You are on page 1of 25

CIS 329 Administering Desktop Clients

(Prerequisite: CIS 175)

COURSE DESCRIPTION
Provides students with the knowledge and skills necessary to perform administration tasks in a peer to peer network or server centric network. Administration topics include installation, configuration, user management, resource management, and security.

INSTRUCTIONAL MATERIALS
Required Resources Zacker, C. (2011). Microsoft Official Academic Course. 70-680: Windows 7 Configuration, Lab Manual. Danvers, MA: John W iley and Sons. Zacker, C. (2011). Microsoft Official Academic Course. 70-680: Windows 7 Configuration, Textbook . Danvers, MA: John W iley and Sons. Microsoft Office, Microsoft Visio, and Microsoft Project or their equivalents such as Open Project, Dia, and OpenOffice are required. Tutorials for Microsoft Office 2010 can be found on Microsofts support site, located at http://office.microsoft.com/en-us/support/training-FX101782702.aspx MOAC Labs Online for MOAC 70-680 Windows 7 Configuration. Wiley. WileyPLUS will be used in this course and is integrated with the online course shell. Students are emailed a registration code for this product when they purchase new course materials from MBS Direct Bookstore, located at http://bookstore.mbsdirect.net/strayer.htm Supplemental Resources Beezix, Inc. (2009). Windows 7 quick reference guide (cheat sheet of instructions, tips & shortcuts laminated card). Salt Lake City, UT: Beezix, Inc. Bott, E., Siechert, C., & Stinson, C. (2011). Windows 7 inside out, deluxe edition. Redmond, W A: Microsoft Press. Karp, D. A. (2010). Windows 7 annoyances: Tips, secrets, and solutions . Sebastopol, CA: OReilly Media, Inc. Microsoft Corporation. (2012). Getting started with Windows 7. Retrieved from http://windows.microsoft.com/en-US/windows7/help/getting-started Microsoft Corporation. (2012). Microsoft accessibility: Technology for everyone, Accessibility tutorials for Microsoft products. Retrieved from http://www.microsoft.com/enable/training/default.aspx Microsoft Corporation. (2012). Windows 7 videos: Check out these featured videos and get to know Windows 7. Retrieved from http://windows.microsoft.com/en-US/windows7/products/videos Pouge, D. (2010). Windows 7: The missing manual. Sebastopol, CA: O'Reilly Media, Inc. Stanek. W. R. (2009). Windows 7 administrator's pocket consultant. Redmond, WA: Microsoft Press. Tulloch, M., Corporation, M., Northrup, T., Honeycutt, J., & Wilson, E. (2010). Windows 7 resource kit. Redmond, W A: Microsoft Press.

2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 329 Student Version 1132 (1028 12-6-2012) Page 1 of 25

CIS 329 Administering Desktop Clients


COURSE LEARNING OUTCOMES
1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. Identify computing conditions in which a system needs to be reconfigured. Demonstrate the ability to install and configure an operating system and its associated updates. Validate and successfully install a computer operating system. Demonstrate the ability to discuss the migration phases and considerations in an operating system installation. Prepare an enterprise environment for systems deployment using image files. Configure and define the disks and devices in an operating system environment. Demonstrate the ability to configure networking settings in an operating systems environment. Compare and contrast among different layers of networking stack as it relates to operating systems. Demonstrate the ability to apply technology tools to monitor and configure network performance. Demonstrate the ability to set and configure resource permissions. Demonstrate the ability to describe and configure secure computing applications. Analyze computer performance and performance statistics. Describe the properties of user accounts and configure its components. Demonstrate authentication and authorization in configuring secure user accounts. Demonstrate operating system troubleshooting techniques. Demonstrate the ability to understand operating system administration activities. Develop a deployment and troubleshooting plan for an operating system environment. Discuss and configure mobile computing options. Use technology and information resources to research issues in desktop administration and operating system environments. Write clearly and concisely about desktop administration and operating system environments using proper writing mechanics and technical style conventions.

2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 329 Student Version 1132 (1028 12-6-2012) Page 2 of 25

CIS 329 Administering Desktop Clients


WEEKLY COURSE SCHEDULE
The standard requirement for a 4.5 credit hour course is for students to spend 13.5 hours in weekly work. This includes preparation, activities, and evaluation regardless of delivery mode. Week 1 Preparation Reading(s) o Lesson 1: Introducing Windows 7 o Lesson 2: Installing W indows 7 Preparation, Activities, and Evaluation Points

e-Activities o Go to the Microsoft Website to read about W indows 7 editions, located at http://windows.microsoft.com/enUS/windows7/products/compare. Be prepared to discuss. o Go to the TechRepublic Website to read the article titled Plan Clients W indows 7 Upgrade with these useful tips, located at http://www.techrepublic.com/blog/project-management/plan-clientswindows-7-upgrade-with-these-useful-tips/1024. Be prepared to discuss. Activities Discussions Evaluation Graded Evaluation o None Non-Graded W ileyPLUS Optional Evaluation o WileyPLUS Activity: Practice Assignments 01.01 through 01.06 o WileyPLUS Activity: Practice Assignments 02.01 through 02.05 Reading(s) o Lesson 3: Deploying W indows 7 10

Preparation

e-Activity o Go to the Microsoft TechNet Website to read the article titled Building a Standard Image of Windows 7: Step-by-Step Guide, located at http://technet.microsoft.com/enus/library/ee523217(WS.10).aspx. Be prepared to discuss. Activities Discussions Evaluation Graded Evaluation o Quiz 1: Lessons 1 and 2 o Lab 1: MOAC Labs 1, 2, and 3 o Lab 2: MOAC Labs 4 and 5 Non-Graded W ileyPLUS Optional Evaluation o WileyPLUS Activity: Practice Assignments 03.01 through 03.04 10

30 33 22

2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 329 Student Version 1132 (1028 12-6-2012) Page 3 of 25

CIS 329 Administering Desktop Clients


3 Preparation Reading(s) o Lesson 4: W orking with Disks and Devices

e-Activity o Go to the Seagate W ebsite to read the article title Hard Drive Basics, located at http://www.seagate.com/ww/v/index.jsp?vgnextoid=2df42bb581b51 210VgnVCM1000001a48090aRCRD. Be prepared to discuss. Activities Discussions Evaluation 4 Graded Evaluation o Lab 3: MOAC Lab 6 Non-Graded W ileyPLUS Optional Evaluation o WileyPLUS Activity: Practice Assignments 04.01 through 04.03 Reading(s) o Lesson 5: Connecting to a Network 10

11

Preparation

e-Activity o Go to http://www.openbookconsulting.org/giip/lectures04/lecture2osi-supplimental.pdf to read James Bond Meets the 7 Layer OSI Model; afterward, visit http://www.answersthatwork.com/Download_Area/ATW_Library/Net working/Network 2-List_of_Common_TCPIP_port_numbers.pdf to read List of Common TCP/IP Port Numbers. Be prepared to discuss. Activities Discussions Evaluation Graded Evaluation o Quiz 2: Lessons 3 and 4 o Lab 4: MOAC Lab 7 Non-Graded W ileyPLUS Optional Evaluation o WileyPLUS Activity: Practice Assignments 05.01 through 05.02 Reading(s) o Lesson 6: Sharing Resources 10

30 11

Preparation

e-Activity o Go to the Microsoft TechNet Website to read the article titled Set Permissions on a Shared Resource, located at http://technet.microsoft.com/en-us/library/cc772501.aspx. Be prepared to discuss. Activities Discussions Evaluation 10

2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 329 Student Version 1132 (1028 12-6-2012) Page 4 of 25

CIS 329 Administering Desktop Clients


Graded Evaluation o Midterm Exam: Lesson 1 through 5 o Lab 5: MOAC Labs 8 and 9 Non-Graded W ileyPLUS Optional Evaluation o WileyPLUS Activity: Practice Assignments 06.01 through 06.03 Reading(s) o Lesson 7: W orking with Applications 100 22

Preparation

e-Activity o Go to the Microsoft TechNet Website to read the article titled Understanding Application Compatibility, located at http://technet.microsoft.com/en-us/library/ee449431(WS.10).aspx. Be prepared to discuss. Activities Discussions Evaluation Graded Evaluation o Lab 6: MOAC Lab 10 o Assignment 1: IT Consultation for Mr. Green Non-Graded W ileyPLUS Optional Evaluation o WileyPLUS Activity: Practice Assignments 07.01 through 07.03 10

11 100

Preparation Reading(s) o Lesson 8: Managing and Monitoring Windows 7 Performance o Lesson 9: W orking with W orkgroups and Domains e-Activity o Go to the TechRepublic Website to read the article titled Keep tabs on ReadyBoost with W indows 7s Performance Monitor, located at http://www.techrepublic.com/blog/window-on-windows/keep-tabson-readyboost-with-windows-7s-performance-monitor/2257. Be prepared to discuss. Activities Discussions Evaluation Graded Evaluation o Quiz 3: Lessons 6 and 7 o Lab 7: MOAC Labs 11 and 12 Non-Graded W ileyPLUS Optional Evaluation o WileyPLUS Activity: Practice Assignments 08.01 through 09.03 Reading(s) o Lesson 10: Securing Windows 7 e-Activity o Go to the E-Week Website to read the article titled How to Protect 10

30 21

Preparation

2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 329 Student Version 1132 (1028 12-6-2012) Page 5 of 25

CIS 329 Administering Desktop Clients


Sensitive Data Using Database Encryption, located at http://www.eweek.com/c/a/Database/How-to-Protect-SensitiveData-using-Database-Encryption/. Be prepared to discuss. Activities Discussions Evaluation Graded Evaluation o Lab 8: MOAC Lab 13 Note: The lab is called Configuring Security Settings and is about Windows Firewall. It uses IIS to generate the sample network traffic that the firewall blocks and later allows. The following links my help for students who are unfamiliar with IIS: Installing IIS 7.5 on Windows 7 Home Premium, Home Basic, or Home Starter http://technet.microsoft.com/en-us/library/cc731911 Installing IIS 7.5 on Windows 7 Professional, Enterprise, or Ultimate http://technet.microsoft.com/en-us/library/cc725762 IIS 7 Operations Guide. It contains step-by-step instructions for performing administrative tasks for Web servers, sites, and applications. http://technet.microsoft.com/en-us/library/cc732976(v=ws.10) Non-Graded W ileyPLUS Optional Evaluation o WileyPLUS Activity: Practice Assignments 10.01 through 10.03 10

10

Preparation Reading(s) o Lesson 11: Administering Windows 7 e-Activity o Go to the Apple W ebsite to read the article titled Mac OS 7.x 9.x Troubleshooting Startup Issues, located at http://support.apple.com/kb/TS1926. Be prepared to discuss. Activities Discussions Evaluation Graded Evaluation o Quiz 4: Lessons 8 through 10 o Lab 9: MOAC Labs 14 and 15 o Assignment 2: Windows 7 Workgroup Consultation for Sally Chu Non-Graded W ileyPLUS Optional Evaluation o WileyPLUS Activity: Practice Assignments 11.01 through 11.03 10

30 20 100

10

Preparation Reading(s) o Lesson 12: Using Mobile Computers Activities Discussions 10

2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 329 Student Version 1132 (1028 12-6-2012) Page 6 of 25

CIS 329 Administering Desktop Clients


Evaluation Graded Evaluation o Lab 10: MOAC Labs 16, 17, and 18 Note: MOAC Lab 18 is not graded but students are encouraged to perform it as there is value. o Technical Paper Project: Disseminating Organizational IT Security and Troubleshooting Best Practices Non-Graded W ileyPLUS Optional Evaluation o WileyPLUS Activity: Practice Assignments 12.01 through 12.04 19

200

11

Preparation Reading(s): None Activities Discussions Evaluation Graded Evaluation o Final Exam: Lessons 5 through 12 Non-Graded W ileyPLUS Optional Evaluation o None 100

2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 329 Student Version 1132 (1028 12-6-2012) Page 7 of 25

CIS 329 Administering Desktop Clients


GRADING SCALE UNDERGRADUATE
Assignment Quizzes (4 quizzes total) Lab Participation (18 MOAC labs, MOAC Lab 1-11, 11 points apiece; MOAC Lab 12-16, 10 points apiece; MOAC Lab 17, 9 points) Note: MOAC Lab 18 is not graded Assignment 1: IT Consultation for Mr. Green Assignment 2: Windows 7 Workgroup Consultation for Sally Chu Technical Paper Project: Disseminating Organizational IT Security and Troubleshooting Best Practices Midterm Exam (Lessons 1-4) Final Exam (Lessons 5-12) Total Points 120 180 % of Grade 12% 18%

100 100 200 100 100

10% 10% 20% 10% 10%

Tests are open book with a 2-hour time limit and may contain multiple choice, true / false, and essay questions. Participation (20 discussions worth 5 points apiece) Note: W eek 11 discussions are not graded. Total 100 1,000 10% 100%

Points 900 1,000 800 899 700 799 600 699 Below 600

Percentage 90% 100% 80% 89% 70% 79% 60% 69% Below 60%

Grade A B C D F

Writing Assignments The objective of the School of Information Systems writing assignments is to promote attitudes and skills that will improve a students ability to communicate in writing, develop research skills and documentation techniques, and encourage critical analysis of data and conclusions specific to the course learning outcomes in the information systems and technology domain.

2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 329 Student Version 1132 (1028 12-6-2012) Page 8 of 25

CIS 329 Assignments and Rubrics


Assignment 1: IT Consultation for Mr. Green Due Week 6 and worth 100 points You are a private computer consultant. Anew client, Mr. Green, has approached you to offer general IT consultation to his small business. Mr. Greens business is currently not networked. However, his business is growing substantially and he is thinking about becoming networked. His IT infrastructure, as small as it is, consists of several stand-alone machines installed with W indows 7 Home Premium. Write a two to three (2-3) page paper in which you analyze and solve the following issues: Mr. Green recommends installing the Windows 7 Ultimate version since he believes all the networking features he requires can be provided by this ultimate version. Mr. Greens stand-alone machines consist of 2 GHz processors, 4 GBs of system memory, and approximately 350 GBs of free hard drive space. At the same time, Mr. Green is concerned that this potential new edition may not be the correct one for his needs although he wants to experiment with it and be able to resort back to the previous version, if possible. 1. List and explain the concerns about Windows 7 Ultimates capabilities that Mr. Green should be aware of currently. 2. List and explain the concerns about Windows 7 Ultimates capabilities that Mr. Green should be aware of down the line as his business and network grows. 3. Use Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, or OpenOffice to illustrate the steps of the most efficient method for Mr. Green to install W indows 7 Ultimate. Note: The graphically depicted solution is not included in the required page length. 4. Explain your graphically depicted solution for the most efficient method for Mr. Green to install Windows 7 Ultimate. 5. Describe the concerns you have about helping Mr. Green experiment with W indows 7 Ultimate without requiring a commitment to it. Once networked, Mr. Greens staff will need to have constant access to shared files (even when the network goes down) and have the ability to quickly search the network for specific shared files. Staff will also require seamless access to the cloud if the network goes down. Also, the network administrator that Mr. Green hires will need to quickly create Group Policy Objects (GPOs) and use tools to quickly troubleshoot potential IT issues. Mr. Green asks you if these things will be a concern with W indows 7. 6. List and describe the features of Windows 7 Ultimate that can provide all of this functionality, if existent. Several years have passed, you are still providing networking consultation to Mr. Green, and his business has successfully grown into an enterprise running a W indows Server 2008 network. You need to install Windows 7 Enterprise and required updates, applications, etc. on a few dozen computers. Mr. Green has a computer with W indows 7 Enterprise and applications he uses for his business installed to use as a model for the computers he wants on his network. 7. Explain three (3) migration strategies that should be used in this scenario and how they differ from how you performed stand-alone installations of Windows 7 Ultimate a few years back. For legacy testing purposes, a user requires two (2) different W indows-based operating systems installed on the same computer: W indows 98 and W indows XP Professional. You decide you want to configure a second computer to provide her with this capability. 8. List the steps necessary for providing a user with the capability of running two (2) different Windows-based operating systems installed on the same computer. 9. Explain the reason for choosing a particular hard disk partitioning style, disk type, and file system. 10. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 329 Student Version 1132 (1028 12-6-2012) Page 9 of 25

CIS 329 Assignments and Rubrics


Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the students name, the professors name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. Include charts or diagrams created in Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, and OpenOffice. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

The specific course learning outcomes associated with this assignment are: Identify computing conditions in which a system needs to be reconfigured. Demonstrate the ability to install and configure an operating system and its associated updates. Validate and successfully install a computer operating system. Demonstrate the ability to discuss the migration phases and considerations in an operating system installation. Prepare an enterprise environment for systems deployment using image files. Configure and define the disks and devices in an operating system environment. Use technology and information resources to research issues in desktop administration and operating system environments. Write clearly and concisely about desktop administration and operating system environments using proper writing mechanics and technical style conventions.

Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric. Points: 100 Assignment 1: IT Consultation for Mr. Green Meets Minimum Expectations 60-69% D
Insufficiently listed and insufficiently explained the concerns about Windows 7 Ultimates capabilities that Mr. Green should be aware of currently. Insufficiently listed and insufficiently explained the

Criteria

Unacceptable Below 60% F


Did not submit or incompletely listed and did not submit or incompletely explained the concerns about Windows 7 Ultimates capabilities that Mr. Green should be aware of currently. Did not submit or incompletely listed and did not submit or

Fair 70-79% C
Partially listed and partially explained the concerns about Windows 7 Ultimates capabilities that Mr. Green should be aware of currently.

Proficient 80-89% B
Satisfactorily listed and satisfactorily explained the concerns about Windows 7 Ultimates capabilities that Mr. Green should be aware of currently. Satisfactorily listed and satisfactorily explained the

Exemplary 90-100% A
Thoroughly listed and thoroughly explained the concerns about Windows 7 Ultimates capabilities that Mr. Green should be aware of currently. Thoroughly listed and thoroughly explained the

1. List and explain the concerns about Windows 7 Ultimates capabilities that Mr. Green should be aware of currently. Weight: 5%

2. List and explain the concerns about Windows 7 Ultimates capabilities that Mr.

Partially listed and partially explained the concerns about

2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 329 Student Version 1132 (1028 12-6-2012) Page 10 of 25

CIS 329 Assignments and Rubrics


Green should be aware of down the line as his business and network grows. Weight: 5% incompletely explained the concerns about Windows 7 Ultimates capabilities that Mr. Green should be aware of down the line as his business and network grows. Did not submit or incompletely used Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, or OpenOffice to illustrate the steps of the most efficient method for Mr. Green to install Windows 7 Ultimate. Did not submit or incompletely explained your graphically depicted solution for the most efficient method for Mr. Green to install Windows 7 Ultimate. Did not submit or incompletely described the concerns you have about helping Mr. Green experiment with Windows 7 Ultimate without requiring a commitment to it. Did not submit or incompletely listed and described the features of Windows 7 Ultimate that can provide all of this functionality, if concerns about Windows 7 Ultimates capabilities that Mr. Green should be aware of down the line as his business and network grows. Insufficiently used Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, or OpenOffice to illustrate the steps of the most efficient method for Mr. Green to install Windows 7 Ultimate. Insufficiently explained your graphically depicted solution for the most efficient method for Mr. Green to install Windows 7 Ultimate. Insufficiently described the concerns you have about helping Mr. Green experiment with Windows 7 Ultimate without requiring a commitment to it. Insufficiently listed and described the features of Windows 7 Ultimate that can provide all of this functionality, if Windows 7 Ultimates capabilities that Mr. Green should be aware of down the line as his business and network grows. concerns about Windows 7 Ultimates capabilities that Mr. Green should be aware of down the line as his business and network grows. Satisfactorily used Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, or OpenOffice to illustrate the steps of the most efficient method for Mr. Green to install Windows 7 Ultimate. Satisfactorily explained your graphically depicted solution for the most efficient method for Mr. Green to install Windows 7 Ultimate. Satisfactorily described the concerns you have about helping Mr. Green experiment with Windows 7 Ultimate without requiring a commitment to it. Satisfactorily listed and described the features of Windows 7 Ultimate that can provide all of this functionality, if concerns about Windows 7 Ultimates capabilities that Mr. Green should be aware of down the line as his business and network grows. Thoroughly used Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, or OpenOffice to illustrate the steps of the most efficient method for Mr. Green to install Windows 7 Ultimate. Thoroughly explained your graphically depicted solution for the most efficient method for Mr. Green to install Windows 7 Ultimate. Thoroughly described the concerns you have about helping Mr. Green experiment with Windows 7 Ultimate without requiring a commitment to it. Thoroughly listed and described the features of Windows 7 Ultimate that can provide all of this functionality, if

3. Use Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, or OpenOffice to illustrate the steps of the most efficient method for Mr. Green to install Windows 7 Ultimate. Weight: 10%

Partially used Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, or OpenOffice to illustrate the steps of the most efficient method for Mr. Green to install Windows 7 Ultimate. Partially explained your graphically depicted solution for the most efficient method for Mr. Green to install Windows 7 Ultimate. Partially described the concerns you have about helping Mr. Green experiment with Windows 7 Ultimate without requiring a commitment to it. Partially listed and described the features of Windows 7 Ultimate that can provide all of this functionality, if

4. Explain your graphically depicted solution for the most efficient method for Mr. Green to install Windows 7 Ultimate. Weight: 10%

5. Describe the concerns you have about helping Mr. Green experiment with Windows 7 Ultimate without requiring a commitment to it. Weight: 10%

6. List and describe the features of Windows 7 Ultimate that can provide all of this functionality, if existent. Weight: 10%

2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 329 Student Version 1132 (1028 12-6-2012) Page 11 of 25

CIS 329 Assignments and Rubrics


existent. 7. Explain three (3) migration strategies that should be used in this scenario and how they differ from how you performed standalone installations of Windows 7 Ultimate a few years back. Weight: 15% Did not submit or incompletely explained three (3) migration strategies that should be used in this scenario and how they differ from how you performed standalone installations of Windows 7 Ultimate a few years back. existent. Insufficiently explained three (3) migration strategies that should be used in this scenario and how they differ from how you performed stand-alone installations of Windows 7 Ultimate a few years back. existent. Partially explained three (3) migration strategies that should be used in this scenario and how they differ from how you performed stand-alone installations of Windows 7 Ultimate a few years back. existent. Satisfactorily explained three (3) migration strategies that should be used in this scenario and how they differ from how you performed stand-alone installations of Windows 7 Ultimate a few years back. Satisfactorily listed the steps necessary for providing a user with the capability of running two (2) different Windowsbased operating systems installed on the same computer. Satisfactorily explained the reason for choosing a particular hard disk partitioning style, disk type, and file system. Meets number of required references; all references high quality choices. 3-4 errors present existent. Thoroughly explained three (3) migration strategies that should be used in this scenario and how they differ from how you performed stand-alone installations of Windows 7 Ultimate a few years back.

8. List the steps necessary for providing a user with the capability of running two (2) different Windows-based operating systems installed on the same computer. Weight: 10%

Did not submit or incompletely listed the steps necessary for providing a user with the capability of running two (2) different Windows-based operating systems installed on the same computer.

Insufficiently listed the steps necessary for providing a user with the capability of running two (2) different Windowsbased operating systems installed on the same computer. Insufficiently explained the reason for choosing a particular hard disk partitioning style, disk type, and file system. Does not meet the required number of references; all references poor quality choices. 7-8 errors present

Partially listed the steps necessary for providing a user with the capability of running two (2) different Windows-based operating systems installed on the same computer. Partially explained the reason for choosing a particular hard disk partitioning style, disk type, and file system.

Thoroughly listed the steps necessary for providing a user with the capability of running two (2) different Windowsbased operating systems installed on the same computer. Thoroughly explained the reason for choosing a particular hard disk partitioning style, disk type, and file system. Exceeds number of required references; all references high quality choices. 0-2 errors present

9. Explain the reason for choosing a particular hard disk partitioning style, disk type, and file system. Weight: 10%

Did not submit or incompletely explained the reason for choosing a particular hard disk partitioning style, disk type, and file system. No references provided

10. 3 references Weight: 5%

Does not meet the required number of references; some references poor quality choices. 5-6 errors present

11. Clarity, writing mechanics, and formatting requirements Weight: 10%

More than 8 errors present

2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 329 Student Version 1132 (1028 12-6-2012) Page 12 of 25

CIS 329 Assignments and Rubrics


Assignment 2: Windows 7 Workgroup Consultation for Sally Chu Due Week 9 and worth 100 points Imagine you have been hired as a network technology consultant for a small business. The owner of the business, Sally Chu, has asked you to provide assistance in setting up local users on a Windows 7 workgroup network. She also wants you to provide the highest level of security for her network. Write a two to three (2-3) page paper in which you analyze and solve the following issues: Sally wants all six (6) of her administrative staff members to have the same computer-access privileges. She wants them to be able to run applications and use network printers, but not be able to make any accidental changes that can adversely affect their computers. 1. List and explain the steps you would take to provide the most-efficient method of creating user accounts for these employees. Sally wants to be able to provide a high level of authentication for her networks users, so she is asking for a dual authentication process. She has asked you to perform research in this manner by providing two (2) dual authentication methods. 2. Explain two (2) different forms of authentication methods that W indows 7 supports that can be combined with requiring a password for network access. 3. Discuss the advantages and disadvantages of using both the methods youve chosen. Sally has asked you to make security modification to Internet Explorer. You need to ensure all Webbased applications run in protected mode except those that exist on the local intranet since these applications need to write to specific disk space that protected mode prohibits writing to. 4. Develop a strategy to ensure this compatibility by using Microsoft Visio or an open-source alternative to create a process diagram or similar visual depiction to represent the troubleshooting steps you would take. Note: The graphically depicted solution is not included in the required page length. 5. Explain how the firm s employees can remain safe from Internet predators by describing at least two (2) Internet threats and how Internet Explorer 8 can help safeguard them against these threats. In keeping with the need for strong security on the network, you need to ensure all the clients computers are provided with the latest updates. Sally has asked you to provide these updates in the most-efficient and cost-effective manner possible and there should be little drag on the network. Remember, your network does not have Active Directory installed. 6. Describe the update distribution method you would choose and why. 7. Explain how you would plan the distribution of updates on the network. Users are reporting that their clients are running sluggishly. You have decided to monitor the performance of all the clients. 8. List and describe at least three (3) steps you can take using W indows 7 to try to determine what has been slowing down the computers. 9. Use at least three (3) quality resources in this assignment. Note: W ikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the students name, the professors name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 329 Student Version 1132 (1028 12-6-2012) Page 13 of 25

CIS 329 Assignments and Rubrics


Include charts or diagrams created in Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, and OpenOffice. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

The specific course learning outcomes associated with this assignment are: Describe the properties of user accounts and configure its components. Demonstrate authentication and authorization in configuring secure user accounts. Use technology and information resources to research issues in desktop administration and operating system environments. Write clearly and concisely about desktop administration and operating system environments using proper writing mechanics and technical style conventions.

Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric.

Points: 100

Assignment 2: Windows 7 Workgroup Consultation for Sally Chu Meets Minimum Expectations 60-69% D
Insufficiently listed and explained the steps you would take to provide the most-efficient method of creating user accounts for these employees. Insufficiently explained two (2) different forms of authentication methods that Windows 7 supports that can be combined with requiring a password for network access. Insufficiently discussed the advantages and disadvantages of using both

Criteria

Unacceptable Below 60% F


Did not submit or incompletely listed and explained the steps you would take to provide the most-efficient method of creating user accounts for these employees. Did not submit or incompletely explained two (2) different forms of authentication methods that Windows 7 supports that can be combined with requiring a password for network access.

Fair 70-79% C
Partially listed and explained the steps you would take to provide the most-efficient method of creating user accounts for these employees. Partially explained two (2) different forms of authentication methods that Windows 7 supports that can be combined with requiring a password for network access. Partially discussed the advantages and disadvantages of using both

Proficient 80-89% B
Satisfactorily listed and explained the steps you would take to provide the most-efficient method of creating user accounts for these employees. Satisfactorily explained two (2) different forms of authentication methods that Windows 7 supports that can be combined with requiring a password for network access. Satisfactorily discussed the advantages and disadvantages of using both

Exemplary 90-100% A
Thoroughly listed and explained the steps you would take to provide the most-efficient method of creating user accounts for these employees. Thoroughly explained two (2) different forms of authentication methods that Windows 7 supports that can be combined with requiring a password for network access. Thoroughly discussed the advantages and disadvantages of using both

1. List and explain the steps you would take to provide the mostefficient method of creating user accounts for these employees. Weight: 10%

2a. Explain two (2) different forms of authentication methods that Windows 7 supports that can be combined with requiring a password for network access. Weight: 5%

3. Discuss the advantages and disadvantages of using both the methods youve chosen.

Did not submit or incompletely discussed the advantages and disadvantages of using both the

2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 329 Student Version 1132 (1028 12-6-2012) Page 14 of 25

CIS 329 Assignments and Rubrics


Weight: 10% 4. Develop a strategy to ensure this compatibility by using Microsoft Visio or an open-source alternative to create a process diagram or similar visual depiction to represent the troubleshooting steps you would take. Weight: 15% methods youve chosen. Did not submit or incompletely developed a strategy to ensure this compatibility by using Microsoft Visio or an opensource alternative to create a process diagram or similar visual depiction to represent the troubleshooting steps you would take. Did not submit or incompletely explained how the firms employees can remain safe from Internet predators by describing at least two (2) Internet threats and how Internet Explorer 8 can help safeguard them against these threats. Did not submit or incompletely described the update distribution method you would choose and why. Did not submit or incompletely explained how you would plan the distribution of updates on the network. Did not submit or incompletely listed and described at least three (3) steps you can take using Windows 7 the methods youve chosen. Insufficiently developed a strategy to ensure this compatibility by using Microsoft Visio or an open-source alternative to create a process diagram or similar visual depiction to represent the troubleshooting steps you would take. Insufficiently explained how the firms employees can remain safe from Internet predators by describing at least two (2) Internet threats and how Internet Explorer 8 can help safeguard them against these threats. Insufficiently described the update distribution method you would choose and why. Insufficiently explained how you would plan the distribution of updates on the network. Insufficiently listed and described at least three (3) steps you can take using Windows 7 to the methods youve chosen. Partially developed a strategy to ensure this compatibility by using Microsoft Visio or an open-source alternative to create a process diagram or similar visual depiction to represent the troubleshooting steps you would take. Partially explained how the firms employees can remain safe from Internet predators by describing at least two (2) Internet threats and how Internet Explorer 8 can help safeguard them against these threats. Partially described the update distribution method you would choose and why. Partially explained how you would plan the distribution of updates on the network. Partially listed and described at least three (3) steps you can take using Windows 7 to try to determine the methods youve chosen. Satisfactorily developed a strategy to ensure this compatibility by using Microsoft Visio or an open-source alternative to create a process diagram or similar visual depiction to represent the troubleshooting steps you would take. Satisfactorily explained how the firms employees can remain safe from Internet predators by describing at least two (2) Internet threats and how Internet Explorer 8 can help safeguard them against these threats. Satisfactorily described the update distribution method you would choose and why. Satisfactorily explained how you would plan the distribution of updates on the network. Satisfactorily listed and described at least three (3) steps you can take using Windows 7 to the methods youve chosen. Thoroughly developed a strategy to ensure this compatibility by using Microsoft Visio or an open-source alternative to create a process diagram or similar visual depiction to represent the troubleshooting steps you would take. Thoroughly explained how the firms employees can remain safe from Internet predators by describing at least two (2) Internet threats and how Internet Explorer 8 can help safeguard them against these threats. Thoroughly described the update distribution method you would choose and why. Thoroughly explained how you would plan the distribution of updates on the network. Thoroughly listed and described at least three (3) steps you can take using Windows 7 to

5. Explain how the firms employees can remain safe from Internet predators by describing at least two (2) Internet threats and how Internet Explorer 8 can help safeguard them against these threats. Weight: 10%

6. Describe the update distribution method you would choose and why. Weight: 10%

7. Explain how you would plan the distribution of updates on the network. Weight: 10%

8. List and describe at least three (3) steps you can take using Windows 7 to try to determine what has been slowing down the

2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 329 Student Version 1132 (1028 12-6-2012) Page 15 of 25

CIS 329 Assignments and Rubrics


computers. Weight: 15% to try to determine what has been slowing down the computers. No references provided try to determine what has been slowing down the computers. Does not meet the required number of references; all references poor quality choices. 7-8 errors present what has been slowing down the computers. try to determine what has been slowing down the computers. Meets number of required references; all references high quality choices. 3-4 errors present try to determine what has been slowing down the computers. Exceeds number of required references; all references high quality choices. 0-2 errors present

9. 3 references Weight: 5%

Does not meet the required number of references; some references poor quality choices. 5-6 errors present

10. Clarity, writing mechanics, and formatting requirements Weight: 10%

More than 8 errors present

2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 329 Student Version 1132 (1028 12-6-2012) Page 16 of 25

CIS 329 Assignments and Rubrics


Technical Paper Project: Disseminating Organizational IT Security and Troubleshooting Best Practices Due Week 10 and worth 200 points This assignment will contain two (2) Parts: Written Paper and PowerPoint Presentation. The PowerPoint presentation is not included in the page count but is included in the evaluation of your assignment. You must submit both parts for the completion of this assignment. Part 1 Write a ten to fifteen (10-15) page paper in which you analyze and solve the following issues: Imagine you are a senior systems administrator who has recently been given the task to help improve security of your companys IT infrastructure after a series of network security breaches. These breaches included someone accessing the network who was not authorized to do so, and authorized users being asked for their passwords by someone who claimed to work in the IT department. You have also been asked to implement IT troubleshooting best practices to help improve the efficiency of solving IT issues that end users frequently experience. Your first task is to ensure secure user accounts since most network security breaches have occurred through social engineering means. 1. List and discuss two (2) user authentication policies that you can implement to help improve the network s security. You have been asked to develop an action plan that you will use to communicate the importance of IT security to all of the companys employees by creating two unique forms of communication material (e.g., detailed email, detailed memo, brochure, electronic presentation, etc.) to help disseminate the security message to company employees. Approach the communication material from the perspective of the core tasks these employees are responsible for. 2. Create a communication medium that: a. Caters to all company employees and these employees core tasks. b. Approaches this from the perspective of security best practices and awareness from the user perspective. c. Includes at least four (4) best practice methods. d. Includes at least two (2) supplemental graphical renderings of best practice methods through the use of Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, and OpenOffice (flowcharts, process diagrams, tables, etc.). Note: The graphically depicted solution is not included in the required page length. 3. Create a communication medium that: a. Caters to technicians who work in the IT department and these employees core tasks. b. Approaches this communication from the perspective of specific technologies the IT technicians can implement to tighten IT security. c. Includes at least four (4) different Windows 7 technologies, excluding authentication. You need to present IT troubleshooting best practices to junior systems administrators at an IT department meeting to ensure departmental efficiency with solving issues. You want to present some of these issues from a case scenario perspective. 4. Create and describe (3) scenarios where there is an IT problem that requires troubleshooting. 5. Describe the steps you would take to handle the situation by modeling them after an effective troubleshooting methodology for each scenario you previously created in Question four (4). 6. Explain the specific IT administration activities required to solve the problems. 7. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 329 Student Version 1132 (1028 12-6-2012) Page 17 of 25

CIS 329 Assignments and Rubrics


Part 2 Develop a three to six (3-6) slide PowerPoint presentation in which you: 8. Illustrate the authentication policies, in which you identified in Part 1 Question 1, by including at least two (2) SmartArt diagrams graphically depicting them. 9. Describe at least two (2) network security breach scenarios that can be prevented by implementing the authentication policies in which you identified in Part 1 Question 1. 10. Include PowerPoint speaker notes that will accompany each slide with five to ten (5-10) sentences and provide more detail about the slide content to be used when presenting this to a group. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student s name, the professors name, the course title, and the date. The cover page and the reference page are not included in the required page length. Include charts or diagrams created in Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, and OpenOffice. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

The specific Course Learning Outcomes associated with this assignment are: Demonstrate authentication and authorization in configuring secure user accounts. Demonstrate operating system troubleshooting techniques. Demonstrate the ability to understand operating system administration activities. Use technology and information resources to research issues in desktop administration and operating system environments. Write clearly and concisely about desktop administration and operating system environments using proper writing mechanics and technical style conventions.

Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric. Points: 200 Technical Paper Project: Disseminating Organizational IT Security and Troubleshooting Best Practices Meets Minimum Expectations 60-69% D
Insufficiently listed and discussed two (2) user authentication policies that you can implement to help improve the networks

Criteria

Unacceptable Below 60% F


Did not submit or incompletely listed and discussed two (2) user authentication policies that you can implement to help improve the networks

Fair 70-79% C
Partially listed and discussed two (2) user authentication policies that you can implement to help improve the networks

Proficient 80-89% B
Satisfactorily listed and discussed two (2) user authentication policies that you can implement to help improve the networks

Exemplary 90-100% A
Thoroughly listed and discussed two (2) user authentication policies that you can implement to help improve the networks

1. List and discuss two (2) user authentication policies that you can implement to help improve the networks security. Weight: 5%

2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 329 Student Version 1132 (1028 12-6-2012) Page 18 of 25

CIS 329 Assignments and Rubrics


security. 2a. Create a communication medium that caters to all company employees and these employees core tasks. Weight: 5% Did not submit or incompletely created a communication medium that caters to all company employees and these employees core tasks. Did not submit or incompletely created a communication medium that approaches this from the perspective of security best practices and awareness from the user perspective. Did not submit or incompletely created a communication medium that includes at least four (4) best practice methods. Did not submit or incompletely created a communication medium that includes at least two (2) supplemental graphical renderings of best practice methods through the use of Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, and OpenOffice (flowcharts, process diagrams, tables, etc.). Did not submit or incompletely security. Insufficiently created a communication medium that caters to all company employees and these employees core tasks. Insufficiently created a communication medium that approaches this from the perspective of security best practices and awareness from the user perspective. Insufficiently created a communication medium that includes at least four (4) best practice methods. Insufficiently created a communication medium that includes at least two (2) supplemental graphical renderings of best practice methods through the use of Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, and OpenOffice (flowcharts, process diagrams, tables, etc.). Insufficiently created a security. Partially created a communication medium that caters to all company employees and these employees core tasks. Partially created a communication medium that approaches this from the perspective of security best practices and awareness from the user perspective. Partially created a communication medium that includes at least four (4) best practice methods. Partially created a communication medium that includes at least two (2) supplemental graphical renderings of best practice methods through the use of Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, and OpenOffice (flowcharts, process diagrams, tables, etc.). Partially created a security. Satisfactorily created a communication medium that caters to all company employees and these employees core tasks. Satisfactorily created a communication medium that approaches this from the perspective of security best practices and awareness from the user perspective. Satisfactorily created a communication medium that includes at least four (4) best practice methods. Satisfactorily created a communication medium that includes at least two (2) supplemental graphical renderings of best practice methods through the use of Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, and OpenOffice (flowcharts, process diagrams, tables, etc.). Satisfactorily created a security. Thoroughly created a communication medium that caters to all company employees and these employees core tasks. Thoroughly created a communication medium that approaches this from the perspective of security best practices and awareness from the user perspective. Thoroughly created a communication medium that includes at least four (4) best practice methods. Thoroughly created a communication medium that includes at least two (2) supplemental graphical renderings of best practice methods through the use of Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, and OpenOffice (flowcharts, process diagrams, tables, etc.). Thoroughly created a

2b. Create a communication medium that approaches this from the perspective of security best practices and awareness from the user perspective. Weight: 5%

2c. Create a communication medium that includes at least four (4) best practice methods. Weight: 5%

2d. Create a communication medium that includes at least two (2) supplemental graphical renderings of best practice methods through the use of Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, and OpenOffice (flowcharts, process diagrams, tables, etc.). Weight: 5%

3a. Create a communication

2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 329 Student Version 1132 (1028 12-6-2012) Page 19 of 25

CIS 329 Assignments and Rubrics


medium that caters to technicians who work in the IT department and these employees core tasks. Weight: 5% created a communication medium that caters to technicians who work in the IT department and these employees core tasks. Did not submit or incompletely created a communication medium that approaches this communication from the perspective of specific technologies the IT technicians can implement to tighten IT security. Did not submit or incompletely created a communication medium that includes at least four (4) different Windows 7 technologies, excluding authentication. Did not submit or incompletely created and described (3) scenarios where there is an IT problem that requires troubleshooting. Did not submit or incompletely described the steps you would take to handle the situation by modeling them after an effective troubleshooting methodology for each scenario you previously created in Question four (4). communication medium that caters to technicians who work in the IT department and these employees core tasks. Insufficiently created a communication medium that approaches this communication from the perspective of specific technologies the IT technicians can implement to tighten IT security. Insufficiently created a communication medium that includes at least four (4) different Windows 7 technologies, excluding authentication. Insufficiently created and described (3) scenarios where there is an IT problem that requires troubleshooting. Insufficiently described the steps you would take to handle the situation by modeling them after an effective troubleshooting methodology for each scenario you previously created in communication medium that caters to technicians who work in the IT department and these employees core tasks. Partially created a communication medium that approaches this communication from the perspective of specific technologies the IT technicians can implement to tighten IT security. Partially created a communication medium that includes at least four (4) different Windows 7 technologies, excluding authentication. Partially created and described (3) scenarios where there is an IT problem that requires troubleshooting. Partially described the steps you would take to handle the situation by modeling them after an effective troubleshooting methodology for each scenario you previously created in communication medium that caters to technicians who work in the IT department and these employees core tasks. Satisfactorily created a communication medium that approaches this communication from the perspective of specific technologies the IT technicians can implement to tighten IT security. Satisfactorily created a communication medium that includes at least four (4) different Windows 7 technologies, excluding authentication. Satisfactorily created and described (3) scenarios where there is an IT problem that requires troubleshooting. Satisfactorily described the steps you would take to handle the situation by modeling them after an effective troubleshooting methodology for each scenario you previously created in communication medium that caters to technicians who work in the IT department and these employees core tasks. Thoroughly created a communication medium that approaches this communication from the perspective of specific technologies the IT technicians can implement to tighten IT security. Thoroughly created a communication medium that includes at least four (4) different Windows 7 technologies, excluding authentication. Thoroughly created and described (3) scenarios where there is an IT problem that requires troubleshooting. Thoroughly described the steps you would take to handle the situation by modeling them after an effective troubleshooting methodology for each scenario you previously created in

3b. Create a communication medium that approaches this communication from the perspective of specific technologies the IT technicians can implement to tighten IT security. Weight: 5%

3c. Create a communication medium that includes at least four (4) different Windows 7 technologies, excluding authentication. Weight: 5%

4. Create and describe (3) scenarios where there is an IT problem that requires troubleshooting. Weight: 5%

5. Describe the steps you would take to handle the situation by modeling them after an effective troubleshooting methodology for each scenario you previously created in Question four (4). Weight: 5%

2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 329 Student Version 1132 (1028 12-6-2012) Page 20 of 25

CIS 329 Assignments and Rubrics


Question four (4). 6. Explain the specific IT administration activities required to solve the problems. Weight: 5% Did not submit or incompletely explained the specific IT administration activities required to solve the problems. Did not submit or incompletely developed a 3-6 slide PowerPoint presentation in which you illustrated the authentication policies, which you identified in Part 1 Question 1, by including at least two (2) SmartArt diagrams graphically depicting them. Did not submit or incompletely developed a three to six (3-6) slide PowerPoint presentation in which you described at least two (2) network security breach scenarios that can be prevented by implementing the authentication policies which you identified in Part 1 Question 1. Insufficiently explained the specific IT administration activities required to solve the problems. Insufficiently developed a 36 slide PowerPoint presentation in which you illustrated the authentication policies, which you identified in Part 1 Question 1, by including at least two (2) SmartArt diagrams graphically depicting them. Insufficiently developed a three to six (36) slide PowerPoint presentation in which you described at least two (2) network security breach scenarios that can be prevented by implementing the authentication policies which you identified in Part 1 Question 1. Insufficiently developed a three to six (36) slide PowerPoint presentation in which you included PowerPoint speaker notes that will Question four (4). Partially explained the specific IT administration activities required to solve the problems. Partially developed a 36 slide PowerPoint presentation in which you illustrated the authentication policies, which you identified in Part 1 Question 1, by including at least two (2) SmartArt diagrams graphically depicting them. Partially developed a three to six (36) slide PowerPoint presentation in which you described at least two (2) network security breach scenarios that can be prevented by implementing the authentication policies which you identified in Part 1 Question 1. Partially developed a three to six (36) slide PowerPoint presentation in which you included PowerPoint speaker notes that will Question four (4). Satisfactorily explained the specific IT administration activities required to solve the problems. Satisfactorily developed a 36 slide PowerPoint presentation in which you illustrated the authentication policies, which you identified in Part 1 Question 1, by including at least two (2) SmartArt diagrams graphically depicting them. Satisfactorily developed a three to six (36) slide PowerPoint presentation in which you described at least two (2) network security breach scenarios that can be prevented by implementing the authentication policies which you identified in Part 1 Question 1. Satisfactorily developed a three to six (36) slide PowerPoint presentation in which you included PowerPoint speaker notes that will Question four (4). Thoroughly explained the specific IT administration activities required to solve the problems. Thoroughly developed a 36 slide PowerPoint presentation in which you illustrated the authentication policies, which you identified in Part 1 Question 1, by including at least two (2) SmartArt diagrams graphically depicting them. Thoroughly developed a three to six (36) slide PowerPoint presentation in which you described at least two (2) network security breach scenarios that can be prevented by implementing the authentication policies which you identified in Part 1 Question 1. Thoroughly developed a three to six (36) slide PowerPoint presentation in which you included PowerPoint speaker notes that will

7. Develop a 3-6 slide PowerPoint presentation in which you illustrate the authentication policies, which you identified in Part 1 Question 1, by including at least two (2) SmartArt diagrams graphically depicting them. Weight: 10%

8. Develop a three to six (3-6) slide PowerPoint presentation in which you describe at least two (2) network security breach scenarios that can be prevented by implementing the authentication policies which you identified in Part 1 Question 1. Weight: 10%

9. Develop a three to six (3-6) slide PowerPoint presentation in which you include PowerPoint speaker notes that will accompany each slide with five to ten (5-10) sentences and provide more detail

Did not submit or incompletely developed a three to six (3-6) slide PowerPoint presentation in which you included PowerPoint speaker notes that will

2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 329 Student Version 1132 (1028 12-6-2012) Page 21 of 25

CIS 329 Assignments and Rubrics


about the slide content to be used when presenting this to a group. Weight: 10% accompany each slide with five to ten (5-10) sentences and provide more detail about the slide content to be used when presenting this to a group. No references provided accompany each slide with five to ten (510) sentences and provide more detail about the slide content to be used when presenting this to a group. Does not meet the required number of references; all references poor quality choices. 7-8 errors present accompany each slide with five to ten (510) sentences and provide more detail about the slide content to be used when presenting this to a group. Does not meet the required number of references; some references poor quality choices. 5-6 errors present accompany each slide with five to ten (510) sentences and provide more detail about the slide content to be used when presenting this to a group. Meets number of required references; all references high quality choices. accompany each slide with five to ten (510) sentences and provide more detail about the slide content to be used when presenting this to a group. Exceeds number of required references; all references high quality choices. 0-2 errors present

10. 3 references Weight: 5%

11. Clarity, writing mechanics, and formatting requirements Weight: 10%

More than 8 errors present

3-4 errors present

2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 329 Student Version 1132 (1028 12-6-2012) Page 22 of 25

CIS 329 Student Notes


Weekly Course Schedule
The purpose of the course schedule is to give you, at a glance, the required preparation, activities, and evaluation components of your course. For more information about your course, whether on-ground or online, access your online course shell. The expectations for a 4.5 credit hour course are for students to spend 13.5 hours in weekly work. This time estimate includes preparation, activities, and evaluation regardless of the delivery mode.

Instructional Materials
In order to be fully prepared, obtain a copy of the required textbooks and other instructional materials prior to the first day of class. When available, Strayer University provides a link to the first three (3) chapters of your textbook(s) in eBook format. Check your online course shell for availability. Review the online course shell or check with your professor to determine whether Internet-based assignments and activities are used in this course. Strayer students are encouraged to purchase their course materials through our designated bookstore MBS Direct. http://bookstore.mbsdirect.net/strayer.htm If a lab is required for the course, MBS Direct is the only vendor that sells the correct registration code so that Strayer students may access labs successfully.

Discussions
Students taking this course online are required to post their discussions to a weekly thread in the online course shell. To earn full credit in an online threaded discussion, students must have a total of 3 posts per discussion thread. Additionally, the posts must be made on two different days during the week. Please note: Material in the online class will be made available on the previous Thursday. As it is always possible that students could lose their work due to unforeseen circumstances, it is a best practice to routinely save a working draft in a separate file before posting in the course discussion area. Professors hold discussions during class time for on-ground students. Check with your professor if any additional discussion participation is required in the online course shell outside of class hours.

Tests
Tests (quizzes, midterm and final exams, essay exams, lab tests, etc.) are available for student access and completion through the online course shell. Check the online course shell to determine how you are expected to take the tests. Online students are to complete the test by Sunday midnight the week the test is due. On-ground students are to complete the tests after the material is covered and before the next class session.

Assignments
A standardized performance grading rubric is a tool your professor will use to evaluate your written assignments. Review the rubric before submitting assignments that have grading rubrics associated with them to ensure you have met the performance criteria stated on the rubric. Grades are based on individual effort. There is no group grading; however, working in groups in the online or on-ground classroom is acceptable. Assignments for online students are always submitted through the online course shell. On-ground professors will inform students on how to submit assignments, whether in paper format or through the online course shell.
2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 329 Student Version 1132 (1028 12-6-2012) Page 23 of 25

CIS 329 Student Notes


Labs
MOAC Labs are used throughout this course to promote advanced learning opportunities. These labs are required and graded based on student performance. MOAC Labs Online access code: Students who purchased their textbook through Strayer MBS will receive a bundled access code for MOAC Labs Online. Students who did not purchase their textbook bundle through Strayer MBS will still need an access code for the labs. These students will need to purchase an access code at the publishers textbook landing page (http://www.wiley.com/WileyCDA/W ileyTitle/productCdEHEP001592.html)*. Individual access codes are labeled as MOAC Labs Online and can be added to cart for individual purchase. *The provided link is a public Website and may change at the publishers discretion. If a bundled access code was purchased but is not found, students are encouraged to check their textbook packaging for a black or white envelope containing the access card before contacting Strayer Online Technical Support.

MOAC Labs Online student login instructions: Students accessing MOAC Labs Online for the first time must enter their access code. The access code is located in a black or white envelope along with login instructions specific to the individual code. o Students receiving their access code in a black envelope can access MOAC Labs Online by following the instructions printed on the access card, through the online course shell, or at the following Website: http://moac.microsoftlabsonline.com Students receiving their access code in a white envelope can access MOAC Labs Online by following the instructions printed on the access card, or at the following W ebsite: http://itacademy.microsoftelearning.com/

MOAC Labs Online student support: Additional information is available in the student MLO Guide located in the online course shell under Additional Resources in the Student Center tab. Students may also contact Strayer Online Technical Support by logging in to their iCampus account at https://icampus.strayer.edu/login and submitting a case under Student Center, then Submit Help Ticket. Technical Support is available via phone at (877) 642-2999 option 3. For help with log-in or technical and connectivity issues within the labs, MOAC Lab Support is available at (877) 450-9875 or by emailing moacsup@microsoft.com. Hours: 2 am 6 pm PST, Monday through Friday & 9 am 6 pm PST on Sunday

WileyPLUS Practice Certification Exams


Practice certification exams are accessible through the WileyPLUS environment for the duration of your enrollment in this course. Access to the exams will end when the course ends. If interested in retaining the information, you should use the available print option. The practice certification exams are supplemental, non-graded and optional self-tests, located in the WileyPLUS Course Material tab and found in the Assignments link. These practice certification exams do not affect your evaluation for this course and serve as a supplemental resource.

2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 329 Student Version 1132 (1028 12-6-2012) Page 24 of 25

CIS 329 Student Notes


Resources
The Resource Center navigation button in the online course shell contains helpful links. Strayer University Library Resources are available here as well as other important information. You should review this area to find resources and answers to common questions. Technical support is available for the following:

For technical questions, please contact Strayer Online Technical Support by logging in to your iCampus account at https://icampus.strayer.edu/login and submitting a case under Student Center, then Submit Help Ticket. If you are unable to log in to your iCampus account, please contact Technical Support via phone at (877) 642-2999. For concerns with your class, please access the Solution Center by logging in to your iCampus account at https://icampus.strayer.edu/login and submitting a case under Student Center, then Submit Help Ticket. If you are unable to log in to your iCampus account, please contact the IT Help Desk at (866) 610-8123 or at mailto:IThelpdesk@Strayer.edu.

TurnItIn.com is an optional online tool to assess the originality of student written work. Check with your professor for access and use instructions. The Strayer Policies link on the navigation bar in the online course shell contains academic policies. It is important that students be aware of these policies.

2013 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 329 Student Version 1132 (1028 12-6-2012) Page 25 of 25

You might also like