Course Title: Configure and administer a network operating system

Part A: Course Overview

Program: C4293 Certificate IV in Information Technology (Networking)

Course Title: Configure and administer a network operating system

Portfolio: SEH Portfolio Office

Nominal Hours: 50

Regardless of the mode of delivery, represent a guide to the relative teaching time and student effort required to successfully achieve a particular competency/module. This may include not only scheduled classes or workplace visits but also the amount of effort required to undertake, evaluate and complete all assessment requirements, including any non-classroom activities.

Course Code

Campus

Career

School

Learning Mode

Teaching Period(s)

COSC5444C

City Campus

TAFE

155T Vocational Health and Sciences

Distance / Correspondence or Face-to-Face or Internet or Workplace

Term1 2012

Course Contact: Geoff Moss

Course Contact Phone: +61 3 9925 4852

Course Contact Email: geoff.moss@rmit.edu.au



Course Description

This unit defines the competency required to create the network configuration required by a client and to set up and use administrative tools to manage the network.

Pre-requisite Courses and Assumed Knowledge and Capabilities

The following units are prerequisite for this competency:
• ICAI3020A - Install and optimise operating system software
• ICAS3024A - Provide basic system administration
• ICAS3032A - Provide network systems administration



National Competency Codes and Titles

National Element Code & Title:

ICAS3120C Configure and administer a network operating system

Elements:

1. Review network policies

1.1 Review organisational policies for network use and administration arrangements
1.2 Identify network administration tools both built into the network operating system and third-party tools that can be used to enforce organisational polices
1.3 Determine and document settings and parameters that should be used in order to meet policies and procedures
1.4 Make necessary recommendations to appropriate person for ways of overcoming weaknesses in administration tools

2. Create an interface with existing system

2.1 Identify and document the current system and components and configuration through audits of hardware and software
2.2 Identify and map system interaction by identifying what data is required by particular users and how often the data is accessed
2.3 Examine existing applications and plan required upgrades/reconfigurations to new system or applications
2.4 Test reconfiguration for successful interface with existing system

3. Set up and manage the network file system

3.1 Evaluate the network requirements of the user and design an appropriate file and folder structure
3.2 Create the designed file and folder structure using appropriate administration and system tools
3.3 Set the security, access and sharing of file system to meet user requirements
3.4 Identify and implement the virus protection requirements for the network in line with organisational procedures
3.5 Test the file system to ensure that appropriate access is available to the user groups
3.6 Document the created file system in accordance with organisational standards

4. Manage user services

4.1 Evaluate the network requirements of the user and design an appropriate set of services that should be provided
4.2 Create users and groups as required to facilitate user security and network access in accordance with user authorisation
4.3 Monitor non-verbal and verbal communication of participants to promote attainment of presentation outcomes
4.4 Test successful access by users to authorised network data and resources and record outcomes

5.  Monitor user accounts

5.1 Modify default user settings to ensure that they match security policies
5.2 Modify existing user settings for non-compliant security according to security and access policies
5.3 Check that appropriate legal notices at log on are displayed
5.4 Use appropriate utilities to check strength of passwords
5.5 Review procedures and take action to ensure that users who leave the organisation or area have their accounts disabled or deleted
5.6 Use information services to identify well-known and up-to-date security gaps and secure these with appropriate hardware and software

6. Provide and support back up security

6.1 Scan and, if required, clean the network of viruses before back-up
6.2 Review security requirements for users and data to be stored on network
6.3 Determine risks to which data is exposed and provide appropriate prevention and recovery processes
6.4 Implement systems to provide back-up and service restoration capability in the event of a disaster
6.5 Document and disseminate the disaster recovery procedures


Learning Outcomes


Overview of Assessment

Critical aspects for assessment and evidence required to demonstrate competency in this unit.
• Assessment must confirm knowledge of the facilities available in the operating environment.
• Assessment must confirm the ability to use network administrative tools and manage a network.
• Assessment must confirm the ability to create the network configuration required by the client and provide timely client service.

Assessment occurs throughout the program and includes learning and assessment activities conducted in the classroom, online and in the workplace giving you the opportunity to practice and be assessed on what you are learning in a work context. You must demonstrate an understanding of all elements of a particular competency to be deemed competent. Assessment methods have been designed to measure achievement of each competency in a flexible manner over a range of assessment tasks.

Assessment will incorporate a variety of methods including technical requirements, documentation, workplace activities, in class exercises, quizzes, practical problem solving exercises and presentations. Participants are advised that they are likely to be asked to personally demonstrate their assessment work to their teacher to ensure that the relevant competency standards are being met.

If you have a long term medical condition and/or disability it may be possible to negotiate to vary aspects of the learning or assessment methods. You can contact the program coordinator or the Disability Liaison Unit if you would like to find out more.