|
|
|
||
The subject concerns basic working principals of computer networks and operating systems. It explains each OSI model layer and explains functions of the layers. It identifies the most common threats in computer networks and teaches how to set basic security settings. The basic settings and functions of the key computer network services are explained.
Last update: HOREJSJ (25.06.2013)
|
|
||
R: J. Lasser, Rozumíme Unixu, Computer Press, 2002, ISBN: 80-7226-706-X R: J.C. Mackin, T. Northrup, Configuring Windows Server 2008 Network Infrastructure, MSPRESS, 2008, ISBN: 978-0-7356-2512-9 A: D. L. Shinder, Počítačové sítě, Softpress, Praha, 2003, ISBN: 80-251-0178-9 Last update: Fialová Jana (30.09.2013)
|
|
||
1. Addressing scheme of IPv4, network mask, understanding of VLSM 2. Structure of computer network, characteristics and division, ISO/OSI model, protocols TCP and UDP, basic terms 3. Operating systems Unix and Linux, basic characteristics, installation 4. Linux Shell, basic use and commands 5. MS Windows Server 2008, basic characteristics, installation, protection using BITLocker 6. Translation of names to IP address in local, NETBIOS, LLMNR and WINS in MS Windows 7. DNS server, basic characteristics, use and settings in MS Windows Server 2008 8. DHCP, basic characteristics, use and settings in MS Windows Server 2008 9. IPSec protocol, basic characteristics, use and settings in MS Windows server 2008, Telnet 10. Connecting to the networks, NAT a PAT, Wireless networks, basic characteristics, use and settings 11. Certificates, security in computer networks, basic characteristics, use and settings 12. Backup and Recovery in MS Windows server 2008, basic characteristics, use and settings 13. Clusters and High Availability (HA), basic characteristics, use and settings 14. Storage Area Network (SAN), basic characteristics, use and settings Last update: HOREJSJ (25.06.2013)
|
|
||
www.linux.org Last update: HOREJSJ (01.08.2013)
|
|
||
Students will be able: Differentiate each OSI model layer function Identify security risks in computer networks and basic security settings to mitigate the risks To set key services necessary in order to correct function of modern computer networks. Last update: TAJ445 (14.12.2013)
|
|
||
There are no prerequisites. Last update: HOREJSJ (01.08.2013)
|
Teaching methods | ||||
Activity | Credits | Hours | ||
Účast na přednáškách | 0.5 | 14 | ||
Příprava na přednášky, semináře, laboratoře, exkurzi nebo praxi | 1.5 | 42 | ||
Práce na individuálním projektu | 0.5 | 14 | ||
Příprava na zkoušku a její absolvování | 1 | 28 | ||
Účast na seminářích | 1.5 | 42 | ||
5 / 5 | 140 / 140 |
Coursework assessment | |
Form | Significance |
Defense of an individual project | 20 |
Continuous assessment of study performance and course -credit tests | 60 |
Oral examination | 20 |