You are on page 1of 177

NATIONAL BOARD FOR TECHNICAL EDUCATION

HIGHER NATIONAL DIPLOMA


(HND)

NETWORKING AND CLOUD COMPUTING

CURRICULUM AND COURSE SPECIFICATION

AUGUST, 2023

PLOT B, BIDA ROAD, P.M.B. 2239, KADUNA – NIGERIA


www.nbte.gov.ng

1
Foreword

The Higher National Diploma (HND) Networking and Cloud Computing curriculum is designed to be used
by training institutions to produce manpower to boost the practice of Networking and Cloud Computing in
Nigeria.

There is therefore the need to produce professional practitioners with good ethics and prospects for career
progression, through the acquisition of desirable knowledge and skills. This necessitated the production of
this national curriculum.
It is my belief that this curriculum and course specifications, which is the minimum required to produce
technologists with sound knowledge and skills in Networking and Cloud Computing, if properly implemented
with the required resources along with qualified candidates being admitted into the programme, will lead to
the production of competent and skilled technologists.

I sincerely appreciate all those who made the development of this curriculum possible. The invaluable
contributions of all the members of the committee and resource persons during the pre-critique and national
critique workshops are appreciated.

I hope that the curriculum would be properly implemented so as to produce the required Work Force of our dream.

Prof. Idris M. Bugaje


Executive Secretary
NBTE, Kaduna

2
TABLE OF CONTENTS

Foreword .......................................................................................................................................................................................................................................... 2
TABLE OF CONTENTS .............................................................................................................................................................................................................. 3
GENERAL INFORMATION ....................................................................................................................................................................................................... 5
CURRICULUM TABLE ............................................................................................................................................................................................................... 9
YEAR ONE SEMESTER ONE COURSES .............................................................................................................................................................................. 13
NETWORKING ESSENTIALS ................................................................................................................................................................................................. 14
VIRTUALIZATION AND CLOUD MIGRATION ................................................................................................................................................................. 29
OPERATING SYSTEM FOR NETWORK ENVIRONMENT .............................................................................................................................................. 37
WIRELESS COMMUNICATION SYSTEMS ......................................................................................................................................................................... 47
COMPUTER ARCHITECTURE ............................................................................................................................................................................................... 53
PYTHON PROGRAMMING BASICS ...................................................................................................................................................................................... 65
YEAR ONE SEMESTER TWO COURSES ............................................................................................................................................................................. 75
ROUTING AND SWITCHING 1 ............................................................................................................................................................................................... 76
CLOUD COMPUTING 1 ............................................................................................................................................................................................................ 83
ADVANCED STATISTICS FOR COMPUTING ..................................................................................................................................................................... 94
ADVANCE WIRELESS NETWORKS ..................................................................................................................................................................................... 99
YEAR TWO SEMESTER ONE COURSES ........................................................................................................................................................................... 104
RESEARCH METHODOLOGY IN NETWORKING AND CLOUD COMPUTING ....................................................................................................... 105
PROJECT MANAGEMENT IN NETWORKING AND CLOUD COMPUTING ............................................................................................................. 112
ROUTING AND SWITCHING II ............................................................................................................................................................................................ 119
NETWORK MONITORING AND TROUBLESHOOTING ................................................................................................................................................ 126
YEAR TWO SEMESTER TWO COURSES .......................................................................................................................................................................... 140

3
CLOUD COMPUTING II ......................................................................................................................................................................................................... 141
ENTERPRISE NETWORKING, SECURITY, AND AUTOMATION................................................................................................................................ 149
ETHICAL AND PROFESSIONAL PRACTICE IN NETWORKING AND CLOUD COMPUTING ............................................................................. 161
INTERNET OF THINGS (IOT)............................................................................................................................................................................................... 168
LIST OF MINIMUM EQUIPMENT REQUIRED IN NETWORKING AND CLOUD COMPUTING LABORATORY............................................. 174
LIST OF PARTICIPANTS (PRE-CRITIQUE WORKSHOP) ............................................................................................................................................. 176

4
GENERAL INFORMATION

1.0 TITLE OF THE PROGRAMME:

Higher National Diploma Networking and Cloud Computing

2.0 GOAL AND OBJECTIVES:

2.1 GOAL: At the end of the programme the students should be able to show competency in Networking and Cloud Computing

2.2 OBJECTIVES OF THE PROGRAMME:

A diplomat of HND Networking and Cloud Computing should be able to:

i. Design, build, secure, and manage networks


ii. Deploy Cloud Computing services
iii. Use Operating Systems in Network Environment
iv. Design and deploy Internet of Things (IOT) solutions
v. Give professional advice to clients on system specifications
vi. Use Python Programming to solve real-life problems
vii. Apply Cloud solutions to solve organizational problems across various industries
viii. Obtain industry-based certification
ix. Conduct independent research
x. Deploy solutions in Virtualized environment
xi. Apply Ethical & Professional Practice in Networking and Cloud Computing
xii. Set up and manage a business.

5
3.0 ENTRY REQUIREMENTS

The general entry requirements for the HND Networking and Cloud Computing Programme are:
(a) In addition to the entry requirement for National Diploma.
(b) ND Computer Science or National Skills Qualification (NSQ) level 3-5 in Networking and Cloud Computing
(c) One (1) year relevant industrial training
(d) NID Networking and System Security
(e) ND Diplomats with a pass (CGPA of 2.0-2.49) in the ND examination with two or more years of cognate experience in the specific field may
be considered.

4.0 CURRICULUM

5.0 STRUCTURE OF PROGRAMME


This is a two-year Programme i.e. four semesters of classroom, laboratory, field and workshop activities in the institution. Each semester shall be
of 17 weeks duration made up as follows:
15 Contact weeks of teaching, i.e. recitation, practical exercises, quiz, tests, etc and 2 weeks for examination and registration.

5.0 EVALUATION SCHEME


The HND Networking and Cloud Computing Examination must be externally moderated. In grading the students, theory shall constitute 40%
while practical and project are 60% respectively.

6.0 ACCREDITATION
Each Programme offered at the HND level shall be accredited by the NBTE before the Diplomates can be awarded the Higher National Diploma
certificates. Details about the process of accrediting a Programme for the award of the HND are available from the office of the Executive Secretary,
National Board for Technical Education, Plot B, Bida Road, P.M.B. 2239, Kaduna, Nigeria.

6
7.0 CONDITIONS FOR THE AWARD OF HND NETWORKING AND CLOUD COMPUTING

Institutions offering this Programme will award the HND certificate to candidates who successfully completed the Programme after passing
prescribed course work, examinations, Project and Industry-based certification as approved by NBTE. Such candidates should have completed a
minimum of 85 semester credit units.

7.1 GRADING OF COURSES: Courses shall be graded as follows:


MARKED RANGE LETTER GRADE WEIGHTING
75% and above A 4.00
70% – 74% AB
GRADE 3.50
65% – 69% B 3.25
60% – 64% BC 3.00
55% – 59% C 2.75
50% – 54% CD 2.50
45% – 49% D 2.25
40% – 44% E 2.00

7.2 CLASSIFICATION OF DIPLOMAS: Higher National Diploma Certificates shall be awarded based on the following classifications:
Distinction - CGPA 3.50-4.00
Upper Credit - CGPA 3.00-3.49
Lower Credit - CGPA 2.50-2.99
Pass - CGPA 2.00-2.49

8.0 QUALIFICATION OF THE TEACHERS:


8.1 Holders of B.Sc/HND or a higher degree qualifications in Computer Science related disciplines
8.2 In addition, teachers of this programme should have been trained and certified by recognized professional and industrial bodies in
Networking and Cloud Computing.

7
9.0 GUIDANCE NOTES FOR TEACHERS OF THE PROGRAMME

9.1 The new curriculum is drawn in unit courses. This is in keeping with the provisions of the National Policy on Education which stresses the
need to introduce the semester credit units which will enable a student who so wish to transfer the units already completed in an institution of
similar standard from which he is transferring.

9.2 In designing the units, the principle of the modular system by product has been adopted; thus, making each of the professional modules,
when completed provides the student with technician operative skills, which can be used for employment purpose.
As the success of the credit unit system depends on the articulation of Programme between the institutions and industry, the curriculum content
has been written in behavioral objectives, so that it is clear to all the expected performances of the student who successfully completed some of
the courses or the diplomates of the Programme. There is a slight departure in the presentation of the performance-based curriculum which requires
the conditions under which the performance is expected to be carried out and the criteria for the acceptable levels of performance. It is a deliberate
attempt to further involve the staff of the department teaching the Programme to write their own curriculum stating the conditions existing in the
institution under which the performance can take place and to follow that with the criteria for defining an acceptable level of performance.
Departmental submission on the final curriculum may be vetted by the Academic Board of the institution.

9.3 Our aim is to continue to see to it that a solid internal evaluation system exists in each institution for ensuring minimum standard and
quality of education in the programmes offered throughout the Technical and Vocational Education (TVE) system.

9.4 The teaching of the theory and practical work should as much as possible be integrated. Practical exercises, especially those in professional
courses and laboratory work should not be taught in isolation from the theory. For most courses, there should be a balance of theory to practice in
the ratio of 40:60

10. MANDATORY SKILLS QUALIFICATION:

8
CURRICULUM TABLE

YEAR ONE SEMESTER ONE

S/N COURSE CODE COURSE TITLE L P CU CH


1 GNS 301 Use of English III 2 0 2 2
2 NCC 311 Networking Essentials 2 2 3 4
3 NCC 312 Virtualization and Cloud Migration 2 2 3 4
4 NCC 313 Operating System for Network Environment 1 2 3 3
5 NCC 314 Wireless Communication Systems 2 2 3 4
6 NCC 315 Computer Architecture 2 1 3 3
7 NCC 316 Python Programming Basics 1 2 2 3
Total 12 11 19 23

9
YEAR ONE, SEMESTER TWO

S/N COURSE CODE COURSE TITLE L P CU CH


1 GNS 302 Communication in English III 2 0 2 2
2 ENT 326 Practice of Entrepreneurship 1 2 2 2 4
3 AIT 313 Artificial Intelligence 2 2 3 4
4 CYS 322 Mobile Wireless Security 2 2 4 4
5 NCC 321 Routing and Switching 1 1 3 4 4
6 NCC 322 Cloud Computing 1 1 2 3 3
7 NCC 323 Advance Statistics for Computing 1 2 3 3
8 NCC 324 Mandatory Skill Qualification 1 0 4 4 4
9 NCC 325 Advanced Wireless Networks 2 2 3 4
Total 13 19 28 32

10
YEAR TWO SEMESTER ONE

S/N COURSE CODE COURSE TITLE L P CU CH


1 GNS 401 Communication in English IV 2 0 2 2
2 ENT 416 Practice of Entrepreneurship II 2 2 4 4
3 AIT 321 Machine Learning 2 2 3 4
4 CYS 412 Data Protection and Privacy 2 1 3 3
5 NCC 411 Research Methodology 2 0 2 2
6 NCC 412 Project Management in Networking & Cloud Computing 1 1 2 2
7 NCC 413 Routing and Switching II 1 3 4 4
8 NCC 414 Networking Troubleshooting & Monitoring 1 2 3 3
9 NCC 415 Mandatory Skills Qualifications II 0 4 4 4
Total 13 15 27 28

11
YEAR TWO, SEMESTER TWO

S/N COURSE CODE COURSE TITLE L P CU CH


1. NCC 421 Cloud Computing II 1 2 3 3

2. NCC 422 Enterprise Networking, Security & Automation 1 3 4 4

3. NCC 423 Ethical & Professional Practice in Networking and Cloud 2 0 2 2


Computing
4. NCC 424 Internet of Things 1 2 3 3

5. NCC 425 Seminar 2 0 2 2

6. NCC 426 Project 0 6 6 6


Total 7 13 20 20

KEY: L= Lecture hours, T= Tutorial hours, P= Practical hours, CU= Credit Units, CH= Contact Hour

12
YEAR ONE SEMESTER ONE COURSES

13
NETWORKING ESSENTIALS
PROGRAMME: HIGHER NATIONAL DIPLOMA (HND) NETWORKING AND CLOUD COMPUTING
COURSE: NETWORKING ESSENTIALS COURSE CODE: NCC 311 Contact Hours: 3 hours /week

CREDIT UNITS: 3 Theoretical: 2 hours /week

Year: 1 Semester: 1 Pre-requisite: Practical: 1 hour/week

GOAL: This course is designed to equip students with networking skills.


GENERAL OBJECTIVES:
On completion of the course, the student should be able to:

1.0 Understand Networks Today


2.0 Understand Protocols and Models
3.0 Know Open System Interconnect (OSI) model
4.0 Understand Ethernet Switching
5.0 Understand Number Systems and IP addressing
6.0 Understand Basic Router and Switch Configuration
7.0 Understand Network Security Fundamentals
8.0 Know how to build Small Networks

14
PROGRAMME: HIGHER NATIONAL DIPLOMA (HND) NETWORKING AND CLOUD COMPUTING
COURSE: NETWORKING COURSE CODE: NCC 311 Contact Hours: 3hours/Week
ESSENTIALS
CREDIT UNIT: 3 Theoretical: 2 Hours/Week
Year: I Semester: I Pre-requisite: Practical: 1 Hour/Week
GOAL: This course is designed to equip students with networking skills.
GENERAL OBJECTIVE: 1.0 Understand networks today
THEORETICAL CONTENT PRACTICAL CONTENT

Week Specific Learning Teacher’s Activities Resources Specific Learning Teacher’s Activities Evaluation
Outcome Outcome
1-2 1.1 Explain how • Explain how Multi-media Identify network devices Demonstrate Network Outline network
networks affect networks affect Projector, Representation using representations
our daily lives. our daily lives. Lecture notes, simulation software. and how they are
Tutorials, used in network
1.2 Outline how host • Explain how host Pictorials Design LAN/WAN Demonstrate how to topologies
and network and network Packet tracer or using the simulator design LAN/WAN using
devices are used devices are used any other the simulator List the
suitable characteristics of a
1.3 Outline network • Explain network simulator Design types of network Demonstrate how to good network
representations representations topologies using the design network topologies
and how they are and how they are simulator using the simulator Describe types of
used in network used in network network
topologies. topologies. topologies

1.4 List the • Compare the


characteristics of characteristics of
common types of common types of
networks. networks.

1.5 Outline how • Explain how


LANs and LANs and WANs
WANs interconnect to the
15
interconnect to internet.
the internet.
1.6 Explain the four • Describe the four
basic basic
requirements of a requirements of a
reliable network. reliable network.
1.7 Outline how • Explain how
trends such as trends such as
BYOD, online BYOD, online
collaboration, collaboration,
video, and cloud video, and cloud
computing are computing are
changing the way changing the way
we interact we interact

1.8 Explain some • Identify some


basic security basic security
threats and threats and
solutions for all solution for all
networks networks

1.9 Outline •
Explain
employment employment
opportunities in opportunities in
the networking the networking
field field
• GENERAL OBJECTIVE 2.0: Understand protocols and models
2.1 Outline the types • Describe the types Multi-media Investigate the TCP/IP Guide students to; Explain why
3-4 of rules that are of rules that are Projector, and OSI Models in • Investigate the protocols are
necessary to necessary to Lecture notes, Action using packet TCP/IP and OSI necessary in
successfully successfully Tutorials, tracer Models in Action network
communicate. communicate. Pictorials using packet tracer communication
Wireshark Install Wireshark to • Install Wireshark
2.2 Narrate why • Explain why packet tracer or view network traffic. to view Network Explain the
16
protocols are protocols are other network Traffic purpose of
necessary for necessary in simulators • Apply ping and adhering to a
network network trace route utilities protocol suite.
communication communication to test network
connectivity
2.3 Outline the • Explain the • Use ping and trace
purpose of purpose of Apply ping and route utilities to
adhering to a adhering to a traceroute utilities to test test network
protocol suite. protocol suite. network connectivity connectivity

2.4 Outline the role • Explain the role of


of standards standards
organizations in organizations in Use ping and traceroute
establishing establishing utilities to test network
protocols for protocols for connectivity
network network
interoperability. interoperability.

2.5 Outline how the • Explain how the


TCP/IP model TCP/IP model and
and the OSI the OSI model are
model are used used to facilitate
to facilitate standardization in
standardization the
in the communication
communication process.
process.
2.6 Outline how data • Explain how data
encapsulation encapsulation
allows data to be allows data to be
transported transported across
across the the network.
network.
2.7 Outline how • Explain how local
17
local hosts access hosts access local
local resources resources on a
on a network. network.

2.8 Contrast the • Compare the roles


roles of the MAC of the MAC
address and the address and the IP
IP address. address.

2.9 Explain the • Describe the


purpose of ARP. purpose of ARP.

2.10 Explain the • Describe the


operation of operation of IPv6
IPv6 neighbour neighbour
discovery. discovery.

2.11 Outline how • Explain how


ICMP is used to ICMP is used to
test network test network
connectivity. connectivity.

2.12 Explain the • Use ping and


techniques of traceroute utilities
ensuring to test network
successful connectivity
communication
between devices

• GENERAL OBJECTIVE: 3.0 Know Open System Interconnect (OSI) model


3.1 Explain the • Elaborate the Multi-media • Make crossover Guide students to: List the
purpose and purpose and Projector, and straight- • Make crossover characteristics of
5-7 functions of the functions of the Lecture notes, through cable and straight- media access
physical layer in physical layer in Tutorials, • Connect wired through cable control methods
18
the network. the network. Pictorials and wireless • Connect a Wired on WAN and LAN
3.2 Explain the • Elaborate the Wireshark LAN. and Wireless LAN topologies
characteristics of characteristics of packetacer or • View Wired and • View Wired and
the physical the physical layer.other network Wireless NIC Wireless NIC
layer. simulators Information Information
3.3 Explain the basic • Explain the basic networking tool using
characteristics of characteristics of kit Packet Tracer. Packet Tracer -
copper cabling. copper cabling. networking • Observe TCP TCP and UDP
3.4 Explain how • Describe how cable and UDP Communications
UTP cable is UTP cable is used Communications • Observe DNS
used in Ethernet in Ethernet • Observe DNS Resolution
networks. networks. Resolution

3.5 Explain fiber • Explain fiber


optic cabling and optic cabling and
its main its main
advantages over advantages over
other media. other media.

3.6 Explain Network • Explain Network


devices using devices using
wired and wired and
wireless media. wireless media.
3.7 List the purpose • List the purpose
and function of and function of
the data link the data link layer
layer in in preparing
preparing communication
communication for transmission
for transmission on specific media.
on specific
media.

19
3.8 List the • List the
characteristics of characteristics of
media access media access control
control methods methods on WAN and
on WAN and LAN topologies.
LAN topologies.
3.9 Explain the • Explain the
characteristics characteristics and
and functions of functions of the
the data link data link frame.
frame.
3.10 Explain how • Explain how the
the network layer network layer
uses IP protocols uses IP protocols
for reliable for reliable
communications communications

3.11 Explain the • Explain the role of


role of the major the major header
header fields in fields in the IPv4
the IPv4 packet. packet.

3.12 Explain the • Explain the role of


role of the major the major header
header fields in fields in the IPv6
the IPv6 packet. packet.
3.13 Explain how • Explain how
network devices network devices
use routing tables use routing tables
to direct packets to direct packets
to a destination to a destination
network. network.

20
3.14 Explain the • Explain the
functions of function of fields
fields in the in the routing
routing table table of a router.

3.15 Explain the • Explain the


purpose of the purpose of the
transport layer in transport layer in
managing the managing the
transportation of transportation of
data in end-to- data in end-to-end
end communication.
communication.
3.16 List the • List the
characteristics of characteristics of
TCP. TCP.

3.17 List • List


characteristics of characteristics of
UDP. UDP.
3.18 Describe how
TCP and UDP • Describe how
use port TCP and UDP use
numbers. port numbers.
3.19 Explain how • Explain how TCP
TCP session session
establishment establishment and
and termination termination
processes processes
facilitate reliable facilitate reliable
communication. communication.
3.20 Explain how • Explain how TCP
21
TCP protocol protocol data units
data units are are transmitted
transmitted and and acknowledged
acknowledged to to guarantee
guarantee delivery.
delivery.
3.21 Explain the • Explain the
operations of operations of
transport layer transport layer
protocols in protocols in
supporting end- supporting end-to-
to-end end
communication. communication.

3.22 Explain how • Explain how the


the functions of functions of the
the application application layer,
layer, presentation layer,
presentation and session layer
layer, and work together to
session layer provide network
work together to services to end-
provide network user applications.
services to end-
user applications.

3.23 Explain how • Explain how end-


end-user user applications
applications operate in a peer-
operate in a peer- to-peer network.
to-peer network.
3.24 Explain how • Explain how web
web and email and email
protocols protocols operate.
22
operate.
3.25 Explain how • Explain how DNS
DNS and DHCP and DHCP
operate. operate.

3.26 Explain how • Explain how file


file transfer transfer protocols
protocols operate.
operate.

GENERAL OBJECTIVE: 4.0 Understand Ethernet switching


4.1 Describe how the • Explain how the Multi-media • Use Wireshark Guide students to; Describe how a
Ethernet Ethernet sublayers Projector, to Examine • Use Wireshark to switch builds its
8-9 sublayers are are related to the Lecture notes, Ethernet Frames Examine Ethernet MAC address
related to the frame fields. Tutorials, • View Network Frames table and forwards
frame fields. Pictorials Multi- *Device MAC • View Network frames
4.2 Describe the • Describe the media Addresses Device MAC
Ethernet MAC Ethernet MAC Projector, • View the Switch Addresses
address. address. Lecture notes, MAC Address • View the Switch
4.3 Describe how a • Explain how a Tutorials, Table MAC Address
switch builds its switch builds its Pictorials Table
MAC address MAC address Computer
table and table and forwards Routers
forwards frames. frames. Switches
4.4 Describe switch • Describe switch
forwarding forwarding
methods and port methods and port
settings available settings available
on Layer 2 on Layer 2 switch
switch ports. ports.

23
GENERAL OBJECTIVE: 5.0 Understand Number systems and IP addressing
5.1 Explain how to • Explain how to Multi-media Convert binary numbers Demonstrate how to Explain the
10 convert numbers convert between Projector, to decimal numbers convert binary numbers to structure of an
between decimal decimal and binary Lecture notes, decimal numbers IPv4 address
and binary systems. Tutorials, including the
systems. Pictorials Convert decimal Demonstrate the network portion,
5.2 Explain how to • Explain how to numbers to conversion of decimal the host portion,
convert numbers convert numbers Hexadecimal numbers numbers to Hexadecimal and the subnet
between decimal between decimal and numbers mask.
and hexadecimal hexadecimal systems.
systems.
5.3 Explain the • Describe the structure
structure of an of an IPv4 address
IPv4 address including the network
including the portion, the host
network portion, portion, and the
the host portion, subnet mask.
and the subnet +-
mask.
5.4 Analyse the • Explain the
characteristics characteristics and
and uses of the uses of the unicast,
unicast, broadcast and
broadcast and multicast IPv4
multicast IPv4 addresses.
addresses.
5.5 Describe public, • Explain public,
private, and private, and reserved
reserved IPv4 IPv4 addresses.
addresses.
5.6 Describe how • Explain how
subnetting subnetting segments a
segments a network to enable
network to better
24
enable better communication.
communication.

5.7 Compute IPv4 • Calculate IPv4


subnets for a /24 subnets for a /24
prefix. prefix.
5.8 Describe the • Explain the need for
need for IPv6 IPv6 addressing.
addressing.
5.9 Describe how • Explain how IPv6
IPv6 addresses addresses are
are represented. represented.
5.10 Contrast types • Compare types of
of IPv6 network IPv6 network
addresses. addresses.

5.11 Describe how • Explain how to


to configure configure static global
static global unicast and link-local
unicast and link- IPv6 network
local IPv6 addresses.
network
addresses.
5.12 Describe how • Explain how to
to configure configure global
global unicast unicast addresses
addresses dynamically.
dynamically.
General Objective 6.0: Understand Basic router and switch configuration
11-12 6.1 Explain how to • Explain how to Multimedia • Configure a Guide students to: Explain how to
access IOS or access IOS or Projector, Switch and • Navigate the IOS navigate IOS or
VRP device for VRP device for Routers and navigate through or VRP by Using VRP to configure
configuration configuration Switches, the IOS or VRP Tera Term for network devices.
purposes. purposes. Packet Tracer or Console
25
eNSP or GNS3, • Configure Initial Connectivity
6.2 Explain how to • Explain how to Laptop • Configure Initial
navigate IOS or navigate IOS or Internet • Switch Settings • Switch Settings
VRP to configure VRP to configure Books, Journals, •
network devices. network devices. Marker board,
Marker,
6.3 Explain the • Explain the Textbooks, Tera
command command Term, Putty
structure of IOS structure of IOS
or VRP software. or VRP software.

6.4 Explain IOS or • Explain IOS or


VRP device VRP device using
using CLI. CLI.

6.5 Explain IOS or • Explain IOS or


VRP commands VRP commands
to save the to save the
running running
configuration. configuration.

6.6 Explain how • Explain how


devices devices
communicate communicate
across network across network
media. media.
6.7 Explain a host • Explain a host
device with an IP device with an IP
address. address.
6.8 Explain • Explain
connectivity
connectivity
between two end between two end
26
devices. devices.

6.9 Explain initial • Explain initial


settings on an settings on an IOS
IOS or VRP or VRP router.
router.

6.10 Explain two • Explain two


active interfaces active interfaces
on IOS or VRP on IOS or VRP
router. router.

6.11 Explain how • Explain how


devices use the devices use the
default gateway. default gateway.
General Objective 7.0: Understand Network Security fundamentals
13-14 7.1 Explain why • Explain why basic Multimedia • Configure secure Guide the students to List general
basic security security measures Projector, passwords and configure secure mitigation
measures are are necessary on Routers and SSH on network passwords and SSH on techniques
necessary on network devices. Switches, devices. network devices.
network devices. • Packet Tracer or
eNSP or GNS3,
7.2 List general • List general Laptop
security mitigation Internet
mitigation techniques. Books, Journals,
techniques. Marker board,
Marker,
7.3 Explain network • Explain network Textbooks,
devices with devices with TeraTerm, Putty
device hardening device hardening
features to features to
mitigate security mitigate security
threats. threats.

27
General Objective 8.0: Know how to build small networks
14-15 8.1 Explain the • Explain the Multimedia • Design a small Guide the students to: Explain the
devices used in a devices used in a Projector, network, and use • Design a small protocol and
small network. small network. Routers and ping and network, and use application used in
Switches, traceroute to test ping and traceroute a small network
8.2 Explain the • Explain the Packet Tracer or for latency and to test for latency
protocols and protocols and eNSP or GNS3, connectivity. and connectivity.
applications used in a applications used Laptop • Troubleshoot • Troubleshoot
small network. in a small Internet connectivity connectivity issues.
network. Books, Journals, issues.
Marker board,
8.3 Explain how a • Explain how a Marker,
small network serves small network Textbooks, Tera
as the basis of larger serves as the basis Term, Putty
networks. of larger
networks.

8.4 Explain common • Explain common


network network
troubleshooting troubleshooting
methodologies. methodologies.

8.5 List common • Explain common


connectivity problems connectivity
associated with problems
network devices associated with
network

28
VIRTUALIZATION AND CLOUD MIGRATION

PROGRAMME: HIGHER NATIONAL DIPLOMA IN NETWORKING AND CLOUD COMPUTING


COURSE: VIRTUALIZATION AND CLOUD CODE: NCC 312 CONTACT HOURS: 45 HOURS/WEEK
MIGRATION
YEAR: 1 SEMESTER 1 Credit Units: 3 THEORETICAL: 1 HOURS/WEEK
PRACTICAL: 2 HOURS/WEEK
GOAL: This course is designed to equip students with theoretical and practical skills required to understand virtualization technologies
Course Specification: THEORETICAL CONTENT PRACTICAL CONTENT
GENERAL OBJECTIVES: On completion of this course, the students should be able to:
1.0: Understand the concepts of virtualization.
2.0 Understand the local virtualization Technologies.
3.0 Know Cloud Service Providers.
4.0 Understand cloud computing and virtualization.
5.0 Understand virtualization management and security.
6.0 Understand virtualization trends and Emerging technologies

29
PROGRAMME: HIGHER NATIONAL DIPLOMA IN NETWORKING AND CLOUD COMPUTING
COURSE: VIRTUALIZATION AND CLOUD MIGRATION CODE: NCC 312 CONTACT HOURS: 45 HOURS/WEEK
YEAR: 1 SEMESTER 1 Credit Units: 3 THEORETICAL: 1 HOURS/WEEK
PRACTICAL: 2 HOURS/WEEK
GOAL: This course is design to equip students with theoretical and practical skills required to understand virtualization technologies
Course Specification: THEORETICAL CONTENT PRACTICAL CONTENT
GENERAL OBJECTIVE 1.0: Understand the concepts of virtualization.
Wee Specific Learning Teachers’ Activities Learning Specific Learning Teachers’ Evaluation
k Outcome Resources Outcome
Activities
GENERAL OBJECTIVE 2.0: Understand the Local Virtualization Technologies.
2-3 2.1 Define hypervisor. • Explain hypervisors. Internet, Install any type 2 Guide students to Define
hypervisor, install any type 2 hypervisor.
2.2 Identify their roles in • Explain the difference Local directory
hypervisor,
local virtualization. between type 1 and type for copying the Create virtual machine
2 hypervisors. executable file, instances, Guide students to
2.3 Describe the
create virtual
difference between type 1 • Explain the features and Markers, Guest OS installation
machines,
and type 2 hypervisors. capabilities of popular whiteboard, and configuration,
configure the
bare-metal hypervisors, computer,
2.4. Describe the features Setup a network and VMs, install OSs,
and capabilities of using examples such Projector, connect two or more and manage the
Vmware vSphere/ESXi, OSs running on VMs and the OSs
Microsoft Hyper-V, etc Lecture notes,

30
popular local • Explain the features and Pictorials, different virtual
virtualization platforms. capabilities of popular PowerPoint machines,
hosted hypervisors, slides, etc.
Create snapshots,
using examples such as
clones, and manage the
Oracle Virtual Box,
VM.
Vmware Workstation,
etc
GENERAL OBJECTIVE 3.0: Know Cloud Service Providers.
4-7 3.1 Explain major cloud • Explain AWS virtual Internet, • Setup 2 servers and Guide students to: Describe
service providers using services features, Amazon EC2, install hypervisor features, pricing
virtualization Azure VM, or • Setup 2 servers models, and use
pricing models and type 1
Google Compute and install
use cases cases of
Engine, • Prepare the servers hypervisor type
different
• Explain Microsoft Multi-media by enabling 1
providers.
3.2 Describe features,
Azure virtual virtualization in the
pricing models, and use Projector, • Prepare the
offerings features, BIOS set up
cases of different servers by
pricing models and Lecture notes,
providers.
use cases. • Install proxmox or enabling
Marker, any other virtualization in
3.3 Explain how to use
proxmox for • Explain Google Hypervisor Type 1 the BIOS set up
Whiteboard,
Cloud Virtual software
virtualization • Install proxmox
Solution features, Computer,
pricing models and • Set up networking or any other
PowerPoint On server 2 only: Hypervisor Type
use cases
slides, etc. 1 software
• Set up shared
• Explain how to use
storage on server • Set up
proxmox for
networking On
virtualizations • Configure cluster server 2 only:
• Create virtual • Set up shared
machines storage on server

31
• Manage virtual • Configure
machines cluster
• Create virtual
• Configure high
machines
availability and
• Manage virtual
backup
machines
• Install OS on • Configure high
virtual machines availability and
backup
• Install OS on
• Select cloud service virtual machines
provider and setup
a free account
Guide the
students to select
a cloud service
provider like
AWS, Azure,
Google Cloud,
etc, and setup an
account
• Explore the Guide the
providers features students to
and pricing models explore the
features and
pricing model of
the provider
services.

32
GENERAL OBJECTIVE 4.0: Understand Cloud Computing and virtualization.
8-9 4.1 Explain the relationship • Explain cloud Internet, Launch a virtual serverGuide students to Explain the
between cloud computing computing and instance on the createdlaunch a virtual cloud service
Amazon EC2,
and virtualization. how virtualization account and configure server and models and
Azure VM, or
technologies is instance details, configure details their
Google Compute
used in cloud like OS, storage, virtualization
Engine, Configure network and
computing. etc, components.
security group,
Projector,
4.2 Explain the cloud • Explain the roles Guide students to
Setup key pairs and
service models and their of virtualization in Lecture notes, configure
access the server
virtualization components. cloud service network and
Marker, remotely,
models security group in
Whiteboard, Assign Elastic IP and AWS VPC or
• Explain the attach additional Azure VN,
4.3 Explain the benefits of
impact of Computer, storage,
virtualization in enabling Guide students to
virtualization on
cloud services. PowerPoint setup key pairs
cloud scalability.
slides, etc. (SSH key pair)
and access the
server remotely,
Guide students to
assign Elastic IP
and attach and
manage
additional storage
like Amazon EBS
or Azure
Managed Disks

33
GENERAL OBJECTIVE 5.0: Understand Virtualization Management and Security.
10-11 5.1 Explain the tools for • Explain Virtualization Explore different Guide students to Explain security
virtualization management management tools for explore and best practices
Managing and monitoring
management tools tools like virtualized manage for virtualized
virtualized environments.
vCenter, Hyper- environment, virtualization environment
Explain security • Explain security
V Manager, etc, management tools
considerations for virtual considerations for Setup a virtualization
machines. virtual machines Internet, management tools, Guide students to
such as guest OS select the right
Projector, Monitor virtualized
hardening and tools for their
resources,
network security Lecture notes, created virtual
Configure security and environment,
5.3 Explain the • Explain optimization Marker,
hardening features,
importance of patch and patch Guide students to
management and management Whiteboard, explore the
Explore automation
resource optimization. resource Computer, and reporting features dashboard and
of the management features of the
PowerPoint tools chosen tools to
• Explain security best slides, etc. monitor resources
practices for like CPU, RAM,
virtualized and storage
environment usage,
Guide students to
investigate
automation
options such
scripting task,
automatic
backups, etc.

34
GENERAL OBJECTIVE 6.0: Understand Virtualization Trends and Emerging Technologies.

12-15 6.1 Explain how to • Explain server less Internet, Configure regular data Guide students on Explain AI-
identify the latest trends computing and backups for virtualized how to choose driven
Projector,
in virtualization and Event-Driven resources, backup solutions optimization in
cloud technologies. Architectures Lecture notes, offered by virtualized
Test backup and
virtualization environments
6.2 Explain how to • Explain Edge Marker, restoration processes
platform or third-
identify the emerging computing and its for virtual machines,
Whiteboard, party tools,
virtualization cloud impact on
Configure replication
technologies. virtualization Computer, Guide students to
and fail-over to a
configure backup
6.3 Explain the role of • Explain AI-driven PowerPoint secondary site or cloud
schedules and
artificial intelligence (AI) optimization in slides, etc. region for disaster
retention policies,
in optimizing virtualized virtualized recovery,
test backup and
environments. environments. Test fail-over restoration
6.4 Explain the • Explain common procedure, processes,
importance of disaster causes of IT disaster Test disaster recovery Guide students to
recovery planning. such hardware procedures and assess understand
failure, natural their effectiveness replication
disaster, etc options within the
• Explain the virtualization
components of platform
disaster recovery (example
plan such as backup, Vmware SRM),
replication, fail-over, Guide the
etc students to test
the configured
• Explain the
fail-over
importance of
procedure to
Recovery Point
ensure smooth
Objective (RPO) and
35
Recovery Time transition to the
Objective (RTO) secondary
environment,
Guide the
students to
simulate a
disaster scenario
in a controlled
environment,
Validate the
recovery of
virtual machines
and applications
ASSESSMENT: The continuous assessment; tests, quizzes will be awarded 40% of the total score. The end of the Semester Examination will make
up for the remaining 60% of the total score.

36
OPERATING SYSTEM FOR NETWORK ENVIRONMENT
PROGRAMME: HIGHER NATIONAL DIPLOMA (HND) NETWORKING AND CLOUD COMPUTING
COURSE: OPERATING SYSTEM FOR NETWORK COURSE CODE: NCC 313 Contact Hours: 3 hours / week
ENVIRONMENT
CREDIT UNIT: 3 Theoretical: 1 hour /week

Year: 1 Semester: 1 Pre-requisite: Practical: 2 hours / week

GOAL: This course is designed to acquaint students with knowledge and skills in Operating System for Network Environment
GENERAL OBJECTIVES:
General Objectives: On completion of this course the student should be able to:
1.0 Understand Operating Systems.
2.0 Understand Linux Operating System
3.0 Know User and File Management
4.0 Understand Process Management
5.0 Comprehend Memory Management and Virtualization
6.0 Understand Network Addressing in Linux

37
PROGRAMME: HIGHER NATIONAL DIPLOMA (HND) NETWORKING AND CLOUD COMPUTING
COURSE: OPERATING SYSTEM FOR NETWORK COURSE CODE: NCC 313 Contact Hours: 3 hours / week
ENVIRONMENT
CREDIT UNIT: 3 Theoretical: 1 hour / week

Year: I Semester: I Pre-requisite: Practical: 2 hours / week


COURSE SPECIFICATION: THEORETICAL AND PRACTICAL
GOAL: This course is designed to acquaint students with knowledge and skills in Operating System for Network Environment
GENERAL OBJECTIVE 1.0: Understand Operating Systems
THEORETICAL CONTENT PRACTICAL CONTENT
Week Specific Learning Teacher’s Activities Resources Specific Learning Teacher’s Activities Evaluation
Outcome Outcome
1–2 1.1 Define Operating • Explain operating Internet PC Guide Students on List types
System(OS) • System (OS) and its Loaded with • Create and how to: of operating
1.2 Explain the Evolution Evolution. virtualization manage user systems
of OS software with Account • Create, modify,
• Describe the concept of different OS and delete user
1.3 Describe the concept
OS in Networking installed • Create, Delete, accounts.
of OS in a Understand user
Environment eg: Copy and Moving
Networking privileges and
Resource Management, Presentation Files and
Environment experiment with
Facilitate package Directories using
communication, Windows OS different user
Security and Multimedia roles.
Authentication, File and Projector • Use Task
Print Sharing, Network Manager / • Create, rename,
services, Resource Text Books Activity Monitor move, and delete
Management, Remote Lecture Notes to view and files and folders
access and control, monitor system on your
Importance and features Marker resources, Windows
of OS, etc. Marker Board running processes operating
etc system. Explore
1.4 Describe mode of • Describe mode of different file
38
operation and the attributes and
architecture of OS operation and the permissions.
Architecture of OS
o (Monolithic, Micro-
kernel, • Use the built-
in task
o Layered Kernel) manager
(Windows) or
• Classify OS intobatch, Activity
real time,timesharing Monitor
and networking • Perform basic (macOS/Linux
Command-Line ) to monitor
Interface (CLI) system
1.5 Explain the types and • Describe the types of operations resources,
classes of Operating OS such as: Microsoft view running
System. Windows, processes, and
Apple MacOS, Linux: terminate
Linux Distribution unresponsive
Red hat and Embedded applications.
Systems
• Practice basic
command-line
operations.
Navigate
directories, list
files, copy,
move, and
delete files
using
commands like
ls, cd, cp, mv,
and rm.

39
GENERAL OBJECTIVE: 2.0 Understand Linux Operating System
2 – 4 2.1 Define Linux • Explain Linux • Utilize a package Guide Students on Explain
Operating System Operating System Computer manager to install how to: Installation
System and update Process (dual-
2.2 Give brief history
Internet PC software • Utilize a package boot or Virtual
and evolution of
Loaded with manager to Machine set up)
Linux
virtualization • Diagnose and install and
2.3 Describe the Open • Describe the Open address issues update software
software with
Source Philosophy Source Philosophy such different OS with package
and the GNU as: Free Redistribution, installed repositories and • Apply package
General Public Access to Source Code, apply package management
License (GPL) Technology Neutrality, Presentation management commands
Transparency etc package commands effectively
effectively
2.4 Describe Linux • Explain Linux Multimedia
Distributions and Distribution and Projector • Set up a basic • Set up a basic
Package Package Management Linux Linux
Management System Linux networking networking
2.5 Explain Installation • Describe the Installation Distribution environment environment
Process (dual-boot or Process and the basic (Distro) eg
Virtual Machine set up) Linux Command-liner Ubuntu, Fedora • Experiment with • Experiment with
2.6 Describe the basic Interface etc., help- help-related
Linux commands • Show the basic related commands like
and command-line Linux commands Installation commands ‘info’, which
interface (CLI) and command-line Media, provides
2.7 Describe File • Explore comprehensive
System hierarchy and Text books commands to documentation
Navigation search for for some
Marker/Marker commands based commands and
Board on keywords etc. topics.

2.8 Explain the usage of • Explain the File System


“Getting Help” hierarchy and • Use ‘apropos’ and
Navigation, ‘whatis’
40
commands to
search for
commands based
• Describe “Getting Help” on keywords.
eg: Introduction, Man
Pages, Finding • Use the help’
Commands and option with
Documentation, Info various
Documentation etc commands to
access built-in
command-line
documentation
GENERAL OBJECTIVE: 3.0 Know User and File Management
3.1 Explain user • Describe user account Computer • Configure user Guide Students on Explain user
accounts and groups such as: Username, Hardware, authentication how to: authentication,
5-6 Password, Home and Password
Directory, Access Linux permissions • Configure user Policies, file
Privileges, Personal Distribution authentication permissions and
Settings and Resource (Distro) e.g. • Implement RAID and ownership
Usage. User Groups Ubuntu, Fedora configurations permissions
such as: Primary Group, etc.,
Secondary Groups, • Manage • Implement
Access Control etc. Installation networked RAID
Media, storage using configurations
3.2 Explain user • Explain User Linux tools
authentication, authentication, Marker • Manage
Password Policies, Password Policies, File Marker Board • Create, networked
file permissions and permissions and Delete, Copy and storage using
ownership. ownership Text books Move Files and Linux
Directories tools
• Describe File
Manipulation and basic • Use Text Editors • Create, rename,
text editing such as: to move, and
Copying and Moving Navigate, Move, delete files and
41
Files, Changing Search, and folders on your
Permissions, Formatting Replace operating
and Indentation, • Create and Edit system. Explore
Inserting and Deleting Scripts different file
Text, etc. attributes and
3.3 Explain the File • Set up file permissions.
Manipulation and sharing between
basic text editing computers • Use Text
Editors to
Navigate and
Move, Search
and
Replace
• Create and
Edit Scripts

• Set up file
sharing
between two
computers
using protocols
like SMB
(Server
Message Block)
or NFS
(Network File
System). Share
a folder
from one
system and
access it from
another.

42
GENERAL OBJECTIVE: 4.0: Understand Process Management
4.1 Explain processes and • Describe Processes and Multimedia Monitor and control Guide Student how Explain
7–9 threads threads, Projector processes using Linux to: processes and
4.2 Explain Process • Process states and Textbooks, and Windows tools Demonstrate how threads
states and management Management command, Online Articles OS schedules and
commands. Process Scheduling And Tutorials. switches between
Demonstrate how OS
considering factors like: Video Lectures threads in a
schedules and switches
process priority, And Courses. multithreaded
between threads in a
communication delays, Computer applications
multithreaded
and fairness across System
applications
networked machines. Marker
Marker board
• Describe Concurrency, Create, terminate, and
4.3Explain Process Parallelism, Process monitor processes.
Scheduling and Priorities, Creation and Monitor and control
Process Creation and Termination, Inter processes using
Termination, Process Communication Linux/ Windows
Concurrency and etc. tools
Parallelism and Inter- Create, terminate,
process communication and monitor
(IPC) processes;

• Explain the concept of


4.4 Explain Deadlock Deadlock e.g. Resource
Handling, Load Allocation Graph
Balancing and Resource (RAG), Deadlock
Management Detection, Timeouts and
Aborts, Resource Pre-
emption and Distributed
Deadlock Detection.

43
4.5 Explain Security and • Explain the shared
Isolation responsibility model for
cloud security
General Objective 5.0: Comprehend Memory Management and Virtualization
1.1 Explain memory • Describe Memory Open-Source • Configure Guide Students how Explain Virtual
10 - 12 Management Management with Operating memory settings to: memory and
1.2 Explain Virtual respect to: Memory Systems and memory Paging
memory and Paging Hierarchy, Memory management • Configure
5.3 Explain Swap space Allocation, Memory Multimedia strategies in a memory
Configuration Protection, Virtual Projector Linux and settings and
Memory, Swapping, windows memory
Paging, Demand Textbooks management
Paging, Page strategies in a
Replacement Online Articles Linux and
Algorithms and And Tutorials. • Configure virtual windows
Fragmentation. memory settings,
Video Lectures monitor paging • Configure
5.4 Describe • Describe the concept of And Courses. behaviour, and virtual
Virtualization (Virtual virtualization optimize memory memory
Box, KVM) Marker usage settings,
Marker Board monitor
paging
. behaviour,
and optimize
memory
• Create virtual usage
machines using
virtualisation
tools • Create virtual
machines
using
virtualisation

44
tools

• Create and
analyse
Scenarios
demonstrating
deadlock and
apply
strategies to
prevent and
resolve
deadlocks
GENERAL OBJECTIVE: 6.0 Understand Network Addressing in Linux
13 - 15 6.1 Explain Networking • Describe Physical Computer system, Capture and analyze Guide Students on Explain Network
Protocols and Stacks Layer, network traffic how to: Monitoring and
Data Link Layer, Internet Analysis
Network Layer, connectivity Configure a Linux Configure a Linux
Transport Layer and LAN computer to obtain IP computer to obtain IP
Application Layer details details
Multimedia
6.2 Explain IP Addressing • Describe IP Addressing, Configure IP
and Subnetting IPv4 (Internet Protocol Projector Configure IP addresses, addresses, subnetting,
Version 4), IPv6 (Internet Textbooks, subnetting, and routing and routing
Protocol version 6), Subnetting Online Articles
etc. Use network utilities and Use network utilities
Cheat Sheets and commands to diagnose, and commands to
6.3 Explain Sockets, • Describe Network Quick References troubleshoot, and diagnose,
Socket APIs, Network Utilities and manage network troubleshoot, and
Utilities and Commands Commands. Practical Labs and connectivity issues manage network
Simulators. connectivity issues
• Explain the Key
6.4 Describe Firewalls and Functions of Firewalls,
Security2 Types of Firewalls,
Security Mechanisms,
45
How Firewalls Work,
Firewall
Rules, Importance of
Firewalls in Security

6.5 Explain Network • Describe Network


Monitoring and Monitoring and
Analysis Analysis

46
WIRELESS COMMUNICATION SYSTEMS
PROGRAMME: HIGHERE NATIONAL DIPLOMA(HND) NETWORKING AND CLOUD COMPUTING
COURSE: WIRELESS COMMUNICATION COURSE CODE: NCC 314 Contact Hours: 3 Hours /week
SYSTEMS
CREDIT UNIT: 3 Theoretical: 2 Hours /week

Year: 1 Semester: 1 Pre-requisite: Practical: 1 Hour /week

GOAL: This course is designed to equip the students with theoretical and practical skills in wireless communication systems.
GENERAL OBJECTIVES:
On completion of the course, the student should be able to:
1.0 Understand wireless communication systems.
2.0 Understand mobile communication technologies.
3.0 Understand mobile Radio Propagation.
4.0 Understand the practical applications of mobile communications in various industries.
5.0 Know WLAN standards and the development of Wi-Fi technology
6.0 Understand WLAN technologies.

47
PROGRAMME: HIGHER NATIONAL DIPLOMA (HND) NETWORKING AND CLOUD COMPUTING
COURSE: WIRELESS COURSE CODE: NCC 314 Contact Hours: 3 Hours/Week
COMMUNICATION SYSTEMS
CREDIT UNIT: 3 Theoretical: 2 Hours/Week
Year: 1 Semester: 1 Pre-requisite: Practical: 1 Hour/Week
GOAL This course is designed to equip the students with theoretical and practical skills in wireless communication systems.
GENERAL OBJECTIVE 1.0: Know wireless communication systems.
THEORETICAL CONTENT PRACTICAL CONTENT
Week Specific Learning Teacher’s Activities Resources Specific Learning Teacher’s Activities Evaluation
Outcome Outcome
1-3 1.1 Define wireless • Explain what is Textbooks, • Demonstrate • Guide students to set up Define wireless
communication wireless Multi-media wireless a simple wireless communication
systems and their communication Projector, communication is communication system systems and
significance Computer, Marker, achieved using using two devices like their
1.2 Define components • Explain the Marker board, walkie-talkies walkie-talkies or significance
of wireless components of Lecture notes, wireless modules.
communication wireless Animation • Identify the
systems communication Videos/illustrations various • Show the components,
systems , walkie-talkie, components that such as transmitters,
1.3 Differentiate wireless • Explain the Oscilloscope. make up the receivers, antennas, and
communication difference between systems how they interact.
systems with wired analogue and digital
communication communication • Use a simple • Guide students to use a
systems systems oscilloscope or simple oscilloscope or
1.4 Differentiate between • Explain wireless waveform waveform visualization
analogue and digital communication visualization software to show them
communication systems software to the difference between
systems demonstrate the analogue and digital
1.5 List types of wireless • Explain wireless difference signals.
communication communication between analogue
systems networks and digital signals. • Demonstrate how noise
1.6 Identify various • Explain various affects analogue signals
applications of
48
wireless applications of compared to digital
communication wireless ones.
systems communication Demonstrate how
systems noise affects
analogue signals
compared to
digital ones
GENERAL OBJECTIVE: 2.0 Understand Mobile Communication Technologies.
4-5 2.1 Define mobile • Explain what is Textbooks, • Implement a • Guide the students on List the different
communication mobile Multi-media simple mobile how to setup a simple generations of
2.2 communication Projector, Computer, communication mobile communication mobile
2.3 List the different • Explain the different Marker, Marker setup using using devices like communication
generations of mobile generation of mobile board, mobile phone to walkie-talkies or two-
communication communication Lecture notes, show how way radios. Explain how
2.4 List the applications • Explain the Animation Videos, information is information is
of mobile applications of image illustrations, transmitted and transmitted and received.
communication mobile mobile phone, received
communication walkie-talkie. • Set up a mock cellular
2.5 Describe cellular • Explain cellular • Show how network using simple
network architecture network cellular network equipment or visual aids.
and its components architecture and using a mobile
its constituent phone • Show the components
elements. such as base stations,
2.6 Outline the evolution • Demonstrate cell towers, mobile
of mobile how a cellular devices, and the
generations (1G to telephone call is communication flow
5G) made. between them
2.7
2.8 List key features and • Explain the unique .
benefits of each characteristics and
mobile generation. improvements
introduced in each
mobile generation

49
GENERAL OBJECTIVE 3.0 Understand mobile Radio Propagation
6–7 3.1 Define the concept of • Explain the concept Textbooks, Describe free
Radio wave of Radio wave Multi-media space
propagation propagation Projector, Computer, propagation
3.2 Define free space • Describe free space Marker, Marker model
propagation model propagation model boaSrd,
3.3 Outline the three • Explain the three Lecture notes,
basic Propagation basic Propagation Animation
mechanism mechanism Videos/illustrations.
3.4 Explain ground • Describe ground
reflection (Two- reflection (Two-Ray)
Ray) Model Model
3.5 Explain indoor • Explain Indoor
propagation propagation models
models
3.6 Explain Outdoor • Explain Outdoor
propagation propagation models
models
3.7 Describe Practical • Explain practical
Link Budget
Link Budget design
design using path
using path loss
loss models
models
3.8 Define Multiple
• Explain Multiple
access technique
access technique for
for wireless
wireless
communications
communications
GENERAL OBJECTIVE: 4.0: Comprehend the practical applications of mobile communications in various industries
4.1 Define mobile • Discuss case studies Textbooks, Explain the use
7-8 communication and examples Multi-media of mobile
applications in Highlight the use of Projector, communications
transportation and mobile Lecture notes, in agriculture
logistics. communications in Animation and rural
different sectors. Videos/illustrations development.

50
4.2 Explain the use of • Facilitate a
mobile discussion on the
communications in benefits and
agriculture and rural challenges of
development. applying mobile
4.3 Explain the impact of communications in
mobile diverse industries.
communications on
banking and finance.
GENERAL OBJECTIVE: 5.0 Understand WLAN standards and the development of Wi-Fi technology.
9 - 11 5.1 Define the concept of • Introduce the concept Textbooks, Demonstrate different Guide students to Differentiate
WLAN (Wireless and significance of Multi-media Wi-Fi technologies demonstrate different Wi- between
Local Area Network) WLANs. Projector, using mobile hotspot Fi technologies using various Wi-Fi
and its importance • Explain timeline of Lecture notes, mobile hotspot frequencies and
5.2 Describe the Wi-Fi standards and Animation their
evolution of Wi-Fi their respective Videos/illustration applications
standards enhancements.
(802.11a/b/g/n/ac/ax)
5.3 Differentiate between • Discuss the
various Wi-Fi utilization and
frequencies and their advantages of
applications. different Wi-Fi
frequencies.

GENERAL OBJECTIVE: 6.0 Understand WLAN technologies.


6.1 Explain the • Explain the Textbooks, Describe the
12- 15 importance of components and Multi-media basic
standardization in functioning of Projector, components of
WLAN technology. Lecture notes, a WLAN
6.2 List common WLAN Animation
technical standards Videos/illustration
and regulations. s, marker,
51
6.3 Describe the basic • Describe the basic Markerboard,
components of a components of a
WLAN WLAN
6.4 Explain the principles Discussions on the
of WLAN principles of wireless
communication communication within
WLANs.

6.5 Outline the • Describe the


architecture of IEEE architecture and
802.11 protocol workings of the IEEE
802.11 protocol.

6.6 Differentiate the • Explain the various


modes and frame modes and types of
types in IEEE 802.11 frames used in IEEE
protocol 802.11 protocol.

52
COMPUTER ARCHITECTURE
PROGRAMME: HIGHER NATIONAL DIPLOMA (HND) NETWORKING AND CLOUD COMPUTING
COURSE: COMPUTER ARCHITECTURE COURSE CODE: NCC 315 Contact Hours: 3 hours /week

CREDIT UNIT: 3 Theoretical: 2 hours /week

Year: 1 Semester: 1 Pre-requisite: Practical: 1 hour /week


GOAL: This course is designed to provide students with knowledge of Internal Structure and Functions of the Computer System

GENERAL OBJECTIVES: On completion of the course, the student should be able to:
1.0 Understand the Concept of Computer Organisation and Architecture
2.0 Understand Analysis of Different Computer System Architectures.
3.0 Know Functional Units and Operations
4.0 Understand Memory/Storage Organisation and Management
5.0 Comprehend Instruction Level Parallelism and Parallel Computers
6.0 Understand Multiprocessors and Thread-Level Parallelism

53
PROGRAMME: HIGHER NATIONAL DIPLOMA NETWORKING AND CLOUD COMPUTING
COURSE: COMPUTER COURSE CODE: NCC 315 Contact Hours: 3 hours /week
ARCHITECTURE
CREDIT UNIT: 3 Theoretical: 2 hours /week
Year: I Semester: I Pre-requisite: Practical: 1 hours /week
GOAL: This course is designed to provide the student with a thorough understanding of the key concepts and principles of computer architecture
GENERAL OBJECTIVE 1.0: Understand the Concept of Computer Organisation and Architecture
THEORETICAL CONTENT PRACTICAL CONTENT
Week Specific Learning Outcome Teacher’s Activities Resources Specific Learning Teacher’s Evaluation
Outcome Activities
1-3 1.1 Explain the concept of • Explain the Marker board, Identify computer Use different Explain the
computer organisation and theoretical Markers, organisation and component concept of
architecture concept of computer Documentary films, architecture structural computer
organisation and Multimedia Projector relationship and organisation,
architecture, show the and Screen, Case functional computer
difference between the studies, Power point behaviour to architecture
two with examples slides, Internet, illustrate the and show the
Textbooks, Computer, concepts of difference
• Explain the three Flip charts etc. computer
1.2 Explain the three major major organisation and
components of a computer components of a architecture
and its functions computer system
with the Identify each major Use a typical
functions, component on the closed or
including the motherboard, complete
CPU, memory, including motherboard to
and I/O microprocessor, BIOS show the
and CMOS IC, cache, microprocessor,
I/O ports and BIOS and CMOS
1.3 Describe the internal • Describe the terminals IC, cache, I/O
structures of the CPU and its structure and ports and other
functions terminal and
54
Functioning of the explain the
control unit, Draw the detailed function of each
execution unit like diagram of a typical
arithmetic logic unit, (Harvard or
control unit and Von Neuman) Use either Harvard
registers within the architecture to show or Von Neuman
CPU. the architecture
internal layout of the diagram to show
1.4 Describe systems • Describe Intel CPU the CPU structure
evolution and
Advance RISC
Machine (ARM) Identify different
processors processors and their
evolution evolution

Use different Explain the


processors to metrics used in
• Explain the describe the measuring
1.5 Explain processor metrics used in evolution of the processor
performance measurement measuring Check the speed, systems performance
metrics processor power, and throughput such as speed,
performance such of a processor power, and
as speed, power, throughput.
and
Throughput. Guide students to
Identify how to check check the speed, Explain the
clock power, and factors
speed, smart cache, throughput of a affecting
turbo boost, hyper processor. processor
• Explain the threading, UHD performance
1.6 Explain the factors factors graphics features on a such as
affecting processor affecting processor typical system Guide students to architecture
performance identify how to design, clock
check clock speed, speed,

55
performance such Identify how smart cache, turbo instruction set
as architecture microprocessor boost, hyper complexity,
design, communicate with threading, UHD and
clock speed, instruction outside world graphics features parallel
set complexity, and on a typical system processing
parallel processing Capabilities.
capabilities Use method of
interrupt and DMA for
interfacing

Discuss the
1.7 Explain the concept of concept of
processor benchmarking and processor Use of different ports,
the use of benchmarking benchmarking terminal and
software. and the use of connectors
Benchmarking Use spooling in
sending data from the
system to a printer

1.8 Explain Microprocessor -


I/O Interfacing

1.9 Explain I/O interface Explain I/O interface


(interrupt and DMA mode) (interrupt and DMA
serial and parallel mode)
communications. Software.

56
GENERAL OBJECTIVE: 2.0 Understand Analysis of Different Computer System Architectures
4-6 2.1 Explain types of computer • Explain types of Marker board, Disassemble and Guide students to Explain
architecture Computer architecture Markers, assemble system unit disassemble and Instruction
including Documentary assemble system Cycle
Harvard and films, unit
Von Neumann Multimedia
architecture Projector and
Screen, Case
studies, Power
2.2 Explain Instruction Cycle • Explain point slides,
instruction Internet,
cycle, including Textbooks,
Fetch Computer, Flip
Decode and charts etc.
execute

2.3 Describe Registers Set • Describe different


CPU registers,
including general
and specific
purpose

2.4 Explain Instruction Set • Explain the use of


various set of
instruction in
program
development

2.5 Explain the instruction set • Explain different


architecture instruction set
architecture
design, including
57
Reduced
Instruction Set
Computers,
Complex
Instruction set
computers

• Explain different
2.6 Explain different addressing
addressing modes modes, including
Immediate,
direct, indirect
and indexing

2.7 Explain different types of • Explain different


operations operations,
including
arithmetic, logic,
data movement
and control
operations

58
• GENERAL OBJECTIVE 3.0: Know Functional Units and Operations
7-8 3.1 Explain Arithmetic and • Explain basic Marker board, Identify system bus Guide student to
logic unit arithmetic Markers, diagram of a identify system bus
operations, Documentary films, motherboard diagram of a
including adder, Multimedia Projector motherboard
subtractor, and Screen, Case
multiplier, two’s studies, Power point
complement slides, Internet,
addition Textbooks, Computer,
Flip charts etc.
3.2 Explain Floating points • Explain floating
units point arithmetic
operations

3.3 Explain Graphical • Explain GPU


Processing Unit (GPU) •

3.4 Explain control unit • Explain


design hardwired and
Micro
programmed
control unit,
control unit
design
3.5 Explain system bus •Explain control
bus, address bus
and data bus
• GENERAL OBJECTIVE 4.0: Understand Memory/Storage Organisation and Management
9-10 4.1 Explain the hierarchy of • Explain the Marker board, Use simulation Guide students to Explain the
different types of memory and hierarchy Markers, software to visualize use simulation hierarchy of
storage devices Documentary films, how data is stored and software to different types

59
• and Multimedia Projector retrieved in different visualize how data of memory and
characteristics of and Screen, Case memory types. is stored and storage devices
• different types of studies, Power point retrieved in
• memory and slides, Internet, different memory
storage Textbooks, Computer, types.
• devices (Static Flip charts
RAM, Dynamic Simulink Format HDD drive, Guide students on
RAM, ROM, Stateflow both logically and how to format
• Hard disk, SSD, etc. physically, create HDD drive, both
Cache partitions, create file logically and
• etc.). levels of systems NTFS, Linux physically, create
cache, cache file system(ext3) partitions, create
replacement file systems
algorithm, write
policy
Demonstrate different Use USB flash,
speed of data or file external HDD, SSD
4.2 Explain the characteristics transfer using to copy file to
of different types of memory different storage and demonstrate
• Explain different
and storage devices memories different speed of
memory
data or file transfer
characteristic,
using different
including
medium
location, capacity,
access method,
Create Virtual Guide students to
physical type,
memory create Virtual
speed
4.3 Describe how data is memory
stored and retrieved in
• Explain how data
different memory types
is stored and
retrieved in
different memory
types.
4.4 Describe the performance
differences among various

60
types of memory and storage • Discuss
devices. performance
differences
among various
types of memory
4.5 Describe the concept and and storage
the use of virtual memory in devices.
computer systems. • Discuss the use of
virtual memory in
computer
systems.


Explain the
concept of
memory
management in
operating
systems.
including line
replacement
strategies
• GENERAL OBJECTIVE: 5.0 Comprehend Instruction Level Parallelism and Parallel Computers
11-12 5.1 Explain the concept of • Explain the Marker board, Use different Guide students to Explain the
Instruction Level Parallelism concept of Markers, techniques to increase use different impact of ILP
(ILP) and its importance in Instruction Level Documentary films, ILP using simulation techniques to on pipeline
increasing computing Parallelism (ILP) Multimedia Projector software. increase ILP using performance.
performance. and its and Screen, Case simulation
importance in studies, Power point software.
increasing slides, Internet, Use simulation Describe the
computing Textbooks, Computer, software to explore Assist students to concepts of out-
performance. Flip charts the concepts of out-of- use simulation of-order
Simulink, etc. order execution and software to explore execution and
speculative execution the concepts of out- speculative
of-order execution
61
5.2 Explain hardware and • Discuss the and speculative execution in the
software techniques used to hardware and execution. context of ILP.
increase ILP. software
techniques used
to increase ILP.

5.3 Explain the impact of ILP • Explain the


on pipeline performance. impact of ILP on
pipeline
performance.

5.4 Describe the concepts of • Describe the


out-of-order execution and concepts of out-
speculative execution in the of-order
context of ILP. execution and
speculative
execution in the
context of ILP.

5.5 Describe the implications • Describe the


of dependencies between implications of
instructions in the context of dependencies
ILP. between
instructions in the
context of ILP.

• Explain Single
Instruction, single
62
5.6 Explain Flynn’s Data(SISD),
classification parallel Single Instruction
computers Multiple
Data9SIMD),
Multiple
Instruction Single
Data(MISD),
Multiple
Instruction
Multiple
Data(MIMD)
GENERAL OBJECTIVE: 6.0 Understand Multiprocessors and Thread-Level Parallelism
13-15 6.1 Explain the basic concepts • Explain the basic Marker board, Use different Assist students to Explain the
of multiprocessors and concepts of Markers, architectures of use different basic concepts
thread-level parallelism. multiprocessors Documentary films, multiprocessor architectures of of
and thread-level Multimedia Projector systems, such as multiprocessor multiprocessors
parallelism. and Screen, Case symmetric systems, such as and thread-level
studies, Power point multiprocessing symmetric parallelism.
s6.2 Explain the different • Discuss the slides, Internet, (SMP) and massively multiprocessing
architectures of different Textbooks, Computer, parallel processing (SMP) and Discuss the
multiprocessor systems architectures of Flip charts (MPP). massively parallel different
multiprocessor Simulink processing (MPP). architectures of
systems, such as Stateflow Carry out parallel multiprocessor
symmetric etc. programming, and Guide students to systems, such
multiprocessing exploit thread-level carry out parallel as symmetric
(SMP) and parallelism. programming, and multiprocessing
massively parallel exploit thread-level (SMP) and
processing parallelism. massively
(MPP). parallel
processing
(MPP).
6.3 Explain the importance of • Explain the
cache coherence and memory importance of
cache coherence
63
consistency in multiprocessor and memory Explain the
systems. consistency in performance
multiprocessor implications
systems. and scalability
of
multiprocessor
• Explain the role systems.
6.4 Explain the role of of parallel
parallel programming, and programming,
how to exploit thread-level and how to
parallelism. exploit thread-
level parallelism.
6.5 Explain the performance
implications and scalability of
multiprocessor systems. • Explain the
performance
implications and
scalability of
multiprocessor
systems.

64
PYTHON PROGRAMMING BASICS
PROGRAMME: HIGHER NATIONAL DIPLOMA (HND) NETWORKING AND CLOUD COMPUTING
COURSE: PYTHON PROGRAMMING BASICS COURSE CODE: NCC 316 Contact Hours: 3 hours /week

CREDIT UNIT: 3 Theoretical: 1 hour /week

Year: 1 Semester: 1 Pre-requisite: Practical: 2 hours /week

GOAL: To enrich students with general understanding of Python to be able to create basic implementable projects
GENERAL OBJECTIVES: On completion of this course, the student should be able to:

1.0 Understand Python Development Environment


3.0 Understand Datatypes and Arrays
4.0 Understand Control Structures
5.0 Understand Functions, Libraries and Modules
6.0 Understand String Operations
7.0 Understand List, Tuple, Dictionary and Set
8.0 Know The Concept Of Object Oriented Programme
9.0 Know how to w12ork with Databases
10.0 Understand Basics of GUI Programming

65
PROGRAMME: HIGHER NATIONAL DIPLOMA NETWORKING AND CLOUD COMPUTING
COURSE: Python Programming Basics COURSE CODE: NCC 316 Contact Hours: 2 Hours/week
CREDIT UNIT: 2 Theoretical: 1 Hour/week
Year: I Semester: I Pre-requisite: Practical: 1 Hours/week
GOAL: To enrich students with general understanding of Python to be able to create basic implementable projects
GENERAL OBJECTIVE 1.0: Understand Python Development Environment
THEORETICAL CONTENT PRACTICAL CONTENT
Week Specific Learning Teacher’s Activities Resources Specific Learning Teacher’s Activities Evaluation
Outcome Outcome
1 1.1 Explain the • Describe the PC/Laptop, • Download and Guide students to What are
Installation of features of Multimedia Install Python download and Install the main
Python Interpreter Python; It is projector, Interpreter and Python Interpreter and features of
and Running Simple interpreted, Marker, configure the configure the running Python
Programs Object Oriented, Markerboard, running environment programmi
Interactive, and Python environment • Guide students ng
1.2 Explain the a Scripting Interpreter, • Install an IDE to download language?
main features language. IDE and Run simple Python
of Python. ● PyCharm. Python program Interpreter What are
● IDLE • Familiarize with from the
1.3 Explain the • Explain the ● Sublime Python Program www.python.o applicatio
Application of various ● Vim. Development rg and install. n areas of
Python application areas ● Atom. Environment. • Guide students Python
of Python ● Jupyter to install What is
1.4 Explain the Notebook. appropriate the
functions of the • Explain the ● Eclipse IDE such as function
Python Interpreter difference ● PyDev • Create python IDLE, of Python
between an ● GNU variables, and Pycham, IDE?
+interpreted Emacs. operators Jupyter,
language and a Practical manual, • Spyder, What are
compiled Sublime, the rules
Books
language. PyDev. guiding
Python
66
1.5 Explain Python • Explain the Demonstrate to the Variable
development functions and students how to write naming?
environment. different kinds python programs with
of Python variables and Write a
development operators command
environment. line
program
1.6 Explain how to • Discuss how to to display
download and download and “Hello
install Python install Python Python”
Interpreter and IDE Interpreter and
IDE

1.7 Explain Python •


Explain how to
variables and use Python
Operators variables and
operators in
python codes
GENERAL OBJECTIVE: 3.0 Understand Datatypes and Arrays
3.1Define Data types • Explain the PC/Laptop, • Use Python data • Guide the What are the
various Python Multimedia types students to use various
3.2 Explain the various data projector, Python data Python data
3 data categorizations - categorization Marker, • Create and types. types?
Data types in Python Markerboard, Manipulate
- Numeric Python arrays in Python • Guide the Mention four
- Dictionary Interpreter, students to types of
- Boolean IDE create Arrays in
- Set ● PyCharm. manipulate Python
- Sequence type ● IDLE Arrays in
- Etc. ● Sublime Python Write Python
● Vim. • Create and codes to
• Explain Python ● Atom. manipulate List, • Guide the create store
array and how to ● Jupyter Turple and students to and
67
3.3 Explain why and Use Arrays in Notebook. Dictionary in create and manipulate
how Arrays are used Python ● Eclipse Python manipulate the content
in Python ● PyDev List, Turple of an Array
• Discuss how to ● GNU and Dictionary
3.4 Explain how to Create and Emacs. in Python
Create and manipulate manipulate Python Practical manual,
Python Arrays Arrays Books.
GENERAL OBJECTIVE 4.0: Understand Control Structures
4.1 Explain • Describe the PC/Laptop, • Write and • Demonstrate the Write a
conditional use of Multimedia execute Python implementation of program that
statements in conditional projector, codes using IF Conditional prints your
Python blocks such as Marker, statement, Statements. name 100
IF…ELIF and Markerboard, ELIF • Guide students times.
ELSE Python construct, and on using IF,
Interpreter, using ELIF, ELSE Write a
4-5 4.2 Explain • Explain how IDE IF…ELIF…E statements. program to
Loops in FOR and ● PyCharm. SIF construct. Demonstrate accept
Python; For WHILE loop ● IDLE the values,
Loops, While constructs ● Sublime • Write implementatio compare and
Loops work. ● Vim. programs that n of FOR and print in
● Atom. use the WHILE specific
• Describe the ● Jupyter WHILE loop, • Loops. Guide order
Explain Range Notebook. WHILE with students on
the Range Function ● Eclipse BREAK, using WHILE, Use a for
Function ● PyDev WHILE with BREAK, and loop to print
● GNU CONTINUE CONTINUE a triangle (of
Emacs. Commands. any
Practical manual, • Write character).
programs Allow the
Books
that use user to
the FOR specify how
loop, high the
FOR with triangle
should be.
68
BREAK

GENERAL OBJECTIVE 5.0: Understand Functions, Libraries and Modules


5.1 Explain • Explain PC/Laptop, • Write • Guide students Explain
Functions and Functions and Multimedia programs to: Functions
differentiate function projector, that calls • Use the Def and
between Library parameters. Marker, built-in command to function
functions and Markerboard, functions define a parameter
User- defined Python from the function and s.
functions. Interpreter, Python set its
IDE Library parameters. Write
6-7 5.2 List the rules for • Outline the ● PyCharm. Call the programs
creating functions. rules for ● IDLE • Write a function. that calls
creating ● Sublime program built-in
functions ● Vim. that is • Use the functions
● Atom. made of at Return from the
5.3 Explain the need • Explain ● Jupyter least two statement Python
for Recursive how Notebook. modules. to exit a Library
functions.-*-++ Recursive ● Eclipse function
functions ● PyDev Write a
work ● GNU • Create a program
Emacs. recursive that is
Practical manual, function made of at
5.4 Explain module • Explain Books
least two
modules modules

• Explain how
recursive
functions work

69
GENERAL OBJECTIVE: 6.0 Understand Strings operations
6.1 Define strings • PC/Laptop,
Explain String • Write codes to Guide the students to: List the
8 data type inMultimedia Create and String
6.2 Explain string Python projector, Manipulate Strings • Guide students to Operators
data types and Marker, use Operators to
string Methods Markerboard, • Use Operators to manipulate strings Write
Python manipulate strings Python
6.3 Explain how to • List the String Interpreter, • Guide students to Code to
use String Methods and IDE use build-in Manipulat
Operators to Implementati ● PyCharm. • Use build-in methods e String
Manipulates on ● IDLE methods with
Strings ● Sublime Build-in
● Vim. Methods
6.4 Identify and • Identify and ● Atom.
implement String implement ● Jupyter
Build-in Methods String Build- Notebook.
+-6589 ● Eclipse
• I9+3 ● PyDev
• 01n Methods ● GNU
Emacs.
Practical manual,
Books
GENERAL OBJECTIVE 7.0: Understand List, Tuple, Dictionary and Set
9-10 7.1 Describe List, • Explain List, Tuple, PC/Laptop, • Manipulate List, Illustrate how to: What are the
Tuple, Dictionary and Dictionary and Set Multimedia Tuple, • Create and similarities
Set projector, Dictionary and Manipulate and
• Explain basic List Marker, Set in Python List differences
7.2 Explain the Basic Operations Markerboard, between List
Operations of List, Python • Demonstrate • Create and and Tuple?
Tuple, Dictionary and Interpreter, Indexing, Manipulate
Set IDE Slicing, and Tuple What are the
- Indexing ● PyCharm. Matrixes in List similarities
- Slicing ● IDLE and Tuple • Create and and
70
- Matrixes ● Sublime Manipulate differences
• Explain Built-in ● Vim. Dictionary between a
7.3 Explain the Built- List Functions and ● Atom. dictionary
in Functions and Methods ● Jupyter • Create and and a set?
Methods Notebook. Manipulate Set
● Eclipse State the
● PyDev properties of
● GNU a dictionary
Emacs.
Practical manual,
Books.
General Objective 8.0: Know the concepts of Object Oriented Programming
11-12 8.1 Explain Object • Explain Object PC/Laptop, • Create a class • Demonstrate the Define
Oriented Oriented Multimedia named MyClass, concept of OOP OOP
programming concepts: projector, with a property in Python
Abstraction, Marker, named x Write a
Polymorphism, Markerboard, • Demonstrate how python
Inheritance, and Python • Create an object to create object code to
Encapsulation Interpreter, named p1, and and class create and
8.2 Define • Explain class IDE print the value object and
Class and Object and object ● PyCharm. of x print the
● IDLE value
8.3 Define Methods • Explain ● Sublime • Create a class
Methods and ● Vim. named Person, use
how they relate ● Atom. the
to Objects in a ● Jupyter • init() function to
Class. Notebook. assign values for
● Eclipse name and age
8.4 Define Parent • Explain Parent ● PyDev
and Child Classes Class and Child ● GNU • Insert a function
Class Emacs. that prints a
Practical manual, greeting, and
Books execute it on the
71
p1 object

• Create a Parent
Class named
Person, with
firstname and
lastname
properties, and a
printname method

• Create a class
named Student,
which will inherit
the properties and
methods from the
Person class
General Objective 9.0: Know how to work with Databases
13-14 9.1 List the • Explain the need PC/Laptop, • Create a Guide students to: Use the
different for database Multimedia database • Create a appropriat
databases that projector, named database e SQL
Python API • List and explain Marker, "mydatabase" named statement
supports the different Marker board, using the "mydatabas to create a
Databases that Python Create e" using the Database
Python API Interpreter, Database Create with at
supports. IDE command. Database least two
- ● PyCharm. command. tables and
9.2 Explain • Explain database ● IDLE • Create a table Create a write
MySQL operations and ● Sublime named table statement
database the syntaxes and ● Vim. "customers" named s to
commands. functions of the ● Atom. with two "customers manage
following ● Jupyter fields “Name” " with two the
database Notebook. and “Address” fields content of
command: Create ● Eclipse in “Name” the tables
Database, Create ● PyDev “mydatabase” and
72
Table, Insert, ● GNU using the “Address”
Select, Where, Emacs. Create Table in
Order by, Delete, Practical manual, command. “mydatabas
Drop Table, e” using the
Books
Update, Join • Insert a record Create
in the Table
"customers" command.
table using the • Insert a
Insert Into record in
command the
"customer
Query the s" table
“customers” using the
using the Insert Into
Select..From..W command
here statement • Query the
“customers”
Delete a record using the
from Select..From
“customers” ..Where
using the statement
Delete...From… • Delete a
Where statement record from
“customers”
Delete using the
“customers” from Delete...Fro
“mydatabase” m…Where
using the Drop statement
Table statement • Delete
“customers
” from
“mydataba
se” using
the Drop
73
Table
statement

General Objective 10: Understand ases of Graphic User Interface (GUI) Programming
15 10.1 Explain • Describe GUI PC/Laptop, • Import GUI • Demonstrate Explain
GUI imports modules Multimedia module how to how to
projector, import the create
10.2 Explain • Explain how to Marker, • Create Labels modules for labels,
how to create labels, text Markerboard, GUI. text
implement GUI boxes, buttons, Python • Creates a boxes,
Elements grids, canvass, Interpreter, simple entry • Guide the buttons,
- Labels and window IDE • box using Entry students to grids,
- Entry box colors ● PyCharm. ( ) method and create canvass,
- Grids ● IDLE place it on the Labels, text and
- Buttons ● Sublime screen. boxes, window
- Canvass ● Vim. buttons, colors
10.3 Explain the ● Atom. • Use the get(), grids for
concept of Global ● Jupyter delete() and accepting
variables Notebook. insert () user inputs
● Eclipse methods to get and
10.3 Explain ● PyDev input from the manipulate
callbacks and ● GNU box, erase the contents
lamba Emacs. content of the
Practical manual, box and to
Books insert text into
the entry box

74
YEAR ONE SEMESTER TWO COURSES

75
ROUTING AND SWITCHING 1
PROGRAMME: HIGHER NATIONAL DIPLOMA NETWORKING AND CLOUD COMPUTING
COURSE: Routing and Switching 11 COURSE CODE: NCC 321 Contact Hours: 4 hours /week

CREDIT UNIT: 4 Theoretical: 1 hour /week

Year: 1 Semester: 11 Pre-requisite: NCC 311 Practical: 3 hours /week

GOAL: This Course is designed to equip students with the essentials of Routing and Switching Technologies.
GENERAL OBJECTIVES: On completion of the course, the student should be able to:
1.0 Understand Basic Device Configuration
2.0 Understand Virtual Local Area Networks (VLANs)
3.0 Understand Inter-VLAN Routing
4.0 Know Spanning Tree Protocol Concepts
5.0 Know link Aggregation Technology
6.0 Understand Dynamic Host Configuration Protocol for IPv4/ IPv6
7.0 Understand Stateless Address Auto Configuration (SLAAC)

76
PROGRAMME: HIGHER NATIONAL DIPLOMA NETWORKING AND CLOUD COMPUTING
COURSE: Routing and Swutching1 COURSE CODE: NCC 321 Contact Hours: 4 hours /week
CREDIT UNIT: 4 Theoretical: 1 hours /week
Year: I Semester: 11 Pre-requisite: NCC 311 Practical: 3 hours /week
GOAL: This Course is designed to equip the students with the essentials of Switching and Routing Technologies.
GENERAL OBJECTIVE 1.0: Understand Basic Device Configuration
THEORETICAL CONTENT PRACTICAL CONTENT
Week Specific Learning Teacher’s Resources Specific Learning Teacher’s Activities Evaluation
Outcome Activities Outcome
1-2 1.1 Define switch • Explain Multimedia Projector, • Configure Switches, Guide students to: Define switch.
1.2 Explain Frame Frame Routers and Switches, Cable the Network • Configure Switches,
Forwarding Forwarding. Packet Tracer or eNSP or and Verify the Cable the Network Define frame
GNS3, Default Switch and Verify the forwarding.
1.3 Define Switching • Explain Laptop Configuration Default Switch
Domains Switching Internet • Configure Basic Configuration Define switching
Domains. Books, Journals, Marker Network Device • Configure Basic domains
1.4 Explain how to board, Marker, Settings Network Device
setup a Switch • Configure a Textbooks, TeraTerm, • Verify and Test Settings
with Initial Switch with Putty Network • Verify and Test
Settings. Initial Connectivity Network
Settings. Connectivity

1.5 Define Switch • Explain


Ports. Switch Ports.

1.6 Explain Remote • Explain


Access. Secure
Remote
Access.
1.7 Explain Router • Explain Basic
Configuration.
77
Router
Configuration
.
1.8 Explain Directly • Explain
Connected directly
Networks. Connected
Networks.

GENERAL OBJECTIVE: 2.0 Understand Virtual Local Area Networks (VLANs)


3.1 Explain the • Explain the Multimedia Projector, • Build a Network; Guide students to: Explain the purpose of
4-5 purpose of VLANs in purpose of Routers and Switches, VLANs in a switched
a switched Network. VLANs in a Packet Tracer or eNSP or • Create VLAN • Build a Network; Network.
switched GNS3, • Configure VLANs
s Network. Laptop • Configure VLANs and Trunking
3.2 Explain frame • Explain frame Internet and Trunking • Configure Basic
forwarding within a forwarding Books, Journals, Marker • Configure Basic Device Settings
Multi-Switched within a board, Marker, Device Settings • Create VLANs;
Environment using Multi- Textbooks, TeraTerm, • Assign Switch Ports Assign Switch Ports
VLAN Switched Putty • Maintain VLAN • Maintain VLAN
Environment Port Assignments Port Assignments
using VLAN from the VLAN and the VLAN
• Explain how Database Database
3.3 Explain how to •
to configure a • Configure an Configure an
Setup a switch Port to switch Port to 802.1Q Trunk
802.1Q Trunk
be assigned to a be assigned to Between the
Between the
VLAN. a VLAN. Switches
Switches
• Explain how
to Configure a
switch port
3.4 Explain how to for VLAN
Configure a switch Trunks
port for VLAN • Explain how
78
Trunks to Configure
Dynamic
Trunking
Protocol
3.5 Explain how to
Configure Dynamic
Trunking Protocol

GENERAL OBJECTIVE: 3.0 Understand Inter-VLAN Routing


3.1 Explain options • Explain Multimedia Projector, Configure Router-on-a- Demonstrate how to: Explain options for
6-7 for configuring options for Routers and Switches, Stick Inter-VLAN Routing. Configure Router-on-a- configuring inter-
inter-VLAN configuring Packet Tracer or eNSP or Troubleshoot Inter-VLAN Stick Inter-VLAN Routing. VLAN routing
routing. inter-VLAN GNS3, Routing. Troubleshoot Inter-VLAN
routing. Laptop Routing.
3.2 Explain Router- • Explain Internet Configure Inter-VLAN Configure Inter-VLAN
on-a-stick inter- Router-on-a- Books, Journals, Marker Routing. Routing
VLAN routing. stick inter- board, Marker,
VLAN Textbooks, TeraTerm,
routing. Putty
3.3 Explain inter- • Explain inter-
3.4 VLAN routing VLAN
using Layer 3 routing using
switching. Layer 3
switching.

3.5 Explain • Explain


troubleshooting troubleshootin
in inter-VLAN. g in inter-
VLAN.

79
GENERAL OBJECTIVE: 4.0 Know Spanning Tree Protocol Concepts
4.1 Explain common • Explain Multimedia Projector, • Investigate STP Guide students to; Explain common
problems in a common Routers and Switches, Loop Prevention. • Investigate STP problems in a
8 redundant, Layer problems in a Packet Tracer or eNSP or Loop Prevention. redundant, Layer 2
2 switched redundant, GNS3, • Build a simple switched network
network Layer 2 Laptop three-switch • Build a simple
switched Internet network with STP. three-switch
network Books, Journals, Marker network with STP.
4.2 Explain how • Explain how board, Marker, • View STP operation
STP operates in STP operates Textbooks, TeraTerm, • View STP operation
a simple in a simple Putty • Disable STP and
switched switched view operation again • Disable STP and
network. network. view operation again
4.3 Explain RSTP • Explain RSTP • Configure RSTP
operations. operations and/or Rapid per - • Configure RSTP
VLAN Spanning and/or Rapid per -
tree (PVST+) VLAN Spanning
tree (PVST+)

GENERAL OBJECTIVE: 5.0 Know link Aggregation Technology.


9 5.1 Explain link • Explain link Multimedia Projector, Explain link
aggregation aggregation Routers and Switches, • Configure link Guide students to; aggregation technology
technology. technology. Packet Tracer or eNSP or aggregation.
GNS3, network cables, • Configure link
5.2 Explain Setup of • Explain Setup network toolbox, • Troubleshoot link aggregation.
link aggregation. of link Laptop aggregation.
aggregation. Internet • Troubleshoot link
Books, Journals, Marker aggregation.
5.3 Explain • Explain board, Marker, • Verify link
troubleshooting troubleshootin Textbooks, TeraTerm, aggregation between
in link g in link Putty the switches • Verify link
aggregation aggregation aggregation between
the switches
80
GENERAL OBJECTIVE: 6.0 Understand Dynamic Host Configuration Protocol for IPv4/ IPv6
10 -11 6.1 Explain • Explain Multimedia Projector, Guide students to; Explain DHCPv4
DHCPv4 DHCPv4 Routers and Switches, • Configure DHCPv4: • Configure DHCPv4: operations in a small-
operations in a operations in Packet Tracer or eNSP or to medium-sized
small- to a small- to GNS3, network cables, • Configure a Router • Configure a Router business network.
medium-sized medium-sized network toolbox, lab as a DHCP Server as a DHCP Server
business business guides,
network. network. Laptop • Configure DHCP • Configure DHCP
6.2 Explain how an • Explain how Internet Relay Relay
IPv6 host can an IPv6 host Books, Journals, Marker
acquire its IPv6 can acquire its board, Marker, • Configure a Router • Configure a Router
configuration. IPv6 Textbooks, TeraTerm, as a DHCP Client as a DHCP Client
configuration. Putty
6.3 Explain the • Explain the • Verify DHCP and • Verify DHCP and
operation of operation of Connectivity. Connectivity.
SLAAC SLAAC
6.4 Explain the • Explain the • Implement DHCPv4 • Implement DHCPv4
operation of operation of
DHCPv6 DHCPv6 • Configure DHCPv6. • Configure DHCPv6.

• Verify SLAAC • Verify SLAAC


address assignment address assignment
on a router on a router

• Configure a • Configure a
Stateless DHCPv6 Stateless DHCPv6
Server on a router Server on a router

• Configure a Stateful • Configure a Stateful


DHCPv6 Server on DHCPv6 Server on
a router a router

• Configure a • Configure a
81
DHCPv6 Relay on a DHCPv6 Relay on a
router router
GENERAL OBJECTIVE: 7.0 Understand Stateless Address Auto Configuration (SLAAC) and Dynamic Host Configuration Protocol for IPv6
12 7.1 Explain how an • Explain how Multimedia Projector, • Configure DHCPv6. Guide students to:Explain how an IPv6
IPv6 host can an IPv6 host Routers and Switches, host can acquire its
acquire its IPv6 can acquire its Packet Tracer • Build the Network • Configure DHCPv6. IPv6 configuration.
configuration. IPv6 Laptop and Configure Basic
configuration. Internet Device Settings • Build the Network Explain the operation
7.2 Explain the • Explain the • Verify SLAAC and Configure Basic of SLAAC
operation of operation of PC/Laptop, address assignment Device Settings
SLAAC SLAAC Multimedia projector, on a router • Verify SLAAC
7.3 Explain the • Explain the Marker, • Configure and verify address assignment
operation of operation of Marker board, a Stateless DHCPv6 on a router
DHCPv6 DHCPv6 Practical Manual, Server on a router • Configure and verify
7.4 Explain how to • Configure a Books • Configure and verify a Stateless DHCPv6
configure a stateful and a Stateful DHCPv6 Server on a router
stateful and stateless Server on a router • Configure and verify
stateless DHCPv6 • Configure and verify a Stateful DHCPv6
DHCPv6 server. server. a DHCPv6 Relay on Server on a router
a router • Configure and verify
a DHCPv6 Relay on
a router

82
CLOUD COMPUTING 1
PROGRAMME: HIGHER NATIONAL DIPLOMA (HND) NETWORKING AND CLOUD COMPUTING
COURSE: CLOUD COMPUTING I CODE: NCC 322 Credit Unit: 3 CONTACT HOURS: 3
HOURS/WEEK
GOAL: This course is designed to equip students with theoretical and practical skills required to gain a foundational understanding of
cloud computing.
YEAR: 1 SEMESTER: 1 PRE-REQUISITE: THEORETICAL: 2 HOURS/WEEK
PRACTICAL: 1 HOURS/WEEK
GENERAL OBJECTIVES: On completion of the course, the student should be able to:
2.0 Understand Cloud Computing Overview.
3.0 2.0 Understand Cloud Economics And Billing
4.0 Understand Global Cloud Infrastructure
5.0 Understand The Fundamentals Of Cloud Computing Security
6.0 Understand Cloud Networking And Content Delivery

83
PROGRAMME: HIGHER NATIONAL DIPLOMA (HND) NETWORKING AND CLOUD COMPUTING
COURSE: CLOUD COMPUTING I CODE: NCC 312 Contact Hours: 3 Hours/Week
CREDIT UNIT: 3 Theoretical: 2 Hours/Week
Practical: 1 Hour/Week
GOAL: This course is designed to equip students with theoretical and practical skills required on cloud computing.
Course Specification: THEORETICAL CONTENT PRACTICAL CONTENT
GENERAL OBJECTIVE 1.0: Understand cloud computing overview
Week Specific Learning Teachers’ Activities Learning Specific Learning Teachers’ Evaluation
Outcome Resources Outcome Activities
1-3 1.1 Define the term • Explain cloud Internet, Login to Demonstrate how Explain cloud
cloud computing. computing in relation Multimedia AWS/AZURE to login to computing
to delivery of management AWS/AZURE
functions such as Projector, console management
computation power, console Explain the
Computer,
storage, etc. different cloud
Lecture notes, service models
1.2 Define different • Explain the
differences of cloud Tutorials, Differentiate cloud
types of cloud
service models such Marker, computing model
service models.
as IaaS, PaaS, SaaS, from traditional
Marker board, computing model
DbaaS, etc and
differentiate cloud Books/Journals, Explain the cloud
computing model PowerPoint slides computing
from tradition deployment models
computing model.
Describe different
1.3 Define cloud • Explain the web services and
computing differences of cloud give example of
deployment computing their providers
models. deployment models
such as cloud hybrid,
On-premise, multi- Explain different
cloud, etc. ways to interact
1.4 Describe the with cloud services
• Explain the
84
advantages of advantages of cloud
cloud computing computing

1.5 Define web • Explain web services


services and give such as networking,
examples of web database, storage,
service providers. application
integration, etc and
give examples like
AWS, Microsoft
Azure, Google
Cloud, etc
Demonstrate cloud Guide students to
• Explain different
1.6 Identify simple adoption demonstrate
ways to interact with
solution example framework (CAF) cloud adoption
cloud service(s) such
and how users framework (CAF)
as GUI management
interact with the console, CLI, etc
cloud services.

• Explain the cloud


1.7 Explain the cloud
adoption framework
adoption
(CAF) and state the
framework (CAF)
difference between
AWS CAF, Google
CAF, and Microsoft
Azure CAF
GENERAL OBJECTIVE 2.0: Understand Cloud Economics and Billing
4-6 2.1 Explain the cloud • Explain the cloud Online Pricing • Take an • Guide Explain
service pricing service pricing types Calculator, existing case students on fundamental pricing
philosophy such as pay-as-you- Internet, study, and use how to read types.
go, custom pricing, a pricing estimate and
free, etc for AWS, Multimedia calculator to use pricing
85
Microsoft Azure, etc. Projector, provide an calculator
estimate. with a case
2.2 Explain • Explain fundamental Computer,
fundamental pricing • Use billing study.
Lecture notes,
pricing types. characteristics for tools such as • Guide
different providers. Tutorials, Bills, Cost students on
Explorer, how to use
2.3 Differentiate • Explain and Marker,
Budgets, etc. the billing
premises versus differentiate Marker board,
premises versus tools.
cloud costing Books/Journals,
cloud costing.
PowerPoint slides
• Explain Total cost of
2.4 Explain the ownership
elements of total
cost of ownership
(TCO).

2.5 Explain the • Explain the TCO


components to consideration.
consider for TCO
preparation.
2.6 Explain how to set • Explain the 4 steps to
up an setup organization on
organizational a provider’s platform
structure that for efficient billing
simplifies billing and account
and account management, etc.
visibility to review
cost data.

• Explain cloud service


2.7 Explain the organizations
functionality in an terminologies
online billing
86
dashboard.
Explain organizations
security, key features
2.8 Explain the
and benefits
limitations imposed on
the providers platform
for setting up Explain how to use
organizations billing tools such as
Bills, Cost Explorer,
Budgets, etc
2.9 Explain how to use
costing and billing
tools.
GENERAL OBJECTIVE 3.0: Understand Global Cloud Infrastructure
7-9 3.1 Explain the • Explain the meaning Online global Identify global Show global Explain the
purpose of global and purpose of infrastructure cloud cloud components that
cloud global cloud view for infrastructures infrastructure make up a cloud
infrastructure. infrastructure. Microsoft Azure, global cloud
AWS, or any infrastructure
3.2 Explain the • Explain the
components that other,
components that
make up a cloud make up a global Internet,
global cloud cloud infrastructure Multimedia
infrastructure
• Explain the factors Projector,
3.3 Explain factors to that are considered
consider when when selecting a Computer,
selecting a region. region for Lecture notes,
implementing the
Tutorials,
infrastructure.
3.4 Define data center Marker,
and explain where • Explain the
it fits in the global components such as Marker board,
cloud global regions, Books/Journals,
infrastructure. zones, data centers, PowerPoint slides
87
etc
3.5 Explain point of • Explain points of
presence for presence for different
different global global cloud
cloud infrastructure from
infrastructure different providers

3.6 Explain different • Explain common


categories of categories of services
services and their such as compute,
cloud service storage, database,
providers networking, and
outline some
proprietary examples
specific to different
3.7 Explain different providers
management • Explain some
consoles popular management
consoles such as
Azure Portal, AWS
Management
Console
GENERAL OBJECTIVE 4.0: Understand the Fundamentals of Cloud Computing Security
10-12 4.1 Explain the shared • Explain the shared Microsoft Azure, Create Account on Guide students to Explain the shared
responsibility responsibility model AWS, or any AWS, Microsoft create account, responsibility
model for cloud for cloud security other, Azure platforms add users, create model for cloud
security using models such as Internet, and others. groups, add users security
AWS, Azure AD, etc. to groups, and test
Create and add
Multimedia sign-in to the
4.2 Explain the • Explain the users to groups.
Projector, created accounts
components that responsibility of the Explore the users
form both the customer and the Computer, and groups,
88
customer and the provider in cloud Lecture notes, Sign-in and test
provider security model. users account.
Tutorials, Guide students
responsibilities in Demonstrate how to demonstrate
the shared model. Marker,
to secure data on how to secure
• Explain and Markerboard,
4.3 Explain the cloud the cloud data on the cloud
differentiate security
service Books/Journals, platforms platforms
services manage by
characteristics and PowerPoint slides
customer and those
security.
manage by the
provider with
4.4 Explain the shared examples
responsibilities • Explain the concept of
component by shared responsibilities
answering the using scenario-based
scenario-based quiz
quiz.
• Explain the access
4.5 Explain the and control
components of management essential
cloud service components such as
access and control users, group, policy,
management. and role. And explain
the components using
AWS IAM, Azure
AD, or any other
service
4.6 Explain the • Explain how the
management of access and control is
control and access managed using user
to resources. and group, roles,
MFA, access
conditions, directory
integration

89
• Explain different
4.7 Explain account account access types
access types and such as root, etc and
how to secure a how to secure a new
new account. account
• Explain how to secure
data at rest or in
4.8 Explain how to transit using
secure data on the encryption provided
cloud platforms on the cloud platform.
Use AWS S3 buckets
or Azure Blob Storage
for elaboration
4.9 Explain how to
• Explain how to ensure
ensure compliance
compliance with
with regulatory
regulatory
requirements
requirements on the
platforms
GENERAL OBJECTIVE 5.0: Understand Cloud Networking and Content Delivery.
13-15 5.1 Explain the basics • Explain what is a AWS • Design a cloud • Guide the Explain cloud
of networking network Management virtual network student to virtual network
Console, Azure diagram, design a
5.2 Explain IP address • Explain the concept
VN Designer, or cloud virtual
and their versions. of IP addressing and any other, • Build a virtual
private
5.3 Explain the subnets, IPv4, IPv6, network and
Pictorial network network,
concept of and CIDR launch a web
subnetting and diagrams, server, • Guide the
students to
CIDR Internet, • Create a virtual
• Explain OSI model build a virtual
5.4 Explain OSI Multimedia network, create
and the possible network and
model. protocols found in additional
Projector, launch a web
subnets, create
each layer server,
Computer, virtual network
security group, • Guide the
90
5.5 Explain IP address Explain IP address Lecture notes, and launch a students to
and subnet. and subnet web server create a
Tutorials,
instance. virtual
5.6 Explain cloud • Explain cloud virtual Marker, network,
virtual network networks
Markerboard, create
5.7 Explain the • Explain the concept additional
concept of cloud of cloud virtual Books/Journals, subnets,
virtual network in network using AWS PowerPoint slides create virtual
relation to cloud VPC, and Azure VN, network
computing and how the security
organizational technology is used in group, and
structure a region, zones, and launch a web
subnets. server
instance.
5.8 Describe how IP • Explain how IP
address, routes, and address, routes, and
route tables are used route tables are used
in cloud virtual in cloud virtual
networks networks
5.9 Describe the • Explain elastic
concept of elastic network interface
network interface and how it can be
connected to
5.9 Describe the instances
concept of cloud
virtual networking
• Explain with help of
sample designs the
concept of cloud
virtual networking
such as internet and
NAT gateway,
sharing, peering,
site-to-site VPN,

91
direct connect,
endpoints, and transit
gateway
5.10 Explain the cloud
virtual network
security groups • Explain the cloud
virtual network
security groups
5.11 Explain network
access control lists
(ACLs) for cloud • Explain network
virtual networks and access control lists
compare between (ACLs) for cloud
security groups and virtual networks and
network ACLs compare between
security groups and
network ACLs
5.13 Explain the
concept of cloud • Explain the high
DNS and cloud availability and
DNS resolution scalability of cloud
DNS using Amazon
53 and Azure DNS
and how it support
several routing
5.13 Explain how
policies
multi-region
deployment and • Explain how multi-
fail-over can be region deployment
used to improve and fail-over can be
availability used to improve
availability
5.14 Explain the
concept of CDN

92
• Explain how CDN is
used to accelerate
delivery of content
using either AWS
CloudFront or Azure
CDN
ASSESSMENT: The continuous assessment; tests, quizzes will be awarded 40% of the total score. The end of the Semester Examination will
make up for the remaining 60% of the total score.

93
ADVANCED STATISTICS FOR COMPUTING

PROGRAMME: HIGHER NATIONAL DIPLOMA (HND) NETWORKING AND CLOUD COMPUTING

Course Title: Advanced Statistics for Computing Course Code: NCC 323 Contact Hours: 3

Theoretical: 1hour /week


Year: 1 Semester: 1 Practical: 2 hour /week
Goal: This course is designed to enable students to acquire basic knowledge of SPSS Package Tools
General Objectives: On completion of this course the diplomate, should be able to:
1.0 Understand the Main Features Of SPSS (Statistical Package for Social Science)
2.0 Understand Variable and Data Input Transformation in SPSS
3.0 Understand How to Perform Descriptive Analyses with SPSS and Ms Excel ER
4.0 Know How to Perform Common Parametric and Non-Parametric Test
5.0 Understand How to Perform Simple Regression and Multivariate Analyses

94
PROGRAMME: HIGHER NATIONAL DIPLOMA (HND) NETWORKING AND CLOUD COMPUTING
Course Title: Advanced Statistics for Computing Course Code: NCC 323 Contact Hours: 3
CREDIT UNITS: 3 Theoretical: 1 hour /week
Practical: 2 hour /week
Theoretical Content Practical Content
General Objective 1: Understand the main features of SPSS (Statistical Package for Social Science)
Specific Learning Teacher’s activities Specific Teacher’s
Week Resources Evaluation
Outcomes Learning activities
Outcomes
1-2 1.1 Define SPSS • Explain Install SPSS Guide students to:
Package the main Books of • Install SPSS Explain SPSS
features of recorded Identify the features
SPSS statistics in SPSS • Identify the Identify general
1.2 Explain SPSS features in SPSS Features of SPSS
general features • Explain the Internet Explain Sorting,
general aspect, Transpose in SPSS
workflow and
critical issues
Explain how to store
1.3 Explain the
and retrievefiles
Importance of SPSS • Explain
Functions,
Menus and
1.4 Describe File commands
management in
SPSS • Explain file
management in
SPSS
1.5 Explain data
file Storage and • Explain data file
Retrieval Storage and
Retrieval

95
• Explain the
importance
of SPSS
General Objective 2.0 Understand Variable and Data Input Transformation in SPSS
3-4 2.1 Define Variable, • Define Textbooks Demonstrate the Demonstratethe Describe variable
Variable and Lecture notes concept of concept of Variable
Explain Variable Explain the various
variable view Illustrate how to methodsof data Input
spreadsheet InternetPCs generate data online
SPSS Use computer
system to generate Explain Data
2.2 Describe Manual • Explain data Illustrate how to Transformation
Data input ManualData TransformData
Entry Textbooks PCs
SPSS
2.3 Explain • Explain Data
Automated Data Transformation
Input andfile import
• Explain Syntax
2.4 Explain Data files and script
Transformation • Describe how to
generate data
2.5 Explain syntax andImport file
files and scripts using computer
system
2.6 Explain Output
Management

96
General Objective 3: Understand how to perform descriptive analyses with SPSS
5-6 3.1 Explain Explain Frequencies Textbooks Categories various Explain and Explain frequency,
Frequencies Ms. Excel data supervise student
Explain Descriptive Textbooks Ms. collected exercises andstudent Explain Crosstab
analysis Excel Hard disk, Illustrate Crosstab work and Chart
3.2 Explain Flash drive,CD, and Chart Explain crosstab
Descriptive internet and Chart
Explain Crosstab
Analysis SPSS etc

3.3 Explain Crosstab Explain and discuss


Charts
3.4 Explain Charts
General Objective 4 : Know how to perform common parametric and non-parametric test
4.1 Identify and Explain and discuss Textbooks Identify the Demonstratehow to Enumerate the
7-8 Explain different various types of Statistical various types of identify the various various types of
statistical test: statistical tests tables statistical table types statistical tables
Mean, T test, One- of statisticaltables
wayANOVA, Non Statistical Demonstrate Explain how to
Parametric test, tables, how to construct Demonstrateby construct
Normality test PCs, Charts,Ms. scattered exampleshow to frequency tables
Explain Linear Excel diagrams, construct scattered and graphs
4.3 Explain Correlation and SPSS frequency tables diagrams, frequency
Correlation and Regression and graphs tables and graphs Enumerate the
Regression: merits and
Explain Multiple demerits of charts
- Linear Correlation regression (Linear) and diagrams
and Regression,
- Multiple regression
(Linear)

97
General Objective 5: Understand how to perform advanced regression and multivariate analyses
5.1 Explain Factor • Define and Text books Analyze data Guide students to Explain factorand
9 Analysis Explain SPSS using Factor analyze datausing cluster analysis
Factor PCs SPSS analysis factoranalysis Use SPSS to
Analysis Package Analyze data Guide students to analyze data
using cluster analyze data using
• Define and analysis SPSS
5.2 Explain Cluster Explain Analyze data
Analysis Cluster using SPSS
10- Analysis
12
5.3 Analyze Data using • Explain how
SPSS to analyze
data using
SPSS

98
ADVANCE WIRELESS NETWORKS
PROGRAMME: HIGHER NATIONAL DIPLOMA (HND) NETWORKING AND CLOUD COMPUTING
COURSE: ADVANCE WIRELESS COURSE CODE: NCC 325 Contact Hours: 3 Hours/Week
NETWORKS
CREDIT UNIT: 3 Theoretical: 2 Hours/Week

Pre-requisite: Practical: 1 Hour/Week


Year: 1 Semester: 1

GOAL: This course is designed to equip students with comprehensive understanding of WLAN Technologies and its Deployment.
GENERAL OBJECTIVES: On Completion Of The Course, The Student Should Be Able To:
1.0 Understand WLAN Technology, Products and VRP
2.0 Understand WLAN Fundamentals and Configuration
3.0 Understand the WLAN Security, Operation and Management
4.0 Understand Historical Progression and Advancements in Modern Wireless Communication Systems.
5.0 Understand 5G Industrial Applications and Solutions

99
PROGRAMME: HIGHER NATIONAL DIPLOMA (HND) NETWORKING AND CLOUD COMPUTING
COURSE: ADVANCE WIRELESS COURSE CODE: NCC 325 Contact Hours: 3 Hours/Week
NETWORKS
CREDIT UNIT: 3 Theoretical: 2 Hours/Week
Year: ONE 1 Semester: 11 Pre-requisite: Practical: 1 Hour/Week
COURSE SPECIFICATION: THEORETICAL AND PRACTICAL
GOAL: This course is designed to equip students with comprehensive understanding of WLAN Technologies and its Deployment.
GENERAL OBJECTIVE 1.0: Understand WLAN technology and products
THEORETICAL CONTENT PRACTICAL CONTENT
Week Specific Learning Outcome Teacher’s Activities Resources Specific Learning Teacher’s Activities Evaluation
Outcome
1 –3 1.1 Explain WLAN technical • Explain WLAN Text books, • Perform basic • Guide students on Explain how to
principles and products. multi-media
technical principles wireless LAN basic wireless LAN upgrade WLAN
and products Projector, configuration configuration devices.
1.2 Explain the basic wireless • Explain the basic Lecture notes,
configuration methods Lab guide,
wireless configuration • Perform WLAN • Guide the students on
method. simulation Device Upgrade (ACs how to Upgrade
1.3 Explain how to upgrade • Explain how to tools, and APs) WLAN Devices
WLAN devices. upgrade WLAN Switches,
devices Routers,
Access Point s
(APs), Access
Controllers
(ACs)
GENERAL OBJECTIVE: 2.0 Understand WLAN Fundamentals and Configuration
4–6 2.1 Explain the working • Describe Layer 2 Text books, • Design and configure • Guide the students to Explain the
principles of Layer 2 WLAN networking multi-media Layer 2 Off-Path design and configure various WLAN
WLAN networking and and Layer 3 WLAN Projector, WLAN Networking Layer 2 Off-Path service
Layer 3 WLAN networking. networking. Lecture notes, • Design and configure WLAN Networking configuration
2.2 Explain the various WLAN • Explain the WLAN Lab guide, Layer 3 Off-Path • Guide the students to process and
service configuration service configuration simulation WLAN Networking design and configure commands.
process and commands. process and tools, Switches, Experiment (CLI) Layer 3 Off-Path
2.3 commands. Routers, Access • Configure Layer 3 WLAN Networking

100
2.4 Explain WLAN radio • Explain WLAN radio Point s (APs), Off-Path WLAN Experiment (CLI)
resource management. resource Access Networking • Demonstrate Layer 3
management. Controllers Experiment (Web) Off-Path WLAN
(ACs) • Configure WLAN Networking
Radio Resource Experiment (Web)
Management • Demonstrate WLAN
Radio Resource
Management

GENERAL OBJECTIVE: 3.0 Understand WLAN Security, Operations and Management


3.1 Define various WLAN • Explain WLAN Text books, • Perform some basic • Demonstrate some Define various
7-8 security technologies security technologies. multi-media WLAN basic WLAN WLAN security
. Projector, Troubleshooting. Troubleshooting technologies
3.2 Explain how to perform • Explain the basic Lecture notes,
basic troubleshooting WLAN Lab guide,
WLAN methods. troubleshooting simulation
methods. tools, Switches,
3.3 Explain the WLAN • Explain the WLAN Routers, Access
deployment solution deployment solution Point s (APs),
Access
Controllers
(ACs)
GENERAL OBJECTIVE: 4.0 Understand the Historical Progression and Advancements In Modern Wireless Communication Systems.
9 – 11 4.1 Explain the evolution of • Describe the Text books, Explain the
wireless communication evolution of wireless multi-media evolution of
systems, highlighting key communication Projector, wireless
milestones. systems, highlighting Lecture notes, communication
key milestones. Computers, systems,
Animation highlighting key
4.2 List the characteristics and • Explain the various videos/illustrati milestones.
benefits of Wi-Fi 6 characteristics and ons.
(802.11ax) technology. benefits of Wi-Fi 6
4.3 (802.11ax)

101
technology.
4.4Outline the features, use • Explain the features,
cases, and advancements brought use cases, and
by 5G networks. advancements
brought by 5G
networks.
4.4 Describe 5G Network • Explain 5G Network
architecture and key architecture and key
technologies technologies
4.5 Explain 5G industry chain • Explain 5G industry
progress chain progress
4.1
4.2 Identify key network 4.5 Explain key network
performance and objectives performance and
in three 5G service scenarios objectives in three 5G
service scenarios

4.3 Explain 5G spectrum •Explain 5G spectrum


resources and country- resources and
specific distribution and country-specific
allocation distribution and
allocation
4.4 Outline key technologies of • Explain key
5G new radio: uplink and technologies of 5G
downlink decoupling, new new radio: uplink and
coding technologies, F- downlink decoupling,
OFDM, etc. new coding
technologies, F-
OFDM, etc.
GENERAL OBJECTIVE:5.0 Understand 5G Industrial Applications and Solutions
12 -14 5.1 List IoV Technical Features, • Explain IoV Technical Text books, List IoV
and Industry and Standards Features, and Industry multi-media Technical
Progress and Standards Progress Projector, Features, and
Lecture notes, Industry and

102
5.2 Outline 5G IoV Application • Explain 5G IoV Computers, Standards
Scenarios and Solutions Application Scenarios Animation Progress
and Solutions videos/illustrati
5.3 Outline 5G Smart Healthcare • Explain 5G Smart ons.
Application Scenarios and Healthcare Application
Solutions Scenarios and
Solutions
5.4 Outline 5G Smart • Explain 5G Smart
EducationsApplication Education Application
Scenarios and Technical Scenarios and
Requirements Technical
Requirements
5.5 Outline 5G Smart Grid • Explain 5G Smart Grid
Application Scenarios and Application Scenarios
Technical Requirements and Technical
Requirements
5.6 Outline 5G Smart Port • Explain 5G Smart Port
Application Scenarios and Application Scenarios
Technical Requirements and Technical
Requirements
5.7 Outline 5G Smart Campus • Explain 5G Smart
Application Scenarios and Campus Application
Technical Requirements Scenarios and
Technical
Requirements
5.8 Outline 5G Smart
• Explain 5G Smart
Manufacturing Application
Manufacturing
Scenarios and Technical
Application Scenarios
Requirements
and Technical
Requirements

103
YEAR TWO SEMESTER ONE COURSES

104
RESEARCH METHODOLOGY IN NETWORKING AND CLOUD COMPUTING

PROGRAMME: HIGHER NATIONAL DIPLOMA NETWORKING AND CLOUD COMPUTING

Course: RESEARCH METHODOLOGY IN Contact Hours: 60 (2 hrs lecture, 2 hrs


Course Code: NCC 411 Credit Unit: 2
NETWORKING AND CLOUD COMPUTING practical)
Year: 11 Semester: 1 Pre requisite
GOAL: This course is designed to provide students with a comprehensive understanding of the fundamental research principles, methodologies,
and best practices essential for conducting effective and innovative research in Networking and Cloud Computing
General Objectives:
1.0 Understand NCC Research scope.
2.0 Evaluate Research Literature
3.0 Design Robust NCC Experiments
4.0 Apply Ethical Research Practices
5.0 Utilize NCC Tools and Frameworks
6.0 Collaborate in Research Projects

105
PROGRAMME: HIGHER NATIONAL DIPLOMA NETWORKING AND CLOUD COMPUTING

Course: RESEARCH METHODOLOGY IN Contact Hours: 60 (2 hrs lecture, 2


Course Code: NCC 411 Credit Unit: 2
NETWORKING AND CLOUD COMPUTING hrs practical)
Year: II Semester: I
GOAL: This course is designed to provide students with a comprehensive understanding of the fundamental research principles, methodologies,
and best practices essential for conducting effective and innovative research in Networking and Cloud Computing
Course Specification: THEORETICAL CONTENT PRACTICAL CONTENT
General /Objective 1.0: Understand NCC Research scope.
Week Specific Learning Teachers’ Activities Learning Resources Specific Teachers’ Evaluation
Outcome Learning Activities
Outcome
1-2 1.1 Explain the fundamental Discuss NCC concepts Reading materials, Analyze real- Guide student to Explain the
concepts of NCC and its and real-world case studies, and world NCC analyze real- fundamental
applications. applications. research papers for projects or case world NCC concepts of NCC
students to explore studies and projects or case and its applications.
1.2 Explain key milestones Discuss timeline of current NCC research identify their key studies and Enumerate key
and historical significant events in trends. components and identify their key milestones and
developments in NCC NCC research history challenges. components and historical
and facilitate challenges. developments in
research.
discussions Develop a simple NCC research.
NCC prototype or Guide student to
1.3 Explain the current Discuss the current state model using a Develop a simple Explain the current
state of NCC research, of NCC research, programming NCC prototype state of NCC
including major trends including major trends language or NCC or model using a research, including
and breakthroughs. and breakthroughs toolkit. programming major trends and
language or NCC breakthroughs.
1.4 Explain ethical Discuss on ethical toolkit.
considerations and issues in NCC research.
challenges related to
NCC research.

106
1.5 Explain the Discuss the
interdisciplinary nature interdisciplinary nature
of NCC and its of NCC and its
collaboration with other collaboration with other
fields fields
General Objective 2.0: Evaluate Research Literature
3-4 2.1 Explain key Discuss key Reading materials, Evaluate a Guide student to Define key
components of research components of research case studies, and research paper evaluate a components of
literature. literature, such as research papers for and present research paper research literature.
abstracts, introductions, students to explore findings in a and present
methodologies, results, current NCC research structured findings in a
and conclusions. trends. manner. structured
manner.

2.2 Explain the credibility Discuss the credibility Compare and Guide student to Explain the
and reliability of research and reliability of contrast research Compare and credibility and
sources and identify research sources and methodologies contrast research reliability of
potential biases. identify potential biases. used in two methodologies research sources
different papers. used in two and identify
2.3 Explain the criteria to Discuss the appropriate different papers. potential biases.
evaluate the quality and criteria to evaluate the
relevance of research quality and relevance of Prepare a
articles. research articles. literature review Guide student to
by synthesizing Prepare a
2.4 Explain the strengths Discuss the strengths information from literature review
and weaknesses of different and weaknesses of multiple research by synthesizing
research methodologies different research articles. information from
used in the literature. methodologies used in multiple research
the literature. articles.

2.5 Explain how to Discuss how to


synthesize information Synthesize information
from multiple research from multiple research
papers to form a papers to form a

107
coherent and well- coherent and well-
supported argument. supported argument.
General Objective 3.0: Design Robust NCC Experiments
5-6 3.1 Explain the key Discuss the key Marker board, Apply relevant Guide student to Explain the key
components of a robust components of a robust Markers, machine learning apply relevant components of a
NCC experiment. NCC experiment. Documentary films, algorithms to machine learning robust NCC
Multimedia Projector solve specific algorithms to experiment.
3.2 Explain how to Discuss how to and Screen, Case problems. solve specific Formulate research
formulate research formulate research studies, Power point problems. questions suitable
questions suitable for NCC questions suitable for slides, Internet, for NCC
experimentation. NCC experimentation. Textbooks, Computer, Implement proper experimentation.
Flip charts, Policy techniques for Guide student to
3.3 Explain how to Select Discuss how to Select documents, research model evaluation Implement proper Explain how to
appropriate datasets for appropriate datasets for papers, etc. and validation. techniques for Select appropriate
NCC experiments. NCC experiments. model evaluation datasets for NCC
Demonstrate and validation. experiments.
3.4 Explain how to apply Discuss how to apply ethical
relevant machine learning relevant machine considerations in Demonstrate to
algorithms to solve specific learning algorithms to NCC experiment student ethical
problems. solve specific problems. design. considerations in
NCC experiment
3.5 Explain how to analyze Discuss how to analyze design.
and interpret the results of and interpret the results
NCC experiments. f. of NCC experiments.
Implement proper
techniques for model
evaluation and validation.

3.6 Explain ethical Discuss ethical


considerations in NCC considerations in NCC
experiment design. experiment design.

108
General Objective 4.0: Apply Ethical Research Practices:
7-8 4.1 Explain the principles of Discuss ethical research Marker board, Develop a Guide student to Describe the
ethical research and their principles, codes, and Markers, research proposal develop a principles of ethical
importance in academic and guidelines. Documentary films, that incorporates research proposal research and their
professional settings. Multimedia Projector ethical that incorporates importance in
and Screen, Case considerations. ethical academic and
4.2. Explain potential Discuss potential ethical studies, Power point considerations. professional
ethical issues and issues and challenges slides, Internet, Conduct settings.
challenges that may arise that may arise during Textbooks, Computer, practical on Guide student to
during the research process. the research process. Flip charts, Policy ethical review of conduct practical Explain potential
documents, research an existing on ethical review ethical issues and
papers, etc. research study. of an existing challenges that may
4.3 Explain the ethical Discuss the ethical Prepare an ethical research study. arise during the
guidelines and protocols to guidelines and protocols data management research process.
design, conduct, and report to design, conduct, and plan for a
research studies. report research studies. research project. Guide student to Describe ethical
prepare an ethical guidelines and
4.4. Explain the ethical Discuss the ethical data management protocols to design,
implications of research implications of research plan for a conduct, and report
findings and propose findings and propose research project. research studies.
appropriate solutions. appropriate solutions.

4.5 Explain awareness of Discuss awareness of


the ethical use of data, the ethical use of data,
including privacy, including privacy,
confidentiality, and confidentiality, and
informed consent. informed consent.

General Objective 5.0: Utilize NCC Tools and Frameworks


9-10 5.1. Explain proficiency in Discuss proficiency in Marker board, Build and train an Guide student to Explain NCC tools
using popular NCC tools using popular NCC Markers, image Build and train an to preprocess data
and frameworks tools and frameworks, Documentary films, classification image and prepare it for
such as Mindspor, Multimedia Projector model using classification model training and
TensorFlow or TensorFlow. model using evaluation.

109
PyTorch. and Screen, Case TensorFlow. Explain and train
5.2. Explain AI tools to studies, Power point NCC models using
preprocess data and prepare Discuss exercises for slides, Internet, Fine-tune a pre- Guide student to the selected
it for model training and data preprocessing tasks
Textbooks, Computer, trained natural fine-tune a pre- frameworks to
evaluation. using NCC tools. Flip charts, Policy language trained natural solve specific
processing model language problems
documents, research
5.3. Explain and train NCC Discuss coding sessions with PyTorch. processing model
models using the selected and projects where papers, etc. Mindspor, with PyTorch.
frameworks to solve students build NCC TensorFlow or
specific problems models using selected PyTorch Implement a
frameworks. simple NCC- Guide student to
based Implement a
5.4. Explain the Discuss case studies on recommendation simple NCC-
performance of NCC model evaluation and system using a based
models and fine-tune hyper hyper parameter tuning. relevant recommendation
parameters for optimization. framework. system using a
relevant
5.5. Explain how to Discuss NCC model framework.
integrate NCC models into integration into
real-world applications and applications.
interpret their outputs.
General Objective 6.0: Collaborate in Research Projects
11-13 6.1 Explain effective Discuss effective Marker board, Collaborate in a Assign students Explain actively to
communication and communication and Markers, research project to research research
teamwork skills in a teamwork skills in a Documentary films, with a team of project teams discussions and
research project setting. research project setting. Multimedia Projector peers. based on their propose valuable
interests and ideas and insights.
and Screen, Case
6.2 Explain actively to Discuss actively to expertise.
studies, Power point
research discussions and research discussions and Conduct data Discuss with peers
propose valuable ideas and propose valuable ideas slides, Internet, analysis and Provide to divide tasks, set
insights. and insights. Textbooks, Computer, interpretation as guidance and goals, and manage
Flip charts, Policy part of the support to project timelines.
6.3 Explain the Discuss with peers to Mindspor, research project student during
management of project divide tasks, set goals, TensorFlow or data analysis and

110
timelines. and manage project PyTorch documents, Deliver a group interpretation
timelines. research papers, etc. presentation on stages.
the research Guide students
6.4 Explain in data Discuss data collection, project's findings to present
collection, analysis, and analysis, and research project's
interpretation in a research interpretation in a findings
project. research project.

6.5 Explain research Discuss research


findings coherently and findings coherently and
professionally to an professionally to an
audience. audience.

111
PROJECT MANAGEMENT IN NETWORKING AND CLOUD COMPUTING

PROGRAMME: HIGHER NATIONAL DIPLOMA IN NETWORKING AND CLOUD COMPUTING


COURSE TITLE: PROJECT MANAGEMENT IN Course Code: NCC 412 CONTACT HOURS: 2 hours/week
NETWORKING AND CLOUD COMPUTING
YEAR: II SEMESTER I CREDIT UNITS: 2 Theoretical: 1 hours/week
PRE-REQUISITE: Practical: 1 hours/week
GOAL: This course is designed to equip students with the knowledge and skills necessary to manage networks and Cloud projects.
General Objectives: On completion of the course, the student should be able to:

1.0 Understand Project management tools and software relevant to Networking and Cloud Computing projects.
2.0 Understand the fundamentals of project management and its application to Cloud Computing and Networking projects.
3.0 Appreciate the unique challenges and requirements of managing Networks and Cloud Projects
4.0 Know how to develop project plan for Networking and Cloud Computing.
5.0 Know how to apply best practices for team management in Networking and Cloud Computing projects.
6.0 Understand ethical considerations, privacy issues, and legal implications inherent in Networking and Cloud Computing project
management.

112
PROGRAMME: HIGHER NATIONAL DIPLOMA IN NETWORKING AND CLOUD COMPUTING
Course: PROJECT MANAGEMENT IN COURSE CODE: NCC 412 CONTACT HOURS: 2 hours/week
NETWORKING AND CLOUD COMPUTING
CREDIT UNITS: 2 Theoretical: 1 hour/week Practical: 1 hour/week
GOAL: This course is designed to equip students with the knowledge and skills necessary to manage Networks and Cloud Computing projects.
General Objective: 1.0 Understand project management tools and software relevant to Networking and Cloud Computing projects
Week Specific Learning Teachers Activities Learning Specific Learning Teachers Evaluation
Outcomes Resources Outcomes Activities

1-2 1.1 Explain the range of • Explain various Computer lab or • Simulate Network Design activities Explain the
project management tools project personal project using where students appropriate
and software and their management tools computers with these tools for identify, analyze, tools based on
application in managing through internet access. project and mitigate the unique
projects. demonstrations or Subscription or management. biases in given requirements
1.2 Explain various project tutorials. access to various • Simulate Cloud datasets of different
management tools, such as project Computing Network and
Jira, Trello, and Asana, management tools project using Cloud
among others. (e.g., Jira, Trello, these tools for Computing
1.3 Explain the appropriate • Explain the Asana). project projects.
tools based on the unique appropriate tools Training management.
requirements for different based on the materials or guides
Network and Cloud unique for using these
Computing projects. requirements of tools.
different Network
and Cloud
Computing
projects.
1.4 Explain the role of these • Explain the role
tools in team collaboration, of these tools in
project tracking, resource team of
management, and risk collaboration,
management in Network project tracking,
and Cloud Computing resource

113
projects. management, and
risk management
in Network and
Cloud Computing
projects.
General Objective 2.0: Understand the fundamentals of project management and its application to Cloud computing and Networking projects.
1-4 2.1 Explain the Principles of • Explain The Learning • Use Project • Guide Explain The
Project Management Fundamentals of Management Management Students to Principles Of
2.2 Explain Project Project System For Software and use Project Project
Initiation, Planning, Management, Content Delivery. Tools To Execute Management Management
Execution, Control, Focusing On Its Access To Case Cloud Project Software and Including
And Closure. Application In Studies Related to (Case Study 1) Tools Project
Networks and Networking and Initiation,
Cloud Projects. Cloud Project • Use Project Planning,
2.3 Explain Key • Explain Key Management. Management Execution,
Differences Between Differences Access To Project Software and Control, And
Managing Networks Between Management Tools to Execute Closure.
and Cloud Projects and Managing Software or Tools. Network Project
Other Types of Networking and (Case Study 1)
Projects. Cloud Projects
And Other Types
Of Projects.
2.4 Explain The Specific • Discuss The
Challenges of Networks Specific
and Cloud Projects Challenges Of
Managing
Networks
Projects.

General Objective 3.0 Appreciate the unique challenges and requirements of managing Networking and Cloud projects
5-6 3.1 Explain the unique • Explain the Learning • Use Project • Guide Explain the
challenges involved in unique Management management students to unique
Networking and Cloud challenges System for content software and tools use Project challenges
projects. involved in delivery. to execute Cloud Management involved in

114
Networks and Access to case project (Case software and Networking
Cloud projects. studies related to Study 2) tools projects
3.2 Explain strategies to • Explain Networking
mitigate challenges in strategies to project •
Use Project
Networking and Cloud mitigate management. management
projects challenges in Microsoft Project software and tools
Network and to execute
Cloud projects. Networking
project (Case
Study 2)
General Objectives: 4.0 Know how to develop a project plan for Networking and Cloud computing
7-9 4.1 Explain the scope of Explain various Learning Use Project Guide students Explain risk
Networking and components of a Management management software to use Project management
Cloud projects comprehensive System and tools to execute Management within the
project plan for (Blackboard, Cloud project (Case software and context of
. Networking project. Google Study 3) tools Networking
4.2 Explain how to Explain various Classroom) projects,
develop a feasible components of a Project Use Project including
timeline for comprehensive management management software identifying,
Networking and project plan for software and tools to execute analyzing, and
Cloud projects Cloud Computing (Microsoft project, Networking project mitigating
project. Primavera) (Case Study 3) potential risks.

4.3 Explain accounting Explain how to set Explain risk


for various stages of realistic goals and management
the development objectives within the
process. context of
Cloud
Computing
4.4 Describe resource Describe resource projects,
planning and planning and including
allocation for allocation for identifying,
Networking and Networking and analyzing, and
Cloud projects, Cloud Computing mitigating

115
recognizing the projects recognizing potential risks.
unique resource the unique resource
needs of Networking needs of the
and Cloud projects. projects.

4.5 Explain risk Explain risk


management within management within
the context of the context of
Networking and Network and Cloud
Cloud projects, projects, including
including identifying,
identifying, analyzing, and
analyzing, and mitigating potential
mitigating potential risks.
risks.

General Objective: 5.0 Know how to apply best practices for team management in Networking and Cloud projects
10-12 5.1 Explain the • Explain the best Learning • Use Project • Guide Explain the
challenges of practices of team Management management students to nuances of
managing cross- management, System for content software and tools use Project managing
functional teams in particularly in delivery. to execute Cloud Management remote teams,
Networking and the context of Access to case project (Case software and particularly in
Cloud Computing Networking and studies, literature, Study 4) tools the context of
projects. Cloud computing and industry Networking
projects. reports on team • Use Project and Cloud
5.2 Explain strategies • Explain management in management computing
for effective strategies for Network or Cloud software and tools projects.
communication and effective Computing to execute
collaboration within communication projects. Network project
a cross-functional and collaboration Project (Case Study 4)
Networking and within a cross- management
Cloud Computing functional software and
projects. Networking collaboration tools
team. that students can

116
5.3 Explain how to • Explain the use to practice
leverage project nuances of managing virtual
management tools managing remote teams.
and technology for teams,
effective team particularly in
management in the context of
Network and Cloud Networking and
Computing projects. Cloud computing
projects.

General Objective 6.0 Understand the ethical considerations, privacy issues, and legal implications inherent in Networking and Cloud project
management
6.1 Explain the ethical Discuss the ethical, Classroom or • Use Project • Guide Describe
considerations in privacy, and legal virtual learning management students to privacy issues
managing issues in Networking platform for software and tools use Project in networking
Networking and and Cloud lectures and to execute Cloud Management and cloud
Cloud Computing Computing project discussions. project (Case software and computing
projects, including management. Access to research Study 5) tools projects,
issues of fairness, papers, articles, especially
accountability, and Illustrate how these and case studies • Use Project related to data
transparency. issues can arise in related to ethical, management management.
6.2 Explain privacy real-world privacy, and legal software and tools
issues in Networking Networking projects issues related to to execute
and Cloud and how they can be Networking and Networking and
Computing projects. managed. Cloud Computing. cloud projects
(Case Study 5)
6.3 Explain the legal Explain the potential
implications of implications of
Networking and ignoring above
Cloud Computing considerations and
projects, such as issues
intellectual property
rights, compliance

117
with all established
laws, and other
regulations.

118
ROUTING AND SWITCHING II
PROGRAMME: HIGHER NATIONAL DIPLOMA NETWORKING AND CLOUD COMPUTING
COURSE: ROUTING AND SWITCHING II COURSE CODE: NCC 413 Contact Hours: 4 hours /week

CREDIT UNITS: 4 Theoretical: 1 hours /week

Year: 11 Semester: 1
Pre-requisite: Practical: 3 hours /week

GOAL: This Course is designed to equip students with advanced skills in Routing and Switching Technologies.
GENERAL OBJECTIVES: On completion of this course, the students should be able to;

1.0 Understand First Hop Redundancy Protocols


2.0 Understand LAN Security Concepts
3.0 Understand Switch Security Configuration
4.0 Understand WLAN configuration
5.0 Know Routing protocols
6.0 Understand IP Static Routing
7.0 Understand Troubleshooting Static and Default Routes

119
PROGRAMME: HIGHER NATIONAL DIPLOMA NETWORKING AND CLOUD COMPUTING
COURSE: ROUTING AND COURSE CODE: NCC 413 Contact Hours: 4 hours /week
SWITCHING II
CREDIT UNITS: 4 Theoretical: 1 hours /week
Year: 11 Semester: I Pre-requisite: Practical: 3 hours /week
GOAL: This Course is designed to equip the students with advanced skills in Routing and Switching Technologies.
GENERAL OBJECTIVE 1.0: Understand First Hop Redundancy Protocols
THEORETICAL CONTENT PRACTICAL CONTENT
Week Specific Learning Teacher’s Activities Resources Specific Learning Teacher’s Activities Evaluation
Outcome Outcome
1-2 1.1 Explain the Explain the operations of Multimedia • Configure and • Guide students to Explain
operations of first-hop first-hop redundancy Projector, test VRRP and configure and test VRRP and
redundancy protocols. protocols. Cisco Routers HSRP VRRP and HSRP HSRP
and Switches,
1.2 Explain VRRP • Explain VRRP Packet Tracer
Laptop
1.3 Explain HSRP • Explain HSRP Internet
eNSP

GENERAL OBJECTIVE: 2.0 Understand LAN Security Concepts


2.1 Explain how to • Explain how to use Multimedia Explain how
use endpoint security endpoint security to Projector, to use
3 to mitigate attacks mitigate attacks Cisco Routers endpoint
and Switches, security to
2.2 Explain how AAA • Explain how AAA Packet Tracer mitigate
and 802.1x are used to and 802.1x are Laptop attacks
authenticate LAN used to authenticate Internet
endpoints and devices LAN endpoints and eNSP
devices
2.3 Explain Layer 2 • Explain Layer 2
vulnerabilities vulnerabilities

120
2.4 Explain how a • Explain how a
MAC address table MAC address table
attack compromise attack compromise
LAN security LAN security

2.5 Explain how LAN • Explain how LAN


attacks compromise attacks
LAN security compromise LAN
security
o
• GENERAL OBJECTIVE: 3.0 Understand Switch Security Configuration
3.1Explain port Explain port security Multimedia Configure; Guide students to; Explain
security Projector, Switch Security Configure; DHCP
4-5 Cisco Routers and Port Security Switch Security and Port snooping.
3.2 Explain DTP and Explain DTP and native and Switches, Security
native VLAN. VLAN Packet Tracer Secure unused
Laptop ports Secure unused ports
3.3 Explain DHCP Explain how to configure Internet Mitigate;
snooping. DHCP snooping to Multimedia Mitigate; - VLAN hopping
mitigate DHCP attacks. Projector, - VLAN hopping attacks
Explain how to configure Cisco Access attacks - DHCP attacks
3.4 Explain ARP ARP inspection to mitigate Point, Wireless - DHCP attacks - ARP attacks
inspection ARP attacks. LAN Controller - ARP attacks - STP attacks
(WLC) - STP attacks
3.5 Explain Port Fast Explain how to configure Packet Tracer, Verify the switch security
and BPDU Guard Port Fast and BPDU Guard SNMP Server Verify the switch configuration
to mitigate STP Attacks. Laptop security
Internet configuration
eNSP

121
GENERAL OBJECTIVE: 4.0 Understand WLAN configuration
6 4.1 Explain WLAN Explain WLAN Multimedia Configure a Guide students to:
technology and technology and standards. Projector, Wireless Network
standards. Cisco Routers Configure a Wireless
and Switches, Configure a Basic Network
4.2 Explain the Explain the components of Packet Tracer WLAN on the
components of a a WLAN infrastructure. Laptop WLC Configure a Basic WLAN
WLAN infrastructure. Internet on the WLC
Multimedia Configure a WPA2
4.3 Explain how Explain how wireless Projector, Enterprise WLAN
wireless technology technology enables WLAN Cisco Access on the WLC Configure a WPA2
enables WLAN operation. Point, Wireless Troubleshoot Enterprise WLAN on the
operation. LAN Controller WLAN Issues WLC
(WLC) Troubleshoot WLAN
4.4 Explain how a Explain how a WLC uses Packet Tracer, Issues
WLC uses CAPWAP CAPWAP to manage SNMP Server
to manage multiple multiple APs. Laptop
APs. Internet
eNSP
4.5 Explain channel Explain channel
management in a management in a WLAN.
WLAN.

4.6 Explain threats to Explain threats to WLANs.


WLANs.

4.7 Explain WLAN Explain WLAN security


security mechanisms.
mechanisms.

4.8 Explain WLAN Configure a WLAN to


support for remote support a remote site.
site.
4.9 Explain WLC Configure a WLC WLAN

122
WLAN management to use the management
interface and WPA2 interface and WPA2 PSK
PSK authentication. authentication.

4.10 Explain how to Explain how to configure a


configure a WLC WLC WLAN to use a
WLAN to use a VLAN interface, a DHCP
VLAN interface, a server, and WPA2
DHCP server, and Enterprise authentication
WPA2 Enterprise
authentication

4.11 Explain how to Explain how to


troubleshoot common troubleshoot common
wireless configuration wireless configuration
issues. issues.
GENERAL OBJECTIVE: 5.0 Know Routing Protocols
9 5.1 Explain how Explain how routers Multimedia • Configure basic • Guide students to
routers determine the determine the best path. Projector, Router configure basic Router
best path. Routers and configuration configuration
Switches,
5.2 Explain how Explain how routers Packet Tracer
routers forward forward packets to the Laptop
packets to the destination. Internet
destination. eNSP

5.3 Explain basic Explain how to configure


settings on a router. basic settings on a router.

5.4 Explain the Explain the structure of a


structure of a routing routing table.
table.

5.5 Contrast static and Compare static and

123
dynamic routing dynamic routing concepts.
concepts.
GENERAL OBJECTIVE: 6.0 Understand IP Static Routing
6.1 Explain the Explain the command Multimedia • Configure IPv4 Guide students to:
10 - 11 command syntax for syntax for static routes. Projector, and IPv6 Static • Configure IPv4 and
static routes. Routers and and Default IPv6 Static and
Switches, Routes Default Routes
6.2 Explain IPv4 and Explain how to configure Packet Tracer o Configure IPv4 • Configure IPv4 and
IPv6 static routes. IPv4 and IPv6 static Laptop and IPv6 Static IPv6 Static and
6.3 Explain IPv4 and routes. Internet and Default Default Routes
IPv6 default static Explain how to configure eNSP Routes o Configure and Verify IP
routes. IPv4 and IPv6 default o Configure and and IPv6 Addressing on
static routes. Verify IP and Routers
6.4 Explain the Explain how to configure a IPv6
floating static route to floating static route to Addressing on
provide a backup provide a backup Routers
connection. connection.

6.5 Explain IPv4 and Explain how to configure


IPv6 static host routes IPv4 and IPv6 static host
that direct traffic to a routes that direct traffic to
specific host. a specific host.

GENERAL OBJECTIVE: 7.0 Understand Troubleshooting Static and Default Routes

7.1 Explain how a Explain how a router Multimedia Troubleshoot Static Guide students to:
router processes processes packets when a Projector, and Default Route • Troubleshoot Static
packets when a static static route is configured. Routers and and Default Route
12 route is configured. Switches, Troubleshoot IPv4 • Troubleshoot IPv4
Packet Tracer static routes. static routes.
7.2 Explain how to Explain how to eNSP • Troubleshoot IPv6
find and fix common troubleshoot common Laptop Troubleshoot IPv6 static
static and default static and default route Internet static routes.
route configuration configuration issues.

124
issues. Configure IPv4
static routes.

Configure IPv4
default routes.

Configure IPv6
static routes

125
NETWORK MONITORING AND TROUBLESHOOTING
PROGRAMME: HIGHER NATIONAL DIPLOMA NETWORKING AND CLOUD COMPUTING
COURSE: NETWORK MONITORING AND COURSE CODE: NCC 414 Contact Hours: 3 hours/ week
TROUBLESHOOTING
CREDIT UNITS: 3 Theoretical: 1hour/week
Year: II Semester: I
Pre-requisite: Practical: 2hours /week

GOAL: The course is designed to enable students monitor and troubleshoot networks
GENERAL OBJECTIVES: On completion of this course, the students should be able to:
1.0 Understand Troubleshooting and Monitoring concepts
2.0 Know Troubleshooting Tools and Techniques
3.0 Understand Network Traffic Analysis
4.0 Understand Physical Network Troubleshooting
5.0 Understand Virtual and Cloud Network Troubleshooting
6.0 Understand Network Monitoring and Management
7.0 Understand Network Troubleshooting and Monitoring Best Practices and Applications

126
PROGRAMME: HIGHER NATIONAL DIPLOMA NETWORKING AND CLOUD COMPUTING
COURSE: NETWORK COURSE CODE: NCC 414 Contact Hours: 3hours/week
TROUBLESHOOTING AND
CREDIT UNITS: 3 Theoretical: 1hour/week
MONITORING
Year: II Semester: I Pre-requisite: Practical: 2hours /week
COURSE SPECIFICATION: THEORETICAL AND PRACTICAL
GOAL: The course is designed to enable students monitor and troubleshoot networks
GENERAL OBJECTIVE 1.0: Know Network Troubleshooting and Network Monitoring Concepts
THEORETICAL CONTENT PRACTICAL CONTENT
Week Specific Learning Teacher’s Activities Resources Specific Learning Teacher’s Evaluation
Outcome Outcome Activities
1 1.1 Explain Network • Explain Network Marker Board and
Troubleshooting and Troubleshooting and Marker, Projector
Monitoring concepts Monitoring concepts

1.2 Explain the importance • Explain the


of effective Network importance of
Troubleshooting and Network
Monitoring Troubleshooting and
Monitoring

1.3 Explain network • Explain network


architecture and architecture and
components components

1.4 Explain Network • Explain Network


Troubleshooting Troubleshooting
process process

1.5 Explain common • Explain common


network issues network problems
1.6 Explain various network • Explain various

127
protocols (TCP/IP, network protocols
DNS, DHCP etc.) (TCP/IP, DNS, DHCP
etc.)
GENERAL OBJECTIVE 2.0: Understand Troubleshooting Tools and Techniques
2.1 Explain types of • Explain the Marker Board and • Install and configure • Guide
2-3 Network Command-line, Marker, Projector the troubleshooting students to
Troubleshooting tools Applications and tools on Windows and install and
(Command-line, Hardware tools PC, OS Linux Operating configure
Applications and involved in Network (Windows and System platforms the
Hardware tools) Troubleshooting Linux), Internet troubleshoo
connectivity, ting tools
2.2 Explain the usage of the • Explain how to use Networking • Carry out Network and utilities
outlined Network the outlined tools and toolbox, Ethernet Troubleshooting using
Troubleshooting tools utilities in Windows Cable Command- the outlined tools and o Guide
and utilities in Windows and Linux Operating line tools (ping, utilities students to
and Linux Operating System platforms tracert, nslookup, troubleshoo
System platforms Nmap, etc.), Packet t using the
sniffers (e.g., outlined
Wireshark), Port • Interpret the results tools and
2.3 Explain ways of • Explain results Scanners, Protocol obtained from the utilities
interpreting results obtained obtained from the Analyzer, Wi-Fi outlined tools and
from troubleshooting tools Network Analyzer, utilities o Guide
and utilities Troubleshooting tools Bandwidth Speed students to
and utilities Tester. • Troubleshoot network interpret
cables using cable results
testers obtained
• Interpret results from
obtained from troubleshoo
diagnostic tools ting tools
and utilities

o Guide
students to
troubleshoo

128
t network
cables using
cable testers
GENERAL OBJECTIVE 3.0: Understand Network Traffic Analysis
4 3.1 Explain Network • Explain Network Marker Board and • Carry out packet • Guide
Traffic Analysis Traffic Analysis Marker, Projector sniffing using students to
Wireshark capture
3.2 Explain network traffic • Explain network PC, LAN, network
capturing and analysis traffic capturing and Wireshark traffic using
using Wireshark analysis using Wireshark
Wireshark • Analyse the packets
3.3 Analyse the data captured and identify • Guide
captured by Wireshark • Explain how to the network protocols students to
analyse the data analyse
captured by captured
Wireshark traffic and
identify the
network
protocols
GENERAL OBJECTIVE 4.0: Understand Physical Network Troubleshooting
5- 8 4.1 Explain various network • Explain the various Marker Board and • Create a Local Area • Guide
hardware problems network hardware Marker, Projector Network (LAN) using students to
problems physical devices create LAN
Network using
4.2 Explain network device o Explain network devices (Routers, physical
performance and device performance Switches, Ethernet o Create a Local Area devices
optimization and optimization cables, etc.), Network (LAN) using
Network toolkits, simulation software o Guide
4.3 Explain network o Explain the process LAN, Internet (Packet tracer, eNSP, students to
devices troubleshooting involved in connectivity, GNS3, etc.) create LAN
process (PCs, Routers, troubleshooting Printer, VoIP using
Switches, Firewalls etc.) network devices (PCs, devices (IP-Phone, o Troubleshoot physical network
Routers, Switches, softphone, etc.), issues such as cable simulation
Firewalls etc.) VoIP Server faults, connector software

129
4.4 Identify common o Explain network (Asterisk etc.) problems, and
network service issues service issues Wireless electrical interference o Guide
(Internet connectivity, (Internet connectivity, Access point students to
file sharing, printing file sharing, printing troubleshoo
etc.) etc.) t physical
problems
4.5 Explain IP addressing o Explain the concepts such as
and subnetting of IP addressing and cable faults,
subnetting o Identify and resolve connector
frame errors, problems
4.6 Explain network device o Explain network collisions, and MAC and
configuration issues and device configuration address conflicts electrical
diagnosis issues and how to interference
mitigate them
o Guide
students to
4.7 Explain wireless o Explain wireless identify and
network technologies network technologies o Analyse and resolve
and their troubleshoot network frame
functionalities switch configurations errors,
collisions,
4.8 Explain wireless o Explain how to and MAC
network optimization configure and address
and configuration optimize wireless o Configure and conflicts
settings network settings troubleshoot router
using the various o Guide
routing protocols students to
4.9 Explain network o Explain network (OSPF, RIP, EGP, IS- analyse and
security concepts security concepts IS etc.) troubleshoo
t switch
4.10 Explain Voice and o Explain Voice and configuratio
Video over IP (VoIP) Video over IP (VoIP) ns
technologies and technologies and
protocols protocols o Guide

130
o Troubleshoot IP students to
4.11 Identify common o Explain common addressing, routing configure
VoIP issues issues in VoIP and and subnetting and
how to mitigate them problems troubleshoo
t router
4.12 Explain how to o Explain how to install, using the
Configure and optimize configure, and various
VoIP devices mitigate VoIP devices routing
o Troubleshoot protocols
connectivity issues (OSPF,
using ping, RIP, EGP,
traceroute/tracert, and IS-IS etc.)
IP scanners
o Guide
students to
troubleshoo
t IP
addressing,
o Analyse TCP and routing and
UDP for performance subnetting
and congestion issues problems

o Guide
students to
troubleshoo
o Troubleshoot TCP t network
connection problems connectivit
such as Packet loss y issues
and latency using ping,
traceroute/tr
acert, and
IP scanners

o Resolve issues related o Guide

131
to DNS, DHCP and students to
HTTP analyse
TCP and
UDP for
performanc
e and
congestion
o Troubleshoot email issues
and file transfer issues
o Guide
students to
troubleshoo
o Analyse device logs t TCP
and error messages connection
problems
like Packet
loss and
latency
o Troubleshoot wireless
signal interference, o Guide
coverage, and students to
authentication identify and
problems resolve
issues
related to
DNS,
DHCP and
o Identify and mitigate HTTP
common VoIP issues
o Guide
students to
troubleshoo
o Configure and t email and
optimize VoIP file transfer

132
devices issues

o Guide
students to
access and
analyse
network
device logs
and error
messages

o Guide
students to
troubleshoo
t wireless
signal
interference
, coverage,
and
authenticati
on
problems

o Guide
students to
identify and
mitigate
VoIP issues

o Guide
students to
configure
and
optimize

133
VoIP
devices
GENERAL OBJECTIVE 5.0: Understand Virtual and Cloud Network Troubleshooting
5.1 Explain Network • Explain Network Marker Board and • Set up virtual • Guide
9-11 Virtualization Virtualization Marker, environments and students to
(VMware, VirtualBox, (VMware, install virtual install
Hyper-V, etc.) VirtualBox, Hyper-V PCs, Internet machines Hypervisor
etc.) connectivity, and set up
5.2 Explain common issues • Explain common Hypervisor virtual
in virtualized network issues in virtualized (VMware, machines
environment and their network environment VirtualBox, Hyper- • Set up LAN within • Guide
causes and their causes V etc.) Cloud the virtual students to
platform (AWS, environment set up Local
5.3 Explain problems • Explain problems Azure etc.) Area
related to virtual related to virtual Network
switches, routers, switches, routers, • Troubleshoot virtual (LAN) in
network overlays and network overlays and network cloud
their causes their causes configurations and environmen
connectivity issues t
5.4 Explain virtual network • Explain how to access
logs and performance and analyse logs and • Guide
metrics performance metrics students to
in virtual • Access and analyse troubleshoo
environments log files and t virtual
performance metrics network
5.5 Explain networking in • Explain networking in virtual configuratio
cloud environments cloud environments environments ns and
connectivit
5.6 Explain causes of • Explain causes of y issues
network connectivity network connectivity
and performance issues and performance • Set up LAN in cloud • Teach the
in cloud environments issues in cloud environments students
environments how to

134
5.7 Explain cloud network • Explain how to access access and
logs and metrics and analyse logs and analyse log
performance metrics files on
• Troubleshoot network virtual
5.8 Explain issues related to • Explain issues related connectivity in cloud machines
cloud network to cloud network environment
configuration configuration • Guide
students to
set up Local
Area
• Access and analyse Network in
cloud network logs a cloud
and performance environmen
metrics t

• Guide
students to
troubleshoo
t network
• Troubleshoot connectivit
configuration issues y issues in
within cloud cloud
environment environmen
t

• Teach
students
how to
access and
analyse
network
logs and
performanc
e metrics in

135
cloud
environmen
ts

• Guide
students to
troubleshoo
t
configuratio
n issues in
cloud
environmen
ts
GENERAL OBJECTIVE 6.0: Understand Network Monitoring and Management
12-13 6.1 Explain Network • Explain Network Marker Board and • Install and configure • Guide
Monitoring and Monitoring and Marker Network Monitoring students to
Management Management systems install and
PCs, LAN, configure
6.2 Explain Network o Explain Network Internet Network
Monitoring and Monitoring and connectivity, Monitoring
Management tools Management tools Network systems
(SNMP, NMS etc.) (SNMP, NMS etc.) Monitoring o Monitor network o Guide
applications performance using students to
(SolarWinds, SNMP, NetFlow and monitor
Datadog, Mange Syslog network
6.3 Explain Network o Explain network Engine etc.) performanc
performance metrics performance metrics e using
and monitoring and monitoring SNMP,
techniques techniques NetFlow
and Syslog
6.4 Explain network o Explain network o Analyse network
performance performance performance metrics o Guide
optimization optimization and identify students to
bottlenecks analyse

136
network
performanc
e metrics
and identify
bottlenecks
o Optimize network
performance through o Guide
configuration changes students to
optimize
network
performanc
e through
configuratio
n changes
GENERAL OBJECTIVE 7.0: Understand Network Troubleshooting and Monitoring Best Practices and Applications
14-15 7.1 Explain effective • Explain effective Marker • Configure alerts and • Guide
network monitoring network monitoring Board and Marker notifications for students to
implementation implementation critical network configure
strategies strategies PCs, LAN, events alerts and
Internet notification
7.2 Explain the procedures • Explain the connectivity, s for critical
to configure alerts and procedures to Network diagram network
notifications for critical configure alerts and tools (Microsoft events
network events notifications for Visio, Lan Flow, • Analyse network
critical network SolarWinds, monitoring data to • Guide
events Intermapper, proactively identify students to
Creately, Smart issues analyse
7.3 Explain troubleshooting • Explain Draw, etc.) network
methodologies and troubleshooting monitoring
techniques and their methodologies and data to
applications in solving techniques and their proactively
complex problems applications in solving • Apply troubleshooting identify
complex problems methodologies and issues
techniques to solve

137
7.4 Explain the importance • Explain network complex problems • Guide
of network documentation and students to
documentation and reporting, importance, apply
reporting and real-world troubleshoo
application. ting
• Create network methodolog
7.5 Explain network • Explain network diagrams ies and
diagram diagrams techniques
to solve
complex
problems

• Guide
students to
design
network
diagrams
using
Network
• Write effective Diagram
network tools
troubleshooting and (Microsoft
monitoring reports Visio,
SolarWinds
,
Intermapper
, Lan Flow,
• Analyse real-world Smart Draw
network etc.)
troubleshooting
scenarios • Guide
students to
write
effective

138
network
troubleshoo
• Implement effective ting and
network monitoring monitoring
strategies reports

• Guide
students
using case
studies to
implement
effective
network
monitoring
strategies

139
YEAR TWO SEMESTER TWO COURSES

140
CLOUD COMPUTING II

PROGRAMME: HIGHER NATIONAL DIPLOMA (HND) NETWORKING AND CLOUD COMPUTING


COURSE: CLOUD COMPUTING II CODE: NCC 421 Credit Unit: 3 CONTACT HOURS: 3 HOURS/WEEK

YEAR: 11 SEMESTER: 11 PRE-REQUISITE: THEORETICAL: 1 HOURS/WEEK


PRACTICAL: 2 HOURS/WEEK
GOAL: This course is designed to equip students with Cloud Services Implementation

GENERAL OBJECTIVES On completion of the course, the student should be able to:
1.0 Understand Cloud Architecture
2.0 Understand the implementation of Compute in the Cloud.
3.0 Understand the implementation of storage in the Cloud.
4.0 Understand the implementation of Database in the cloud.
5.0 Understand Automatic Scaling and Monitoring.

141
PROGRAMME: HIGHER NATIONAL DIPLOMA IN NETWORKING AND CLOUD COMPUTING
COURSE: CLOUD COMPUTING II CODE: NCC 421 CONTACT HOURS: 3 HOURS/WEEK
Credit Unit: 3 Theoretical: 1 HOUR/WEEK
Year: II Semester: II Practical: 2 HOURS/WEEK
GOAL: This course is designed to equip students to attain foundational comprehension of cloud implementation.
Course Specification: THEORETICAL CONTENT PRACTICAL CONTENT
GENERAL OBJECTIVE 1.0: Understand cloud architecture.

Week Specific Learning Teachers’ Activities Learning Specific Learning Teachers’ Evaluation
Outcome Resources Outcome Activities
1-3 1.1 Explain the AWS • Explain the AWS Well- AWS Explain the
Well-Architected Architected platforms, AWS Well-
Framework, Framework, including Architected
Multi-media
including the five the five pillars. Framework,
pillars. Projector, including the
five pillars.
1.2 Explain the design • Explain the design Lecture notes,
principles of the principles of the AWS Internet
AWS Well- Well-Architected.
Architected Computers,
Framework. etc.
Framework.
1.3 Explain the • Explain the importance
importance of of reliability and high
reliability and high availability.
availability.
1.4 Explain how AWS
Trusted Advisor • Explain how AWS
helps customers. Trusted Advisor helps
customers.
1.5 Explain AWS
• Explain AWS Trusted
Trusted Advisor
Advisor
recommendations.
recommendations

142
General Objective 2.0: Understand the implementation of compute in the cloud.

4-6 Internet, • Sign up for an Guide students Explain


2.1 Explain an overview • Explain an overview AWS account to: an
of different compute of different compute overvie
platform or • Explore the • Sign up for
services in the cloud services in the cloud w of
Azure features of AWS an account
• Explain the reasons for different
2.2 Explain the reasons Platform, or EC2, Azure App, or • Explore the compute
for using cloud using cloud compute any other any other platform features of services
compute platform
• Create virtual AWS EC2, in the
2.3 Explain the • Explain the Azure cloud
machines
functionality in the functionality in the App, or
compute console compute console Multimedia • Configure access Explain
any other
Projector, and security the
2.4 Explain basic platform
reasons
• Explain basic Computer, • Attach storage and
functions in cloud • Sign up for for using
compute to build a functions in compute take snapshots
Lecture notes, an account cloud
to build a virtual
virtual computing • create custom if you compute
environment computing Tutorials,
images don’t have
environment Marker, one,
2.5 Explain compute cost •
• Explain compute cost
optimization Markerboard, • Create
elements optimization elements
Books/Journal virtual
2.6 Explain when to use machines
• Explain when to use s,
platform as a service • Configure
PaaS using such PowerPoint
(PaaS) access and
examples such AWS slides
Elastic Beanstalk, security
Azure App Service, or • Configure
any other PaaS load
2.7 Explain when to use
serverless compute • Explain when to use scaling and
load

143
service serverless compute balancing
services such as AWS • Attach
Lambda, Azure storage and
Functions, or any other take
2.8 Explain how to run • Explain how to run snapshots
containerized containerized
applications in a • Create
applications in a
cluster of managed custom
cluster of managed images
servers servers
GENERAL OBJECTIVE 3.0: Understand the implementation of storage in the cloud.
7-9 3.1 Explain different • Explain the different Internet, Sign into the created Guide students Explain the
storage services in types of storage account to explore on how to sign functionality
AWS
the cloud the features of AWS into the in cloud
platform or
• Explain the EBS, Azure Blob created storage
3.2 Explain the Azure
functionality in cloud Storage, or any other account in services
functionality in cloud Platform, or
storage service to order to
storage services storage services using any other
explore the
Amazon EBS, Azure platform create, attach, and
features of
Blob Storage, and any format volumes,
AWS EBS,
other storage service take snapshots and Azure Blob
Multimedia
3.3 Explain functions in • Explain functions in create backup, Storage, or any
cloud storage service cloud storage service Projector, other storage
resize volumes,
to build a storage to build a storage service to
Computer,
solution solution such Amazon enable encryption for
Lecture notes, the volumes, create, attach,
EBS to build an and format
Amazon EC2 storage Tutorials, configure high volumes,
3.4 Explain cloud file
solution, or Azure Marker, availability and
system take snapshots
Blob Storage redundancy,
3.5 Explain the Markerboard, and create
• Explain cloud file create custom images backup,
functionality in cloud Books/Journal and templates
system such as
file system s, resize
Amazon EFS, Azure
volumes,
Files, or any other PowerPoint

144
3.6 Explain cloud • Explain the slides enable
archiving system functionality in cloud encryption for
file system such as the volumes,
Amazon EFS, Azure configure high
Files, or any other availability
3.7 Explain the • Explain cloud and
functionality in cloud archiving system such redundancy,
archiving system as Amazon S3 Glacier, create custom
Azure Archive images and
Storage, or any other templates
• Explain the
functionality in cloud
archiving system

• Explain the difference


3.8 Explain the
between different
difference between
cloud storage and
different cloud
storage and archiving archiving services
services Amazon EBS,
Amazon S3, Amazon
EFS, and Amazon S3
Glacier;
Azure Blob Storage,
Azure Managed Disks,
Azure Files, Azure
Archive Storage

145
GENERAL OBJECTIVE 4.0: Understand the implementation of database in the cloud.
10-12 4.1 Explain relational • Explain relational Internet, • Build a DB • Guide the Explain
database use in cloud database use in cloud Server and students to relational
AWS
services services such Amazon Interact with build a DB database use
platform or
Relational Database the DB Using Server and in cloud
Azure
Service (Amazon an App Interact services
Platform, or
RDS), Azure SQL any other with the
platform DB Using
database, and any
an App
other cloud database
service
Multimedia
4.2 Explain the • Explain the Projector,
functionality in cloud functionality in cloud Computer,
base database based data using
Lecture notes,
Amazon RDS, Azure
SQL Database Tutorials,
• Explain NoSQL Marker,
4.3 Explain NoSQL
database use in the
database use in cloud Markerboard,
cloud such as Amazon
services
DynamoDB, Azure Books/Journal
Cosmos DB s,
4.4 Explain the • Explain the PowerPoint
functionality in functionality in slides
NoSQL database NoSQL database such
as Amazon
DynamoDB, Azure
Cosmos DB, or any
other
4.5 Explain data • Explain cloud-based
warehousing services data warehousing
services such as

146
Amazon Redshift,
Azure Synapse
Analytics, or any other
4.6 Explain relational • Explain relational
database engine
database engine such
as Amazon Aurora,
Azure Database for
Hyperscale
4.7 Explain the tasks
required in • Explain tasks in an
launching, RDS database, such as
configuring, and launching,
interacting with a configuring, and
cloud database interacting
GENERAL OBJECTIVE 5.0: Understand automatic scaling and monitoring
13-15 5.1 Explain how to • Explain how to Internet, • Perform scaling • Guide the Explain how
distribute traffic distribute traffic across AWS and load students to to distribute
across Amazon Elastic Amazon Elastic balancing perform traffic across
Platform,
Compute Cloud Compute Cloud scaling and Amazon
(Amazon EC2) Markers, load Elastic
(Amazon EC2)
instances by using Marker board, balancing Compute
instances by using
Elastic Load Projector, Cloud
Elastic Load
Balancing (Amazon
Balancing Lecture notes, EC2)
5.2 Explain how • Explain how Amazon etc. instances by
Amazon CloudWatch CloudWatch enables using Elastic
enables you to monitor
you to monitor AWS Load
AWS resources and
resources and Balancing
applications in real
time applications in real
time
• Explain how Amazon
5.3 Explain how EC2 Auto Scaling
Amazon EC2 Auto launches and releases

147
Scaling launches and servers in response to
releases servers in workload changes
response to workload
changes
ASSESSMENT: The continuous assessment; tests, quizzes will be awarded 40% of the total score. The end of the Semester Examination
will make up for the remaining 60% of the total score.

148
ENTERPRISE NETWORKING, SECURITY, AND AUTOMATION
PROGRAMME: HIGHER NATIONAL DIPLOMA NETWORKING AND CLOUD COMPUTING
COURSE: ENTERPRISE NETWORKING, COURSE CODE: NCC 422 Contact Hours: 4 hours/week
SECURITY, AND AUTOMATION
Credit units: 4 Theoretical: 1 hours /week

Year: II Semester: II Pre-requisite: Practical: 3 hours /week

GOAL: This Course is designed to equip students with skills in Enterprise Networking, Security, and Automation.
GENERAL OBJECTIVES: on completion of this of the course, the students should be able to;

1.0 Understand Single-Area Open Shortest Path First (OSPFv2)


2.0 Understand Network Security Concepts
3.0 Understand Access Control List (ACL) Concepts and Configuration
4.0 Understand Network Address Translation (NAT) for IPv4 Wide Area Network (WAN) Concepts
5.0 Understand Wide Area Network (WAN) Concepts
6.0 Understand Virtual Private Network (VPN) and IPsec Concepts
7.0 Know Concept of Quality of Service (QoS)
8.0 Understand Network Management
9.0 Understand Network Design
10. Understand Network Troubleshooting
11. Understand Network Virtualization
12. Understand Network Automation.

149
PROGRAMME: HIGHER NATIONAL DIPLOMA NETWORKING AND CLOUD COMPUTING
COURSE: ENTERPRISE NETWORKING, SECURITY, COURSE CODE: NCC 422 Contact Hours: 4 hours/week
AND AUTOMATION
Credit unit: 4
Theoretical: 1 hours /week
Year: II Semester: II Pre-requisite: Practical: 3 hours /week
GOAL: This Course is designed to equip with skills in enterprise networking, security, and automation
GENERAL OBJECTIVE 1.0: Understand Single-Area Open Shortest Path First (OSPFv2)

THEORETICAL CONTENT PRACTICAL CONTENT


Week Specific Learning Teacher’s Activities Resources Specific Learning Teacher’s Activities Evaluation
Outcome Outcome
1 1.1 Explain OSPF • Explain OSPF Multimedia • Configure: • Guide students to Explain single-
operations operations Projector, configure: area OSPF
Routers and • Single-area OSPFv2 operations
Switches, in both point-to-point • Single-area OSPFv2
Packet Tracer or and in both point-to-point
1.2 Explain the OSPF • Explain the OSPF eNSP or GNS3, • Broadcast multi- and
packet types used in packet types used Laptop access networks. • Broadcast multi-
single-area OSPF in single-area Internet access networks.
OSPF Books, Journals, • OSPF interface
Markerboard, priority to influence a
1.3 Explain single-area • Explain single-area Marker, multi-access network's • OSPF interface
OSPF operations OSPF operations Textbooks DR/BDR election. priority to influence a
multi-access network's
DR/BDR election.
• OSPF to propagate a • Verify a single-area
default route OSPFv2
implementation
• Modify the
configuration to change OSPF to propagate a
default route

150
the operation of single • Modify the
area OSPFv2 configuration to change
the operation of single
area OSPFv2

GENERAL OBJECTIVE: 2.0 Understand Network Security Concepts


2-3 2.1 Explain network • Explain Multimedia Explore DNS Traffic Guide the students to Explain the
vulnerabilities, threats, network Projector, using Wireshark explore DNS Traffic current state of
and mitigation vulnerabilities, Computer, using Wireshark cybersecurity and
techniques threats, and Internet, vectors of data
mitigation Books, Journals, loss
techniques Markerboard,
Marker,
2.2 Explain the current • Explain the Textbooks,
state of cybersecurity current state of wireshark
and vectors of data loss cybersecurity
and vectors of
data loss

2.3 Explain the tools • Explain the


used by threat actors to tools used by
exploit networks threat actors to
exploit
networks

2.4 Explain malware • Explain


types malware types

2.5 Explain common • Explain


network attacks common
network attacks

151
2.6 Explain IP • Explain IP
vulnerabilities and vulnerabilities
exploitations and
exploitations

2.7 Explain TCP and • Explain TCP


UDP vulnerabilities and UDP
and mitigations vulnerabilities
and mitigations

2.8 Explain common • Explain


cryptographic common
processes used to cryptographic
protect data in transit processes used
to protect data
in transit

2.9 Explain Social • Explain Social


Engineering techniques Engineering
techniques

• GENERAL OBJECTIVE: 3.0 Understand ACL Concepts and Configuration


4-5 3.1 Explain how ACLs • Explain how Multimedia Configure: Guide the students to Explain how
are used as part of a ACLs are used Projector, configure: ACLs filter
network security as part of a Routers and Numbered Standard IPv4 traffic.
policy. network Switches, ACLs Numbered Standard IPv4
security policy. Packet Tracer or ACLs
eNSP or GNS3, Extended IPv4 ACLs -
3.2 Explain how ACLs • Explain how Laptop Configure Extended Extended IPv4 ACLs -
filter traffic. ACLs filter Internet Configure Extended
traffic. Multimedia
Projector, • Modify Standard IPv4
Routers and ACLs- Configurations • Modify Standard IPv4

152
3.3 Explain how ACLs • Explain how Switches, ACLs- Configurations
use wildcard masks. ACLs use Packet Tracer or Apply IPv4 ACLs to
wildcard masks. eNSP or GNS3, filter traffic and secure
Laptop administrative access.
3.4 Explain how to • Explain how to Internet
create ACLs. create ACLs. Set up standard IPv4
ACLs to filter traffic to
3.5 Contrast standard Compare standard and meet networking
and extended IPv4 extended IPv4 ACLs requirements.
ACLs
Explain the Apply sequence numbers
implementation of IPv4 to edit existing standard
ACLs to filter traffic IPv4 ACLs.
and secure
administrative access. Set up a standard ACL to
secure vty access.
Explain how to
configure standard Set up extended IPv4
IPv4 ACLs to filter ACLs to filter traffic
traffic to meet according to networking
networking requirements.
requirements.

Explain the use of


sequence numbers to
edit existing standard
IPv4 ACLs.

3.10 Configure a
standard ACL to secure
Vty access.

3.11 Configure
extended IPv4 ACLs to

153
filter traffic according
to networking
requirements.
GENERAL OBJECTIVE: 4.0 Understand NAT and PAT for IPv4 and IPv6
6 4.1 Explain the purpose • Explain NAT Multimedia Configure: Guide the students to Explain the
and function of NAT services on Projector, configure: advantages and
edge router to Routers and Static NAT disadvantages of
4.2 Explain the provide IPv4 Switches, Dynamic NAT and Static NAT NAT
operation of different address Packet Tracer or PAT Dynamic NAT and
types of NAT. scalability. eNSP or GNS3, NAT for IPv4 PAT
Laptop NAT for IPv4
4.3 Explain the • Explain the Internet Set up static NAT using
advantages and purpose and Books, Journals, the CLI.
disadvantages of NAT function of Markerboard, Set up static NAT using
NAT Marker, the CLI.
4.5 Explain NAT for Textbooks
IPv6. • Explain the
operation of
different types
of NAT.

• Explain the
advantages and
disadvantages
of NAT

•Explain NAT
for IPv6.
• GENERAL OBJECTIVE: 5.0 Understand WAN Concepts
7 5.1 Explain how WAN • Explain how Multimedia Conduct a Research on Guide the students to Explain how
access technologies can WAN access Projector, Laptop Broadband Internet Research Broadband WANs operate.
be used to satisfy technologies Internet Access Technologies Internet Access
business requirements can be used to Books, Journals, WAN Concepts Technologies
Markerboard, WAN Concepts

154
5.2 Explain the purpose satisfy business Marker,
of WAN requirements Textbooks,
TeraTerm,
5.3 Explain how • Explain the Putty
WANs operate. purpose of a
WAN
5.4 Differentiate
between traditional • Explain how
WAN connectivity, WANs operate.
modern WAN
connectivity, and •
Discuss the
internet-based WAN differences
connectivity options. between
traditional
WAN
connectivity,
modern WAN
connectivity,
and internet-
based WAN
connectivity
options.
• GENERAL OBJECTIVE: 6.0 Understand VPN and IPsec Concepts
8 6.1 Explain how VPNs • Explain how Multimedia Configure site to site VPN Guide students to: Explain different
and IPsec secure site- VPNs and IPsec Projector, Laptop Configure site to site VPN types of VPNs
to-site and remote secure site-to- Internet Configure remote VPN
access connectivity. site and remote Books, Journals, Configure remote VPN
6.2 Explain the access Markerboard,
benefits of VPN connectivity. Marker,
technology. • Explain the Textbooks.t
benefits of VPN
6.3 Explain different technology.
types of VPNs

155
6.4 Explain how the • Explain
IPsec framework is different types
used to secure network of VPNs
traffic.
• Explain how
IPsec
framework is
used to secure
network traffic.

• GENERAL OBJECTIVE: Know Concepts of quality of service


9 7.1 Explain how • Explain how Explain how
networking devices networking networking
implement QoS devices devices
implement QoS implement QoS

7.2 Explain how •


Explain how
network transmission network
characteristics impact transmission
QoS characteristics
impact QoS
• GENERAL OBJECTIVE: 8.0 Understand Network Management
10 8.1 Explain protocols • Explain Multimedia Configure: Show the students how to Explain syslog
used to manage a protocols used Projector, Configure: operation.
network. to manage a Routers and CDP, LLDP, and NTP
network. Switches, Use CDP to Map a CDP, LLDP, and NTP
Explain the use of • Explain the Packet Tracer or Network Use CDP to Map a
LLDP to map network essence of eNSP or GNS3, Use LLDP to Map a Network
topology. mapping Laptop Network Use LLDP to Map a
network Internet, Network
topology. TeraTerm, Putty Use IOS and VRP
commands to back up and • Guide the students to:
restore an configuration

156
8.2 Explain SNMP • Explain SNMP file. verify NTP
operation. operation. Research Network
• Verify NTP Monitoring Software
Explain the • Explain the Research Network Back-Up
implementation of NTP implementation Monitoring Software
between an NTP client of NTP Back-Up Use TeraTerm or Putty to
and an NTP server. between an Manage Rou
NTP client and Use TeraTerm or Putty to ter Configuration Files
an NTP server. Manage Router
. Configuration Files Use TFTP, Flash, and
USB to Manage
8.3 Explain syslog • Explain syslog Use TFTP, Flash and
operation. operation. USB to Upgrade an IOS Upgrade an IOS and VRP
and VRP system image. system image.
• Explain IOS
8.4Explain Upgrade of and
an IOS and VRP VRP
system image. operations.

GENERAL OBJECTIVE 9.0: Understand Network Design


11 9.1 Explain the • Explain the Multimedia Explain
characteristics of characteristics of Projector, considerations for
scalable network scalable network Cisco Routers designing a
architectures. architectures. and Switches, scalable network.
9.2 Explain how data, • Explain how data, Packet Tracer
voice, and video are voice, and video Laptop
converged in a are converged in a Internet
switched network. switched network.

9.3 Explain • Explain


considerations for considerations for
designing a scalable designing a
network. scalable network.

157
9.4 Explain how switch • Explain how switch
hardware features hardware features
support network support network
requirements. requirements.
9.5 Explain the types of
routers available for •
Explain the types of
small-to-medium-sized
routers available
business networks. for small-to-
medium-sized
business networks.
GENERAL OBJECTIVE: 10 Understand Network Troubleshooting
12 10.1 List the symptoms • Determine the Multimedia Troubleshoot Enterprise Guide students to: Explain how to
and causes of network symptoms and Projector, Networks Troubleshoot Enterprise fix a network
problems using a causes of Cisco Routers Document the Network Networks using the layered
layered model. network and Switches, Use Documentation to Troubleshooting model.
10.2 Explain how to problems using Packet Tracer Solve Issues Challenge - Document the
find and fix a network a layered Laptop Find and fix a network Network
using the layered model. model. Internet using the layered model. Troubleshooting
• Explain how to Challenge - Use
troubleshoot a Documentation to Solve
network using Issues
the layered
model.
GENERAL OBJECTIVE:11.0 Understand Network Virtualization
13 11.1 Explain the • Explain the Multimedia Install Linux in a Virtual Guide students to install Explain the
importance of cloud importance of Projector, Machine and Explore the Linux in a Virtual importance of
computing. cloud Routers and GUI Machine and Explore the cloud computing.
computing. Switches, GUI
11.2 Explain the Packet Tracer or
virtualization of • Explain the eNSP
network devices and virtualization Laptop
services. of network Internet
Virtualbox

158
11.3 Explain software- devices and
defined networking. services.

11.4 Explain controllers • Explain


used in network software-
programming defined
networking.


Explain
controllers
used in
network
programming
GENERAL OBJECTIVE: 12.0 Understand Network Automation
14-15 12.1 Explain how • Explain how Multimedia • • • Explain
network automation is network Projector, how
enabled through automation is Routers and REST
RESTful APIs and enabled Switches, enables
Configuration through Packet Tracer or computer-
management tools. RESTful APIs eNSP to-
and Laptop computer
Configuration Internet communic
management Virtualbox ations.
tools.

12.2 Explain • Explain


automation. automation.

12.3 Contrast JSON, • Compare


YAML, and XML data JSON, YAML,
formats. and XML data
formats.

159
12.4 Explain how APIs • Explain how
enable computer-to- APIs enable
computer computer-to-
communications. computer
communicatio
ns.
12.5 Explain how REST • Explain how
enables computer-to- REST enables
computer computer-to-
communications. computer
communicatio
12.6 Contrast the ns.
configuration • Compare the
management tools configuration
Puppet, Chef, Ansible, management
and SaltStack tools Puppet,
Chef, Ansible,
12.7 Explain how Cisco and SaltStack
DNA centre enables • Explain how
intent-based networking Cisco DNA
center enables
intent-based
networking

160
ETHICAL AND PROFESSIONAL PRACTICE IN NETWORKING AND CLOUD COMPUTING
PROGRAMME: HIGHER NATIONAL DIPLOMA NETWORKING AND CLOUD COMPUTING
COURSE TITLE: Ethical and Professional Course Code: NCC 423 CONTACT HOURS: 2 HOURS/week
Practice In networking and cloud computing
YEAR: 11 SEMESTER 11 PRE-REQUISITE: Theoretical: 2 HOURS/week
CREDIT UNIT: 2 Practical: 0 HOURS/week
GOAL: This course is designed to enable students to acquire knowledge and skills to navigate the ethical challenges that arise in
the field of Networking and Cloud Computing
General Objectives: On completion of the course, the students should be able to:
1.0 Understand ethical Awareness related to the design, development, and deployment of Networking and Cloud Computing
Technologies.
2.0 Understand ethical decision-making when working with Networking and Cloud Computing Technologies.
3.0 Understand how to design Networking and Cloud Computing systems that adhere to ethical principles.
4.0 Comprehend the importance of safeguarding user privacy and personal data in Networking and Cloud Computing applications.
5.0 Explore the societal and legal implications of Networking and Cloud Computing Technologies.
6.0 Cultivate professional ethics and responsible conduct in Networking and Cloud Computing development and research
7.0 Explore the ethics of Networking and Cloud Computing for Intelligence Analysis

161
PROGRAMME: HIGHER NATIONAL DIPLOMA NETWORKING AND CLOUD COMPUTING
COURSE: Ethical Professional Practice in COURSE CODE: NCC 423 CONTACT HOURS: 2 hrs.
Networking and cloud computing
GOAL: This course is designed to enable students to acquire knowledge and skills to navigate the ethical challenges that arise in the field of
Networking and Cloud Computing
Year: II Semester: II
COURSE SPECIFICATION: Theoretical Contents: Practical Contents:.
General Objective 1.0: Understand ethical Awareness related to the design, development, and deployment of Networking and Cloud
Computing technologies
Week Specific Learning Teachers Activities Learning Specific Learning Teachers Evaluation
Outcomes Resources Outcomes Activities
1 1.1 Explain Ethical • Explain principles Text books, Explain Ethical
Principles in Networking and values relevant to multi-media Dilemmas in
and Cloud Computing Networking and Projector, Networking
Cloud Computing Computer, and Cloud
1.2 Explain Ethical development. marker, Computing
Dilemmas in Networking markerboard, Applications
and Cloud Computing • Discuss ethical Lecture notes
Applications dilemmas in
Networking and
Cloud Computing
applications.

1.3. Explain the Impact of • Explain Networking


on Society and Individuals and Cloud
Computing’s societal
impact.

1.4. Explain Privacy and • Discuss privacy and


Data Protection in data protection
Networking and Cloud regulations in
Computing Networking and

162
Cloud Computing.
1.5 Explain how to • Discuss Bias and
evaluate Bias and Fairness Fairness in
in Networking and Cloud Networking and
Computing Cloud Computing
GENERAL OBJECTIVE 2.0: Understand ethical decision-making when working with Networking and Cloud Computing Technologies.
4 2.1 Explain ethical • Explain ethical Text books, Explain ethical
Decision-making in decision-making multi-media decision-
Networking and Cloud principles and Projector, making
Computing methodologies. Computer, principles and
marker, methodologies.
2.2. Analyze Ethical • Discuss ethical markerboard,
Dilemmas in Networking dilemmas in Lecture notes
and Cloud Computing Networking and
Applications Cloud Computing
applications.
2.3. Explain ethical
Considerations in • Discuss ethical
Networking and considerations in
CloudTComputing Networking and
Research Cloud Computing
research projects.
2.4. Explain Impact of
Stakeholders in • Discuss the impact of
Networking and Cloud Networking and
Computing Decisions Cloud Computing
decisions on
2.5. Explain how to apply stakeholders.
Ethical Frameworks in
Networking and Cloud • Discuss ethical
Computing Decision- frameworks
making applicable to
Networking and
Cloud Computing

163
decisions.
General Objective 3.0: Understand how to Design Networking and Cloud Computing systems that adhere to ethical principles.
6 3.1Explain Ethical • Explain Ethical Text books, Discuss how to
Principles in Networking Principles in multi-media promote
and Cloud Computing Networking and Projector, Fairness and
Development Cloud Computing Computer, Transparency
Development marker, in Networking
3.2. Explain how to markerboard, and Cloud
Promote Fairness and • Discuss how to Lecture notes Computing
Transparency in promote Fairness and
Networking and Cloud Transparency in
Computing Networking and
Cloud Computing
3.3. Describe how to
ensure Accountability in • Explain
Networking and Cloud Accountability in
Computing Decision- Networking and
making Cloud Computing
Decision-making
3.4. Explain ethical Data
Collection and Usage in • Explain ethical Data
Networking and Cloud Collection and Usage
Computing in
General Objectives: 4.0 Comprehend the importance of safeguarding user privacy and personal data in Networking and Cloud Computing
applications.
10 4.1. Explain Privacy and • Explain Privacy Text books, Explain ethical
Data Protection Principles and Data multi-media use of User
Protection Projector, Data in
4.2. Explain how to Principles Computer, Networking
comply with Privacy • Explain Privacy marker, and Cloud
Regulations in Networking Regulations in markerboard, Computing
and Cloud Computing Networking and Lecture notes Applications
Cloud Computing
4.3. Explain how to ensure • Explain Data

164
Data Minimization and Minimization and
Consent in Networking and Consent in
Cloud Computing Networking and
Cloud Computing
4.4. Explain how to secure • Explain how to
Data Storage and Secure Data
Transmission in Storage and
Networking and Cloud Transmission in
Computing Networking and
Cloud Computing
• Explain the
4.5. Explain ethical use of ethical Use of
User Data in Networking User Data in
and Cloud Computing Networking and
Applications Cloud Computing
Applications
General Objective 5.0: Explore the societal and legal implications of Networking and Cloud Computing technologies
12 5.1. Explain the Social • Explain the Social Text books, Explain ethical
Impact of Networking and Impact of multi-media Considerations
Cloud Computing Networking and Projector, in Networking
Cloud Computing Computer, and Cloud
5.2 Analyze Legal marker, Computing
Implications of • Analyze Legal markerboard, Applications
Networking and Cloud Implications of Lecture notes
Computing Networking and
Cloud Computing
5.3 Examine Networking
and Cloud Computing • Examine Networking
Impact on Privacy Laws and Cloud
Computing Impact on
5.4. Explain ethical Privacy Laws
Considerations in AI
Applications • Explain ethical
Considerations in

165
5.5. Explain how to Networking and
address Networking and Cloud Computing
Cloud Computing Impact Applications
on Human Rights
• Discuss how to
address Networking
and Cloud
Computing Impact on
Human Rights
General Objective 6.0 Cultivate professional ethics and responsible conduct in Networking and Cloud Computing development and research
13 6.1. Explain Professional • Explain Professional Text books, Explain
Ethics in Networking and Ethics in Networking multi-media transparency
Cloud Computing and Cloud Projector, and
Computing Computer, accountability
6.2. Explain how to marker, in Networking
promote Responsible • Explain how to markerboard, and Cloud
Networking and Cloud promote responsible Lecture notes Computing
Computing Development Networking and Development
6.3. Explain how to Adhere Cloud Computing
to Ethical Guidelines in development
Networking and Cloud • Explain Ethical
Computing Research Guidelines in
6.4. Explain transparency Networking and
and accountability in Cloud Computing
Networking and Cloud Research
Computing Development
6.5. Explain ethical • Explain transparency
Decision-making in and accountability in
Networking and Cloud Networking and
Computing Applications Cloud Computing
Development

• Explain ethical
Decision-making in

166
Networking and
Cloud Computing
Applications
General Objective 7.0: Explore the Ethics of Networking and Cloud Computing for intelligence Analysis
14
7.1 Explain the ethics of • Describe the ethics of Text books,
multi-media
vulnerability testing vulnerability testing
Projector,
Computer,
7.2 Explain the ethics of • Explain the ethics of
marker,
visualizations visualizations
markerboard,
Lecture notes
7.3 Describe the ethics of • Describe the ethics of
managing data Analytics managing data
Analytics
7.4 Describe the ethics of
IoT Vulnerabilities • Describe ethics of
IoT Vulnerabilities

167
INTERNET OF THINGS (IOT)
PROGRAMME: HIGHER NATIONAL DIPLOMA NETWORKING AND CLOUD COMPUTING
COURSE: Internet of Things (IoT) COURSE CODE: NCC 424 Contact Hours: 3 Hours/week

Credit units: 3 Theoretical: 1 hour /week

YEAR 11 SEMESTER 11 Pre-requisite: Practical: 2 hours /week

GOAL: This course is designed to provide student with a Knowledge on Internet of Things (IoT), its areas of application, and significance
in modern Technology
GENERAL OBJECTIVES: On completion of the course, the students should be able to:
1.0 Understand the concept and significance of Internet of Things (IoT).
2.0 Know the importance of security and privacy in IoT systems and some key IoT technologies.
3.0 Understand advanced communication technologies, IoT gateways' challenges in various industrial scenarios, and the capabilities
and solutions offered by home gateways.
4.0 Know IoT platforms, their positioning, capabilities, development process, and the role of operating systems
5.0 Understand essential concepts for device development, sensor technologies, the kernel framework and APIs of Lite OS, and AT
commands.

168
PROGRAMME: HIGHER NATIONAL DIPLOMA NETWORKING AND CLOUD COMPUTING
COURSE: Internet of Things (IoT) COURSE CODE: NCC 424 Contact Hours: 3 Hours/week
Credit units: 3 Theoretical: 1 hour /week
Year: I1 Semester: I1 Pre-requisite: Practical: 2 hours /week
COURSE SPECIFICATION: THEORETICAL PRACTICAL
GOAL: This course is designed to provide students with a knowledge on Internet of Things (IoT), its area of application, and significance in
modern Technology
GENERAL OBJECTIVE 1.0: Understand the concept and significance of Internet of Things (IoT).
THEORETICAL CONTENT PRACTICAL CONTENT
Week Specific Learning Outcome Teacher’s Activities Resources Specific Learning Teacher’s Evaluation
Outcome Activities
1-4 1.1 Explain the concept and • Describe the Text books, multi- • Design and • Demonstrate Explain the
development history of the concept and media model IoT and model IoT concept and
IoT, layers of the IoT development Projector, solutions using solutions using development
architecture, and solutions history of the IoT, Computer, marker, simulation tools simulation tools history of
layers of the IoT markerboard, • Design and • Demonstrate the IoT,
architecture, and Lecture notes, Lab prototype IoT and prototype layers of the
solutions guide, solutions using IoT solutions IoT
1.2 Explain IoT industry • Describe IoT IoT simulation electronics and using architecture,
applications and solutions, industry tools, microcontrollers electronics and and
covering smart city, smart applications and microcontroller’s . microcontroller solutions
campus, smart grid, IoV, solutions, covering electronic devices, s
and industrial IoT smart city, smart project
scenarios. campus, smart grid, development
IoV, and industrial board, Proteus,
IoT scenarios KiCad.
1.3 Describe the difficulties • Explain the
facing each industry and difficulties facing
the transformation and each industry and
benefits brought by IoT the transformation
technology. and benefits
brought by IoT

169
technology.
1.4 Describe the combination •Explain the
of the IoT with six combination of the
emerging technologies and IoT with six
know the development emerging
trends of the IoT industry.
technologies and
know the
development trends
of the IoT industry.
1.5 Explain Sensors, Actuators • Describe Sensors,
and microcontrollers Actuators and
microcontrollers
GENERAL OBJECTIVE: 2.0 Understand the importance of security and privacy in IoT systems and some key IoT systems and Technologies.
5–7 2.1 Describe the security • Explain the • Text books, • Discover physical • Demonstrate Explain
challenges faced by the security multi-media vulnerabilities in a physical Sensors,
IoT industry, and list IoT challenges Projector, mock-up IoT vulnerabilities in Actuators
security solutions and faced by the Lecture notes, Lab system with a mock-up IoT and
related applications. IoT industry, guide, simulation physical access to system with microcontrol
and introduces tools, a Raspberry Pi and physical access lers
some IoT microcontrollers, other tools. to a Raspberry Pi
security sensors Perform a threat and other tools.
solutions and Raspberry Pi, modelling exercise • Perform a threat
applications. Arduino, etc using simulation modelling
2.2 Describe common • Explain tool to model IoT exercise using
network communications common physical simulation tool
technologies of IoT based network vulnerabilities. to model IoT
on the solutions described communication • Perform a threat physical
in 2.1 s technologies modelling vulnerabilities.
of IoT based on exercise using
the solutions simulation tool to
described in 2. model IoT
2.3 Define key technologies • Explain key application
and corresponding technologies vulnerabilities.
solutions of the widely and

170
used NB-IoT corresponding
communications solutions of the
technology in the IoT widely used
field NB-IoT
communication
s technology in
the IoT field
GENERAL OBJECTIVE: 3.0 Understand advanced communication technologies, IoT gateways' challenges in various industrial scenarios, and
the capabilities and solutions offered by home gateways.
8–9 3.1 Describe the popular • Explain the popular Text books, multi- • Use Wi-Fi to • Demonstrate on
communication communication media implement a how to use Wi-
technology 5G, including technology 5G, Projector, smart agriculture Fi to implement
its development process, including its Lecture notes, Lab case, which a smart
core technologies, development guide, simulation involves agriculture case,
application scenarios, and process, core tools, collecting real- which involves
commercial solutions. technologies, microcontrollers, time data, collecting real-
application sensors responding to time data,
scenarios, and Raspberry Pi, command responding to
commercial Arduino, etc delivery, and command
solutions. implementing delivery, and
3.2 Describe difficulties and • Explain difficulties device-cloud implementing
challenges faced by IoT and challenges synergy. device-cloud
gateways in industrial faced by IoT • Implement some synergy.
scenarios, edge gateways in other
computing, and mesh industrial scenarios, experiments like
networking. edge computing, smart smoke
and mesh detector, smart
networking. logistics, and
3.3 Describe capabilities of • Explain capabilities smart street
home gateways, as well as of home gateways, lamp
platforms and as well as
corresponding solutions. platforms and
corresponding
solutions.

171
GENERAL OBJECTIVE 4.0: Understand IoT platforms, their positioning, capabilities, development process, and the role of operating systems

10 – 11 4.1 Describe the IoT Explain Describe the Text books, multi- Use Python to create • Guide the
platforms, their IoT platforms, their media a data pipeline to students to use
positioning and positioning and Projector, acquire, manipulate Python to create
capabilities capabilities Lecture notes, Lab and visualize a data pipeline
guide, simulation sensor-generated to acquire,
4.2 Describe the basic Explain the basic tools, data manipulate and
knowledge required for knowledge required for microcontroller, visualize
IoT platform development IoT platform Python IDE sensor-
and the secondary development and the Raspberry Pi, generated data
development process. secondary Arduino, etc
development process

4.3 Describe the development Explain the


history of IoT operating development history of
systems IoT operating systems

4.4 Describe the problems Explain the problems


faced by the IoT operating faced by the IoT
systems and devices operating systems and
devices
GENERAL OBJECTIVE: 5.0 Understand essential concepts for device development, sensor technologies, the kernel framework and APIs of
Lite OS, and AT commands
12 – 14 5.1 Describe the features of Explain the features of Text books, multi- • Use LiteOS • Demonstrate
single-chip single-chip media Studio to how to use
microcomputer and microcomputer and Projector, develop IoT LiteOS Studio
sensor technologies sensor technologies Lecture notes, Lab devices and use to develop IoT
required for device required for device guide, simulation LiteOS to devices and use
development, kernel development, kernel tools, control the IoT LiteOS to
framework, and APIs of framework, and APIs microcontroller development control the IoT
LiteOS. of LiteOS. (Raspberry Pi, board. development
5.2 Describe AT commands BearPi), LiteOS • Implement board.
used in communications Explain AT commands Raspberry Pi, device-cloud • Guide the

172
modules interconnection used in Arduino, etc connection students to
testing communications based on NB- implement
modules IoT Module device-cloud
interconnection testing connection
based on NB-
5.3 Describe network Describe network IoT Module
interconnection process interconnection
using communications process using
modules communications
modules

173
LIST OF MINIMUM EQUIPMENT REQUIRED IN NETWORKING AND CLOUD COMPUTING
LABORATORY
S/N ITEMS QUANTITY
HARDWARE SECTION
1. Computer Systems (Core i5, 8GB RAM) All networked 40
2. Internet default gateway 1
3. Server 2
4. Multimedia Projector 1
5. Printer 1
6. UPS 40
7. Generator (At le5KVA) or Solar System 1
8. Raspberry Pi 4 8GB 20
9. Arduino mega 10
10. Arduino uno 10
11. BearPi 10
12. Router 2
13. Switch 2
14. Oscilloscope 2
15. Network toolbox 10
16. Twisted pair cable (CAT 6 and 7) 2 Rolls
17. RJ-45 connector 2 Packs
18. Soldering Station 10
19. Set of screw drivers 20
SOFTWARE SECTION
1. Operating Systems (Windows and Linux)
2. Hypervisor (VMware, VirtualBox, Hyper-V etc.)
3. Virtual Machine (Windows, Linux etc.)
4. Network Monitoring applications (ManageEngine, SolarWinds, Datadog

174
etc.)
5. Network Diagram tools (Microsoft Visio, LanFlow, Intermapper, Creately,
SmartDraw etc.)
6. Cloud Platform (AWS/Azure) 1 each
7. Command-line tools (ping, traceroute/tracert, nslookup, Nmap etc.)
8. Wireshark
9. Port Scanners
10. Protocol Analyzer
11. Wi-Fi Analyzer
12. Bandwidth Speed Tester
13. PuTTY
14. Python
15. Simulation software (Packet Tracer, eNSP, GNS3)
16. Network mapper
17. SPSS

175
LIST OF PARTICIPANTS (PRE-CRITIQUE WORKSHOP)

S/N NAME ADDRESS E-MAIL


1. Dr. Naseer Sanni Ajoge Computer Professional Registration ajogenass@kadunapolytechnic.edu.ng
Council of Nigeria (C.P.N)
Representative
2. Auwal Idris Zakari Jigawa State Institute of Information awwaliz78@gmail.com
Technology, Kazaure
3. Roland Adeyemi CISCO browseroland2@gmail.com
4. Adelokun A.P Yaba Tech adebowale.adelokun@yabatech.edu.ng
5. Miri Ebipade M.P. NBTE, Kaduna miri.ebipade@gmail.com
6. Dr. Zakari Abdullahi NBTE, Kaduna zakariabdullahi@g.mail.com

7. Hafsat Mora Kaduna Polytechnic hafsatumora@gmail.com


8. Knimi Musa Huawei Technology, Abuja knimimusa@gmail.com
9. Dr. Daniel Audu Ekpah Uniport-CISCO Systems daniel.ekpah@gmail.com

NBTE STAFF
10 Prof. Idris M. Bugaje NBTE, Kaduna es@nbte.gov.ng
11. Ibrahim Bashir Bello NBTE, Kaduna
12. Dr. Musa, Hatim Koko NBTE, Kaduna hatimlion@gmail.com
13. Bala Danladi Akut NBTE, Kaduna baladanladi2000@yahoo.ca
14. Ismail Hussaini NBTE, Kaduna Ihussaini002@gmail.com
15. Muhammad Umar Auna NBTE, Kaduna muhammadauna.mu@gmail.com
16. Jamila Isah NBTE, Kaduna isajamila10@gmail.com
SECRETARIAT
17. Dije Ali NBTE, Kaduna dijeali_2006@yahoo.com
18. Ibrahim Yayork NBTE, Kaduna ibrahimyayork@gmail.com

176
LIST OF PARTICIPANTS (FINAL CRITIQUE WORKSHOP)

S/N NAMES ADDRESS E-MAIL


1. Muhammed Auwal Ahamed CPN Rep. mahmed@kadunapolytechnic.edu.ng
Dept of Computer Science
Kaduna Polytechnic. Kaduna
2. Dr Babangida Abubakar Katsina State Institute of Technology & rector@ksitm.edu.ng
Albaba Management. Katsina
3. Dr Niran Oyekale Commit Technology & consult ltd commitechng@gmail.com
4. Roland Adeyemi CISCO Browseroland2@gmail.com
5. Hafsat Mora Kaduna Polytechnic hafsatumora@gmail.com
6. NBTE STAFF
7. Prof Idris M. Bugaje Executive Secretary,
NBTE
8. Dr Ibrahim Bashir NBTE
9. Dr Musa Hatim Koko NBTE hatimlion@gmail.com
10. Bala Danladi Akut NBTE baladanladi2000@yahoo.ca
11. Miri Ebipade MP NBTE miriebipade@gmail.com
12. Mrs Ramatu Adeiza NBTE ramatuishaq04@gmail.com
13 Muhammed Auna NBTE
SECRETARIAT
14. Ibrahim Attahiru NBTE ibrahimattahiru87@gmail.com
15 Mrs Rabi Sani NBTE rabohiol@gmail.com

177

You might also like