Module Three
Learning Objectives
By the end of this module, you will meet these learning objectives:
Identify equipment needed to create a functioning
network
Describe information technology security concepts
Use technology to map systems
Module Overview
The internet is a staple of American life. In 2012, 74.8% of all
American households had internet use at home (U.S. Census Bureau,
2014). People connect to each other every day via computers, and
they do so through computer networking. Networking is a field that
has opened up many doors for computer usage, not only in the United
States but also around the world. This module will investigate the
fundamental concepts of computer networking. Technical details will
be presented simply, to expose you to key concepts and to initiate
familiarity with frequently used IT terms. Computer networking is a
complex field and cannot be taught in one module. At times,
networking concepts may seem overwhelming; it is important to keep
in mind that this module is an introduction to key concepts.
Advances in computer technology and information technology have
added many advantages to current lifestyles; however, many
significant risks come with those advantages. A substantial amount of
information is accessible and vulnerable on the internet, home
networks, and most businesses intranets or extranets today.
Information assurance (IA) is the field that manages those
vulnerabilities; essentially, it is risk management for online data. In this
module, you will review resources and participate in a discussion with
your peers surrounding basic security concepts you might encounter in
your information technology career. As you consider common security
vulnerabilities such as phishing, consider how you might incorporate
these security concepts into your personal and professional practice.
Module at a Glance
This is the recommended plan for completing the reading assignments
and activities within the module. Additional information can be found
in the module Resources section and on the module table of contents
page.
1. Take the weekly Check Your Knowledge quiz to help gauge
your current understanding of content covered in this module.
2. Review the required resources for Networking.
3. Review the required resources for Security.
a. Complete the discussion: IT Security - Phishing.
4. Review the required resources for Mapping Systems.
a. Complete Module Three Activity: Network
Configuration Model.