Unit of Competency Mapping – Information for Teachers/Assessors – Information for Learners
UEENEED114A Mapping and Delivery Guide
Design and manage enterprise computer networks
Version 1.0
Issue Date: April 2024
Qualification | - |
Unit of Competency | UEENEED114A - Design and manage enterprise computer networks |
---|---|---|---|
Description | 1)Scope:1.1) DescriptorThis unit covers designing and managing enterprise computer networks. It encompasses safe working practices, the design and management of network and application services, core identity and access management components, directory services infrastructure components, designing physical and logical directory service topologies, designing a public key infrastructure (PKI), designing for business continuity and data availability, and documenting all design and management activities.Note: This unit applies to all aspects of Electrotechnology – engineering applications only. For general competencies related to Information Technologies refer to the latest endorsed IT Training Package. | ||
Employability Skills | 5) The required outcomes described in this unit of competency contain applicable facets of Employability Skills. The Employability Skills Summary of the qualification in which this unit of competency is packaged will assist in identifying Employability Skill requirements. | ||
Learning Outcomes and Application | 2)This unit applies to any recognised development program that leads to the acquisition of a formal award at AQF level 6. | ||
Duration and Setting | X weeks, nominally xx hours, delivered in a classroom/online/blended learning setting. |
||
Prerequisites/co-requisites | Prerequisite Unit(s)4) Competencies4.1)Granting competency in this unit shall be made only after competency in the following unit(s) has/have been confirmed.UEENEEE101A Apply Occupational Health Safety regulations, codes and practices in the workplaceLiteracy and numeracy skills4.2) Participants are best equipped to achieve competency in this unit if they have reading, writing and numeracy skills indicated by the following scales. Description of each scale is given in Volume 2, Part 3 ‘Literacy and Numeracy’Reading5Writing5Numeracy5 | ||
Competency Field |
Development and validation strategy and guide for assessors and learners | Student Learning Resources | Handouts Activities |
Slides PPT |
Assessment 1 | Assessment 2 | Assessment 3 | Assessment 4 | |
---|---|---|---|---|---|---|---|---|
Elements of Competency | Performance Criteria | |||||||
Element: Develop design for an enterprise network. |
| |||||||
Element: Design an enterprise network. |
| |||||||
Element: Implement and manage an enterprise network. |
| |||||||
Element: Diagnose network malfunctions. |
| |||||||
Element: Report network management activities. |
| |||||||
Element: Notes. | ||||||||
Element: Examples are company size, user and resource distribution, various site connectivity, bandwidth, service performance, availability and scalability, data and system access patterns, network roles and responsibilities and security considerations | ||||||||
Element: Examples are currently available resources, services, network infrastructure, protocols and hosts, Transmission Control Protocol and Internet Protocol hardware, planned upgrades, support and network and systems management. | ||||||||
Element: Examples of network infrastructure are topology, TCP/IP networking strategy, DHCP strategy, Design of name resolution services, Multi-protocol strategy and Distributed File Strategy | ||||||||
Element: Hardware installation includes using qualified tools, driver signing options, digital signatures on driver files and systems support for legacy hardware devices. | ||||||||
Element: Example of user and group objects are computer accounts, groups configuring accounts via a directory service, searching for objects, use of templates for creating user accounts and resetting accounts | ||||||||
Element: Examples of group policy implementation are deploying software, updates and assigning and publishing applications. | ||||||||
Element: Examples of directory services are publishing resources, performing searches and configuring printer objects | ||||||||
Element: Examples of data storage are NTFS and FAT file systems such as New Technology File Systems (NTFS) and File Allocation Table (FAT), quotas, Encrypting File Systems, configuring volumes and basic and dynamic disks, file and folder permissions and compression and domain-based distributed file systems. | ||||||||
Element: Examples of shared resources are folders, web sharing, folder permissions, printers and printer permissions. | ||||||||
Element: Examples of Internet Information Services are virtual directories and servers, Internet and intranet browsing, authentication and Secure Sockets Layer (SSL), File Transfer Protocol (FTP) services and access permissions for intranet server | ||||||||
Element: Examples of Network security are user account lockout settings, password management, Group Policy to run logon scripts and link objects, auditing and security log file. | ||||||||
Element: Examples of network operations are routing TCP/IP, DHCP, Domain Name Service, name resolution, starting servers, client computers, User and group objects, directory service replication problems, End-User Group Policy and remote access. |