Unit of Competency Mapping – Information for Teachers/Assessors – Information for Learners

ICAS3120C Mapping and Delivery Guide
Configure and administer a network operating system

Version 1.0
Issue Date: April 2024


Qualification -
Unit of Competency ICAS3120C - Configure and administer a network operating system
Description This unit defines the competency required to create the network configuration required by a client and to set up and use administrative tools to manage the network.The following units are linked and form an appropriate cluster:ICAT3025B Run standard diagnostic testsNo licensing, legislative, regulatory or certification requirements apply to this unit at the time of publication.
Employability Skills This unit contains employability skills.
Learning Outcomes and Application
Duration and Setting X weeks, nominally xx hours, delivered in a classroom/online/blended learning setting.
Prerequisites/co-requisites ICAI3020B Install and optimise operating system software ICAS3032B Provide network systems administration
Competency Field
Development and validation strategy and guide for assessors and learners Student Learning Resources Handouts
Activities
Slides
PPT
Assessment 1 Assessment 2 Assessment 3 Assessment 4
Elements of Competency Performance Criteria              
Element: Review network policies
  • Review organisational policies for network use and administration arrangements
  • Identify network administration tools both built into the network operating system and third-party tools that can be used to enforce organisationalpolices
  • Determine and document settings and parameters that should be used in order to meet policies and procedures
  • Make necessary recommendations to appropriate person for ways of overcoming weaknesses in administration tools
       
Element: Create an interface with existing system
  • Identify and document the current system and components and configuration through audits of hardware and software
  • Identify and map system interaction by identifying what data is required by particular users and how often the data is accessed
  • Examine existing applications and plan required upgrades/reconfigurations to new system or applications
  • Test reconfiguration for successful interface with existing system
       
Element: Set up and manage the network file system
  • Evaluate the network requirements of the user and design an appropriate file and folder structure
  • Create the designed file and folder structure using appropriate administration and system tools
  • Set the security, access and sharing of file system to meet user requirements
  • Identify and implement the virus protection requirements for the network in line with organisational procedures
  • Test the file system to ensure that appropriate access is available to the user groups
  • Document the created file system in accordance with organisational standards
       
Element: Manage user services
  • Evaluate the network requirements of the user and design an appropriate set of services that should be provided
  • Implement the services required by using the appropriate administration and system tools
  • Create users and groups as required to facilitate user security and network access in accordance with user authorisation
  • Test successful access by users to authorised network data and resources and record outcomes
       
Element: Monitor user accounts
  • Modify default user settings to ensure that they match security policies
  • Modify existing user settings for non-compliant security according to security and access policies
  • Check that appropriate legal notices at log on are displayed
  • Use appropriate utilities to check strength of passwords
  • Review procedures and take action to ensure that users who leave the organisation or area have their accounts disabled or deleted
  • Use information services to identify well-known and up-to-date security gaps and secure these with appropriate hardware and software
       
Element: Provide and support backup security
  • Scan and, if required, clean the network of viruses before back-up
  • Review security requirements for users and data to be stored on network
  • Determine risks to which data is exposed and provide appropriate prevention and recovery processes
  • Implement systems to provide back-up and service restoration capability in the event of a disaster
  • Document and disseminate the disaster recovery procedures
       


Evidence Required

List the assessment methods to be used and the context and resources required for assessment. Copy and paste the relevant sections from the evidence guide below and then re-write these in plain English.

The evidence guide provides advice on assessment and must be read in conjunction with the performance criteria, required skills and knowledge, range statement and the Assessment Guidelines for the Training Package.

Overview of assessment

Critical aspects for assessment and evidence required to demonstrate competency in this unit

Evidence of the following is essential:

Assessment must confirm knowledge of the facilities available in the operating environment.

Assessment must confirm the ability to use network administrative tools and manage a network.

Assessment must confirm the ability to create the network configuration required by the client and provide timely client service.

To demonstrate competency in this unit the learner will require access to:

User network requirements

Network administration tools

Access policy

Live network

Server

Context of and specific resources for assessment

Many organisations rely heavily on computer network infrastructure to enhance the efficiency of their activities. Consequently, it is imperative that their networks be maintained to reflect current design and usage and that no security breaches adversely affect the system. This requires constant monitoring and reviewing of the network, in order to keep up with new functionality, added workload in network traffic and new virus protection measures.

The breadth, depth and complexity of knowledge and skills in this competency would cover selecting, adapting and transferring skills and knowledge to new environments and providing technical advice and some leadership in resolution of specified problems. This would be applied across a range of roles in a variety of contexts with some complexity in the extent and choice of options available.

Assessment must ensure:

Performance of a defined range of skilled operations, usually within a range of broader related activities involving known routines, methods and procedures, where some discretion and judgement is required in the section of equipment, services or contingency measures and within known time constraints would be characteristic.

Applications may involve some responsibility for others. Participation in teams including group or team coordination may be involved.

Method of assessment

The purpose of this unit is to define the standard of performance to be achieved in the workplace. In undertaking training and assessment activities related to this unit, consideration should be given to the implementation of appropriate diversity and accessibility practices in order to accommodate people who may have special needs. Additional guidance on these and related matters is provided in ICA05 Section 1.

Competency in this unit should be assessed using summative assessment to ensure consistency of performance in a range of contexts. This unit can be assessed either in the workplace or in a simulated environment. However, simulated activities must closely reflect the workplace to enable full demonstration of competency.

Assessment will usually include observation of real or simulated work processes and procedures and/or performance in a project context as well as questioning on underpinning knowledge and skills. The questioning of team members, supervisors, subordinates, peers and clients where appropriate may provide valuable input to the assessment process. The interdependence of units for assessment purposes may vary with the particular project or scenario.

Guidance information for assessment

Holistic assessment with other units relevant to the industry sector, workplace and job role is recommended, for example:

ICAT3025B Run standard diagnostic tests

An individual demonstrating this competency would be able to:

Demonstrate relevant administration skills and an understanding of the theoretical knowledge underpinning the network operating system

Apply a range of well-developed configuration skills to resolve problems

Apply known solutions to a variety of predictable configuration problems

Interpret available network systems knowledge and information, using discretion and judgement

Additionally, an individual demonstrating this competency would be able to:

Demonstrate some relevant theoretical knowledge

Apply a range of well-developed skills

Apply known solutions to a variety of predictable problems

Perform processes that require a range of well-developed skills where some discretion and judgement is required

Interpret available information, using discretion and judgement

Take responsibility for own outputs in work and learning

Take limited responsibility for the output of others

Maintain knowledge of industry products and services


Submission Requirements

List each assessment task's title, type (eg project, observation/demonstration, essay, assignment, checklist) and due date here

Assessment task 1: [title]      Due date:

(add new lines for each of the assessment tasks)


Assessment Tasks

Copy and paste from the following data to produce each assessment task. Write these in plain English and spell out how, when and where the task is to be carried out, under what conditions, and what resources are needed. Include guidelines about how well the candidate has to perform a task for it to be judged satisfactory.

Required skills

Effective communication skills in relation to dealing with clients and team members (e.g. informing a client of certain technical procedures, such as virus checking a disk), with the ability to adapt the explanation of technical concepts to the level that is appropriate to the background knowledge of the client

Administering and configuring network operating system

Being able to undertake open-ended questioning techniques and to exercise active listening skills in relation to dealing with clients and team members (e.g. eliciting information for network troubleshooting)

Required knowledge

Network operating systems that are currently industry standards, and knowing where to access the various system administration tools, as well as third-party tools that may be useful for monitoring various aspects of network performance or traffic

Networking technologies, with broad knowledge of their general features and capabilities (e.g. AppleTalk, Ethernet, Novell, Linux)

How network security is implemented in a LAN, such as users and groups settings, as well as setting file and folder permissions

How anti-virus software operates, how to install it and the importance of undertaking regular and timely updates, such as that of the virus data file or a newer version of the virus search engine

The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included.

Network may include but is not limited to:

large and small LANs

WANs

VPNs

the internet

the use of the PSTN for dial-up modems only

private lines

data

voice

Appropriate person may include:

supervisor

teacher

authorised business representative

client

Network operating system may include but is not limited to:

Novell NetWare 5 or above or any operating system that has multi-user ability

Linux

Mac OS

Windows 2000 or above

Organisational policies may include but are not limited to:

how and what the organisation will operate

maintenance policy

security policy

diagnostic policy

OH&S policy

System may include but is not limited to:

network

software

business

computers

financial system

management system

information system

Components may include:

motherboards

CMOS battery

central processing unit (CPU)

CD and DVD drives

interface cards

drives

fax/modem cards

RAM upgrades

CPU upgrades

Software may include but is not limited to:

Commercial, in-house, packaged or customised software

Hardware may include but is not limited to:

workstations

personal computers

modems or other connectivity devices

networks

DSL modems

remote sites

servers

User may include:

a person within a department

a department within the organisation

a third party

Applications may include:

database programs

word processors

email programs

internet browsers

system browsers

spreadsheets

File system may involve:

multiple or single servers

multiple or single logical disks and complex directory

folder structures

Informationservices may include:

internet

chat rooms

forums

newsgroups

Back-up may involve:

simple, single tape unit back-up to more comprehensive and complex back-up facilities across the network

Copy and paste from the following performance criteria to create an observation checklist for each task. When you have finished writing your assessment tool every one of these must have been addressed, preferably several times in a variety of contexts. To ensure this occurs download the assessment matrix for the unit; enter each assessment task as a column header and place check marks against each performance criteria that task addresses.

Observation Checklist

Tasks to be observed according to workplace/college/TAFE policy and procedures, relevant legislation and Codes of Practice Yes No Comments/feedback
Review organisational policies for network use and administration arrangements 
Identify network administration tools both built into the network operating system and third-party tools that can be used to enforce organisationalpolices 
Determine and document settings and parameters that should be used in order to meet policies and procedures 
Make necessary recommendations to appropriate person for ways of overcoming weaknesses in administration tools 
Identify and document the current system and components and configuration through audits of hardware and software 
Identify and map system interaction by identifying what data is required by particular users and how often the data is accessed 
Examine existing applications and plan required upgrades/reconfigurations to new system or applications 
Test reconfiguration for successful interface with existing system 
Evaluate the network requirements of the user and design an appropriate file and folder structure 
Create the designed file and folder structure using appropriate administration and system tools 
Set the security, access and sharing of file system to meet user requirements 
Identify and implement the virus protection requirements for the network in line with organisational procedures 
Test the file system to ensure that appropriate access is available to the user groups 
Document the created file system in accordance with organisational standards 
Evaluate the network requirements of the user and design an appropriate set of services that should be provided 
Implement the services required by using the appropriate administration and system tools 
Create users and groups as required to facilitate user security and network access in accordance with user authorisation 
Test successful access by users to authorised network data and resources and record outcomes 
Modify default user settings to ensure that they match security policies 
Modify existing user settings for non-compliant security according to security and access policies 
Check that appropriate legal notices at log on are displayed 
Use appropriate utilities to check strength of passwords 
Review procedures and take action to ensure that users who leave the organisation or area have their accounts disabled or deleted 
Use information services to identify well-known and up-to-date security gaps and secure these with appropriate hardware and software 
Scan and, if required, clean the network of viruses before back-up 
Review security requirements for users and data to be stored on network 
Determine risks to which data is exposed and provide appropriate prevention and recovery processes 
Implement systems to provide back-up and service restoration capability in the event of a disaster 
Document and disseminate the disaster recovery procedures 

Forms

Assessment Cover Sheet

ICAS3120C - Configure and administer a network operating system
Assessment task 1: [title]

Student name:

Student ID:

I declare that the assessment tasks submitted for this unit are my own work.

Student signature:

Result: Competent Not yet competent

Feedback to student

 

 

 

 

 

 

 

 

Assessor name:

Signature:

Date:


Assessment Record Sheet

ICAS3120C - Configure and administer a network operating system

Student name:

Student ID:

Assessment task 1: [title] Result: Competent Not yet competent

(add lines for each task)

Feedback to student:

 

 

 

 

 

 

 

 

Overall assessment result: Competent Not yet competent

Assessor name:

Signature:

Date:

Student signature:

Date: