Information Systems Infrastructure
The Individual Final Presentation will entail the development of a detailed presentation that will allow you an opportunity to present a summary of key course concepts. The key course concept summary will be done in one of two ways:
(a) summarize key concepts that you will use in future course work, or
(b) summarize key concepts that you will apply in the work setting.
-
- Students are required to complete and submit this presentation. You may use the course resources for some of your resource material, however, it is expected that you will do research outside of the content posted in this course.
- The Individual Final Presentation must be unique and should not be a restatement of items from the course materials.
- The use of APA is required for citing any in-text citations and providing full references at the end of the presentation.
Course Description
An introduction to information systems infrastructure. Focus is on data communications and networks. Discussion covers layered network architectures and communication hardware. Emerging technologies such as social media, mobile computing, cloud computing, big data, and the Internet of Things are also examined.
Course Introduction
- The Information Systems Infrastructure covers fundamentals of networking, Internet and Intranet, systems and applications, emerging technologies and technological advantages related to Big Data, Cloud Computing, Fog Computing, Internet of Everything (IoE), and Software Defined Networks (SDN), network management, and cyber security
Course Outcomes
-
- Fundamentals of networking – identify and discuss fundamental networking elements and layered network architecture.
- Internet and Intranet – recognize and discuss Internet, Intranet, and Internet and Transport protocols.
- Systems and Application – discuss Web applications, Software Oriented Architecture (SOA), Voice and Video over Internet (VVoIP), and databases; and to assess client-server and peer-to-peer communications.
- Emerging Technologies – evaluate technological advantages related to Big Data, Cloud Computing, Fog Computing, Internet of Everything (IoE), and SDN.
- Network Management – recognize essential functions in network management and operations.
- Cyber Security – identify security vulnerability and provide mitigation mechanisms to prevent, detect, and recover from security threats.