The Server Administration program is focused on relevant enterprise server operating systems configuration, management, and security. The program focuses on current network security concepts and industry certification preparation. Students will be asked to interpret an organization’s information technology requirements. Students earning this degree will have the technical knowledge and skills to work in the increasingly important field of server administration.
Here is an overview of the certificates and degrees we award at Ivy Tech Community College. Click on the credential to view the official statewide curriculum.
Classes on the left are required coursework for our technical and associate degrees. Classes on the right are technical selectives our students get the choose from. Official curriciulum guides can be found here.
Required Coursework
Selective I, II, & III
Selective IV
Selective V & VI (2 classes)
Workforce Prep:
Here is a breakdown of the key concepts and objectives students must learn in their coursework at Ivy Tech Community College.
INFM 109: Informatics Fundamentals
Nature of information • Knowledge domains • Overview of Microsoft Word • Overview of Microsoft Excel • History of computing • Operating systems • Networking • Storage technologies • Storage techniques • Internet basics • Security • System Development Life Cycle • Information Systems Fundamentals • Database TechnologyITSP 135: Hardware/Software Support
System assembly • Device installation and maintenance • Operating systems • Needs assessment • Networking basics • Security essentials • Forensics fundamentals • System documentation • Troubleshooting theory • Issue resolution • Desktop imaging • Virtualization Mobile OSs • Professional communication TCP/IP • BIOS • SOHO • Mobile computingNETI 105: Network Fundamentals
Cisco IOS • Protocols • Integrity and Availability • Routing • IP Addressing • Security • Local Area Network (LAN) • TCP/IP Model • Maintaining and Upgrading • Standards and the OSI Model • Network Cabling • Transmission Basics and Networking Media • Network Hardware • Troubles Shooting • Network Operating Systems • WANs and Remote Connectivity • Physical and Logical Topologies • Wide Area Network (WAN)SDEV 120: Computing Logic
Algorithms and Algorithm Development • Logic Development • Math Concepts • Numbering Systems: Binary, Decimal, Hexadecimal • Basic Programming Control Structures • Flowcharting and Pseudocode • Relational and Logical Operators • Order of Precedence • Truth Tables and Decision Trees • Data Validation • Scripting • Work Ethic • Software Development Life Cycle • Deductive and Inductive Logic • Set Theory • Logic Structures • Fuzzy Logic and Ladder Logic • Logic Gate Theory • Puzzles and Games • Graphing • Unified Modeling LanguageNETI 120: Infrastructure Design - Logical and Physical
Passive Optical Networks • Wireless LAN Request for Proposal Infrastructure Codes and standards • Cabling systems • Fiber optics • Wall plates • Terminators • Transmission Professionalism • Safety • Copper cabling • Networking tools • Electromagnetism • UTP • STP • Microwave InterferenceCSIA 210: Network Protocol Analysis
Headers • Payloads • ARP • RARP • IPv4 • IPv6 • RIPv1/ v2 • OSPF • EIGRP • BGP • DHCPv4 /v6 • APIPA • Host/interface address determination • Stateless and stateful address auto configuration • ISATAP • 6to4 • Teredo • OSI Model • TCP/IP Model • Wire Shark • TCPdump • NmapSVAD 111: Linux/Virtualization Tech Fundamentals
Command Line • NIC Configuration • LAN Settings • Users • Groups • File management • Shell scripts • File systems • File permissions • File ownership • Find system files • Virtualization • TroubleshootingSVAD 121: Enterprise Computing
Unattended installations and answer files • Troubleshooting failed installations • Network services, DNS, DHCP, and WINS • Control access to printers and files/folders • Distributed file system (Dfs) • Local security • Backup and System restoration • Network protocols • Remotely administer servers and clients • Auditing and managing resource access • Configure and manage TCP/IP protocols • Remote server usage • Encrypting File System (EFS) • Local security policy • Remote Access Technologies • Understand Client and Server OS licensing • Server and Desktop Virtualization concepts and Technologies • Centralized update management • Centralized Storage Architecture (SAN/NAS) • Local user accounts • Auditing • Account policy • Local user authentication • Domain user accounts • Active Directory administration • Security configuration • Update drivers • Windows Installer packages • Controlling Desktop settings • Managing network print devices • Configure disks, volumes and partitions, RAIDCSIA 105: Intro to Cyber Security/Info Assurance
Security reviews • Effectiveness of security programs • Investigation of security breaches • Monitoring systems for accuracy and abnormalities • Privacy • Accountability controls • Audit trails and logs • Software design standards • Denial of service, spoofing, and hijacking • Networking • Defense in depth • Cryptography • Security Technologies • Legal, ethical and professional issues in Information Security • Attribution • Destruction of mediaCPIN 269: Project Management
Data flow diagrams • Structure charts • Flow charts • Data Dictionaries • Prototyping • Object-oriented • Case tools • Team dynamics • Project management • Conversion methods • Total cost of ownership • Return on investmentCPIN 279: Exploration/Evaluation
Interviews • Team participation • Time management • Portfolios • Career paths • Communication skills • Life-long learning • Electronic presentationsThe most recent demographic data from our students. Note: This is only for the Indianapolis/Central Indiana campus and surrounding service sites of Avon, Lawrence, Noblesville, Greencastle, Mooresville, Franklin, and Shelbyville.
Total Students
Part Time Status
Sophomore Standing
Last Semester's Awarded Credentials
Contact the School of IT Career Development Coach, Jessica Jagger, today via phone, LinkedIN, or email.