Course Title: Configure and administer a network operating system

Part B: Course Detail

Teaching Period: Term1 2012

Course Code: COSC5444C

Course Title: Configure and administer a network operating system

School: 155T Vocational Health and Sciences

Campus: City Campus

Program: C4293 - Certificate IV in Information Technology (Networking)

Course Contact: Geoff Moss

Course Contact Phone: +61 3 9925 4852

Course Contact Email: geoff.moss@rmit.edu.au


Name and Contact Details of All Other Relevant Staff

Chelton Evans

chelton.evans@rmit.edu.au

Nominal Hours: 50

Regardless of the mode of delivery, represent a guide to the relative teaching time and student effort required to successfully achieve a particular competency/module. This may include not only scheduled classes or workplace visits but also the amount of effort required to undertake, evaluate and complete all assessment requirements, including any non-classroom activities.

Pre-requisites and Co-requisites

The following units are prerequisite for this competency:
• ICAI3020A - Install and optimise operating system software
• ICAS3024A - Provide basic system administration
• ICAS3032A - Provide network systems administration

Course Description

This unit defines the competency required to create the network configuration required by a client and to set up and use administrative tools to manage the network.


National Codes, Titles, Elements and Performance Criteria

National Element Code & Title:

ICAS3120C Configure and administer a network operating system

Element:

1. Review network policies

1.1 Review organisational policies for network use and administration arrangements
1.2 Identify network administration tools both built into the network operating system and third-party tools that can be used to enforce organisational polices
1.3 Determine and document settings and parameters that should be used in order to meet policies and procedures
1.4 Make necessary recommendations to appropriate person for ways of overcoming weaknesses in administration tools

Performance Criteria:

1.1 Review organisational policies for network use and administration arrangements
1.2 Identify network administration tools both built into the network operating system and third-party tools that can be used to enforce organisational polices
1.3 Determine and document settings and parameters that should be used in order to meet policies and procedures
1.4 Make necessary recommendations to appropriate person for ways of overcoming weaknesses in administration tools

Element:

2. Create an interface with existing system

2.1 Identify and document the current system and components and configuration through audits of hardware and software
2.2 Identify and map system interaction by identifying what data is required by particular users and how often the data is accessed
2.3 Examine existing applications and plan required upgrades/reconfigurations to new system or applications
2.4 Test reconfiguration for successful interface with existing system

Performance Criteria:

2.1 Identify and document the current system and components and configuration through audits of hardware and software
2.2 Identify and map system interaction by identifying what data is required by particular users and how often the data is accessed
2.3 Examine existing applications and plan required upgrades/reconfigurations to new system or applications
2.4 Test reconfiguration for successful interface with existing system

Element:

3. Set up and manage the network file system

3.1 Evaluate the network requirements of the user and design an appropriate file and folder structure
3.2 Create the designed file and folder structure using appropriate administration and system tools
3.3 Set the security, access and sharing of file system to meet user requirements
3.4 Identify and implement the virus protection requirements for the network in line with organisational procedures
3.5 Test the file system to ensure that appropriate access is available to the user groups
3.6 Document the created file system in accordance with organisational standards

Performance Criteria:

3.1 Evaluate the network requirements of the user and design an appropriate file and folder structure
3.2 Create the designed file and folder structure using appropriate administration and system tools
3.3 Set the security, access and sharing of file system to meet user requirements
3.4 Identify and implement the virus protection requirements for the network in line with organisational procedures
3.5 Test the file system to ensure that appropriate access is available to the user groups
3.6 Document the created file system in accordance with organisational standards

Element:

4. Manage user services

4.1 Evaluate the network requirements of the user and design an appropriate set of services that should be provided
4.2 Create users and groups as required to facilitate user security and network access in accordance with user authorisation
4.3 Monitor non-verbal and verbal communication of participants to promote attainment of presentation outcomes
4.4 Test successful access by users to authorised network data and resources and record outcomes

Performance Criteria:

4.1 Evaluate the network requirements of the user and design an appropriate set of services that should be provided
4.2 Create users and groups as required to facilitate user security and network access in accordance with user authorisation
4.3 Monitor non-verbal and verbal communication of participants to promote attainment of presentation outcomes
4.4 Test successful access by users to authorised network data and resources and record outcomes

Element:

5.  Monitor user accounts

5.1 Modify default user settings to ensure that they match security policies
5.2 Modify existing user settings for non-compliant security according to security and access policies
5.3 Check that appropriate legal notices at log on are displayed
5.4 Use appropriate utilities to check strength of passwords
5.5 Review procedures and take action to ensure that users who leave the organisation or area have their accounts disabled or deleted
5.6 Use information services to identify well-known and up-to-date security gaps and secure these with appropriate hardware and software

Performance Criteria:

5.1 Modify default user settings to ensure that they match security policies
5.2 Modify existing user settings for non-compliant security according to security and access policies
5.3 Check that appropriate legal notices at log on are displayed
5.4 Use appropriate utilities to check strength of passwords
5.5 Review procedures and take action to ensure that users who leave the organisation or area have their accounts disabled or deleted
5.6 Use information services to identify well-known and up-to-date security gaps and secure these with appropriate hardware and software

Element:

6. Provide and support back up security

6.1 Scan and, if required, clean the network of viruses before back-up
6.2 Review security requirements for users and data to be stored on network
6.3 Determine risks to which data is exposed and provide appropriate prevention and recovery processes
6.4 Implement systems to provide back-up and service restoration capability in the event of a disaster
6.5 Document and disseminate the disaster recovery procedures

Performance Criteria:

6.1 Scan and, if required, clean the network of viruses before back-up
6.2 Review security requirements for users and data to be stored on network
6.3 Determine risks to which data is exposed and provide appropriate prevention and recovery processes
6.4 Implement systems to provide back-up and service restoration capability in the event of a disaster
6.5 Document and disseminate the disaster recovery procedures


Learning Outcomes



Details of Learning Activities

Though pracs and theory

 

  • document a live network
  • set up a windows server
  • explore antivirus software


Teaching Schedule

WeeksTopicSoftware/ReadingPractical Exercies and Assessment
1Introduction to Topic, Overview of courseSee online resources 
2Review network policiesSee online resourcesPrac 1 – Documenting the network
3Setting up and manage the network file system
Manage user services
Monitor user accounts
See online resourcesPrac 2 Setting up a Windows Server
7Provide and support backup security
 
See online resourcesPrac 7 point form Disaster Recovery Plan
9Provide and support backup securitySee online resourcesPrac 12 Antivirus software
10Provide and support backup security
 
See online resourcesPrac 7 Backup


Learning Resources

Prescribed Texts


References


Other Resources


Overview of Assessment

Critical aspects for assessment and evidence required to demonstrate competency in this unit.
• Assessment must confirm knowledge of the facilities available in the operating environment.
• Assessment must confirm the ability to use network administrative tools and manage a network.
• Assessment must confirm the ability to create the network configuration required by the client and provide timely client service.

Assessment occurs throughout the program and includes learning and assessment activities conducted in the classroom, online and in the workplace giving you the opportunity to practice and be assessed on what you are learning in a work context. You must demonstrate an understanding of all elements of a particular competency to be deemed competent. Assessment methods have been designed to measure achievement of each competency in a flexible manner over a range of assessment tasks.

Assessment will incorporate a variety of methods including technical requirements, documentation, workplace activities, in class exercises, quizzes, practical problem solving exercises and presentations. Participants are advised that they are likely to be asked to personally demonstrate their assessment work to their teacher to ensure that the relevant competency standards are being met.

If you have a long term medical condition and/or disability it may be possible to negotiate to vary aspects of the learning or assessment methods. You can contact the program coordinator or the Disability Liaison Unit if you would like to find out more.


Assessment Tasks

Skills Based Assessments:
These assessments can be done either at RMIT or at the workplace providing appropriate equipment is available.

All pracs need to be completed to pass the course.


Assessment Matrix

ElementPractical Tasks|n Class/Work ObservationIn Class TestingIndividual and Group discussion**
1.1xxxx
1.2xxxx
1.3xxxx
1.4xxxx
2.1xxxx
2.2xxxx
2.3xxxx
2.4xxxx
3.1xxxx
3.2xxxx
3.3xxxx
3.4xxxx
3.5xxxx
3.6xxxx
4.1xxxx
4.2xxxx
4.3xxxx
4.4xxxx
5.1xxxx
5.2xxxx
5.3xxxx
5.4xxxx
5.5xxxx
5.6xxxx
6.1xxxx
6.2xxxx
6.3xxxx
6.4xxxx
6.5xxxx

Course Overview: Access Course Overview