COS 109: Computer and Network Operations

A study of the concepts, principles, tools, and constraints related to computer and network operations, including the following topics: shell scripting, information technology system components, systems policy and governance, operating systems management, network devices, and virtual machines. Students will install and configure commodity operating systems, manage users, analyze system logs, write scripts to automate systems administration, review and write information technology policies, and related activities.

Cybersecurity Knowledge Areas

  • Basic Scripting
  • Information Technology System Components
  • Policy. Legal, Ethics and Compliance
  • Security Policy and Governance
  • Systems Administration


CAE 2014 Topics

  • Information Technology System Components (tier 1)
    • Workstations
  • Policy. Legal, Ethics and Compliance (tier 1)
  • Systems Administration (tier 1)
    • OS Installation

CAE 2014 Outcomes

  • Basic Scripting (tier 1)
    • Demonstrate their proficiency in the use of scripting languages to write simple scripts (e.g., to automate system administration tasks)
  • Information Technology System Components (tier 1)
    • Students will be able to describe the hardware components of modern computing environments and their individual functions.
  • Policy. Legal, Ethics and Compliance (tier 1)
    • List the applicable laws and policies related to cyber defense and describe the major components of each pertaining to the storage and transmission of data
  • Systems Administration (tier 1)
    • Apply the knowledge gained to successfully install and securely configure, operate and maintain a commodity OS, to include: setting up user accounts, configuring appropriate authentication policies, configuring audit capabilities, performing back-ups, installing patches and updates, reviewing security logs, and restoring the system from a backup

ACM 2013 Outcomes

  • Security Policy and Governance (tier 3)
    • Describe the concept of privacy including personally private information, potential violations of privacy due to security mechanisms, and describe how privacy protection mechanisms run in conflict with security mechanisms

236 W. Reade Ave., Upland, IN 46989 · 765-998-5162 ·
Copyright © 2016 Taylor University Computer Science and Engineering