Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006



Similar documents
CompTIA Network+ (Exam N10-005)

IT4405 Computer Networks (Compulsory)

Advanced Higher Computing. Computer Networks. Homework Sheets

Overview of Computer Networks

Chapter 5. Data Communication And Internet Technology

IT Data Communication and Networks (Optional)

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).

Essential Curriculum Computer Networking 1. PC Systems Fundamentals 35 hours teaching time

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Connecting with Computer Science, 2e. Chapter 5 The Internet

EUCIP - IT Administrator. Module 2 Operating Systems. Version 2.0

Chapter 1 Personal Computer Hardware hours

Information Technology Career Field Pathways and Course Structure

Network Technologies

The OSI and TCP/IP Models. Lesson 2

Introduction to computer networks and Cloud Computing

Oct 15, Internet : the vast collection of interconnected networks that all use the TCP/IP protocols

Network System Design Lesson Objectives

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

IT Networking and Security

Lecture 28: Internet Protocols

EUCIP - IT Administrator. Module 3 LAN and Network Services. Version 2.0

Future Stars. Grade X Manual Chapter 1 Networking and Telecommunication. telecommunication. Telephones, telegrams, radios and televisions help

Computer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Network Security. Vorlesung Kommunikation und Netze SS 10 E. Nett

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

FBLA: NETWORKING CONCEPTS. Competency: General Network Terminology and Concepts

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET

ICTTEN8195B Evaluate and apply network security

COMPUTER NETWORK TECHNOLOGY (300)

Local Area Networking technologies Unit number: 26 Level: 5 Credit value: 15 Guided learning hours: 60 Unit reference number: L/601/1547

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

8/27/2014. What is a computer network? Introduction. Business Applications (1) Uses of Computer Networks. Business Applications (2)

GUJARAT TECHNOLOGICAL UNIVERSITY, AHMEDABAD, GUJARAT. COURSE CURRICULUM COURSE TITLE: INFORMATION COMMUNICATION TECHNOLOGY (Code: )

Chapter 4: Networking and the Internet

M3-R3: INTERNET AND WEB DESIGN

i. Definition ii. Primary Activities iii. Support Activities iv. Information Systems role in value chain analysis

Address Resolution Protocol (ARP)

Fundamentals of Network Security - Theory and Practice-

Local Area Networks (LANs) Blueprint (May 2012 Release)

EUCIP IT Administrator - Module 2 Operating Systems Syllabus Version 3.0

Chapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking.

COURCE TITLE DURATION CompTIA A+ Certification 40 H.

Introduction to Information Technology Course Number 10009

Transport and Network Layer

Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I)

Networking Technology Online Course Outline

Course Description and Outline. IT Essential II: Network Operating Systems V2.0

EUCIP IT Administrator - Fundamentals Syllabus Version 1.0

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

NOS for Network Support (903)


Web Hosting & Maintenance

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

COMPUTER NETWORK TECHNOLOGY (40)

CISC 1600 Introduction to Multi-media Computing

The OSI Model: Understanding the Seven Layers of Computer Networks

Connect your Control Desk to the SIP world

NETWORKING TECHNOLOGIES

Computer Networks. Computer Networks. Telecommunication Links. Connecting. Connecting via Telephone Lines ISDN

IT Networking and Security

TYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

Networking Basics and Network Security

CDS and Clearing Limited Thapathali, Kathmandu 7 th Level (Technical) Syllabus

DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM

Mathatma Gandhi University

TCP/IP Protocol Suite. Marshal Miller Chris Chase

Telecommunications, Networks, and Wireless Computing

Terminology. Internet Addressing System

Computer Networks CCNA Module 1

Layered protocol (service) architecture

Networking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the

Protocols. Packets. What's in an IP packet

Computer Networks Vs. Distributed Systems

CSCI 362 Computer and Network Security

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

Computer Networks CS321

Chapter 17: Distributed Systems

Fundamentals of a Windows Server Infrastructure Course 10967A; 5 Days, Instructor-led

OCR LEVEL 3 CAMBRIDGE TECHNICAL

Network Models and Protocols

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0

Computer networks, data communication and Internet

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)

IT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION

Internet Concepts. What is a Network?

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks

Transcription:

Core Syllabus C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS Version 2.6 June 2006

EUCIP CORE Version 2.6 Syllabus. The following is the Syllabus for EUCIP CORE Version 2.6, which provides the basis for the tests in this module domain. Module Goals EUCIP CORE: Operate Knowledge Area Module C, Operate, deals with networks and related communication services of an IT Infrastructure, as well as the maintenance and usage issues in terms of service provision. The module requires the candidate to know about hardware components, computing architectures and different operating systems. The candidate shall also distinguish between the various levels of communication protocols, and their application both to wired and wireless network technologies. In addition, he/she shall understand the simple network management protocol (SNMP), e-mail and web services, and the related security threats and remedies. The candidate shall appreciate the importance of a client-oriented approach to IT support, and apply some of the basic principles of IT service delivery. C - OPERATE KNOWLEDGE AREA : OPERATION AND SUPPORT OF INFORMATION SYSTEMS Category Topic Ref Item C.1 Computing C.1.1 Main Hardware C.1.1.1 Describe the main components of a computer system and their functions Components and Architecture C.1.1.2 Describe the main types of peripheral units and their functions C.1.1.3 C.1.1.4 C.1.1.5 C.1.1.6 C.1.1.7 C.1.1.8 Understand the parameters which characterise any type of peripheral units Describe the main types of memory technology Identify various types of buses in a computer system Describe the concept of instruction pipelining Describe the concept of instruction-level parallelism Understand the parameters which characterise a microprocessor: (clock frequency, pipeline stages, caching system, chip size) C.1.2 Computer Architecture C.1.2.1 Show, using diagrams, the architecture of a general purpose computer C.1.2.2 Describe the concept of a multiprocessor machine EUCIP Ltd. 2006 Page 2 of 8 Ref: EUCIPV2.6_2006

C.1.2.3 Describe the concept of a Memory Hierarchy C.1.3 Multimedia Components C.1.2.1 Know the standard multimedia types (audio, music, graphics, image, video, telephony, TV) C.1.2.2 C.1.2.3 Know the main multimedia I/O devices (scanners, digital camera, microphone, etc.) Know the major multimedia storage standards (CD-ROM, DVD, Magneto Optical disk) C.2 Operating Systems C.2.1 Principles C.2.1.1 Describe the functions of a typical Operating System C.2.2 Concurrent and Parallel Processes C.2.3 Memory and Storage Management C.2.1.2 C.2.1.3 C.2.1.4 C.2.2.1 C.2.2.2 C.2.2.3 C.2.2.4 C.2.2.5 C.2.3.1 C.2.3.2 C.2.3.3 C.2.3.4 C.2.3.5 Describe the different types of Operating System (Time-sharing, Real-time, Batch) Describe the concept of Application Program Interfaces Describe how the resources of a computer system are managed by software Justify the presence of concurrency inside an Operating System Describe the mutual exclusion problem Describe the concept of a process Describe the concept of a thread Describe a context switch operation Explain the concept of virtual memory Describe how virtual memory is realised in hardware and software Describe the thrashing concept Describe the concept of memory hierarchy Describe the functions of a file system C.2.4 Security and Protection C.2.4.1 Recognise the need for protection and security in a computer system EUCIP Ltd. 2006 Page 3 of 8 Ref: EUCIPV2.6_2006

C.2.4.2 Describe the protection mechanisms implemented by Operating Systems C.2.5 Examples of Operating Systems C.2.4.3 C.2.4.4 C.2.4.5 C.2.4.6 C.2.5.1 C.2.5.2 Understand the difference between identification and authentication Describe the principles of access control Recognise the need for recovery and back-up Describe the concept of backdoor, Trojan horse and computer virus threats Describe the main features of the Unix or Linux Operating System Describe the main features of the W2000 or Windows XP Operating System C.3 Communications and Networks C.3.1 Communication Principles C.3.1.1 C.3.1.2 C.3.1.3 C.3.1.4 C.3.1.5 Understand the difference between an analog and a digital signal Understand the transformation between an analog signal and its corresponding digital version Describe the concepts of circuit switching and packet switching Describe the concepts of streams and datagrams Describe the role of the main network standardisation bodies C.3.2 Network Components and Architectures C.3.2.1 C.3.2.2 C.3.2.3 C.3.2.4 C.3.2.5 C.3.2.6 C.3.2.7 Describe the components of a network and their roles Describe the different characteristics of the transmission media (twisted pair, Coaxial cable, fiber optic, microwaves) Describe how the components of a network are connected to each other in practice Describe the roles of interconnecting devices (hub, switch, router) Describe the standard network topologies Differentiate between the concepts of LAN and WAN Name the major LAN Standards EUCIP Ltd. 2006 Page 4 of 8 Ref: EUCIPV2.6_2006

C.3.3 Communication Protocols C.3.3.1 Describe the ISO 7-layer reference model C.3.3.2 C.3.3.3 C.3.3.4 C.3.3.5 C.3.3.6 Describe the instantiation of the ISO reference model in TCP/IP Describe how a packet is routed over the Internet Understand the differences between TCP and UDP Know the major differences between a connection-oriented and a connectionless protocol Understand the concept of network congestion and the mechanisms for avoiding it C.4 Network Services C.4.1 Network Security C.4.1.1 Know the main security threats in networks (sniffing and spoofing) C.4.1.2 C.4.1.3 C.4.1.4 C.4.1.5 Describe the scope of cryptography Differentiate between secret-key algorithms from public key algorithms Describe a strong authentication protocol Understand how to use cryptography for protecting networks C.4.2 Domain Name System C.4.2.1 Define the scope of the Domain Name System (DNS) C.4.2.2 C.4.2.3 C.4.2.4 Describe the naming of Internet hosts Describe the concept of resource descriptor Outline how a Domain Name is translated into an IP address C.4.3 The World-Wide-Web C.4.3.1 Describe the World Wide Web (WWW) as a client server application C.4.3.2 C.4.3.3 C.4.3.4 C.4.3.5 Describe the role of the server Describe the role of the client: browser Describe the role and the functions of the Hypertext Transmission Protocol (HTTP) Understand the concept of Universal Resource Locator ( URL) EUCIP Ltd. 2006 Page 5 of 8 Ref: EUCIPV2.6_2006

C.4.3.6 Describe the main characteristics of Hypertext Mark-up Language (HTML) C.4.3.7 C.4.3.8 Describe the concept of the Common Gateway Interface (CGI) Describe the concept of an applet C.4.4 E-mail C.4.4.1 Understand the role of an e-mail client C.4.4.2 C.4.4.3 C.4.4.4 C.4.4.5 C.4.4.6 Understand the role of an e-mail server Understand the role of an e-mail gateway Describe the SMTP protocol Describe the POP3 protocol Describe the Internet Message Access Protocol (IMAP) protocol C.4.5 Multimedia Impact C.4.5.1 Know the network impact of the most important multimedia tools C.4.5.2 Know about the resource needs of a major multimedia application C.4.5.3 Describe the characteristics of a server computer system that has to host a multimedia application C.5 Wireless and Mobile Computing C.5.1 Principles of Wireless Communication C.5.1.1 Describe technologies used for wireless communications C.5.1.2 Describe the major wireless standards C.5.1.3 Know the problems characterising wireless and mobile computing C.5.2 Wireless Networks C.5.2.1 Describe the main components of a Wireless LAN C.5.3 Protocols for Mobile Stations C.5.2.2 C.5.2.3 C.5.3.1 C.5.3.2 Know the compatibility of different technologies Describe the main components of a satellite-based network Describe the functions of the main protocols for mobile stations (Mobile IP, Wireless Application Protocol (WAP), Bluetooth) Understand the range of applicability of each protocol EUCIP Ltd. 2006 Page 6 of 8 Ref: EUCIPV2.6_2006

C.6 Network C.6.1 Principles of Network C.6.1.1 Describe the main functions of a Network Management System Management Management C.6.1.2 Describe the different parameters which can be managed in a network (performance, failures, configuration settings) C.6.1.3 Describe the different architectures of Network Management systems C.6.2 The Simple Network Management Protocol C.6.2.1 Describe the main components of the simple network management protocol (SNMP) and their interaction C.6.2.2 Describe the main services provided by the protocol C.6.2.3 Describe the main limitations of the protocol C.6.3 Tools for Network Management C.6.3.1 Name the most important Network Management tools C.6.3.2 Understand the differences between a System Management tool and a Network Management tool C.6.3.3 Understand the system requirements for operating a Network Management tool C.7 Service Delivery and Support C.7.1 Customer Relationships and Service Level Agreements C.7.1.1 Describe the Service Level Management process and identify its benefits C.7.1.2 Name the main elements of a Service Level Agreement C.7.1.3 Compare the uses and purposes of Service Level Agreements, underpinning contracts and Operational Level Agreements C.7.2 Capacity and Contingency Planning C.7.2.1 Describe the three sub-processes (business, service and resource) as defined within ITIL-based Capacity Management and explain the importance of each C.7.2.2 Identify the purpose and describe the main elements of a Capacity Plan C.7.2.3 Explain the concepts of risk, threat and vulnerability and give examples of each C.7.2.4 Give examples of risk reduction measures C.7.2.5 Identify the purpose and describe the main elements of a contingency/service continuity plan EUCIP Ltd. 2006 Page 7 of 8 Ref: EUCIPV2.6_2006

C.7.3 Availability Management C.7.3.1 Identify the purpose and benefits of Availability Management as referenced in ITIL and define the main terms used (availability, reliability, failure, recovery) C.7.3.2 C.7.3.3 Compare some of the commonly-used measures of availability (percentage availability, frequency of failure, mean time between failures, impact of failure) Name the main Availability Management methods and techniques (such as Component Failure Impact Analysis (CFIA), CRAMM, Fault Tree Analysis (FTA)) C.7.4 Service Desk C.7.4.1 Explain the purpose of a Service Desk in a service support organisation C.7.4.2 C.7.4.3 Identify the different types of Service Desk and describe the circumstances in which each is appropriate Define the main elements of an ITIL-based incident management system C.7.5 Change Management C.7.5.1 Explain the importance of managing change in an IT environment C.7.5.2 C.7.5.3 Construct a basic ITIL -based change management procedure Define the purpose of a Request for Change and propose the essential elements that it should contain EUCIP Ltd. 2006 Page 8 of 8 Ref: EUCIPV2.6_2006