Prerequisites
Elements and Performance Criteria
ELEMENT | PERFORMANCE CRITERIA |
1. Review network policies | 1.1. Review organisational policies for network use and administration arrangements 1.2. Identify network administration tools both built into the network operating system and third-party tools that can be used to enforce organisationalpolices 1.3. Determine and document settings and parameters that should be used in order to meet policies and procedures 1.4. Make necessary recommendations to appropriate person for ways of overcoming weaknesses in administration tools |
2. Create an interface with existing system | 2.1. Identify and document the current system and components and configuration through audits of hardware and software 2.2. Identify and map system interaction by identifying what data is required by particular users and how often the data is accessed 2.3. Examine existing applications and plan required upgrades/reconfigurations to new system or applications 2.4. Test reconfiguration for successful interface with existing system |
3. Set up and manage the network file system | 3.1. Evaluate the network requirements of the user and design an appropriate file and folder structure 3.2. Create the designed file and folder structure using appropriate administration and system tools 3.3. Set the security, access and sharing of file system to meet user requirements 3.4. Identify and implement the virus protection requirements for the network in line with organisational procedures 3.5. Test the file system to ensure that appropriate access is available to the user groups 3.6. Document the created file system in accordance with organisational standards |
4. Manage user services | 4.1. Evaluate the network requirements of the user and design an appropriate set of services that should be provided 4.2. Implement the services required by using the appropriate administration and system tools 4.3. Create users and groups as required to facilitate user security and network access in accordance with user authorisation 4.4. Test successful access by users to authorised network data and resources and record outcomes |
5. Monitor user accounts | 5.1. Modify default user settings to ensure that they match security policies 5.2. Modify existing user settings for non-compliant security according to security and access policies 5.3. Check that appropriate legal notices at log on are displayed 5.4. Use appropriate utilities to check strength of passwords 5.5. Review procedures and take action to ensure that users who leave the organisation or area have their accounts disabled or deleted 5.6. Use information services to identify well-known and up-to-date security gaps and secure these with appropriate hardware and software |
6. Provide and support backup security | 6.1. Scan and, if required, clean the network of viruses before back-up 6.2. Review security requirements for users and data to be stored on network 6.3. Determine risks to which data is exposed and provide appropriate prevention and recovery processes 6.4. Implement systems to provide back-up and service restoration capability in the event of a disaster 6.5. Document and disseminate the disaster recovery procedures |
Required Skills
Required skills |
Effective communication skills in relation to dealing with clients and team members (e.g. informing a client of certain technical procedures, such as virus checking a disk), with the ability to adapt the explanation of technical concepts to the level that is appropriate to the background knowledge of the client Administering and configuring network operating system Being able to undertake open-ended questioning techniques and to exercise active listening skills in relation to dealing with clients and team members (e.g. eliciting information for network troubleshooting) |
Required knowledge |
Network operating systems that are currently industry standards, and knowing where to access the various system administration tools, as well as third-party tools that may be useful for monitoring various aspects of network performance or traffic Networking technologies, with broad knowledge of their general features and capabilities (e.g. AppleTalk, Ethernet, Novell, Linux) How network security is implemented in a LAN, such as users and groups settings, as well as setting file and folder permissions How anti-virus software operates, how to install it and the importance of undertaking regular and timely updates, such as that of the virus data file or a newer version of the virus search engine |
Evidence Required
The evidence guide provides advice on assessment and must be read in conjunction with the performance criteria, required skills and knowledge, range statement and the Assessment Guidelines for the Training Package. | |
Overview of assessment | |
Critical aspects for assessment and evidence required to demonstrate competency in this unit | Evidence of the following is essential: Assessment must confirm knowledge of the facilities available in the operating environment. Assessment must confirm the ability to use network administrative tools and manage a network. Assessment must confirm the ability to create the network configuration required by the client and provide timely client service. To demonstrate competency in this unit the learner will require access to: User network requirements Network administration tools Access policy Live network Server |
Context of and specific resources for assessment | Many organisations rely heavily on computer network infrastructure to enhance the efficiency of their activities. Consequently, it is imperative that their networks be maintained to reflect current design and usage and that no security breaches adversely affect the system. This requires constant monitoring and reviewing of the network, in order to keep up with new functionality, added workload in network traffic and new virus protection measures. The breadth, depth and complexity of knowledge and skills in this competency would cover selecting, adapting and transferring skills and knowledge to new environments and providing technical advice and some leadership in resolution of specified problems. This would be applied across a range of roles in a variety of contexts with some complexity in the extent and choice of options available. Assessment must ensure: Performance of a defined range of skilled operations, usually within a range of broader related activities involving known routines, methods and procedures, where some discretion and judgement is required in the section of equipment, services or contingency measures and within known time constraints would be characteristic. Applications may involve some responsibility for others. Participation in teams including group or team coordination may be involved. |
Method of assessment | The purpose of this unit is to define the standard of performance to be achieved in the workplace. In undertaking training and assessment activities related to this unit, consideration should be given to the implementation of appropriate diversity and accessibility practices in order to accommodate people who may have special needs. Additional guidance on these and related matters is provided in ICA05 Section 1. Competency in this unit should be assessed using summative assessment to ensure consistency of performance in a range of contexts. This unit can be assessed either in the workplace or in a simulated environment. However, simulated activities must closely reflect the workplace to enable full demonstration of competency. Assessment will usually include observation of real or simulated work processes and procedures and/or performance in a project context as well as questioning on underpinning knowledge and skills. The questioning of team members, supervisors, subordinates, peers and clients where appropriate may provide valuable input to the assessment process. The interdependence of units for assessment purposes may vary with the particular project or scenario. |
Guidance information for assessment | Holistic assessment with other units relevant to the industry sector, workplace and job role is recommended, for example: ICAT3025B Run standard diagnostic tests An individual demonstrating this competency would be able to: Demonstrate relevant administration skills and an understanding of the theoretical knowledge underpinning the network operating system Apply a range of well-developed configuration skills to resolve problems Apply known solutions to a variety of predictable configuration problems Interpret available network systems knowledge and information, using discretion and judgement Additionally, an individual demonstrating this competency would be able to: Demonstrate some relevant theoretical knowledge Apply a range of well-developed skills Apply known solutions to a variety of predictable problems Perform processes that require a range of well-developed skills where some discretion and judgement is required Interpret available information, using discretion and judgement Take responsibility for own outputs in work and learning Take limited responsibility for the output of others Maintain knowledge of industry products and services |
Range Statement
The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included. | |
Network may include but is not limited to: | large and small LANs WANs VPNs the internet the use of the PSTN for dial-up modems only private lines data voice |
Appropriate person may include: | supervisor teacher authorised business representative client |
Network operating system may include but is not limited to: | Novell NetWare 5 or above or any operating system that has multi-user ability Linux Mac OS Windows 2000 or above |
Organisational policies may include but are not limited to: | how and what the organisation will operate maintenance policy security policy diagnostic policy OH&S policy |
System may include but is not limited to: | network software business computers financial system management system information system |
Components may include: | motherboards CMOS battery central processing unit (CPU) CD and DVD drives interface cards drives fax/modem cards RAM upgrades CPU upgrades |
Software may include but is not limited to: | Commercial, in-house, packaged or customised software |
Hardware may include but is not limited to: | workstations personal computers modems or other connectivity devices networks DSL modems remote sites servers |
User may include: | a person within a department a department within the organisation a third party |
Applications may include: | database programs word processors email programs internet browsers system browsers spreadsheets |
File system may involve: | multiple or single servers multiple or single logical disks and complex directory folder structures |
Informationservices may include: | internet chat rooms forums newsgroups |
Back-up may involve: | simple, single tape unit back-up to more comprehensive and complex back-up facilities across the network |
Sectors
Unit sector | Support |
Employability Skills
This unit contains employability skills. |
Licensing Information
Refer to Unit Descriptor