G Saunders' Home

INFO300 - IT Infrastructure & Security

Course Description:

The course introduces principles of computer hardware and software architecture & organization, surveys what is likely to be encountered in the IT legacy today and what's emerging, introduces data structures & algorithms, provides some experience with Linux OS via command line.

Text: Operating Systems: A Systematic View; Davis & Rajkumar; Addison Wesley. The 5th edition is in the bookstore, the 6th edition is current on-line. Either will work for the course.

Projects include: Using CASE (Visio) and office tools to diagram and make a bill of details for a medium-sized LAN; and, Exercises to introduce the unix/linux command line; Some Programming in an open source environment to introduce algorithms for processing data structures.

Lecture and demonstrations will introduce basic networking concepts, hardware, & software. The instructor will set up a Linux firewall/router and demo basic network configuration and troubleshooting.

A 'term paper' or other written project will be assigned.

Course Objectives:

At the completion of the course the successful student will demonstrate:

  1. An ability to apply knowledge of computing and mathematics appropriate to the discipline.
  2. An understanding of system and network security fundamentals and current standards of practice.
  3. An understanding of computing hardware fundamentals, including classes of computer platforms, processor architectures, and basic networking & internetworking.
  4. An understanding of software fundamentals and architecture, and types of software and data involved in business systems.
  5. An understanding of operating systems likely to be encountered in business.
  6. Some experience with Linux/*ix at the command line and with server-based text editors, setting file permissions, &c. A project using HTML, CSS, linux command line, and the vi editor will be assigned, with results like these.
  7. An ability to communicate effectively about historical, current, and emerging computing technology.
  8. An ability to use a CASE tool (Visio) to accurately diagram a network of moderate complexity, to specifications provided by the instructor. A project similar to these will be assigned, with lab time in class to get started.
  9. An ability to state basic requirements and components for system and network security.
  10. An ability to describe and diagram primitive data structures, express structured algorithms for their processing, and write scripts handling data in them.


Here's a breakdown of points for Summer 2017:

Quiz #3 will be given at the exam time. Students who need to take or want to retake Quiz #1 or #2 may take either quiz after Quiz #3. Students who would like to retake both Quiz #1 and #2 may take a cumulative exam that has questions from the topics for Quiz #1 and #2. If a quiz is retaken the score earned on the exam day will be posted -- this is not 'the highest grade will be posted'. If the cumulative exam is taken, the score earned will replace both Quiz #1 and Quiz #2.

Quizzes ask for short essays, short answers, definitions, & sketches & diagrams in response to questions about concepts presented in the text and in class.

Policy on quizzes: All quizzes must be taken at the announced time. The makeup for any missed quiz will be given at the scheduled exam day & time for the class, regardless of the reason the quiz was missed.

Policy on not wandering out of and back into class: If you must walk out of a class, please take your stuff with you and do not walk back in. Take care of any personal issues before class. Silence cellphones prior to class and do not place or answer calls in class.

VCU Honor Code and Conduct Policy

VCU Honor Code and Conduct Policy This serves as notice of what happens when students cheat, facilitate academic dishonesty, or otherwise misbehave at VCU. When I observe cheating I turn the matter over to the University's Honor Coordinator and certify that I have posted notices about the Honor Code and discussed them in class.

In this class Cheating would be copying from a 'crib sheet' or another student's test. Or, It would also be Cheating to submit a LAN or WAN Bill of Details that was actually done by another person. Students are encouraged to work together and learn tools together, but each student should start with an empty file and fill it with their own keystrokes and mouse clicks. It is not appropriate for two students to submit a project as 'a team' unless the project has been assigned as a team. It is never appropriate to take a file, or any element of a project, that another student has made, modify it, and submit it as one's own work. Giving another student a copy of you LAN project is 'facilitating academic dishonesty', which is another form of cheating. Do not give other students copies of your files! Some will present your work as their own and expose you to an honor violation.

G Saunders,
Dept of Information Systems
VCU School of Business

G Saunders Wings

Content © 1999 - Today
By G Saunders
Images are Available on the Web