NTISthis.com

Evidence Guide: ICTNWK408 - Configure a desktop environment

Student: __________________________________________________

Signature: _________________________________________________

Tips for gathering evidence to demonstrate your skills

The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!

From the Wiki University

 

ICTNWK408 - Configure a desktop environment

What evidence can you provide to prove your understanding of each of the following citeria?

Prepare to install a desktop operating system

  1. Prepare for work according to site specific safety requirements and enterprise work health and safety (WHS) processes and procedures
  2. Obtain desktop applications and features from appropriate person
  3. Review required installation options and file systems
  4. Determine and apply knowledge of licensing, hardware and system requirements
  5. Analyse data migration requirements
  6. Backup local data in preparation for installation
  7. Arrange access to site and advise client of deployment and potential down times
Prepare for work according to site specific safety requirements and enterprise work health and safety (WHS) processes and procedures

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Obtain desktop applications and features from appropriate person

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Review required installation options and file systems

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Determine and apply knowledge of licensing, hardware and system requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Analyse data migration requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Backup local data in preparation for installation

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Arrange access to site and advise client of deployment and potential down times

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Install desktop operating system

  1. Install or upgrade desktop operating system using appropriate installation or update method
  2. Install desktop applications according to identified requirements
  3. Configure network settings to connect workstation to network
  4. Patch the operating system and applications to ensure maximum security and reliability
  5. Restore local data to new workstation
Install or upgrade desktop operating system using appropriate installation or update method

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Install desktop applications according to identified requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure network settings to connect workstation to network

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Patch the operating system and applications to ensure maximum security and reliability

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Restore local data to new workstation

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure desktop environment

  1. Configure hardware devices
  2. Administer user environment
  3. Create file and directory structure using appropriate administration and system tools
  4. Configure access to external data
  5. Configure desktop applications according to business requirements
Configure hardware devices

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Administer user environment

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Create file and directory structure using appropriate administration and system tools

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure access to external data

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure desktop applications according to business requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Operate command line interface

  1. Open a command line interface
  2. Run commands and scripts from the command line interface
  3. Manipulate files using the command line
Open a command line interface

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Run commands and scripts from the command line interface

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Manipulate files using the command line

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure desktop security

  1. Modify default user settings to ensure that they match organisational security policies
  2. Modify file and directory ownership and permissions to ensure data security requirements are met
  3. Ensure password security
  4. Check appropriate legal notices are displayed at logon
  5. Implement security options for network protocols
  6. Configure security settings for desktop applications according to business requirements
Modify default user settings to ensure that they match organisational security policies

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Modify file and directory ownership and permissions to ensure data security requirements are met

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Ensure password security

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Check appropriate legal notices are displayed at logon

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Implement security options for network protocols

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure security settings for desktop applications according to business requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Monitor and test the desktop

  1. Test desktop environment to ensure that client, functionality and performance requirements have been met
  2. Analyse and respond to diagnostic information
  3. Use troubleshooting tools and techniques to diagnose and correct desktop problems
  4. Document the desktop environment, according to organisational policy
Test desktop environment to ensure that client, functionality and performance requirements have been met

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Analyse and respond to diagnostic information

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Use troubleshooting tools and techniques to diagnose and correct desktop problems

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Document the desktop environment, according to organisational policy

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessed

Teacher: ___________________________________ Date: _________

Signature: ________________________________________________

Comments:

 

 

 

 

 

 

 

 

Instructions to Assessors

Evidence Guide

ELEMENT

PERFORMANCE CRITERIA

Elements describe the essential outcomes.

Performance criteria describe the performance needed to demonstrate achievement of the element.

1. Prepare to install a desktop operating system

1.1 Prepare for work according to site specific safety requirements and enterprise work health and safety (WHS) processes and procedures

1.2 Obtain desktop applications and features from appropriate person

1.3 Review required installation options and file systems

1.4 Determine and apply knowledge of licensing, hardware and system requirements

1.5 Analyse data migration requirements

1.6 Backup local data in preparation for installation

1.7 Arrange access to site and advise client of deployment and potential down times

2. Install desktop operating system

2.1 Install or upgrade desktop operating system using appropriate installation or update method

2.2 Install desktop applications according to identified requirements

2.3 Configure network settings to connect workstation to network

2.4 Patch the operating system and applications to ensure maximum security and reliability

2.5 Restore local data to new workstation

3. Configure desktop environment

3.1 Configure hardware devices

3.2 Administer user environment

3.3 Create file and directory structure using appropriate administration and system tools

3.4 Configure access to external data

3.5 Configure desktop applications according to business requirements

4. Operate command line interface

4.1 Open a command line interface

4.2 Run commands and scripts from the command line interface

4.3 Manipulate files using the command line

5. Configure desktop security

5.1 Modify default user settings to ensure that they match organisational security policies

5.2 Modify file and directory ownership and permissions to ensure data security requirements are met

5.3 Ensure password security

5.4 Check appropriate legal notices are displayed at logon

5.5 Implement security options for network protocols

5.6 Configure security settings for desktop applications according to business requirements

6. Monitor and test the desktop

6.1 Test desktop environment to ensure that client, functionality and performance requirements have been met

6.2 Analyse and respond to diagnostic information

6.3 Use troubleshooting tools and techniques to diagnose and correct desktop problems

6.4 Document the desktop environment, according to organisational policy

Required Skills and Knowledge

ELEMENT

PERFORMANCE CRITERIA

Elements describe the essential outcomes.

Performance criteria describe the performance needed to demonstrate achievement of the element.

1. Prepare to install a desktop operating system

1.1 Prepare for work according to site specific safety requirements and enterprise work health and safety (WHS) processes and procedures

1.2 Obtain desktop applications and features from appropriate person

1.3 Review required installation options and file systems

1.4 Determine and apply knowledge of licensing, hardware and system requirements

1.5 Analyse data migration requirements

1.6 Backup local data in preparation for installation

1.7 Arrange access to site and advise client of deployment and potential down times

2. Install desktop operating system

2.1 Install or upgrade desktop operating system using appropriate installation or update method

2.2 Install desktop applications according to identified requirements

2.3 Configure network settings to connect workstation to network

2.4 Patch the operating system and applications to ensure maximum security and reliability

2.5 Restore local data to new workstation

3. Configure desktop environment

3.1 Configure hardware devices

3.2 Administer user environment

3.3 Create file and directory structure using appropriate administration and system tools

3.4 Configure access to external data

3.5 Configure desktop applications according to business requirements

4. Operate command line interface

4.1 Open a command line interface

4.2 Run commands and scripts from the command line interface

4.3 Manipulate files using the command line

5. Configure desktop security

5.1 Modify default user settings to ensure that they match organisational security policies

5.2 Modify file and directory ownership and permissions to ensure data security requirements are met

5.3 Ensure password security

5.4 Check appropriate legal notices are displayed at logon

5.5 Implement security options for network protocols

5.6 Configure security settings for desktop applications according to business requirements

6. Monitor and test the desktop

6.1 Test desktop environment to ensure that client, functionality and performance requirements have been met

6.2 Analyse and respond to diagnostic information

6.3 Use troubleshooting tools and techniques to diagnose and correct desktop problems

6.4 Document the desktop environment, according to organisational policy

Evidence of the ability to:

install and configure a desktop operating system

attach the desktop to the network

configure the desktop operating system, including user accounts, file and print services, and security

perform backup and recovery

update operating system and software

monitor and troubleshoot the desktop environment.

Candidates should demonstrate competency in at least TWO different desktop operating systems.

To complete the unit requirements safely and effectively, the individual must:

outline the features of current desktop operating systems, applications, compatibility issues and the resolution procedures

summarise the configuration requirements of a desktop environment, including:

command line interface and scripts

controlling the boot process

error logging and reporting

file naming conventions related to selected operating system

network protocols and transmission control protocol or internet protocol (TCP/IP) network connectivity

operating systems and their functions, including file system, memory management and process scheduling

printer driver and queue management

process or task management, including process termination

tools available for remote assistance and administration

troubleshooting tools and techniques, including network diagnostic utilities

user account, group and password administration and guidelines for selecting a secure password

explain file system navigation and manipulation utilities, including:

edit, copy, move and search

operating system help and support utilities

summarise relevant work health and safety (WHS) and regulatory requirements for desktop operators.