info@iuline.it / 055 0380900

Accreditata MUR con D.M. 02/12/2005

Scienze psicologiche delle risorse umane, delle organizzazioni e delle imprese, classe L-24

Information Technology

Informazioni

Anno accademico: 2021/2022

Periodo: III YEAR; II SEMESTER

SSD: SDS INF/01

Crediti: 6 ECT CFU

Scarica il programma

PhD in Computer Engineering.

Post-doctoral Research Fellow at the Institute of High Performance Computing and Networking (ICAR) of the National Research Council (NRC).

Lecturer in the course “Big Data Processing” (SDS ING-INF/05) at the University of Naples Federico II.

TABLE AND DEFINITION OF CONTENTS

The course consists of 2 modules and covers the following topics.

 

Module 1 – Fundamentals of IT and Computer Networking

  • Understanding how the binary system works.
  • Assembling a computer from scratch.
  • Choosing and installing an operating system on a computer.
  • Understanding what the Internet is, how it works and the impact it has in the modern world.
  • Learn how applications are created and how they work under the cover of a computer.
  • To use common problem-solving methodologies and soft skills in an IT environment.
  • To describe computer networks in terms of a five-layer model.
  • To understand all standard protocols involved in TCP/IP communications.
  • To understand powerful network troubleshooting tools and techniques.
  • To learn about network services such as DNS and DHCP that help make computer networks work.
  • Understanding cloud computing, everything as a service, and cloud storage.

Module 2 – Operating systems and infrastructure and IT security

  • Surfing in Windows and Linux filesystems using a graphical interface and a command line interpreter.
  • To set users, groups and permissions for account access.
  • To install, configure and remove software on Windows and Linux operating systems.
  • To configure disk partitions and filesystems.
  • Understanding how system processes work and how to manage them.
  • Working with system logs and remote connection tools.
  • To use knowledge of the operating system to solve common problems.
  • To use best practices when choosing hardware, suppliers and services for your organisation.
  • Understanding how the most common infrastructure services that maintain an organisation work.
  • Operation of an organisation and how to manage the infrastructure servers.
  • To understand how to make the most of the cloud for your organisation.
  • To manage an organisation’s computers and users using directory services, Active Directory and OpenLDAP.
  • To choose and manage the tools your organisation will use.
  • Backing up the organisation’s data and knowing how to recover the IT infrastructure in the event of a disaster.
  • To use knowledge of systems administration to plan and improve processes in IT environments.
  • how the various cryptographic algorithms and techniques work and their benefits and limitations.
  • The various systems and types of authentication.
  • The difference between authentication and authorisation.
  • How to assess potential risks and recommend ways to reduce risks.
  • Best practices for securing a network.
  • How to help others understand the concepts of safety and how to protect themselves.

Module 1 aims to acquire the necessary skills to manage Information Technology (IT) tools: assembly of a Personal Computer (PC), wireless networking, installation of programmes, and so on.

Module 2, on the other hand, aims to teach how to manage these tools in an end-to-end manner, starting from the identification of problems through to their resolution and debugging, using tools such as Linux, Domain Name Systems, Command-Line Interface and Binary Code, with a focus on the indispensable IT security aspects.

Module 1 proposes to acquire the necessary skills to manage Information Technology (IT) tools: assembly of a Personal Computer (PC), wireless networking, installation of programmes, etc.

Module 2, on the other hand, aims to teach how to manage these tools in an end-to-end manner, starting from the identification of problems through to their resolution and debugging, using tools such as Linux, Domain Name Systems, Command-Line Interface and Binary Code, with a focus on the indispensable aspects of IT security.

A. Knowledge and understanding of the IT world and its specificities

B. Applied knowledge and understanding of IT tools

C. Autonomy of judgement with regard to the choice of suitable tools for solving typical IT problems

D. Communication skills using the correct terminology in order to communicate properly with different stakeholders

E. Learning skills aimed at demonstrating flexibility in the use of constantly changing and updated operating environments and tools.

A. Use of advanced textbooks, knowledge of some cutting-edge topics within the subject studied. But above all, the ability to exploit the Internet and the resources made available.

B. A professional approach to work and possession of appropriate skills to devise arguments, support them and solve problems within the subject studied. Ability to collect and interpret data to make independent judgements. Flexibility in the use of different tools depending on the computer platform used.

C. Ability to communicate information, ideas, problems and solutions to specialists and non-specialists. In particular, use of the correct terminology in order to be able to communicate correctly with the different stakeholders.

D. Ability to undertake further studies with a high degree of autonomy. Ability to use what has been learned in different contexts, independently and with knowledge.

DIDACTICS PROVISION

  • 6 hours of recorded video lessons available on the platform.
  • 2 synchronous meetings on the platform.
  • Podcasts of all the above-mentioned video lessons.

 

INTERACTIVE DIDACTICS

  • 1 course orientation forum.
  • 2 thematic follow-up forums (1 per module).
  • Possibility to carry out work in groups.
  • 2 structured e-activities (as described in the section in itinere assessment methods”).

 

SELF-LEARNING

Teaching materials are provided for each module: in-depth thematic studies, articles and slides by the lecturer, open access readings, online resources, reference bibliography, etc.

Material provided by the lecturer.

Access to the final examination is subject to the following 2 e-activities:

– Etivity 1 – Problem solving (Module 1)

– Etivity 2 – Problem solving (Module 2)

The assessment of learning will take the form of an oral interview on the course contents and on the final report submitted, if any. The grade (min 18, max 30 with possible honours) is determined by the level of performance for each of the following dimensions of the oral interview: mastery of contents, appropriateness of definitions and theoretical references, clarity of argument, command of specialist language.