Fall 2012 Virtualization, Network Security, Linux, ITSM / ITIL Education / Training at TCC

vmware-logo.jpg

VMware Academic Program

 

Tidewater Community College is proud to announce an academic partnership with VMware and EMC. This partnership will allow students to earn the VMware Certified Professional (VCP) credential for about 15% of what it would otherwise cost as well as the EMC Proven Professional Associate Certification for Storage Area Networks (SANs).  

 

ITN 171 Unix I – Online Course #52424 - Section # O01C - Provides an introduction to UNIX-like operating systems. Teaches login procedures, file creation, UNIX file structure, input/output control, and the UNIX shells.

ITN260 Network Security Basics - Tuesdays 6-9:30pm Course#53590 Section# N01C - This course lays the foundation for further study in the virtualization program. Content domains include cryptography, communications security, infrastructure security, operating system security, wireless security, intrusion detection, malicious software, common attacks, and countermeasures. Also available online Course# 53591 Section O02C.

 

ITN 213 Information Storage and Management – Mondays 6 to 9:30pm – Course# 53588 Section# N01C - Focuses on advanced storage systems, protocols, and architectures, including Storage Area Networks (SAN), Network-Attached Storage (NAS), Fibre Channel Networks, Internet Protocol SANs (IPSAN), iSCSI, and Content-Addressable Storage (CAS). Prepares students for the EMC Proven Professional Associate Certification exam.

\

ITN 254 VMware Virtual Infrastructure: Install and Configure– Thursdays 6 to 9:30pm - Course #53589 Section N01C - Explore virtual network design and implementation, storage area networks, virtual switching, virtual system management, engineering for high availability, and virtualization security. Covers the vSphere 5 VMware Certified Professional (VCP) exam domains. Students get free exam vouchers at the end of the course (a $175 value).

\

 

ITN 255 VMware Virtual Infrastructure: Deploy, Secure, and Analyze - Focuses on advanced troubleshooting, performance management, and security for VMware Virtual Infrastructure. Prepares students for the VMware Certified Advanced Professional (VCAP) Data Center Administrator exam. Next section available Spring 2013.

\

 

 

For information, contact Robert Guess rguess@tcc.edu 757-822-5022

 

BACKGROUND: WHAT IS VIRTUALIZATION?

“Virtualization lets you run multiple virtual machines on a single physical machine, sharing the resources of that single computer across multiple environments. Different virtual machines can run different operating systems and multiple applications on the same physical computer.”[1] IBM introduced virtualization in 1972 and, for several decades, this was solely utilized in mainframe environments. In the 1990s, cheaper servers utilizing Intel x86-based microprocessors began to proliferate and dominate server facilities. This proliferation led to enormous server farms being built, particularly in California. In the mid-to-late 1990s, Stanford University researcher Mendel Rosenblum recognized a number of problems with this. The power required to run these facilities was taxing California’s electrical grid. The cooling and power requirements of large data centers were enormous and wasteful. In the early 2000s, rolling blackouts were instituted as a way of dealing with these tremendous and wasteful demands.

chart_server_virtualization.gif image003.gif

       

       Fig 1. Virtualization Architecture                        Fig 2. A Three Server Virtual Infrastucture

 

Mendel Rosenblum’s research into virtualization on Intel microprocessor-based servers led to the eventual creation of VMware virtual machine software and the establishment of VMware Incorporated. By consolidating dozens of smaller physical servers onto a single large server, the power and cooling requirements are vastly reduced. This green technology also has a pleasant side-effect of lowering overall costs to build and maintain computing infrastructure. Later, the ability to cluster several of the servers together was introduced and led to a great leap forward in the ability to create dynamic, self-healing networks. If a member of a VMware physical server cluster fails, the virtual servers running on it can dynamically migrate to another member of the cluster reducing downtime to no more than a few seconds. These “High Availability” features have led to vast improvements in disaster recovery and business continuity planning.

 

In these economic times, any technology that enables organizations to improve operational effectiveness while reducing operational expenses is gaining market share. The virtualization of the computing infrastructure is revolutionizing how companies deploy and utilize server technology. By allowing multiple “virtual” servers to run on a single physical computer, organizations are conserving financial resources, reducing the need for heating, cooling, electricity, and data center space while improving the effectiveness of disaster recovery and business continuity. This “green” technology can save organizations a great deal of money while improving service availability, disaster recovery capabilities, and business continuity planning. While the faculty at Tidewater Community College have used virtualization technology in the classroom for years, shifts in the marketplace have pushed what was once a niche technology toward widespread enterprise adoption. Over 14,000 people attended the VMworld conference, reflecting a 30 percent increase over the previous year's conference.

 

WHO IS USING VIRTUALIZATION TECHNOLOGY?

 

VMware has captured nearly 100% of the enterprise market for virtualization technology. Using VMware, Nortel decreased 3000 servers to 300, reducing operational expenses while increasing availability. The IRS reduced procurement times for new servers from six months to minutes, vastly reducing the cost of new deployments. School systems use VMware to upgrade servers in place without actually replacing the computer hardware, reducing the cost of upgrades. A large health care concern uses virtual infrastructure to improve the reliability and availability of patient information systems.

 

Department of Defense (DOD) employees and contractors use VMware to standardize server builds, increasing security and reliability while reducing the time and expense involved in deploying new servers. The Marine Corps has a goal of virtualizing 98 percent of their computing infrastructure by 2012. The Federal Bureau of Investigation uses VMware in the evidence management system for the Computer Analysis Response Team.  The National Security Agency (NSA) has created true multilevel security systems (MLS) using VMware technology (Netop), which is the basis for the development of the NSA High-Assurance Platform (HAP) workstation. It is clear that virtualization technology is on the ascendency.

 

When contacted about interest in this innovative program, the manager of a large incident response team states, “A project I work on is currently leveraging this technology at an aggressive pace and would definitely benefit from the availability of VMware courses. My employer is on track to fully deploy this technology in our environment. Being that we have over 200 local administrators, I expect demand to be rather high.”

 

WHY IS INFORMATION STORAGE AND MANAGEMENT IMPORTANT?

 

By 2011, the digital universe will be 10 times the size it was in 2006.[2] To deal with the explosion of data, the IT industry must manage more complex information storage environments that are increasingly difficult to manage. Large numbers of new information management professionals will be required by 2012, but the skilled individuals who can manage the explosion of digital information are in short supply. Management policies need to be developed to deal with the creation, storage, security, retention, and disposal of digital information, including virtualization. As most enterprise virtualization projects rely upon storage area network technologies such as those provided by EMC, TCC has elected to include a dedicated course on storage area network (SAN) management as a part of this innovative program.

 

Network Security Fall 2012@TCC

 

ITN 260 Network Security Basics - Face to Face Tuesday 6 to 9:30pm - Section N01C Course - 53590 - Online Section O02C - Course 53591 - This course lays the foundation for further study in the network security program. Content domains include cryptography, communications security, infrastructure security, operating system security, wireless security, intrusion detection, malicious software, common attacks, and countermeasures. This course, among others, has helped hundreds of students to comply with DOD 8570.01m.

ITN 261 Network Attacks, Computer Crimes and Hacking - Section N01c - Course 53592 - Wednesdays 6 to 9:30pm - In ITN 261, students learn the latest vulnerability assessment strategies to fix security issues before the attackers have a chance to exploit them. From port scan to buffer overflow, hands-on labs teach students effective computer/network attack and defense techniques. Prerequisite: ITN 260 Network Security Basics

ITN 267 Legal Topics in Network Security - Section O01C - Course 53594 – Online - Find out how to protect your legal interests! In this course, students learn about the numerous laws affecting intellectual property, computer crime, privacy, and technology. Covers the Law, Investigation, and Ethics domain of the CISSP certification.

ITN 213 Information Storage and ManagementMondays 6 to 9:30pm – Course# 53588 Section# N01C - Focuses on advanced storage systems, protocols, and architectures, including Storage Area Networks (SAN), Network-Attached Storage (NAS), Fibre Channel Networks, Internet Protocol SANs (IPSAN), iSCSI, and Content-Addressable Storage (CAS). Prepares students for the EMC Proven Professional Associate Certification exam.

ITN 254 VMware Virtual Infrastructure: Install and ConfigureThursdays 6 to 9:30pm - Course # 53589 Section N01C - Explore virtual network design and implementation, storage area networks, virtual switching, virtual system management, engineering for high availability, and virtualization security. Covers the vSphere 4.1 VMware Certified Professional (VCP) exam domains..

For information, contact Robert Guess rguess@tcc.edu 822-5022


TCC Network Security Program Courses

 

 

ITN 260 Network Security Basics Network Security Basics lays the foundation for further study in the network security program. Content domains include cryptography, public-key infrastructure, communications security, infrastructure security, operating system security, wireless security, intrusion detection, perimeter security, malicious software, common attacks and countermeasures.

ITN 261 Network Attacks, Computer Crime and Hacking (4 CR) Provides an in-depth exploration of various methods for attacking and defending a network. Explores network security concepts from the point of view of hackers and their attack methodologies. Discusses hackers, attacks, malicious code, computer crime and industrial espionage.

ITN 262 Network Communication, Security and Authentication (4 CR) Students learn how to analyze network traffic to reveal malicious attacks, configure intrusion detection systems and write signatures to detect and react to the latest threats. Provides an in-depth exploration of various communication protocols with a concentration on TCP/IP.

ITN 263 Internet/Intranet Firewalls and E-commerce Security (4 CR) Provides an in-depth exploration of firewalls, virtual private networks and proxy servers. Explores firewall concepts, types, topology and the firewall's relationship to the TCP/IP protocol. Students configure firewalls in a scenario driven by real-world needs.

ITN 266 Network Security Layers (4 CR) Provides an in-depth exploration of the layers of security needed to protect an organization’s interests. Emphasis is on the Nation Security Agency model of Defense in Depth. The OCTAVE security methodology is introduced and students use case studies to apply the knowledge gained to real-world business environments.

ITN 267 Legal Topics in Network Security (Cyberlaw) (3 CR) Provides an in-depth exploration of the civil and common law issues that apply to network security. Explores statutes, jurisdictional and constitutional issues related to computer crime and privacy. Discusses intellectual property and privacy rights in the digital age.

ITN 275 Incident Response and Computer Forensics (4 CR) This course focuses upon the collection, identification, documentation, preservation and interpretation of computer resident evidence. Data collection and analysis will be presented in the contexts of root cause analysis and crime scene investigation.  The preservation of best evidence using non-destructive methods, rules of evidence, maintenance of integrity and presentation in legal proceedings will be discussed.

 

For more information, contact Robert Guess rguess@tcc.edu 757-822-5022

 

 

Red Hat Academy - Register Now for Fall 2012!

 

Demand for certified Linux professionals is surging in our local area. To meet this demand, Tidewater Community College and Red Hat have teamed up to offer the Red Hat Academy. The RHA offers performance-based training for Linux and open source technology. Through the Red Hat Academy, TCC provides Red Hat Certified System Administrator (RHCSA) and Red Hat Certified Engineer (RHCE) Training and Certification opportunities. Qualifying students get to take the exams FREE of charge - a $1200 value! For further information about the academy, please email rguess@tcc.edu or rking@tcc.edu.

 

 

ITN 171 Unix I - Online 4 credits – Online Course # 52424 Section # O02C - Provides an introduction to UNIX-like operating systems (like Linux, Apple OS-X, and Google Android). Teaches the UNIX shells and shell scripting to end users.

 

ITN 170 Linux System Administration - Course# 52421 Section#N01C Tuesdays 6:00pm – 9:30pm 4Cr Focuses on the installation, configuration and administration of the Linux operating system. Emphasis is placed upon use of Linux as a network client and workstation. Leads to Red Hat Certified System Administrator (RHCSA) Certification Exam. Prerequisite: ITN 171

 

ITN 270 Advanced Linux Network Administration -  Focuses on the configuration and administration of the Linux operating system as a network server. Emphasis is placed upon the configuration of common network services and security. Leads to Red Hat Certified Engineer (RHCE) Certification Exam.  Prerequisite: ITN170. Next available in spring 2013.

 

 

 

IT Service Management (ITIL 2011)

 

 

Are your IT systems based skills ready to excel in a services based economy?

 

 

Systems expertise and technical knowledge alone is no longer sufficient to demonstrate value in the global IT environment. Business pressures and IT commoditization are driving IT professionals to optimize the quality and performance of their services based on evolving standards, reference models and frameworks. Standardization, compliance and value-based service management systems are the new norms and knowledge of key supporting areas are strongly sought across industry and government sectors.  Demand for ITSM skills is now higher in the U.S. Job market than the supply of skilled, certified people available in the IT community.[i]

 

Tidewater Community Collegein partnership with IBM’s Academic Initiative and the ANSI’s University Outreach is proud to announce a new addition to our IT Systems program specializing in IT Service Management (ITSM) best practices. This course provides students familiarization with the most recent standards and models as well as a practical approach for enterprise level implementation and integration within an organization’s Business Services Management program. It also serves as primer for ITIL V3 Foundations preparing students for this optional certification available at the TCC local testing center.

 

ITN 193 Foundations of Information Technology Service Management –Tuesdays 6 to 9:30pm Course 54258 Section N01C- Covers the terminology, structure, concepts, principles and  implementation approaches for Information Technology Service Management (ITSM) based on the Information Technology Infrastructure Library (ITIL  2011) best practices framework and other relevant global standards.

 

 

 

For information, contact Robert Guess rguess@tcc.edu 757-822-5022

 

image010.jpg

 

 



[1] “Virtualization Basics” <http://www.vmware.com/virtualization>

[2] International Data Corporation, “The Diverse and Exploding Digital Universe: Executive Summary,” White Paper, March 2008 <http://www.emc.com/collateral/analyst-reports/diverse-exploding-idc-exec-summary.pdf>



[i]Gartner Group, “Experienced ITIL® Consultants Are Few and Far Between”, 2004