T141 Computer Systems Technician MTCU Code Program Learning Outcomes

Size: px
Start display at page:

Download "T141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes"

Transcription

1 T141 Computer Systems Technician MTCU Code Program Learning Outcomes Synopsis of the Vocational Learning Outcomes * The graduate has reliably demonstrated the ability to 1. analyze and resolve information technology problems through the application of systematic approaches and diagnostic tools. 2. support the implementation and administration of computer systems. 3. support the implementation and administration of networking solutions. 4. install, configure, troubleshoot, maintain, and upgrade components of computer systems. 5. install, configure, troubleshoot, maintain, and upgrade components of networks. 6. use a variety of scripting tools and languages to automate routine tasks. 7. follow, monitor, and document data storage procedures designed to ensure the integrity of information. 8. apply knowledge of security issues to the implementation of information technology solutions. 9. provide efficient and effective technical support to clients in a manner that promotes safe computing practices and reduces the risk of the issue recurring. 10. conform to workplace expectations found in information technology (IT) environments. 11. contribute to the successful completion of the project applying the project management principles in use. ELEMENTS OF PERFORMANCE 1. The graduate has reliably demonstrated the ability to analyze and resolve information technology problems through the application of systematic approaches and diagnostic tools. 1.1 Analyze information technology problems and formulate solutions (e.g., hardware, software, operating systems, communications, process- related) 1.2 Implement a variety of systematic troubleshooting methodologies 1.3 Research and determine an appropriate course of action 1.4 Develop and follow appropriate procedures and methodologies to resolve problems effectively and minimize risk of recurrence 1.5 Monitor, review, and assess the effectiveness of the solution 1.6 Document the problem and solution and communicate results with others 1.7 Minimize risk to client 1.8 Use a variety of troubleshooting tools

2 1.9 Implement solution in a timely and low- impact fashion 2. The graduate has reliably demonstrated the ability to support the implementation and administration of computer systems. 2.1 Use a variety of data gathering techniques (e.g., research, interviewing) 2.2 Conduct a needs assessment and determine requirements for components of computer systems 2.3 Apply knowledge of a variety of architectures to integrate the components of computer systems 2.4 Apply knowledge of a variety of hardware platforms and operating systems to the implementation and administration of computer systems 2.5 Select and use appropriate tools and techniques to monitor and test the effectiveness of a system 2.6 Produce, present, and maintain clear, accurate, systems- and project-related documents, including detailed diagrams 3. The graduate has reliably demonstrated the ability to support the implementation and administration of networking solutions. 3.1 Use a variety of data gathering tools and techniques (e.g., research, interviewing) 3.2 Conduct a needs assessment and determine requirements for components of a network 3.3 Apply knowledge of computer connectivity, networks, and telecommunications to the implementation of networks (e.g., Internet, Intranet, local area networks, wide area networks, wireless devices, Voice Over IP) 3.4 Apply knowledge of a variety of hardware platforms and operating systems to the implementation and administration of networks 3.5 Select and use appropriate tools and techniques to monitor and test the effectiveness of a network 3.6 Produce, present, and maintain clear, accurate, networks- and project- related documents, including detailed diagrams 3.7 Apply knowledge of various services available to fulfill the needs of the transmission of data while managing costs 3.8 Apply knowledge of Quality of Service (QoS) 3.9 Recognize and use electrical, construction, and telecommunication codes and standards in the implementation of networking solutions 3.10 Apply knowledge of network security to the implementation and administration of networking solutions 3.11 Support the deployment and administration of services within a networked environment 4. The graduate has reliably demonstrated the ability to install, configure, troubleshoot, maintain, and upgrade components of computer systems.

3 4.1 Use troubleshooting techniques and applied knowledge of a variety of computer components to resolve technical problems 4.2 Modify and upgrade computer systems to adapt to the changing technological and organizational environment 4.3 Install and configure a variety of client and server software applications 4.4 Recognize and use a variety of file types 4.5 Select and use standard tools, techniques, and equipment to implement and troubleshoot computer systems 4.6 Install, configure, and support applications used in the workplace such as database management, word processing, spreadsheet, graphics, and communication software 4.7 Acquire and use relevant technical information from a variety of sources (e.g., technical manuals, online support, help desks) 4.8 Follow preventive maintenance procedures 4.9 Document existing and newly implemented configurations and user settings while ensuring the maintenance of historical documentation 5. The graduate has reliably demonstrated the ability to install, configure, troubleshoot, maintain, and upgrade components of networks. 5.1 Use troubleshooting techniques and applied knowledge of a variety of network components and network management services to resolve technical problems 5.2 Modify and upgrade networks to adapt to the changing technological and organizational environment 5.3 Install and configure a variety of client and server remote- access software applications 5.4 Select and use standard tools, techniques, and equipment to implement and troubleshoot network components 5.5 Apply knowledge of the basic functions of network administration 5.6 Acquire and use relevant technical information from a variety of sources (e.g., technical manuals, online support, help desks) 5.7 Consider the security implications of integrating information technology into global networks 5.8 Document the modification and monitor its effect on network performance 5.9 Follow schedules of maintenance 6. The graduate has reliably demonstrated the ability to use a variety of scripting tools and languages to automate routine tasks. 6.1 Apply basic knowledge of relevant scripting tools and techniques 6.2 Use a variety of strategies to resolve routine scripting problems 6.3 Apply basic knowledge of a variety of scripting languages 6.4 Apply knowledge of new and current development tools 6.5 Assess, select, and use appropriate tools and techniques to develop and maintain administrative scripts and task automation 6.6 Provide clear and accurate comments on the script 6.7 Apply knowledge of automation tools to deploy and migrate software applications and user configurations

4 7. The graduate has reliably demonstrated the ability to follow, monitor, and document data storage procedures designed to ensure the integrity of information. 7.1 Maintain infrastructure to capture, store, and update information 7.2 Implement and maintain data storage and retrieval systems 7.3 Implement strategies for backup and recovery of information 7.4 Apply information security protocols and procedures 7.5 Follow schedules for archiving of data 7.6 Recover user data from storage back- up 7.7 Follow established procedures for incident response and data recovery, should the need arise 8. The graduate has reliably demonstrated the ability to apply knowledge of security issues to the implementation of information technology solutions. 8.1 Apply knowledge of software and hardware firewalls 8.2 Apply knowledge of anti- virus and anti- spamming software 8.3 Seek out and remove malicious software (e.g., viruses, worms, trojan horses, spyware, ad- ware) that affects the reliability of IT resources 8.4 Monitor host behaviour and network activity with a view to ensuring a secure environment 8.5 Conduct security updates minimizing client downtime 8.6 Recognize the role of physical security in the implementation of information technology solutions 8.7 Follow procedures and policies for keeping security software up- to- date 8.8 Apply knowledge of network services (e.g., e- mail, shares, Voice Over IP) to minimize security threats to the organization 8.9 Assess security risks created through the implementation of new information technology solutions 8.10 Manage sensitive information held by the organization according to its assigned classification 8.11 Apply knowledge of intrusion detection and prevention to networking environments 8.12 Assist in evaluating and enforcing security- related policies and documents 8.13 Apply knowledge of remote- access and wireless technologies to allow secure remote access to the network and its resources 9. The graduate has reliably demonstrated the ability to provide efficient and effective technical support to clients in a manner that promotes safe computing practices and reduces the risk of the issue recurring. 9.1 Promote an environment of effective communication 9.2 Respond to client inquiries promptly 9.3 Maintain professional and honest relationships with clients 9.4 Apply knowledge of proper client service to the maintenance of client relationship 9.5 Work to ensure satisfactory realization of client s expectations 9.6 Recognize personal limits and seek assistance in a timely manner to resolve problems beyond own knowledge and skills

5 9.7 Incorporate practical education of clients in the resolution of the issue 9.8 Support the sales function 9.9 Field calls and inquiries 9.10 Identify relevant issues in reported information 9.11 Express problem and solution in non- technical language 9.12 Solicit information from clients respectfully and tactfully 9.13 Use judgement to balance organizational policies and procedures regarding technical support and the level of client knowledge 9.14 Educate client on alternative and reliable sources of support information (e.g., 9.15 FAQs, knowledge bases, online support) should the issue recur 9.16 Report and document incidents breaching service- level agreements (e.g., 24/7 support, % uptime) 9.17 Document, with appropriate level of detail, each instance of customer support 9.18 Maintain appropriate case- by- case documentation of the solution applied 10. The graduate has reliably demonstrated the ability to conform to workplace expectations found in information technology (IT) environments Recognize personal limits and seek assistance in a timely manner to resolve problems beyond own knowledge and skills 10.2 Use language and terminology suited to the context 10.3 Use electronic communication methods appropriately 10.4 Keep abreast of relevant technological change 10.5 Adhere to ethical principles and standards 10.6 Follow organizational policies and procedures 10.7 Identify guidelines set by appropriate organizations and bodies that prescribe quality programs, practices, processes, and procedures which apply to information technology environments 10.8 Ensure quality of assigned work 10.9 Comply with software licensing requirements Make appropriate use of IT resources in the workplace Adhere to safe computing practices Follow existing confidentiality, privacy, and reporting regulations as they apply to daily work Function within the boundaries of established organizational policy, as well as legal and legislative requirements 11. The graduate has reliably demonstrated the ability to contribute to the successful completion of the project applying the project management principles in use Participate in the planning, identification, scheduling, and assigning of tasks and resources involved in a project as required 11.2 Contribute to the monitoring of resources and expenditures to maintain cost effectiveness and timelines as required 11.3 Consolidate project updates regularly 11.4 Estimate accurately the time required to complete project elements

6 11.5 Complete project elements according to schedule 11.6 Interpret and use project- planning documents (e.g., Gantt Charts, Critical Path 11.7 Analysis Charts, PERT Charts) 11.8 Identify problems that will affect the project timeline and recommend changes as soon as possible 11.9 Maintain current, clear, and accurate project- related documents which adhere to organizational and industry standards and procedures Use project management software *Source Extracted from Provincial Vocational Outcomes 2006

Computer Systems Technician Program Standard

Computer Systems Technician Program Standard Computer Systems Technician Program Standard The approved program standard for all Computer Systems Technician programs of instruction leading to an Ontario College Diploma delivered by Ontario Colleges

More information

Computer Systems Technology Program Standard

Computer Systems Technology Program Standard Computer Systems Technology Program Standard The approved program standard for all Computer Systems Technology programs of instruction leading to an Ontario College Advanced Diploma delivered by Ontario

More information

Sample Career Ladder/Lattice for Information Technology

Sample Career Ladder/Lattice for Information Technology Click on a job title to see examples of descriptive information about the job. Click on a link between job titles to see the critical development experiences needed to move to that job on the pathway.

More information

B130 Business Administration- Finance MTCU code - 60201 Program Learning Outcomes

B130 Business Administration- Finance MTCU code - 60201 Program Learning Outcomes B130 Business Administration- Finance MTCU code - 60201 Program Learning Outcomes Synopsis of the Vocational Learning Outcomes* The graduate has reliably demonstrated the ability to 1. co- ordinate the

More information

Certified Information Systems Auditor (CISA)

Certified Information Systems Auditor (CISA) Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the

More information

INFORMATION SYSTEMS (IS) NETWORK SERVICES TITLE SERIES DEFINITIONS

INFORMATION SYSTEMS (IS) NETWORK SERVICES TITLE SERIES DEFINITIONS INFORMATION SYSTEMS (IS) NETWORK SERVICES TITLE SERIES DEFINITIONS Effective Date: July 1, 2015 I. DEFINITIONS A. Identifying the Correct Job Family This section defines duties performed by positions appropriately

More information

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination

More information

Updating the International Standard Classification of Occupations (ISCO) Draft ISCO-08 Group Definitions: Occupations in ICT

Updating the International Standard Classification of Occupations (ISCO) Draft ISCO-08 Group Definitions: Occupations in ICT InternationalLabourOrganization OrganisationinternationaleduTravail OrganizaciónInternacionaldelTrabajo Updating the International Standard Classification of Occupations (ISCO) Draft ISCO-08 Group Definitions:

More information

Supplier Security Assessment Questionnaire

Supplier Security Assessment Questionnaire HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.

More information

INFORMATION TECHNOLOGY ENGINEER V

INFORMATION TECHNOLOGY ENGINEER V 1464 INFORMATION TECHNOLOGY ENGINEER V NATURE AND VARIETY OF WORK This is senior level lead administrative, professional and technical engineering work creating, implementing, and maintaining the County

More information

T146 Electro Mechanical Engineering Technician MTCU Code 51021 Program Learning Outcomes

T146 Electro Mechanical Engineering Technician MTCU Code 51021 Program Learning Outcomes T146 Electro Mechanical Engineering Technician MTCU Code 51021 Program Learning Outcomes Synopsis of the Vocational Learning Outcomes* The graduate has reliably demonstrated the ability to: 1. fabricate

More information

Computer Engineering Technician Program Standard

Computer Engineering Technician Program Standard Computer Engineering Technician Program Standard The approved program standard for all Computer Engineering Technician programs of instruction leading to an Ontario College Diploma delivered by Ontario

More information

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model--- ---Information Technology (IT) Specialist (GS-2210) IT Security Model--- TECHNICAL COMPETENCIES Computer Forensics Knowledge of tools and techniques pertaining to legal evidence used in the analysis of

More information

Information Technology Hardware Technician

Information Technology Hardware Technician Apprenticeship Training Schedule Schedule of off the job courses Information Technology Hardware Technician Trade Code: 634B Course Summary Level 1 - Common Core S0791.0 Information Technology Contact

More information

Computer and Information Science

Computer and Information Science Computer and Information Science www.odessa.edu/dept/computer Faculty: Katrieva Jones- Munroe, chair The computer information systems curriculum provides students with practical, job- related computer

More information

CLASS SPECIFICATION Systems Support Analyst II

CLASS SPECIFICATION Systems Support Analyst II San Diego Unified Port District Class Code: B211-UE03 CLASS SPECIFICATION Systems Support Analyst II FLSA Status: EEOC Job Category: Classified: Union Representation: Exempt Professionals No Unrepresented

More information

Information Technology Engineers Examination. Network Specialist Examination. (Level 4) Syllabus. Details of Knowledge and Skills Required for

Information Technology Engineers Examination. Network Specialist Examination. (Level 4) Syllabus. Details of Knowledge and Skills Required for Information Technology Engineers Examination Network Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination Version 2.0

More information

Domain 1 The Process of Auditing Information Systems

Domain 1 The Process of Auditing Information Systems Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge

More information

B126 Business Administration Project Management MTCU code - 60200 Program Learning Outcomes

B126 Business Administration Project Management MTCU code - 60200 Program Learning Outcomes B126 Business Administration Project Management MTCU code - 60200 Program Learning Outcomes Synopsis of the Vocational Learning Outcomes The graduate has reliably demonstrated the ability to 1. evaluate

More information

C115 Office Administration - Medical MTCU Code 52308 Program Learning Outcomes

C115 Office Administration - Medical MTCU Code 52308 Program Learning Outcomes C115 Office Administration - Medical MTCU Code 52308 Program Learning Outcomes Synopsis of the Vocational Learning Outcomes* The graduate has reliably demonstrated the ability to: 1. apply scheduling,

More information

EUROPASS DIPLOMA SUPPLEMENT

EUROPASS DIPLOMA SUPPLEMENT EUROPASS DIPLOMA SUPPLEMENT TITLE OF THE DIPLOMA (ES) Técnico Superior en Administración de Sistemas Informáticos en Red TRANSLATED TITLE OF THE DIPLOMA (EN) (1) Higher Technician in Computer Network Systems

More information

INFORMATION TECHNOLOGY INFRASTRUCTURE ANALYST

INFORMATION TECHNOLOGY INFRASTRUCTURE ANALYST JOB DESCRIPTION MICHIGAN CIVIL SERVICE COMMISSION JOB SPECIFICATION INFORMATION TECHNOLOGY INFRASTRUCTURE ANALYST Employees in this job function as information technology (IT) professionals serving as

More information

RL Solutions Hosting Service Level Agreement

RL Solutions Hosting Service Level Agreement RL Solutions Hosting Service Level Agreement April 2012 Table of Contents I. Context and Scope... 1 II. Defined Terms... 1 III. RL Solutions Responsibilities... 2 IV. Client Responsibilities... 4 V. The

More information

CLASS SPECIFICATION Systems Support Analyst I

CLASS SPECIFICATION Systems Support Analyst I San Diego Unified Port District Class Code: B837-UE03 CLASS SPECIFICATION Systems Support Analyst I FLSA Status: EEOC Job Category: Classified: Union Representation: Exempt Professionals No Unrepresented

More information

OCR LEVEL 3 CAMBRIDGE TECHNICAL

OCR LEVEL 3 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT NETWORKED SYSTEMS SECURITY J/601/7332 LEVEL 3 UNIT 28 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 NETWORKED SYSTEMS SECURITY

More information

Please Note: Temporary Graduate 485 skills assessments applicants should only apply for ANZSCO codes listed in the Skilled Occupation List above.

Please Note: Temporary Graduate 485 skills assessments applicants should only apply for ANZSCO codes listed in the Skilled Occupation List above. ANZSCO Descriptions This ANZSCO description document has been created to assist applicants in nominating an occupation for an ICT skill assessment application. The document lists all the ANZSCO codes that

More information

Empowering the Enterprise Through Unified Communications & Managed Services Solutions

Empowering the Enterprise Through Unified Communications & Managed Services Solutions Continuant Managed Services Empowering the Enterprise Through Unified Communications & Managed Services Solutions Making the transition from a legacy system to a Unified Communications environment can

More information

Office of Human Resources. Network Engineer

Office of Human Resources. Network Engineer Office of Human Resources Network Engineer Page 1 of 5 GENERAL STATEMENT OF CLASS DUTIES Performs full performance professional information technology work planning and coordinating the installation and

More information

Microsoft Exchange Server 2007, Upgrade from Exchange 2000/2003 (3938. 3938/5049/5050) Course KC3065 5 Days OVERVIEW COURSE OBJECTIVES AUDIENCE

Microsoft Exchange Server 2007, Upgrade from Exchange 2000/2003 (3938. 3938/5049/5050) Course KC3065 5 Days OVERVIEW COURSE OBJECTIVES AUDIENCE Microsoft Exchange, Upgrade from Exchange 2000/2003 COURSE OVERVIEW This instructor-led course offers Microsoft Exchange Server administrators with the skills they need to manage a Microsoft Exchange infrastructure.

More information

HOSTING SERVICES ADDENDUM TO MASTER SOFTWARE LICENCE AGREEMENT

HOSTING SERVICES ADDENDUM TO MASTER SOFTWARE LICENCE AGREEMENT HOSTING SERVICES ADDENDUM TO MASTER SOFTWARE LICENCE AGREEMENT Last Updated: 10 June 2015 This Hosting Services Addendum to the Master Software Licence Agreement ( Addendum ) will only apply to the extent

More information

POSITION QUALIFICATIONS. Minimum Experience (Yrs)

POSITION QUALIFICATIONS. Minimum Experience (Yrs) POSITION QUALIFICATIONS Core Labor Category Skill Minimum Education Minimum Experience (Yrs) Labor Category Description Technical Manager, Principal Bachelors Degree 12 Technical Manager, Senior Bachelors

More information

Recommended Programs Per School

Recommended Programs Per School Recommended Programs Per School Note: Some courses are appropriate for teaching students at various ages, therefore some courses may be listed below as recommended offerings at multiple school age levels.

More information

NOS for Network Support (903)

NOS for Network Support (903) NOS for Network Support (903) November 2014 V1.1 NOS Reference ESKITP903301 ESKITP903401 ESKITP903501 ESKITP903601 NOS Title Assist with Installation, Implementation and Handover of Network Infrastructure

More information

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable

More information

Information Technology General Controls Review (ITGC) Audit Program Prepared by:

Information Technology General Controls Review (ITGC) Audit Program Prepared by: Information Technology General Controls Review (ITGC) Audit Program Date Prepared: 2012 Internal Audit Work Plan Objective: IT General Controls (ITGC) address the overall operation and activities of the

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

INFORMATION TECHNOLOGY SECURITY STANDARDS

INFORMATION TECHNOLOGY SECURITY STANDARDS INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL

More information

FBLA Cyber Security aligned with Common Core 6.14. FBLA: Cyber Security RST.9-10.4 RST.11-12.4 RST.9-10.4 RST.11-12.4 WHST.9-10.4 WHST.11-12.

FBLA Cyber Security aligned with Common Core 6.14. FBLA: Cyber Security RST.9-10.4 RST.11-12.4 RST.9-10.4 RST.11-12.4 WHST.9-10.4 WHST.11-12. Competency: Defend and Attack (virus, spam, spyware, Trojans, hijackers, worms) 1. Identify basic security risks and issues to computer hardware, software, and data. 2. Define the various virus types and

More information

Higher Certificate in Information Systems (Network Engineering) * (1 year full-time, 2½ years part-time)

Higher Certificate in Information Systems (Network Engineering) * (1 year full-time, 2½ years part-time) Higher Certificate in Information Systems (Network Engineering) * (1 year full-time, 2½ years part-time) Module: Computer Literacy Knowing how to use a computer has become a necessity for many people.

More information

Release: 1. CPPSEC4015A Maintain networked security system

Release: 1. CPPSEC4015A Maintain networked security system Release: 1 CPPSEC4015A Maintain networked security system CPPSEC4015A Maintain networked security system Modification History Not Applicable Unit Descriptor Unit descriptor This unit of competency specifies

More information

SRA International Managed Information Systems Internal Audit Report

SRA International Managed Information Systems Internal Audit Report SRA International Managed Information Systems Internal Audit Report Report #2014-03 June 18, 2014 Table of Contents Executive Summary... 3 Background Information... 4 Background... 4 Audit Objectives...

More information

Senior Systems Analyst. Interpersonal Skills Physical Effort Concentration Complexity

Senior Systems Analyst. Interpersonal Skills Physical Effort Concentration Complexity Job Class Profile: Senior Systems Analyst Pay Level: CG-42 Point Band: 994-1037 Accountability & Decision Making Development and Leadership Environmental Working Conditions Factor Knowledge Interpersonal

More information

Fundamentals of a Windows Server Infrastructure Course 10967A; 5 Days, Instructor-led

Fundamentals of a Windows Server Infrastructure Course 10967A; 5 Days, Instructor-led Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Fundamentals of a Windows Server Infrastructure Course 10967A; 5 Days, Instructor-led

More information

Systems Programmer/Analyst (12203) (31002632)

Systems Programmer/Analyst (12203) (31002632) GENERAL DESCRIPTION OF WORK Positions in this banded class perform specialized work in supporting information technology equipment and systems for the business, research, and instructional functions of

More information

Technical Competency Framework for Information Management (IM)

Technical Competency Framework for Information Management (IM) Technical Competency Framework for Information Management (IM) Office of the Chief Information Officer (OCIO) June 15, 2009 Table of contents IM Competency Framework...1 Competency 1: Information Management

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

Information Technology Manager Training Needs Assessment Evaluation Form. Personal/Position Information

Information Technology Manager Training Needs Assessment Evaluation Form. Personal/Position Information Personal/Position Information Name: Period Covered: Position: Reviewed by: Title: Position Start Date: Community: Region: Instructions: The information contained in this evaluation is strictly confidential.

More information

An Overview of Korea Information Security Stats

An Overview of Korea Information Security Stats An Overview of Korea Information Security Stats - With the focus on the secure server stats Gee, Sang-Ho Senior Researcher of KISA Korea Information Security Agency Korea Information Security Stats at

More information

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014 DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014 Revision History Update this table every time a new edition of the document is

More information

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security

More information

Employability Skills Summary

Employability Skills Summary s Summary Monday, 22 November 2010 10:55 AM Version 1.2 s Summary Page 2 Table of Contents BSB10107 Certificate I in Business... 3 BSB20107 Certificate II in Business... 4 BSB30107 Certificate III in Business...

More information

Appendix A-2 Generic Job Titles for respective categories

Appendix A-2 Generic Job Titles for respective categories Appendix A-2 for respective categories A2.1 Job Category Software Engineering/Software Development Competency Level Master 1. Participate in the strategic management of software development. 2. Provide

More information

Council is committed to achieving the three key outcomes identified by our local community:

Council is committed to achieving the three key outcomes identified by our local community: Position Profile Position Title: Reports to: Department: Section: Information Technology Team Leader Information Technology Information Services Community Outcomes Council is committed to achieving the

More information

IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS

IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS IT INFRASTRUCTURE MANAGEMENT SERVICES Nortech Remote management IT security Services provide around clock remote Management, real time

More information

INFORMATION TECHNOLOGY

INFORMATION TECHNOLOGY INFORMATION TECHNOLOGY Scope These program criteria apply to Information Technology, Computer Engineering Technology, and specialities therein, such as computer programming, computer systems analysis,

More information

Canadian Technology Accreditation Criteria (CTAC) INFORMATION TECHNOLOGY - TECHNOLOGIST Technology Accreditation Canada (TAC)

Canadian Technology Accreditation Criteria (CTAC) INFORMATION TECHNOLOGY - TECHNOLOGIST Technology Accreditation Canada (TAC) Canadian Technology Accreditation Criteria (CTAC) INFORMATION TECHNOLOGY - TECHNOLOGIST Technology Accreditation Canada (TAC) Preamble These CTAC are applicable to programs having titles involving Information

More information

Department of Information and Technology Management

Department of Information and Technology Management INFOTEC Overview Department of Information and Technology Management Introduction The Information and Technology Management Department (INFOTEC) is responsible for providing modern, secure, fit for purpose

More information

July 2013 SANTA BARBARA COMMUNITY COLLEGE DISTRICT

July 2013 SANTA BARBARA COMMUNITY COLLEGE DISTRICT July 2013 SANTA BARBARA COMMUNITY COLLEGE DISTRICT CLASS TITLE: VICE PRESIDENT-INFORMATION TECHNOLOGY BASIC FUNCTION: Under the direction of the President, plan, organize, control and direct College-wide

More information

SENIOR SYSTEMS ANALYST

SENIOR SYSTEMS ANALYST CITY OF MONTEBELLO 109 DEFINITION Under general administrative direction of the City Administrator, provides advanced professional support to departments with very complex computer systems, programs and

More information

Exhibit to Data Center Services Service Component Provider Master Services Agreement

Exhibit to Data Center Services Service Component Provider Master Services Agreement Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information

More information

Fundamentals of a Windows Server Infrastructure MOC 10967

Fundamentals of a Windows Server Infrastructure MOC 10967 Fundamentals of a Windows Server Infrastructure MOC 10967 Course Outline Module 1: Installing and Configuring Windows Server 2012 This module explains how the Windows Server 2012 editions, installation

More information

Data Management Policies. Sage ERP Online

Data Management Policies. Sage ERP Online Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...

More information

Information Technology Solutions. Managed IT Services

Information Technology Solutions. Managed IT Services Managed IT Services System downtime, viruses, spyware, lost productivity; if these problems are impacting your business, it is time to make technology work for you. At ITS, we understand the importance

More information

C I T Y O F W E S T L I N N

C I T Y O F W E S T L I N N C I T Y O F W E S T L I N N JOB DESCRIPTION Job Title: NETWORK AND COMPUTER SYSTEMS ADMINISTRATOR GENERAL FUNCTION: Position has direct responsibility for the administration of the City s entire network

More information

SAAS MADE EASY: SERVICE LEVEL AGREEMENT

SAAS MADE EASY: SERVICE LEVEL AGREEMENT SAAS MADE EASY: SERVICE LEVEL AGREEMENT THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY ( SaaS Made Easy ). Capitalized terms used herein but not otherwise defined

More information

Information Technology Plan Technology Vision for the Community College

Information Technology Plan Technology Vision for the Community College Information Technology Plan Technology Vision for the Community College At Caldwell Community College and Technical Institute, information technology will be a primary resource for students, faculty, staff,

More information

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)

More information

MCSE SYLLABUS. Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003:

MCSE SYLLABUS. Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003: MCSE SYLLABUS Course Contents : Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003: Managing Users, Computers and Groups. Configure access to shared folders. Managing and Maintaining

More information

JOB TITLE: CURRENT CLASSIFICATION/GRID POSITION # IT Tech I AD Grid Level 5(h) #68 (Service Desk)

JOB TITLE: CURRENT CLASSIFICATION/GRID POSITION # IT Tech I AD Grid Level 5(h) #68 (Service Desk) COUNTY OF GRANDE PRAIRIE JOB DESCRIPTION JOB TITLE: CURRENT CLASSIFICATION/GRID POSITION # IT Tech I AD Grid Level 5(h) #68 (Service Desk) NOC CODE: 2171 STANDARD HOURS: 35 hours/week (non-management)

More information

JOB TITLE: CURRENT CLASSIFICATION/GRID POSITION # IT Tech II AD Grid Level 5(g) #123 Network Support Technician

JOB TITLE: CURRENT CLASSIFICATION/GRID POSITION # IT Tech II AD Grid Level 5(g) #123 Network Support Technician COUNTY OF GRANDE PRAIRIE JOB DESCRIPTION JOB TITLE: CURRENT CLASSIFICATION/GRID POSITION # IT Tech II AD Grid Level 5(g) #123 Network Support Technician NOC CODE: 2281 STANDARD HOURS: 35 hours/week (non-management)

More information

Data Security Incident Response Plan. [Insert Organization Name]

Data Security Incident Response Plan. [Insert Organization Name] Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security

More information

APPENDIX 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT

APPENDIX 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT TUGeneral TUSecurity TURequirements TUDesign TUIntegration

More information

Certificate and Diplomas in ICT Professional Competence (4520-01/02/03/04)

Certificate and Diplomas in ICT Professional Competence (4520-01/02/03/04) Certificate and Diplomas in ICT Professional Competence (4520-01/02/03/04) Levels 1-4 unit handbook for centres www.cityandguilds.com July 2011 Version 1.2 (May 2012) About City & Guilds As the UK s leading

More information

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225

More information

Contents The College of Information Science and Technology 2011-2012 Undergraduate Course Descriptions

Contents The College of Information Science and Technology 2011-2012 Undergraduate Course Descriptions Contents The College of Information Science and Technology 2011-2012 Undergraduate Course Descriptions Information Science & Systems Courses INFO 101 - Introduction to Information Technology Introduces

More information

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4

More information

Exhibit 16.1-4a Non Applications Services Labor Categories

Exhibit 16.1-4a Non Applications Services Labor Categories Exhibit 16.1-4a Non Applications Services Labor Categories PAGE 1 1. Infrastructure System Administrator Description: The Infrastructure Systems Administrator s role is to: (1) deliver support to internal

More information

IT Sample Duties and Responsibilities Statements BAND B POSITION CONCEPT: JOURNEYWORKER / WORKING SUPERVISOR / LEAD WORKER

IT Sample Duties and Responsibilities Statements BAND B POSITION CONCEPT: JOURNEYWORKER / WORKING SUPERVISOR / LEAD WORKER BAND B POSITION CONCEPT: JOURNEY / WORKING SUPERVISOR / LEAD Multi-user System Administration Systems & Services Administration Installs, configures, and optimizes operating systems. Installs, tests, and

More information

HelpDesk Service Description ( HelpDesk )

HelpDesk Service Description ( HelpDesk ) HelpDesk Service Description ( HelpDesk ) I. HelpDesk Service Overview HelpDesk provides support on virus, spyware and multiple versions of industry standard applications in addition to factory-installed

More information

Decision on adequate information system management. (Official Gazette 37/2010)

Decision on adequate information system management. (Official Gazette 37/2010) Decision on adequate information system management (Official Gazette 37/2010) Pursuant to Article 161, paragraph (1), item (3) of the Credit Institutions Act (Official Gazette 117/2008, 74/2009 and 153/2009)

More information

ICANWK406A Install, configure and test network security

ICANWK406A Install, configure and test network security ICANWK406A Install, configure and test network security Release: 1 ICANWK406A Install, configure and test network security Modification History Release Release 1 Comments This Unit first released with

More information

B. Preservation is not limited to simply avoiding affirmative acts of destruction because day-to-day operations routinely alter or destroy evidence.

B. Preservation is not limited to simply avoiding affirmative acts of destruction because day-to-day operations routinely alter or destroy evidence. This is a sample approach to developing a sound document collection process, referenced at Section II(7)(vi) of the Guidelines on Best Practices for Litigating Cases Before the Court of Chancery. It should

More information

Request for Proposal for Application Development and Maintenance Services for XML Store platforms

Request for Proposal for Application Development and Maintenance Services for XML Store platforms Request for Proposal for Application Development and Maintenance s for ML Store platforms Annex 4: Application Development & Maintenance Requirements Description TABLE OF CONTENTS Page 1 1.0 s Overview...

More information

10605164 Medical Networks and Operating Systems

10605164 Medical Networks and Operating Systems Western Technical College 10605164 Medical Networks and Operating Systems Course Outcome Summary Course Information Description Instructional Level Total Credits 4.00 Total Hours 108.00 A course studying

More information

CHIS, Inc. Privacy General Guidelines

CHIS, Inc. Privacy General Guidelines CHIS, Inc. and HIPAA CHIS, Inc. provides services to healthcare facilities and uses certain protected health information (PHI) in connection with performing these services. Therefore, CHIS, Inc. is classified

More information

Internet Applications and Web Development

Internet Applications and Web Development Internet Applications and Web Development Fundamentals Program Standard The approved program standard for the Internet Applications and Web Development Fundamentals program of instruction leading to an

More information

Job Description Information Services Coordinator

Job Description Information Services Coordinator Job Description Position Title: Information Services Coordinator Department: Reports To: Technology & Infrastructure Manager Purpose The Information Services Coordinators role is to ensure the stability,

More information

Managed Services. Business Intelligence Solutions

Managed Services. Business Intelligence Solutions Managed Services Business Intelligence Solutions Business Intelligence Solutions provides an array of strategic technology services for life science companies and healthcare providers. Our Managed Services

More information

C I T Y O F W E S T L I N N

C I T Y O F W E S T L I N N C I T Y O F W E S T L I N N JOB DESCRIPTION Job Title: DESKTOP TECHNICIAN II GENERAL FUNCTION: Position is responsible for: 1) providing administration and support for all City desktop and peripheral hardware,

More information

Better secure IT equipment and systems

Better secure IT equipment and systems Chapter 5 Central Services Data Centre Security 1.0 MAIN POINTS The Ministry of Central Services, through its Information Technology Division (ITD), provides information technology (IT) services to government

More information

Threat Management: Incident Handling. Incident Response Plan

Threat Management: Incident Handling. Incident Response Plan In order to meet the requirements of VCCS Security Standards 13.1 Reporting Information Security Events, and 13.2 Management of Information Security Incidents, SVCC drafted an (IRP). Incident handling

More information

SECURITY MANAGEMENT IT Security Policy (ITSP- 1)

SECURITY MANAGEMENT IT Security Policy (ITSP- 1) SECURITY MANAGEMENT IT Security Policy (ITSP- 1) 1A Policy Statement District management and IT staff will plan, deploy, and monitor IT security mechanisms, policies, procedures, and technologies necessary

More information

Department of Education. Network Security Controls. Information Technology Audit

Department of Education. Network Security Controls. Information Technology Audit O L A OFFICE OF THE LEGISLATIVE AUDITOR STATE OF MINNESOTA FINANCIAL AUDIT DIVISION REPORT Department of Education Network Security Controls Information Technology Audit May 5, 2010 Report 10-17 FINANCIAL

More information

MCITP MCITP: Enterprise Administrator on Windows Server 2008 (5 Modules)

MCITP MCITP: Enterprise Administrator on Windows Server 2008 (5 Modules) MCITP Windows 2008 Enterprise Edition is considered as Microsoft s most reliable, scalable and high-performing server operating system. It has been designed to simplify the process of Migration from the

More information

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.

More information

Cisco Security Optimization Service

Cisco Security Optimization Service Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless

More information

Guardian365. Managed IT Support Services Suite

Guardian365. Managed IT Support Services Suite Guardian365 Managed IT Support Services Suite What will you get from us? Award Winning Team Deloitte Best Managed Company in 2015. Ranked in the Top 3 globally for Best Managed Service Desk by the Service

More information

STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION

STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION STATE OF NEVADA Department of Administration Division of Human Resource Management LASS SPEIFIATION TITLE GRADE EEO-4 ODE IT TEHNIIAN SUPERVISOR 37 7.927 SERIES ONEPT Information Technology (IT) Technicians

More information

Remote Services. Managing Open Systems with Remote Services

Remote Services. Managing Open Systems with Remote Services Remote Services Managing Open Systems with Remote Services Reduce costs and mitigate risk with secure remote services As control systems move from proprietary technology to open systems, there is greater

More information