CMSY 219 Operating Systems
Students will examine the operation of the system software of various operating systems. The goal of this course is to familiarize each student with operating system software, define the role of the software, and train each student in the proper use of the operating system software. This course is part of a comprehensive series of courses to prepare students for Cyber Incident Responder certification from the Department of Defense Cyber Crime Center, CompTIA A+ certification, and transfer to UMBC and other colleges. Keyboarding skills and knowledge of word processing is required.
Hours Weekly
2 hours lecture, 1 hour lab
Course Objectives
- Demonstrate an understanding of operating systems fundamentals.
- Identify and use popular operating systems.
- Install and upgrade operating systems, manage local security, and possess familiarity with basic security features in Windows, Linux (Ubuntu), and Mac OS.
- Explain the evolution of virtualization and cloud computing and identify the common features of today’s desktop virtualization products.
- Identify the versions of Windows, Mac, Linux (Ubuntu), and Android and compare their strengths and weaknesses with primary emphasis on Windows.
- Describe how to install and manage device drivers and identify file systems supported by various operating systems.
Course Objectives
- Demonstrate an understanding of operating systems fundamentals.
Learning Activity Artifact
- Other (please fill out box below)
- Final Exam
Procedure for Assessing Student Learning
- Other (please fill out box below)
- Final Exam Rubric
Program Goal(s)
Degree: Computer Science - A.A. Degree (Transfer)
Identify, understand, evaluate, and apply ethical reasoning in business practices.
- Identify and use popular operating systems.
Learning Activity Artifact
- Other (please fill out box below)
- Lab Assignments
Procedure for Assessing Student Learning
- Other (please fill out box below)
- Lab Assignments Rubric
Program Goal(s)
Degree: Cyber Forensics Technology - A.A. Degree (Transfer)
Demonstrate the ability to install, configure, and troubleshoot and apply security configurations to various network devices.
- Install and upgrade operating systems, manage local security, and possess familiarity with basic security features in Windows, Linux (Ubuntu), and Mac OS.
Learning Activity Artifact
- Other (please fill out box below)
- Lab Assignments
Procedure for Assessing Student Learning
- Other (please fill out box below)
- Lab Assignment Rubric
Program Goal(s)
Degree: Cyber Forensics Technology - A.A. Degree (Transfer)
Demonstrate the ability to install, configure, and troubleshoot and apply security configurations to various network devices.
- Explain the evolution of virtualization and cloud computing and identify the common features of today’s desktop virtualization products.
Learning Activity Artifact
- Other (please fill out box below)
- Lab Assignments
Procedure for Assessing Student Learning
- Other (please fill out box below)
- Lab Assignments Rubric
Program Goal(s)
Degree: Cyber Forensics Technology - A.A. Degree (Transfer)
Utilize software, procedures, and various forensic tools used in computer forensics.
- Identify the versions of Windows, Mac, Linux (Ubuntu), and Android and compare their strengths and weaknesses with primary emphasis on Windows.
Learning Activity Artifact
- Other (please fill out box below)
- Final Exam
Procedure for Assessing Student Learning
- Other (please fill out box below)
- Final Exam Rubric
Program Goal(s)
Degree: Computer Science - A.A. Degree (Transfer)
Demonstrate competence in programming, analysis and design principles, data structures, testing, and debugging techniques.
- Describe how to install and manage device drivers and identify file systems supported by various operating systems.
Learning Activity Artifact
- Other (please fill out box below)
- Lab Assignments
Procedure for Assessing Student Learning
- Other (please fill out box below)
- Lab Assignment Rubric
Program Goal(s)
Degree: Cyber Forensics Technology - A.A. Degree (Transfer)
Demonstrate the ability to install, configure, and troubleshoot and apply security configurations to various network devices.