The page uses Browser Access Keys to help with keyboard navigation. Click to learn moreSkip to Navigation

Different browsers use different keystrokes to activate accesskey shortcuts. Please reference the following list to use access keys on your system.

Alt and the accesskey, for Internet Explorer on Windows
Shift and Alt and the accesskey, for Firefox on Windows
Shift and Esc and the accesskey, for Windows or Mac
Ctrl and the accesskey, for the following browsers on a Mac: Internet Explorer 5.2, Safari 1.2, Firefox, Mozilla, Netscape 6+.

We use the following access keys on our gateway

n Skip to Navigation
k Accesskeys description
h Help
   
Website Catalog
SUNY Broome Community College
   
 
  Jan 17, 2018
 
 
    
Website Catalog
[Add to Portfolio]

CST 209 - Advanced Computer Networking


This course provides an in depth exploration of current and next generation computer networking, data communication and telecommunication technologies including hardware, software, and applications.  Students will gain experience with server class operating systems, server applications installation and configuration, client server application development tools, secure data transmission, network security fundamentals, and network management.

Prerequisite- Corequisite
Prerequisite:  CST 208W Introduction to Networking, CST 113 Introduction to Programming

Credits: 3
Hours
2 Class Hours, 2 Laboratory Hours
Course Profile
Learning Outcomes of the Course:

Upon successful completion of this course the student will be able to:

1.  Discuss the various topologies used to construct computer networks.
2.  Build networks using hubs, switches and routers.
3.  Understand the function of each layer in the ISO/OSI and TCP/IP protocol stacks.
4.  Install and/or configure a computer to participate in a secure network using VPNs.
5.  Use advanced troubleshooting techniques to solve network problems.
6.  Install and configure remote connectivity and file transfer programs.
7.  Explain the role of server computers in the client server network paradigm, configure server applications, and develop/modify client server applications.
8.  Implement various methods to mitigate risks and threats associated with networked computers.



[Add to Portfolio]