Course Title: Configure and administer a network operating system
Part B: Course Detail
Teaching Period: Term1 2012
Course Code: COSC5444C
Course Title: Configure and administer a network operating system
School: 155T Vocational Health and Sciences
Campus: City Campus
Program: C4293 - Certificate IV in Information Technology (Networking)
Course Contact: Geoff Moss
Course Contact Phone: +61 3 9925 4852
Course Contact Email: geoff.moss@rmit.edu.au
Name and Contact Details of All Other Relevant Staff
Chelton Evans
chelton.evans@rmit.edu.au
Nominal Hours: 50
Regardless of the mode of delivery, represent a guide to the relative teaching time and student effort required to successfully achieve a particular competency/module. This may include not only scheduled classes or workplace visits but also the amount of effort required to undertake, evaluate and complete all assessment requirements, including any non-classroom activities.
Pre-requisites and Co-requisites
The following units are prerequisite for this competency:
• ICAI3020A - Install and optimise operating system software
• ICAS3024A - Provide basic system administration
• ICAS3032A - Provide network systems administration
Course Description
This unit defines the competency required to create the network configuration required by a client and to set up and use administrative tools to manage the network.
National Codes, Titles, Elements and Performance Criteria
National Element Code & Title: |
ICAS3120C Configure and administer a network operating system |
Element: |
1. Review network policies 1.1 Review organisational policies for network use and administration arrangements |
Performance Criteria: |
1.1 Review organisational policies for network use and administration arrangements |
Element: |
2. Create an interface with existing system 2.1 Identify and document the current system and components and configuration through audits of hardware and software |
Performance Criteria: |
2.1 Identify and document the current system and components and configuration through audits of hardware and software |
Element: |
3. Set up and manage the network file system 3.1 Evaluate the network requirements of the user and design an appropriate file and folder structure |
Performance Criteria: |
3.1 Evaluate the network requirements of the user and design an appropriate file and folder structure |
Element: |
4. Manage user services 4.1 Evaluate the network requirements of the user and design an appropriate set of services that should be provided |
Performance Criteria: |
4.1 Evaluate the network requirements of the user and design an appropriate set of services that should be provided |
Element: |
5. Monitor user accounts 5.1 Modify default user settings to ensure that they match security policies |
Performance Criteria: |
5.1 Modify default user settings to ensure that they match security policies |
Element: |
6. Provide and support back up security 6.1 Scan and, if required, clean the network of viruses before back-up |
Performance Criteria: |
6.1 Scan and, if required, clean the network of viruses before back-up |
Learning Outcomes
Details of Learning Activities
Though pracs and theory
- document a live network
- set up a windows server
- explore antivirus software
Teaching Schedule
Weeks | Topic | Software/Reading | Practical Exercies and Assessment |
1 | Introduction to Topic, Overview of course | See online resources | |
2 | Review network policies | See online resources | Prac 1 – Documenting the network |
3 | Setting up and manage the network file system Manage user services Monitor user accounts |
See online resources | Prac 2 Setting up a Windows Server |
7 | Provide and support backup security |
See online resources | Prac 7 point form Disaster Recovery Plan |
9 | Provide and support backup security | See online resources | Prac 12 Antivirus software |
10 | Provide and support backup security |
See online resources | Prac 7 Backup |
Learning Resources
Prescribed Texts
References
Other Resources
Overview of Assessment
Critical aspects for assessment and evidence required to demonstrate competency in this unit.
• Assessment must confirm knowledge of the facilities available in the operating environment.
• Assessment must confirm the ability to use network administrative tools and manage a network.
• Assessment must confirm the ability to create the network configuration required by the client and provide timely client service.
Assessment occurs throughout the program and includes learning and assessment activities conducted in the classroom, online and in the workplace giving you the opportunity to practice and be assessed on what you are learning in a work context. You must demonstrate an understanding of all elements of a particular competency to be deemed competent. Assessment methods have been designed to measure achievement of each competency in a flexible manner over a range of assessment tasks.
Assessment will incorporate a variety of methods including technical requirements, documentation, workplace activities, in class exercises, quizzes, practical problem solving exercises and presentations. Participants are advised that they are likely to be asked to personally demonstrate their assessment work to their teacher to ensure that the relevant competency standards are being met.
If you have a long term medical condition and/or disability it may be possible to negotiate to vary aspects of the learning or assessment methods. You can contact the program coordinator or the Disability Liaison Unit if you would like to find out more.
Assessment Tasks
Skills Based Assessments:
These assessments can be done either at RMIT or at the workplace providing appropriate equipment is available.
All pracs need to be completed to pass the course.
Assessment Matrix
Element | Practical Tasks | |n Class/Work Observation | In Class Testing | Individual and Group discussion** |
1.1 | x | x | x | x |
1.2 | x | x | x | x |
1.3 | x | x | x | x |
1.4 | x | x | x | x |
2.1 | x | x | x | x |
2.2 | x | x | x | x |
2.3 | x | x | x | x |
2.4 | x | x | x | x |
3.1 | x | x | x | x |
3.2 | x | x | x | x |
3.3 | x | x | x | x |
3.4 | x | x | x | x |
3.5 | x | x | x | x |
3.6 | x | x | x | x |
4.1 | x | x | x | x |
4.2 | x | x | x | x |
4.3 | x | x | x | x |
4.4 | x | x | x | x |
5.1 | x | x | x | x |
5.2 | x | x | x | x |
5.3 | x | x | x | x |
5.4 | x | x | x | x |
5.5 | x | x | x | x |
5.6 | x | x | x | x |
6.1 | x | x | x | x |
6.2 | x | x | x | x |
6.3 | x | x | x | x |
6.4 | x | x | x | x |
6.5 | x | x | x | x |
Course Overview: Access Course Overview