Modification History
Not Applicable
Unit Descriptor
Unit descriptor |
This unit defines the competency required to create the network configuration required by a client and to set up and use administrative tools to manage the network. The following units are linked and form an appropriate cluster:
No licensing, legislative, regulatory or certification requirements apply to this unit at the time of publication. |
Application of the Unit
Application of the unit |
Licensing/Regulatory Information
Refer to Unit Descriptor
Pre-Requisites
Prerequisite units |
||
ICAI3020B |
Install and optimise operating system software |
|
ICAS3032B |
Provide network systems administration |
|
Employability Skills Information
Employability skills |
This unit contains employability skills. |
Elements and Performance Criteria Pre-Content
Elements describe the essential outcomes of a unit of competency. |
Performance criteria describe the performance needed to demonstrate achievement of the element. Where bold italicised text is used, further information is detailed in the required skills and knowledge section and the range statement. Assessment of performance is to be consistent with the evidence guide. |
Elements and Performance Criteria
ELEMENT |
PERFORMANCE CRITERIA |
1. Review network policies |
1.1. Review organisational policies for network use and administration arrangements 1.2. Identify network administration tools both built into the network operating system and third-party tools that can be used to enforce organisational polices 1.3. Determine and document settings and parameters that should be used in order to meet policies and procedures 1.4. Make necessary recommendations to appropriate person for ways of overcoming weaknesses in administration tools |
2. Create an interface with existing system |
2.1. Identify and document the current system and components and configuration through audits of hardware and software 2.2. Identify and map system interaction by identifying what data is required by particular users and how often the data is accessed 2.3. Examine existing applications and plan required upgrades/reconfigurations to new system or applications 2.4. Test reconfiguration for successful interface with existing system |
3. Set up and manage the network file system |
3.1. Evaluate the network requirements of the user and design an appropriate file and folder structure 3.2. Create the designed file and folder structure using appropriate administration and system tools 3.3. Set the security, access and sharing of file system to meet user requirements 3.4. Identify and implement the virus protection requirements for the network in line with organisational procedures 3.5. Test the file system to ensure that appropriate access is available to the user groups 3.6. Document the created file system in accordance with organisational standards |
4. Manage user services |
4.1. Evaluate the network requirements of the user and design an appropriate set of services that should be provided 4.2. Implement the services required by using the appropriate administration and system tools 4.3. Create users and groups as required to facilitate user security and network access in accordance with user authorisation 4.4. Test successful access by users to authorised network data and resources and record outcomes |
5. Monitor user accounts |
5.1. Modify default user settings to ensure that they match security policies 5.2. Modify existing user settings for non-compliant security according to security and access policies 5.3. Check that appropriate legal notices at log on are displayed 5.4. Use appropriate utilities to check strength of passwords 5.5. Review procedures and take action to ensure that users who leave the organisation or area have their accounts disabled or deleted 5.6. Use information services to identify well-known and up-to-date security gaps and secure these with appropriate hardware and software |
6. Provide and support backup security |
6.1. Scan and, if required, clean the network of viruses before back -up 6.2. Review security requirements for users and data to be stored on network 6.3. Determine risks to which data is exposed and provide appropriate prevention and recovery processes 6.4. Implement systems to provide back -up and service restoration capability in the event of a disaster 6.5. Document and disseminate the disaster recovery procedures |
Required Skills and Knowledge
REQUIRED SKILLS AND KNOWLEDGE |
This section describes the skills and knowledge required for this unit. |
Required skills |
|
Required knowledge |
|
Evidence Guide
EVIDENCE GUIDE |
|
The evidence guide provides advice on assessment and must be read in conjunction with the performance criteria, required skills and knowledge, range statement and the Assessment Guidelines for the Training Package. |
|
Overview of assessment |
|
Critical aspects for assessment and evidence required to demonstrate competency in this unit |
Evidence of the following is essential:
To demonstrate competency in this unit the learner will require access to:
|
Context of and specific resources for assessment |
Many organisations rely heavily on computer network infrastructure to enhance the efficiency of their activities. Consequently, it is imperative that their networks be maintained to reflect current design and usage and that no security breaches adversely affect the system. This requires constant monitoring and reviewing of the network, in order to keep up with new functionality, added workload in network traffic and new virus protection measures. The breadth, depth and complexity of knowledge and skills in this competency would cover selecting, adapting and transferring skills and knowledge to new environments and providing technical advice and some leadership in resolution of specified problems. This would be applied across a range of roles in a variety of contexts with some complexity in the extent and choice of options available. Assessment must ensure:
|
Method of assessment |
The purpose of this unit is to define the standard of performance to be achieved in the workplace. In undertaking training and assessment activities related to this unit, consideration should be given to the implementation of appropriate diversity and accessibility practices in order to accommodate people who may have special needs. Additional guidance on these and related matters is provided in ICA05 Section 1.
|
Guidance information for assessment |
Holistic assessment with other units relevant to the industry sector, workplace and job role is recommended, for example:
An individual demonstrating this competency would be able to:
Additionally, an individual demonstrating this competency would be able to:
|
Range Statement
RANGE STATEMENT |
|
The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included. |
|
Network may include but is not limited to: |
|
Appropriate person may include: |
|
Network operating system may include but is not limited to: |
|
Organisational policies may include but are not limited to: |
|
System may include but is not limited to: |
|
Components may include: |
|
Software may include but is not limited to: |
|
Hardware may include but is not limited to: |
|
User may include: |
|
Applications may include: |
|
File system may involve: |
|
Information services may include: |
|
Back -up may involve: |
|
Unit Sector(s)
Unit sector |
Support |
Co-requisite units
Co-requisite units |
||
Competency field
Competency field |