Configuring and administering a network operating system
ICAS3120A
From the official document:
"This unit defines the competency required to create the network configuration required by a client and to set up and use administrative tools to manage the network."
Basically, that means ... (translate above into plain english)
After learning and applying the skills required by this unit you'll be able to demonstrate your skills in:
ELEMENT
PERFORMANCE CRITERIA
1. Review network policies
Review organisational policies for network use and administration arrangements
Identify network administration tools both built into the network operating system and third-party tools that can be used to enforce organisational polices
Determine and document settings and parameters that should be used in order to meet policies and procedures
Make necessary recommendations to appropriate person for ways of overcoming weaknesses in administration tools
2. Create an interface with existing system
Identify and document the current system and components and configuration through audits of hardware and software
Identify and map system interaction by identifying what data is required by particular users and how often the data is accessed
Examine existing applications and plan required upgrades/reconfigurations to new system or applications
Test reconfiguration for successful interface with existing system
3. Set up and manage the network file system
Evaluate the network requirements of the user and design an appropriate file and folder structure
Create the designed file and folder structure using appropriate administration and system tools
Set the security, access and sharing of file system to meet user requirements
Identify and implement the virus protection requirements for the network in line with organisational procedures
Test the file system to ensure that appropriate access is available to the user groups
Document the created file system in accordance with organisational standards
4. Manage user services
Evaluate the network requirements of the user and design an appropriate set of services that should be provided
Implement the services required by using the appropriate administration and system tools
Create users and groups as required to facilitate user security and network access in accordance with user authorisation
Test successful access by users to authorised network data and resources and record outcomes
5. Monitor user accounts
Modify default user settings to ensure that they match security policies
Modify existing user settings for non-compliant security according to security and access policies
Check that appropriate legal notices at log on are displayed
Use appropriate utilities to check strength of passwords
Review procedures and take action to ensure that users who leave the organisation or area have their accounts disabled or deleted
Use information services to identify well-known and up-to-date security gaps and secure these with appropriate hardware and software
6. Provide and support back up security
Scan and, if required, clean the network of viruses before back-up
Review security requirements for users and data to be stored on network
Determine risks to which data is exposed and provide appropriate prevention and recovery processes
Implement systems to provide back-up and service restoration capability in the event of a disaster
Document and disseminate the disaster recovery procedures
translate the above elements and performance criteria into plain english and summarise here...
If you are demonstrating this unit as part of a formal course, you might find that the unit is graded (meaning you can not only demonstrate your competence, but can also gain a credit or distinction). Your facilitator may already have set criteria that your college uses. If not, here are some ideas for possible credit/distinction activities that you can discuss with your facilitator: