Google Links
Follow the links below to find material targeted to the unit's elements, performance criteria, required skills and knowledge
Required Skills
convey and clarify information
develop and document network and data integrity processes
interpret and prepare technical documentation
record asset audit information
planning skills to develop methods for maintaining network and data integrity
apply solutions in networks including systems management processes
deploy rapid solutions to problems involving management of network assets
technical skills to apply current best practice to methodologies and technologies
auditing and control of user access
backup restore and rollback procedures
current antivirus solutions and techniques
system and network monitoring tools and related functions
client organisation structure and business functionality
tools and applications required to manage network and data integrity
Evidence Required
Range Statement
Security policies should include: | data securityphysical securityremote accessuser logon. |
Tools should include: | hardware and software audit tools:MSINFO32DXdiagMicrosoft Software Inventory Analyzer (MSIA)E-Z Audithardware and software logs. |
Assets may include: | company information and brandingcomputersdatapersonal informationservers. |
Antivirus may include: | AVGEICAR (test virus string)McAfeeMicrosoft Security EssentialsNorton Antivirus or EndpointTrendmicro. |
Environmental threats may include: | earthquakefirefloodpower failure, spike or surgetheft. |
Backup type must include: | copydifferentialfolder and drive synchronisationfull and normal incrementalRAID. |
Sync solution may include: | Folder SyncShadowprotectYadis. |
Network may include: | internetLANWANWLANs. |
Monitoring tools may include: | Microsoft server performance monitorWindows network monitorWindows performance monitorWindows resource monitorWindows task managerWireshark. |