Lesson 2.1 – Introduction to Information Technology/C182 – Module 2
· Key Concepts: Difference between Information Technology and Information Systems
· IT Functions in the Organization: User Support, Data Management, Networks, System Integration
· Core Components of IT Software: Software Development, Security, Business Analysis
· Business of IT – Web Development: Intranet, Internet, Extranet – Purpose of each, Examples
· Business of IT Concepts: Business Intelligence, Project Management, Outsourcing Services
Lesson 2.2 – IT as a Discipline/C182 – Module 3
· IT Fields: Computer Engineering, Computer Science, Software Engineering, Information Systems, Information Technology - What do they do? Examples of each
· 5 Generations of Computers: 1st to 5th Generation Hardware Overview, Programming Language, Purpose, Name some significant innovations in the History of Computers Timeline that significantly impacted society and the evolution of computing.
Lesson 2.3 – IT Professionals/C182 – Module 4
· Administrators: Roles: System, Network, Database, Security, Web Administrators - What does each do? Difference between System and Network Administrators, Summary of Administrator Roles
· Architects: Roles: Cloud, Network, Automation, Cybersecurity Architects - What does each do? - Summary of Architect Roles
· Engineers: Roles: Machine Learning, Software, Network, Cloud Engineers, What does each do? Summary of Engineer Roles
· Analysts: Roles: Technical Support, System, Data, Security Analysts, Cybersecurity Specialists, Technical Consultant - What does each do? Summary of Analyst Roles
· Other IT Roles - Roles: Project Managers, Web Developers, Software Testers, Technical Sales -What does each do? Purpose of the IT Department in an Organization
Lesson 2.4 – Data and Information/C182 – Module 5
· The Data Pyramid: Levels: Data, Information, Knowledge, Wisdom – Definition, Examples
· Big Data: Definition and Key Concepts
· Data Types: Structured vs. Unstructured Data – Definition, Examples
· Cloud-Based Systems: IaaS, PaaS, SaaS - Full Name, Purpose, Examples
· Data Management: Data Sources: Where companies store data, Data Quality: Importance for businesses, Data Hygiene: Dirty data, data scrubbing, types of bad data
· Quality Data Attributes: Precise, Valid, Reliable, Timely, Complete
Lesson 2.5 – Computer Systems/C182 – Module 6
· Key Components: Hardware, Software, Middleware – Definition, Examples, Purpose, How Hardware, Software, and Middleware Work Together
· Hardware Elements: Components: Motherboard, CPU, RAM, Hard Drive, Power Supply - Definitions
· Network Types: LAN, WAN – Definitions, Examples
· Network Designs: Client to Server, Peer to Peer – Definitions, Examples
· Network Topologies: Types of Topologies, Four Physical Topologies
· What is a Protocol? Most Popular Protocol, Special Purpose Computer Systems for Networks, Purpose of Network Operating Systems and Software Applications
· Summary Questions: Importance of IT Department in an Organization, How Supporting Business Goals with Data/Information Systems Aids Success, Basic Network Structure, Role of the Network as a Framework for the Business Economy Section/Unit 3 Study Guide
Lesson 3.1 – The History of the Computer/C182 – Module 8
· Computer Generations: 1st to 4th: Hardware: Key advancements in each generation, Programming Language: Types of languages developed/used, Purpose: Who used these computers and why; Name some Innovations that represent critical advancements in the evolution of computing, from simple calculation tools to sophisticated, interconnected devices.
Lesson 3.2 – Introduction to Computer Hardware/C182 – Module 9
· Device Types: Input Devices: 3 examples, Output Devices: 3 examples, Storage: 3 examples
· Key Components: CPU, RAM, Hard Drive, Graphics Processor Unit, Expansion Card - Responsibilities and functions of each component
Lesson 3.3 – Components of Computer Hardware/C182 – Module 10
· CPU (Central Processing Unit): What does CPU stand for? Responsibilities of the CPU, Speed measurement, 3 parts of the CPU, Meaning of IPOS
· CPU Parts: Arithmetic Logic Unit, Control Unit, Process Register - Definitions
· Buses: Address Bus, Data Bus, Control Bus - Definitions and roles
· The System Unit: Motherboard: Examples of components, Purpose of the system clock, Secondary Storage: Definition, Examples, Expansion slot’s purpose, Ports purpose, Peripheral Devices: What they are and examples
· Communication Devices: Examples: Modem, Network Cables, Satellite, Wireless, Bluetooth - Definitions and uses
· Types of Computers: Supercomputer, Mainframe, Workstation, Microcomputer - Designed for whom, Reason for development, Purpose and examples
· Personal Computers: Laptop, Desktop, Handheld/Mobile - Performance comparison and use cases
· Communication Devices: Purpose of communication devices, Typical communication alternatives
v Section/Unit 4 Study Guide
Lesson 4.1 – Introduction to Computer Networks/C182 – Module 12
· Basics: What are Networks? How do Networks Work?
· Network Types: PAN, LAN, WAN: Focus on Full Names, Descriptions, Distances, and Examples
· Key Concepts: Public Domain, 3rd Party, Open Network, TCP/IP Protocol
· Network Topologies: Bus, Star, Ring, Mesh, Hybrid: Understand Descriptions, How They Work, and Advantages/Disadvantages
· Protocols: What are protocols? Importance of protocols in networks Why vendors use protocols
· Network Models: Client/Server and Peer-to-Peer
· Distributed Systems: Cluster, Grid, Cloud Computing: Descriptions, How They Work, and Examples
Lesson 4.2 – Network Hardware/C182 – Module 13
· Transmission Media: UTP, STP: Full Names, How They Work, Length, Advantages/Disadvantages
· Additional Mediums: Coaxial, Fiber-Optic, Wireless Transmission: Descriptions, How They Work, Length, and Examples
· Combining Networks: Repeaters, Bridges, Switches, Routers: How Each Works
Lesson 4.3 – The Architecture of the Internet/C182 – Module 14
· 3 Tiers of ISPs: Tier 1, Tier 2, Tier 3: Descriptions, Distances, and Examples
· Internet Addressing: IPv4 and IPv6, Example of an IPv4 Address, Top-Level Domains, DNS (Domain Name System), Domain Names, DNS Organization and Resolution
· Internet Applications: Email, VoIP, Streaming: Email Protocols, What is VoIP? What is a Softphone?, What is an Analog Telephone?, On-Demand Streaming, Broadcasting, Large-Scale Streaming Services
· URLs: Definition, Components, and Structure
· Web Languages: XML, HTML: Full Names and Descriptions
Lesson 4.4 – Network Security & Business Implications/C182 – Module 15
· Malware: Definition and Purpose
· Types of Malwares: Virus, Worm, Spyware, Phishing: Descriptions and Harm Caused
· Other Types of Attacks: DoS, Packet Sniffing, Brute Force, Dictionary: Descriptions and Harm Caused
· Protection and Risk Management: Firewall, Proxy, Network Auditing, Antivirus: Descriptions and How They Protect Systems
v Section/Unit 5: Study Guide
Section 5.1 – Computer Systems/C182 – Module 17
o Application Software vs. Systems Software: Descriptions, Differences and roles of each type, Examples: Key examples of application and systems software
Section 5.2 – Operating Systems/C182 – Module 18
o Operating System Basics: What does an operating system do? Basic tasks of an operating system
o Categories of Operating Systems: Network Operating Systems, Server Operating Systems, Mobile Operating Systems, Personal Computer Operating Systems, Desktop Operating Systems
o Most Common Operating Systems: Windows, MacOS, Linux – Descriptions, Open or Closed Source, what they are known for, Flavors of Linux
o Mobile Operating Systems: Google Android, Apple iOS – Descriptions, Open or Closed Source
o Utility Software: Definition and examples
o Kernel: What is the Kernel? Basic functions of the Kernel
o User Interfaces: Types of Interfaces: Graphical User Interfaces (GUIs), Command-line Interfaces (CLIs) - Descriptions and examples
o User Accounts: Information used for accounts, who establishes end-user accounts
o File Management: What do file managers do? What is a directory path?
o File Structure Differences: Windows vs. Linux - Directory path usage (forward or backward slash), Definitions of root and home directories
o Memory Management: What is memory management? Definitions of paging and virtual memory
o Device Drivers: What are device drivers? Where they are stored, Alternate names, Examples of device drivers
Section 5.3 – Other Software Classification and Groups/C182 – Module 19
o Software Types: Productivity, Collaborative, Specialized Software – Descriptions, Examples
o Software Architecture: Application Software: Bespoke, Off-the-Shelf, Hybrid - Features/Purpose, Controlled By, Cost, Time
o Local vs. Cloud Applications: Differences and examples
o Software Licensing: Closed-Source vs. Open-Source – Descriptions, Examples, Purpose
o Software Packaging: Shareware, Freeware, Public Domain – Descriptions, Protected by EULA, Copyright, or IP Protections (Yes/No)
o Copyrights and Patents: Software packaging with 35-year protection, Definition of copyright and examples, Patents, utility patents, and design patents
Section 5.4 – Programming and Scripting/C182 – Module 20
o Programming Concepts: What is word programming? Programs that instruct the computer Can computers understand human language? Current communication methods with computers
o Source Code vs. Machine Code: Definitions, Translation methods (Compiler vs. Interpreter)
o Compiler vs. Interpreter: How they work - When code is checked for errors, Error resolution timing, Advantages/Disadvantages, Examples
o Algorithms: What is an algorithm? Purpose of algorithms
v Section/Unit 6: Data Study Guide
Lesson 6.1 – Introduction to the Management of Data/C182 – Module 22
o Key Concepts: Importance of database management systems, Need for database research, Connection between databases and the World Wide Web
Lesson 6.1 – Activity – Types of Data/C182 – Module 22
o Data Types: Integers, Floating Point Numbers, Characters, Character Strings, Boolean Values - Definitions and examples
Lesson 6.1 – Database Management Systems/C182 – Module 24
o System Structure: Number of layers in a database management system, Application Layer: Definition and how it works
o Database Components: Definition of a database table, how data is stored, Definition of records and fields
Lesson 6.1 – Flat-File and Hierarchical Databases/C182 – Module 22
o Database Types: Definition and structure of Flat-File Database, Hierarchical Database, Relational Database, Unique Identifier, PK (Primary Key) and FK (Foreign Key),
Lesson 6.2 – Databases Operations/C182 – Module 23
o More Databases: Object-Oriented (OO) Databases, NoSQL Databases: Types and uses, Graph Stores, Wide-Column Stores, Document-Format Databases, Cloud Databases, Data Lakes, Distributed Databases
o SQL Basics: Purpose of an SQL statement, Connection between SQL and the database server
o SQL Keywords and Operations: Selection Operation: Purpose, Keywords: SELECT, FROM, WHERE, and what the asterisk (*) means, Operations: Union, Product, Join
Lesson 6.3 – Database Management and Administration Tools/C182 – Module 24
o DBA Responsibilities: Role and duties of a Database Administrator (DBA)
o Business Intelligence: Definition and significance
o Database Management Tools: Examples of common tools used in database management
v Section/Unit 7: The Business of IT – Study Guide
Lesson 7.1 – Introduction to the Business of IT/C182 – Module 26
o Core Concepts: What is Information Technology? What is IT Governance? What is the Software Development Life Cycle (SDLC)? What are Project Management Frameworks? What are Digital Enterprises?
o Digital Enterprise Components: Descriptions, Advantages/Disadvantages: Communication, Data Collection & Management, Information Security Management, Consumer Relationship Management, Process Improvement
o IT's Role and Goals: Role of IT within an organization, Definitions of strategic, tactical, and operational goals, What IT governance provides to the IT function, How IT governance supports regulatory compliance and initiatives
o IT Organizational System: Roles and Responsibilities – Responsibilities and Examples: Network Admin, System Admin, Web Admin, Database Admin, Cybersecurity Analyst, Technical Support Specialist
o Outsourcing Concepts: Definitions of outsourcing, offshoring, nearshoring, project outsourcing, and insourcing
Lesson 7.2 – Introduction to Project Management/C182 – Module 27
o Project Management Frameworks: Purpose of frameworks, 4 Phases of Project Management Life Cycle: Project Initiation, Planning, Execution, Closure – Descriptions, Tasks/Activities, Documentation, Purpose
o SMART Goals - S, M, A, R, T - What each letter stands for, Description, Example
o CLEAR Framework: C, L, E, A, R - What each letter stands for, Description
o Project Planning Documents: Descriptions - Scope Statement, WBS, Milestones, Communication Plan, Risk Management Plan -
o Risk Management: Risk Types: Execution, Integration, Unknown, Descriptions, Mitigation Strategies, Common Project Risks: Scope Creep, Budget Risk, Resistance to Change, Resource Risk, Contract Risk, Disputes, Dependencies, Assumptions, Benefit Shortfall, Requirements Quality, Force Majeure, Handling risks during Project Planning Phase
Lesson 7.3 – System Development Life Cycle/C182 – Module 28
o System Development Life Cycle (SDLC) - Phases of SDLC, Definitions: CASE (Computer-Aided Software Engineering), IDEs (Integrated Development Environments), What is requirement analysis?
o 3 Steps of Requirement Analysis Process - System Requirement Specification (SRS), Comparison: Requirements Analysis vs. Design, System Maintenance: Activities and Categories
o Software Maintenance Categories: Corrective, Adaptive, Perfective, Preventative – Purpose, Examples
o Testing Concepts: Definitions: Pareto Principle, Basis Path Testing, Glass-box Testing, Black-box Testing
o Testing Stages: Alpha, Beta (Pilot Testing), User Acceptance- Descriptions, Examples
o Documentation Types: User, System, Technical Documentation - Descriptions
o Development Models: Definitions: Waterfall Model, Prototyping, Rapid Prototyping, Agile Model, Scrum, Steps of Scrum, Extreme Programming (XP) Model
o Disaster Recovery and Business Continuity: Definitions: Disaster Recovery Plans, Business Continuity Plans, Strategies: Data Mirroring, Data Backups, Off-Site Storage, Hot-Storage, Cold-Storage – Descriptions, Advantages/Disadvantages
o Off-Site Storage Criteria - 5 Key Criteria for Assessment
Lesson 7.4 – Current and Emerging Technologies/C182 – Module 29
o Emerging Trends in IT: Mobile Computing, Internet of Things (IoT), Globalization – Descriptions, Examples, Advantages/Disadvantages
o Globalization and IT Revolution - Description of their interconnection
v Section/Unit 8: Ethics Study Guide
Lesson 8.1 Introduction to Ethics//C182 – Module 31
o Core Concepts: What are ethics? What are regulations? What is character-based ethics? What are the 10 commandments of computer ethics? What is Asimov’s 3 laws of robotics? What is information privacy? Importance of ethics in IT
Lesson 8.2 – Ethics/C182 – Module 32
o Professional Organizations: What do these organizations support and what is their significance - ACM (Association for Computing Machinery), IEEE (Institute of Electrical and Electronics Engineers), ASA (American Statistical Association), AITP (Association of Information Technology Professionals), AWC (Association for Women in Computing), AAAI (Association for the Advancement of Artificial Intelligence), ABET (Accreditation Board for Engineering and Technology)
o Organizational Ethics: Definition of organizational culture, Ethical code of conduct in an organization, What is AUP (Acceptable Use Policy)?, Definition of conflict of interest, Comparison: Privacy vs. Security
o Privacy & Computer Professionals: Roles and Descriptions: Computing Professionals, Data Analysis, Networking Professionals, Software Developers
o CIA Triad: Confidentiality, Integrity, Availability – Descriptions, Purpose, How the CIA Triad works together
o Security Threats: How Big Data and IoT pose security threats
Lesson 8.3 The Legal Context for Computing/C182 – Module 33
o Regulatory Bodies: FCC (Federal Communications Commission), NIST (National Institute of Standards and Technology), NSA (National Security Agency)
o U.S. IT Regulations: Computer Fraud & Abuse Act, Electronic Communication Privacy Act, Communication Assistance for Law Enforcement Act, Anticybersquatting Consumer Protection Act, Federal Information Security Management Act (FISMA), Health Insurance Portability and Accountability Act (HIPAA), Section 508 of the Rehabilitation Act, Family Educational Rights and Privacy Act (FERPA), Computer Matching and Privacy Protection Act