Istm140L - Linux Fundamentals: Proposed Schedule
Istm140L - Linux Fundamentals: Proposed Schedule
Istm140L - Linux Fundamentals: Proposed Schedule
PROPOSED SCHEDULE
This course uses the TestOut LabSim package for Linux Pro. It contains all of your quizzes and lab
assignments. Your grade is determined based on your performance on these assignments.
You may work the class at your own pace. However, you must complete the class by the end of the
term. Keep in mind that TestOut tracks your performance as well as your participation in minutes.
There is a lot of material in this class. Use the following schedule as a guide to where you should be by
week.
Week
Topics
Sections
Maps to*
Using Linux
T2
T10
Complete chapter 9
T4, T9
System Monitoring
Complete chapter 10
T7
Networking
Complete chapter 11
T11
10
Security
Complete chapter 12
T4, T6,
T10, T12
Finals
T3, T8
T1
O1
Remember, you can take the internal quizzes as often as you wish. Be sure to finish with your highest
score. You may take the practice exams as often as you wish. These are not scored and will not count
towards your grade. You may take the final only once.
If you choose to sit for the CompTIA Linux+ certification, you are responsible for your own testing and
fees. MHCC is a Pearson Vue test site.
Grade assignment is the college standard A = 90%, B = 80%, C = 70%, D = 60%, F = 59+ and below.
CAE MAPPING
Mt. Hood Community College is designated by the National Security Administration (NSA) and the US
Department of Homeland Security (DHS) as a Center for Academic Excellence 2 Year (CAE-2y). This
core class is mapped to specific Knowledge Units (KUs) administered by the National INFOSEC
Education and Training Program (NIETP).
This class maps specifically to the Outcomes and Topics of the System Administration KU. Specific
mappings are identified in the schedule above and relate to the Outcomes and Topics listed here.
Current information on all KUs is available at cyberedwiki.org.
OUTCOMES
1.
Students will be able to apply the knowledge gained to successfully install and securely
configure, operate and maintain a commodity OS, to include: setting up user accounts,
configuring appropriate authentication policies, configuring audit capabilities, performing
back-ups, installing patches and updates, reviewing security logs, and restoring the system
from a backup.
TOPICS
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
OS Installation
User accounts management (Access controls, Password Policies, Authentications Methods,
Group Policies)
Command Line Interfaces
Configuration Management
Updates and patches (Specifics covered in other classes)
Event Logging and Auditing (for performance and security)
Managing System Services
Virtualization
Backup and Restoring Data
File System Security
Network Configuration (port security)
Host (Workstation/Server) Intrusion Detection
Security Policy Development (Covered in other classes)