top of page

Distance Education Description Summary

Delivery System

 

Our distance education programs are delivered in synchronous and asynchronous learning technologies. Synchronous learning occurs when the instructor and the students are both learning at the same time, allowing for real-time engagement. It can happen both online and offline. Depending on the learning objectives, PTC may utilize synchronous applications including, Gotomeeting®, Google Meet®, and/or Zoom®. Asynchronous learning occurs when the instructor and the students are not both learning at the same time. The content is developed and made available for consumption later; there is no real-time engagement. PTC will utilize a Learning Management System (LMS) to provide asynchronous activities. The LMS includes:

​

  • Electronic presentations converted into videos

  • Microsoft PowerPoint or Prezi presentations converted and uploaded to the LMS

  • Content Lessons

  • Distribution of lessons in a weekly basis that may include text, diagrams, and/or pictures

  • Forums (LMS)

  • Guided assignments (LMS)

  • Questions, virtual labs and /or projects

  • Closing Course activity

  • Email communication system

​

Prerequisites

 

To be successful in our online programs’ students will be required to:

 

  • TIME MANAGEMENT, SELF-DISCIPLINE, AND SELF-MOTIVATION

Success in online learning requires the ability to be self-directed and independent in your learning while also managing your time wisely.

  • SELF-MOTIVATION and SELF-DISCIPLINE

To be successful, you will need self-discipline and motivation to log in to the course on a regular basis, keep track of deadlines, and finish your course work on time.

  • MANAGEMENT OF TIME

Have you given yourself enough time to prepare? Consider the following: Regarding both in-person and online classes, the general rule for class time and assignments is the same. For every hour of class time, you should plan on spending at least another 2-3 hours. As a result, you should budget at least 6-9 hours per week to complete readings, assignments, and participate in class discussion in a 3-credit hour course.

  • ROOM TO STUDY

Make a quiet study environment for yourself where you may read course materials, complete class tasks, and participate in class discussions. You should use this time to study course content, perform a learning exercise, participate in class discussions, or submit an evaluation by logging on to your course site.

  • ASK FOR ASSISTANCE

If you require assistance, do not hesitate to ask!

Be willing to seek assistance from your educator.

Seek help from classmates or coworkers.

 

The PTC Student Experience office can assist you with technological issues.

Get in touch with PTC’s student services and resources and set reminders to log in on a regular basis. Setting up a daily plan, noting critical due dates for learning tasks and assessments, and setting off time to read course content and complete course obligations are all important.

 

Expected learning outcomes

 

Student Learning Outcomes for Computer and Networking Specialist Program

 

Students who successfully complete this program will be able to:

 

Computer Hardware

  1. Given a scenario, configure settings and use BIOS/UEFI tools on a PC.

  2. Explain the importance of motherboard components, their purpose and properties.

  3. Compare various RAM types and their features.

  4. Install and configure PC expansion cards.

  5. Install and configure storage devices and use appropriate media.

  6. Install various types of CPUs and apply the appropriate cooling methods.
    Compare various PC connection interfaces, their characteristics and purpose.

  7. Install a power supply based on given specifications.

  8. Given a scenario, select the appropriate components for a custom

  9. PC configuration to meet customer specifications or needs.

  10. Compare types of display devices and their features.

  11. Identify common PC connector types and associated cables.

  12. Install and configure common peripheral devices.

  13. Install SOHO multifunction device/printers and configure appropriate settings.

  14. Compare differences between the various print technologies and the associated imaging process.

  15. Given a scenario, perform appropriate printer maintenance.

 

Networking

​

  1. Identify the various types of network cables and connectors.

  2. Compare the characteristics of connectors and cabling.

  3. Explain the properties and characteristics of TCP/IP.

  4. Explain common TCP and UDP ports, protocols, and their purpose.

  5. Compare various Wi-Fi networking standards and encryption types.

  6. Given a scenario, install and configure SOHO wireless/wired router and apply appropriate settings.

  7. Compare Internet connection types, network types and their features.

  8. Compare network architecture devices, their functions, and features.

  9. Given a scenario, use appropriate networking tools.

​

Mobile Devices

​

  1. Install and configure laptop hardware and components.

  2. Explain the function of components within the display of a laptop.

  3. Given a scenario, use appropriate laptop features.

  4. Explain the characteristics of various types of other mobile devices.

  5. Compare accessories and ports of other mobile devices

​

Hardware and Network Troubleshooting

​

  1. Given a scenario, troubleshoot common problems related to motherboards, RAM, CPU, and power with appropriate tools.

  2. Given a scenario, troubleshoot hard drives and RAID arrays with appropriate tools.

  3. Given a scenario, troubleshoot common video, projector, and display issues.

  4. Given a scenario, troubleshoot wired and wireless networks with appropriate tools.

  5. Given a scenario, troubleshoot and repair common mobile device issues while adhering to the appropriate procedures.

  6. Given a scenario, troubleshoot printers with appropriate tools.

​

Windows Operating Systems
 

  1. Compare various features and requirements of Microsoft Operating Systems (Windows Vista, Windows 7, Windows 8, Windows 8.1).

  2. Given a scenario, install Windows PC operating systems using appropriate methods.

  3. Given a scenario, apply appropriate Microsoft command line tools.

  4. Given a scenario, use appropriate Microsoft operating system features and tools.

  5. Given a scenario, use Windows Control Panel utilities.

  6. Given a scenario, install and configure Windows networking on a client/desktop.

  7. Perform common preventive maintenance procedures using the appropriate Windows OS tools.

 

Other Operatives Systems technologies

​

  1. Identify common features and functionality of the Mac OS and Linux operating systems.

  2. Given a scenario, set up and use client-side virtualization.

  3. Identify basic cloud concepts.

  4. Summarize the properties and purpose of services provided by networked hosts.

  5. Identify basic features of mobile operating systems.

  6. Install and configure basic mobile device network connectivity and email.

  7. Summarize methods and data related to mobile device synchronization.

​

Security

​

  1. Identify common security threats and vulnerabilities.

  2. Compare common prevention methods.

  3. Compare differences of basic Windows OS security settings.

  4. Given a scenario, deploy and enforce security best practices to secure a workstation.

  5. Compare various methods for securing mobile devices.

  6. Given a scenario, use appropriate data destruction and disposal methods.

  7. Given a scenario, secure SOHO wireless, and wired networks.

​

Software Troubleshooting

​

  1. Given a scenario, troubleshoot PC operating system problems with appropriate tools.

  2. Given a scenario, troubleshoot common PC security issues with appropriate tools and best practices.

  3. Given a scenario, troubleshoot common mobile OS and application issues with appropriate tools.

  4. Given a scenario, troubleshoot common mobile OS and application security issues with appropriate tools.

​

Operational Procedures

​

  1. Given a scenario, use appropriate safety procedures.

  2. Given a scenario with potential environmental impacts, apply the appropriate controls.

  3. Summarize the process of addressing prohibited content/activity, and explain privacy, licensing, and policy concepts.

  4. Demonstrate proper communication techniques and professionalism.
    Given a scenario, explain the troubleshooting theory.

 

Student Learning Outcomes for IT Security: Professional White Hat Hacker Program

 

Students who successfully complete this program will be able to:

 

Certified Network Defender (CND)

 

1. Understand the fundamental goals, benefits, challenges, and available countermeasures for network defense.

​

2. Analyze cryptography algorithms and design implementation strategies for privacy and security of information.

​

3. Understand the role of the Intrusion Detection and Prevention System in defending the networks.

 

4. Understand Linux and Windows security concerns and hardening techniques such as password management, security baseline configurations, etc.

​

5. Identify risks associated with IoT and mobile devices and select appropriate countermeasures including policies, guidelines, and tools.

​

6. Implement application whitelisting and blacklisting, sandboxing, patch management, and web application firewall, encryption techniques, and secure design strategies for data loss prevention.

 

Certified Ethical Hacker (CEH)

 

 1. Assess ethical and legal requirements of security assessment and penetration testing and determine a strategy to comply with these requirements.

​

2. Analyze different phases of hacking and recommend the strategy to use ethical hacking for assessing the security of various components of the information system.

​

3. Compare and contrast different hacking techniques and analyze the legal implications of hacking.

​

4. Examine different vulnerabilities, threats, and attacks to information systems and recommend the countermeasures.

​

5. Analyze cryptography algorithms and encryption techniques, and design implementation strategies for securing information.

​

6. Compare and contrast various network security assessments and hacking tools.

​

7. Assess various network security techniques and tools and implement an appropriate level of information security controls based on evidence, information, and research.

 

Student Learning Outcomes for Digital Marketing Program

 

Students who successfully complete this program will be able to:

 

1. Students will be able to define marketing and digital marketing and identify trends in the digital marketing industry.

​

2. Students will understand the role and importance of content creation and distribution in digital marketing. Students will be able to explain the three types of digital content: paid, owned, and earned.

​

3. Students will understand the data and measures as it refers to digital marketing. Students will explore data measurement, analysis, and key performance indicators used by digital marketers.

​

4. Students will understand that online advertising and digital marketing rapidly become the main market form for businesses. Students will understand current forms of online advertising. Students will learn how digital marketing works with the promotion part of the marketing
mix.

​

5. Students will understand the uses of social media platforms in marketing and how it is integrated with digital marketing and traditional offline marketing.

​

6.  Students will understand the basic elements of the app economics, both the device application and the web-based application.

​

7. Students will understand the careers available in the digital marketing industry.

        

Graduation Requirements

 

Any student who understands that is about to complete the academic requirements of their online program of study should visit the Office of Student Services before his last term and apply for a Diploma or Certificate of Graduation. The Office of Student Services will evaluate the student's transcript to verify that, indeed, all requirements except those that are scheduled for the last term are satisfied.
Graduate students are those that met the following criteria:


1. Completed all required courses in their curriculum.
2. Paid off all debts to the institution.
3. Had a cumulative grade point average (GPA) of not less than 2.00

 

Student Services

 

Password Technical College can provide support to students on the online programs in real-time and/or passive methods of communications. The following are the tools PTC use to support online students:

 

Real-time support:

​

  1. Telephone

  2. Instant messaging

  3. Web conferencing

  4. Virtual meeting rooms

  5. Online chats

​

Passive support:

​

  1. Online forms

  2. Email

  3. Forums and discussions boards

  4. Social media

​

The services provided:

​

  1. Financial Aid

  2. Academic Advising

  3. Academic support

  4. Technical Support

  5. Library

  6. Military Services

  7. Personal Support

  8. Internship, apprenticeships

  9. Career Services

  10. Alumni Support

 

Technology and equipment requirements

​

Hardware and peripheral devices:

  • Computer with a 1 GHz processor or higher speed

  • 2GB RAM or higher

  • Hard disk of 80 GB or greater capacity

  • High-speed Internet connection and service (DSL, Cable)

  • Video card with a minimum resolution of 1024x768

  • USB ports

  • Sound card and speakers

  • Microphone (built-in or peripheral)

  • Webcam (integrated or peripheral)

​

Programmed (Software) and applications:

  • Operating system (Windows 7 or higher) or (Mac OS 10.6 or higher)

  • Microsoft® Office 2007, 2010, 365 or newer version or Google Docs

  • Microsoft PowerPoint or scheduled presentations or Google Presentations

  • Microsoft Excel or computer programming or Google Sheets

  • Acrobat® Reader 9.0 or newer version or any PDF application (i.e., Foxit Reader, etc.)

  • Acrobat® Flash plug-in 10.0 or newer version

bottom of page