0% found this document useful (0 votes)
722 views

HND Networking and Cloud Computing (NCC) PDF

Uploaded by

taizincity
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
722 views

HND Networking and Cloud Computing (NCC) PDF

Uploaded by

taizincity
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

HND Networking and

Cloud Computing (NCC)


Uploaded by Ahmad Maccido

! 100% (2) · 1K views · 177 pages


AI-enhanced description

Document Information "


The document outlines the curriculum for a Hi…

Download now
Copyright
© © All Rights Reserved &
Download as pdf or txt
Available Formats
PDF, TXT or read online from Scribd

Share this document

#
Facebook
$
NATIONAL BOARD FOR TECHNICAL EDUCATION

Twitter
HIGHER NATIONAL DIPLOMA
(HND)

NETWORKING AND CLOUD COMPUTING

%
CURRICULUM AND COURSE SPECIFICATION

AUGUST, 2023

Email PLOT B, BIDA ROAD, P.M.B. 2239, KADUNA


www.nbte.gov.ng
– NIGERIA

Did you find this document useful?


1

AD Download to read ad-free


Is this content inappropriate?

Report

Foreword

The Higher National Diploma (HND) Networking and Cloud Computing curriculum is designed to be used
by training institutions to produce manpower to boost the practice of Networking and Cloud Computing in
Nigeria.

There is therefore the need to produce professional practitioners with good ethics and prospects for career
progression, through the acquisition of desirable knowledge and skills. This necessitated the production of
this national curriculum.
It is my belief that this curriculum and course specifications, which is the minimum required to produce
technologists with sound knowledge and skills in Networking and Cloud Computing, if properly implemented
with the required resources along with qualified candidates being admitted into the programme, will lead to
the production of competent and skilled technologists.

I sincerely appreciate all those who made the development of this curriculum possible. The invaluable
contributions of all the members of the committee and resource persons during the pre-critique and national
critique workshops are appreciated.

I hope that the curriculum would be properly implemented so as to produce the required Work Force of our dream.

Prof. Idris M. Bugaje


Executive Secretary
NBTE, Kaduna

AD Download to read ad-free

TABLE OF CONTENTS

Foreword .......................................................................................................................................................................................................................................... 2
TABLE OF CONTENTS .............................................................................................................................................................................................................. 3
GENERAL INFORMATION ....................................................................................................................................................................................................... 5
CURRICULUM TABLE ............................................................................................................................................................................................................... 9
YEAR ONE SEMESTER ONE COURSES .............................................................................................................................................................................. 13
NETWORKING ESSENTIALS ................................................................................................................................................................................................. 14
VIRTUALIZATION AND CLOUD MIGRATION ................................................................................................................................................................. 29
OPERATING SYSTEM FOR NETWORK ENVIRONMENT .............................................................................................................................................. 37
WIRELESS COMMUNICATION SYSTEMS ......................................................................................................................................................................... 47
COMPUTER ARCHITECTURE............................................................................................................................................................................................... 53
PYTHON PROGRAMMING BASICS...................................................................................................................................................................................... 65
YEAR ONE SEMESTER TWO COURSES ............................................................................................................................................................................. 75
ROUTING AND SWITCHING 1 ............................................................................................................................................................................................... 76
CLOUD COMPUTING 1 ............................................................................................................................................................................................................ 83
ADVANCED STATISTICS FOR COMPUTING ..................................................................................................................................................................... 94
ADVANCE WIRELESS NETWORKS ..................................................................................................................................................................................... 99
YEAR TWO SEMESTER ONE COURSES ........................................................................................................................................................................... 104
RESEARCH METHODOLOGY IN NETWORKING AND CLOUD COMPUTING ....................................................................................................... 105
PROJECT MANAGEMENT IN NETWORKING AND CLOUD COMPUTING ............................................................................................................. 112
ROUTING AND SWITCHING II ............................................................................................................................................................................................ 119
NETWORK MONITORING AND TROUBLESHOOTING ................................................................................................................................................ 126
YEAR TWO SEMESTER TWO COURSES .......................................................................................................................................................................... 140

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

Bolt: Request a Ride


FREE

INSTALL

You're Reading a Preview


Upload to Download

OR

Start your 30 day free trial

AD Download to read ad-free

You're Reading a Preview


Upload to Download

OR

Start your 30 day free trial

AD Download to read ad-free

AD Download to read ad-free

You're Reading a Preview


Upload to Download

OR

Start your 30 day free trial

AD Download to read ad-free

You're Reading a Preview


Upload to Download

OR

Start your 30 day free trial

AD Download to read ad-free

You're Reading a Preview


Upload to Download

OR

Start your 30 day free trial

AD Download to read ad-free

You're Reading a Preview


Upload to Download

OR

Start your 30 day free trial

AD Download to read ad-free

YEAR ONE SEMESTER ONE COURSES

13

AD Download to read ad-free

You're Reading a Preview NETWORKING ESSENTIALS


PROGRAMME: HIGHER NATIONAL DIPLOMA (HND) NETWORKING AND CLOUD COMPUTING
COURSE: NETWORKING ESSENTIALS COURSE CODE : NCC 311 Contact Hours: 3 hours /week

Upload to Download CREDIT UNITS : 3 Theoretical: 2 hours /week

Year: 1 Semester: 1 Pre-requisite: Practical: 1 hour/week

GOAL: This course is designed to equip students with networking skills.


GENERAL OBJECTIVES :
On completion of the course, the student should be able to:

1.0 Understand Networks Today


2.0 Understand Protocols and Models
OR
3.0 Know Open System Interconnect (OSI) model
4.0 Understand Ethernet Switching
5.0 Understand Number
PROGRAMME: Systems
HIGHER and IP addressing
NATIONA L DIPLOMA (HND) NETWORKING AND CLOUD COMPUTING
NETWORKING ESSENTIALS
6.0 Understand Basic Router and Switch Configuration
COURSE: NETWORKING ESSENTIALS COURSE CODE : NCC 311 Contact Hours: 3 hours /week

Start your 30 day free trial


7.0 Understand Network Security Fundamentals
8.0 Know how to build Small Networks CREDIT UNITS : 3 Theoretical: 2 hours /week

Year: 1 Semester: 1 Pre-requisite: Practical: 1 hour/week

GOAL: This course is designed to equip students with networking skills.


GENERAL OBJECTIVES :
On completion of the course, the student should be able to:

1.0 Understand Networks Today


2.0 Understand Protocols and Models
14
3.0 Know Open System Interconnect (OSI) model
4.0 Understand Ethernet Switching
5.0 Understand Number Systems and IP addressing
6.0 Understand Basic Router and Switch Configuration
7.0 Understand Network Security Fundamentals
8.0 Know how to build Small Networks

AD Download to read ad-free

14

COURSE: NETWORKING
You're Reading a Preview
PROGRAMME: HIGHER NATIONAL DIPLOMA (HND) NETWORKING AND CLOUD COMPUTING
COURSE CODE: NCC 311 Contact Hours: 3hours/Week
ESSENTIALS
CREDIT UNIT: 3 Theoretical: 2 Hours/Week
Year: I Semester: I Pre-requisite: Practical: 1 Hour/Week

Upload to Download
GOAL: This course is designed to equip students with networking skills.
GENERAL OBJECTIVE: 1.0 Understand networks today
THEORETICAL CONTENT PRACTICAL CONTENT

Week Specific Learning Teacher’s Activities Specific Learning Resources


Teacher’s Activities Evaluation
Outcome Outcome
1-2 1.1 Explain how Explain how Multi-media
• Identify network devices Demonstrate Network Outline network
networks affect networks affectProjector, Representation using representations
our daily lives. Lecture notes,
our daily lives. simulation software. and how they are

1.2 Outline how host


and network and network
Tutorials,
Explain how host Pictorials
• Design LAN/WAN
Packet tracer or using the simulator
OR
Demonstrate how to
design LAN/WAN using
used in network
topologies

PROGRAMME:devicesHIGHER are used


NATIONALdevices
DIPLOMA are used
(HND)any other
NETWORKING AND CLOUD COMPUTING the simulator List the
suitable characteristics of a
COURSE: NETWORKING COURSE CODE: NCC 311 Contact Hours: 3hours/Week
1.3 Outline network Explain network simulator
• Design types of network Demonstrate how to good network
ESSENTIALS
representations CREDIT UNIT: 3
representations topologies using the Theoretical:
design network topologies
2 Hours/Week

Start your 30 day free trial


and how
Year: I Semester: I they are Pre-requisite:
and how they are simulator using the
Practical: simulator
1 Hour/Week Describe types of
used in network used inwith
GOAL: This course is designed to equip students network
networking skills. network
topologies. 1.0 Understand
GENERAL OBJECTIVE: topologies.
networks today topologies
Teacher’s Activities Teacher’s Activities
THEORETICAL CONTENT •
PRACTICAL CONTENT
1.4 List the Compare the •

Week characteristics
Specific Learningof characteristics of Resources Specific Learning Evaluation
common types of
Outcome common types of Outcome
networks. networks. •
1-2 1.1 Explain how Explain how Multi-media Identify network devices Demonstrate Network Outline network
networks
1.5 Outline howaffect networks affect Projector, Representation using representations
our daily Explain
our dailyhow

LANs andlives. lives. Lecture notes,


LANs and WANs Tutorials,
simulation software. and how they are
WANs used in network
1.2 Outline how host interconnect to the Pictorials

Design LAN/WAN Demonstrate how to topologies
Explain how host
and network and network Packet tracer 15
or using the simulator design LAN/WAN using
devices are used devices are used any other the simulator List the
suitable characteristics of a
1.3 Outline network Explain network simulator Design types of network Demonstrate how to good network
representations representations topologies using the design network topologies
and how they are and how they are •
simulator using the simulator Describe types of
used in network used in network network
topologies. topologies. topologies

AD 1.4 List the


characteristics of
common types of

Compare the
characteristics of Download to read ad-free
common types of
networks. networks.

1.5 Outline how Explain how


LANs and LANs and WANs
WANs interconnect to the 15

interconnect to internet.
the internet.
1.6 Explain the four • Describe the four
basic basic
requirements of a requirements of a
reliable network. reliable network.
1.7 Outline how • Explain how
trends such as trends such as
BYOD, online BYOD, online
collaboration, collaboration,
video, and cloud video, and cloud
computing are computing are
changing the way changing the way
we interact we interact

1.8 Explain some • Identify some


basic security basic security
threats and threats and
solutions for all solution for all
networks networks

1.9 Outline Explain •

employment employment
opportunities in
opportunities in
the networking
the networking
field field
• GENERAL OBJECTIVE 2.0: Understand protocols and models
2.1 Outline the types Describe the types Multi-media
• Investigate the TCP/IP Guide students to; Explain why
3-4 of rules that are of rules that are Projector, and OSI Models in •Investigate the protocols are
necessary to necessary to Lecture notes, Action using packet TCP/IP and OSI necessary in
successfully successfully Tutorials, tracer Models in Action network
communicate. communicate. Pictorials using packet tracer communication
Wireshark Install Wireshark to •Install Wireshark
2.2 Narrate why Explain why packet tracer or
• view network traffic. to view Network Explain the
16

AD Download to read ad-free

protocols are protocols are other network Traffic purpose of


necessary for necessary in simulators • Apply ping and adhering to a
network network trace route utilities protocol suite.
communication communication to test network
connectivity
2.3 Outline the • Explain the • Use ping and trace
purpose of purpose of Apply ping and route utilities to
adhering to a adhering to a traceroute utilities to test test network
protocol suite. protocol suite. network connectivity connectivity

2.4 Outline the role • Explain the role of


of standards standards
organizations in organizations in Use ping and traceroute
establishing establishing utilities to test network
protocols for protocols for connectivity
network network
interoperability. interoperability.

2.5 Outline how the • Explain how the


TCP/IP model TCP/IP model and
and the OSI the OSI model are
model are used used to facilitate
to facilitate standardization in
standardization the
in the communication
communication process.
process.
2.6 Outline how data • Explain how data
encapsulation encapsulation
allows data to be allows data to be
transported transported across
across the the network.
network.
2.7 Outline how • Explain how local
17

AD Download to read ad-free

local hosts access hosts access local


local resources resources on a
on a network. network.

2.8 Contrast the • Compare the roles


roles of the MAC of the MAC
address and the address and the IP
IP address. address.

2.9 Explain the • Describe the


purpose of ARP. purpose of ARP.

2.10 Explain the • Describe the


operation of operation of IPv6
IPv6 neighbour neighbour
discovery. discovery.

2.11 Outline how • Explain how


ICMP is used to ICMP is used to
test network test network
connectivity. connectivity.

2.12 Explain the • Use ping and


techniques of traceroute utilities
ensuring to test network
successful connectivity
communication
between devices

• GENERAL OBJECTIVE : 3.0 Know Open System Interconnect (OSI) model


3.1 Explain the • Elaborate the Multi-media • Make crossover Guide students to: List the
purpose and purpose and Projector, and straight- Make crossover • characteristics of
5-7 functions of the functions of the Lecture notes, through cable and straight- media access
physical layer in physical layer in Tutorials, • Connect wired through cable control methods
18

AD Download to read ad-free

the network. the network. Pictorials and wireless • Connect a Wired on WAN and LAN
3.2 Explain the • Elaborate the Wireshark LAN. and Wireless LAN topologies
characteristics of characteristics of packetacer or • View Wired and • View Wired and
the physical the physical layer.other network Wireless NIC Wireless NIC
layer. simulators Information Information
3.3 Explain the basic • Explain the basic networking tool using
characteristics of characteristics of kit Packet Tracer. Packet Tracer -
copper cabling. copper cabling. networking • Observe TCP TCP and UDP
3.4 Explain how • Describe how cable and UDP Communications
UTP cable is UTP cable is used Communications • Observe DNS
used in Ethernet in Ethernet • Observe DNS Resolution
networks. networks. Resolution

3.5 Explain fiber • Explain fiber


optic cabling and optic cabling and
its main its main
advantages over advantages over
other media. other media.

3.6 Explain Network • Explain Network


devices using devices using
wired and wired and
wireless media. wireless media.

3.7 List the purpose • List the purpose


and function of and function of
the data link the data link layer
layer in in preparing
preparing communication
communication for transmission
for transmission on specific media.
on specific
media.

19

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free


AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free


AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free


AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free


AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free


AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free


AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free


AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

AD Download to read ad-free

Share this document


# $ ' % (

You might also like

Document 97 pages

Computer Practice N4
Study Guide. (CTC)
Priscilla Musariwa
)100% (3)

Document 206 pages

HND Artificial Intelligence


Ahmad Maccido
No ratings yet

Document 35 pages

IT REPORT OF A
Cybersecurity Student
Jeff Enaefe
No ratings yet

Document 22 pages

Network Implementation
For Bank Using CISCO…
Packet Tracer
rashid1986
)100% (1)

Document 7 pages

Design and
Implementation of…
Allocation
sanusi bello of Supervisors
bakura
To
)0%Siwes
(1) Student

Document 3 pages

Flutter Course Syllabus


ज्ञानेन्द्र यादव
)100% (3)

Document 12 pages

Network Design Proposal


Ha#amu
)50% (2)

Document 3 pages

Industrial Training Report


For Computer Science…
PDF
Adira Hayat
)100% (2)

Document 26 pages

Siwes
Toheeb Atanda
No ratings yet

Document 5 pages

Project of Networking
dereje buruse
No ratings yet

Document 157 pages

So!ware Engineering PDF


Reshma Deva
No ratings yet

Document 23 pages

Industrial Attachment
Excel Completed
Obaphemy El-Rookie Kappo
)100% (1)

Show more

About Support

About Scribd Help / FAQ

Everand: Ebooks & Accessibility


Audiobooks
Purchase help
SlideShare
AdChoices
Press

Join our team! Social


Contact us Instagram
Invite friends Twitter

Facebook
Legal
Pinterest
Terms

Privacy

Copyright

Cookie Preferences

Do not sell or share my


personal information

Get our free apps

Documents
Download
Language: English

AD
Copyright © 2024 Scribd Inc.

Replay

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy