EUCIP IT Administrator - Fundamentals Syllabus Version 1.0

Similar documents
EUCIP IT Administrator - Module 1 PC Hardware Syllabus Version 3.0

EUCIP IT Administrator - Module 2 Operating Systems Syllabus Version 3.0

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

EUCIP - IT Administrator. Module 2 Operating Systems. Version 2.0

EUCIP - IT Administrator. Module 1 - PC Hardware. Version 2.0

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006

EUCIP - IT Administrator. Module 3 LAN and Network Services. Version 2.0

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

Lesson 1 Quiz Certification Partners, LLC. All Rights Reserved. Version 2.0

COURCE TITLE DURATION CompTIA A+ Certification 40 H.

CompTIA Network+ (Exam N10-005)

Advanced Higher Computing. Computer Networks. Homework Sheets

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

Computer Repair Technology

COMPUTER NETWORK TECHNOLOGY (300)

IT Networking and Security

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).

Essential Curriculum Computer Networking 1. PC Systems Fundamentals 35 hours teaching time

Chapter 4: Networking and the Internet

Course Description and Outline. IT Essential II: Network Operating Systems V2.0

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

Chapter 15: Advanced Networks

IT Data Communication and Networks (Optional)

Program: Systems Engineering Certificate. Prerequisite: None. Hardware/Software required:

EUCIP - IT Administrator. Module 4 - Expert Network Use. Version 2.0

EqualSkills Syllabus Version 2.0

Medical Networks and Operating Systems

Advanced Diploma In Hardware, Networking & Server Configuration

CERTIFICATE IN COMPUTER HARDWARE AND NETWORK TECHNOLOGY (CCHNT) COURSE STRUCTURE UNIVERSITY SCIENCE INSTRUMENTATION CENTRE (USIC)

Course Outline. Faculty of Applied Sciences University of Sri Jayewardanepura. Information Technology

CDS and Clearing Limited Thapathali, Kathmandu 7 th Level (Technical) Syllabus

Chapter 1 Personal Computer Hardware hours

TEST CHAPTERS 1 & 2 OPERATING SYSTEMS

i. Definition ii. Primary Activities iii. Support Activities iv. Information Systems role in value chain analysis

Networking Devices. Lesson 6

Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led

Chapter 5. Data Communication And Internet Technology

COMPUTER NETWORK TECHNOLOGY (40)

A+ Correlation Chart. CompTIA A Domain 1.0 Hardware. Text Lab Study Guide

IT Networking and Security

Fundamentals of Network Security - Theory and Practice-

"Charting the Course to Your Success!" MOC D Windows 7 Enterprise Desktop Support Technician Course Summary

Linux Network Security

Windows 7, Enterprise Desktop Support Technician

Introduction to Cyber Security / Information Security

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA. Test Code: 8148 Version: 01

The Information Security Problem

ICANWK401A Install and manage a server

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

MCSE Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required)

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

NOVA COLLEGE-WIDE COURSE CONTENT SUMMARY ITE INTRODUCTION TO COMPUTER APPLICATIONS & CONCEPTS (3 CR.)

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

FBLA Computer Problem Solving aligned with Common Core FBLA: Computer Problem Solving RST RST

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 1 Introducing Hardware

Computer Networks CCNA Module 1

Module 3: Resolve Software Failure This module explains how to fix problems with applications that have problems after being installed.

Internet tools and techniques at this level will be defined as advanced because:

ICANWK406A Install, configure and test network security

Web Foundations Series Internet Business Associate

TYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX

Information Technology Career Cluster Advanced Cybersecurity Course Number:

ECDL / ICDL Online Essentials Syllabus Version 1.0

Montgomery College Course Designator/Course Number: CS 110 Course Title: Computer Literacy

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12

Section 12 MUST BE COMPLETED BY: 4/22

FBLA: NETWORKING CONCEPTS. Competency: General Network Terminology and Concepts

Networking. Sixth Edition. A Beginner's Guide BRUCE HALLBERG

NetWrix Server Configuration Monitor

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

What the student will need:

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

Networking Technology Online Course Outline

Overview of Computer Networks

The Mac OS X Server Essentials v10.5 Exam Skills Assessment Guide

ELEN 115 Computer Components and Peripherals

ECDL / ICDL Online Collaboration Syllabus Version 1.0

CompTIA Security+ Certification Study Guide. (Exam SYO-301) Glen E. Clarke. Gravu Hill

TABLE OF CONTENTS NETWORK SECURITY 1...1

Web Hosting & Maintenance

Load Balance Router R258V

Connecting with Computer Science, 2e. Chapter 5 The Internet

MCSE Objectives. Exam : TS:Exchange Server 2007, Configuring

INTRODUCTION TO FIREWALL SECURITY

MCSE SYLLABUS. Exam : Managing and Maintaining a Microsoft Windows Server 2003:

EPSON Scan Server & EPSON TWAIN Pro Network

H ARDWARE C ONSIDERATIONS

Virtualised MikroTik

Eleventh Hour Security+

SOFTWARE TECHNOLOGIES

IT4405 Computer Networks (Compulsory)

Technical Glossary from Frontier

Transcription:

EUCIP IT Administrator - Fundamentals Syllabus Version 1.0

Copyright 2011 ECDL Foundation All rights reserved. No part of this publication may be reproduced in any form except as permitted by ECDL Foundation. Enquiries for permission to reproduce material should be directed to ECDL Foundation. Disclaimer Although every care has been taken by ECDL Foundation in the preparation of this publication, no warranty is given by ECDL Foundation, as publisher, as to the completeness of the information contained within it and neither shall ECDL Foundation be responsible or liable for any errors, omissions, inaccuracies, loss or damage whatsoever arising by virtue of such information or any instructions or advice contained within this publication. Changes may be made by ECDL Foundation at its own discretion and at any time without notice. The official version of EUCIP IT Administrator - Fundamentals is the version published on the EUCIP website: www.eucip.org ECDL Foundation is a registered business name of The European Computer Driving Licence Foundation Limited and ECDL Foundation (International) Limited. European Computer Driving Licence, ECDL, International Computer Driving Licence, ICDL, European Certification of Informatics Professionals, EUCIP and related logos are all registered Trade Marks of ECDL Foundation. All rights reserved. 2011 ECDL Foundation Ref: EUCIP IT Administrator - Fundamentals - Syllabus V1.0 Page 2 of 13

EUCIP IT Administrator - Fundamentals This document details the syllabus for EUCIP IT Administrator - Fundamentals. The syllabus describes, through learning outcomes, the knowledge and skills that a candidate for EUCIP IT Administrator - Fundamentals should possess. The syllabus also provides the basis for the theory-based test in this module. Module Goals EUCIP IT Administrator - Fundamentals requires the candidate to have a broad understanding of hardware, operating systems, networks and IT Security. The candidate shall be able to: Know the main elements of hardware of a personal computer. Understand operating system (OS) fundamentals and configure and maintain an operating system. Understand the OSI reference model, how to connect to a network and how common network services such as e-mail and groupware work. Understand key IT security concepts, be aware of malware and common network security concepts, as well as appreciate social, ethical and legal aspects of IT security. CATEGORY SKILL SET REF. TASK ITEM F.1 Hardware F.1.1 Introduction to Personal Computer F.1.1.1 Understand the basic concepts of hardware and software. F.1.2 Motherboards F.1.2.1 Understand the role and basic functions of a motherboard. F.1.2.2 F.1.2.3 Identify the basic components of a motherboard like: CPU slot/socket, chipset, cache memory, buses, ports, expansion slots. Know the different types of motherboards and their differences like: LPX, ATX, NLX. F.1.3 BIOS F.1.3.1 Know what BIOS is, where it is stored and its functions. Understand the terms: POST, SETUP, CMOS, Firmware and their function. F.1.3.2 Be aware of possible alternatives to BIOS like: UEFI, Open Firmware, and Coreboot. F.1.4 Microprocessors F.1.4.1 Understand the role of the CPU. Define the terms: CPU speed, overclocking, multiple factor. 2011 ECDL Foundation Ref: EUCIP IT Administrator - Fundamentals - Syllabus V1.0 Page 3 of 13

F.1.5 Buses and System Resources F.1.4.2 F.1.4.3 F.1.4.4 F.1.4.5 F.1.4.6 F.1.4.7 F.1.4.8 F.1.4.9 F.1.5.1 F.1.5.2 F.1.5.3 F.1.5.4 Be aware of factors that determine the processor s capacity like: clock, architecture, cache size. Understand best practice relating to CPU installations. Be aware of thermal CPU problems and know how they are solved. Understand the terms RAM and ROM. Know the features of DRAM like: speed, capacity. Be aware of the number of bits each type of DRAM memory uses. Understand the term banking. Know the different types of ROM like: PROM, EPROM, EEPROM. Know their features like: speed, capacity. Know how cache memory works and its benefits. Understand the term bus, its structure and functions. Know how bus structure can affect bandwidth. Be aware of the terms front side bus and back side bus. Be aware of the various I/O buses like: PCI, PCI-X, USB and distinguish between them. Understand basic system resources like: I/O port addresses, IRQ s and DMA s. Be able to check the status of used and available system resources. F.1.6 Interfaces F.1.6.1 Understand how an IDE interface works. Understand the terms Primary IDE, Secondary IDE, Master and Slave. F.1.6.2 F.1.6.3 Know how SCSI works, the main types of SCSI. Understand the terms Host adapter, SCSI ID, LUN and Terminator. Know how the SATA interfaces work and their difference with PATA. 2011 ECDL Foundation Ref: EUCIP IT Administrator - Fundamentals - Syllabus V1.0 Page 4 of 13

F.1.6.4 F.1.6.5 F.1.6.6 F.1.6.7 Identify different USB interfaces, working principles, physical connections. Identify different FireWire interfaces, working principles, capacities and limitations. Identify different types of memory card like: Flash, SD, Memory Stick. Understand the function of a card reader. Understand different RAID configurations for performance and security. F.1.7 Mass Storage F.1.7.1 Know how a disk stores and reads data. Understand the disk management terms low level format, partition, high level format. F.1.7.2 Know how to install a hard disk or an optical drive. Know which cables are necessary and how to connect them. F.1.8 Video Display F.1.8.1 Be aware of the most common monitor types like: TFT and LED, and how they work. F.1.8.2 F.1.8.3 Be aware of factors that impact on image quality like: resolution, refresh rate, number of colours. Be aware of the most common display modes like: VGA, SVGA, XVGA. F.1.9 Printers F.1.9.1 Distinguish between the main printing technologies such as dot matrix, inkjet and laser. Know the benefits and limitations of each technology. F.1.9.2 Recognise ways that a PC can communicate with a printer like: parallel, serial, USB, wireless and LAN. F.2 Operating Systems F.2.1 Operating System Fundamentals F.2.1.1 Understand the function and uses of an operating system. F.2.1.2 Be aware of the characteristics of common operating systems like: CLI, GUI, interactivity, multiusage. F.2.1.3 Know how to install an operating system from CD-ROM, network. 2011 ECDL Foundation Ref: EUCIP IT Administrator - Fundamentals - Syllabus V1.0 Page 5 of 13

F.2.2 System Configuration F.2.1.4 F.2.2.1 F.2.2.2 F.2.2.3 F.2.2.4 F.2.2.5 F.2.2.6 F.2.2.7 F.2.2.8 F.2.2.9 Understand the role of a server, its basic components, requirements and function. Understand the role of the client. Know how to configure and change monitor settings like: colours, resolution, refresh rate. Know how to change monitor and graphic adapter drivers. Know how to make desktop configuration changes like: changing background, themes, taskbar settings. Configure mouse and keyboard settings. Configure regional settings. Be able to add, modify, remove a printer. Be able to set a printer as default, check a printer s status and update drivers. Know how the operating system organises its folders/directories. Know where files are stored like: system files, application files, temporary files, internet files. Understand the importance of keeping a system up to date. Be able to install operating system patches and updates. Know how to configure the system to automatically install patches and updates. Define the terms device and driver and their role in installing hardware. F.2.2.10 Be able to check for and resolve resource conflict. F.2.2.11 Be able to install, upgrade, uninstall application software. F.2.3 Disk Management F.2.3.1 Use the available disk administration utility. F.2.3.2 Use the available disk partitioning program. 2011 ECDL Foundation Ref: EUCIP IT Administrator - Fundamentals - Syllabus V1.0 Page 6 of 13

F.2.3.3 F.2.3.4 F.2.3.5 Recognise the most common file systems your operating system can use. Know file and directory attributes and their function. Understand the importance of creating backups. F.2.4 Disk Maintenance F.2.4.1 Use an available utility to test disks and repair problems. F.2.5 Shared Resources and Account Permissions F.2.6 Administrative Tools F.2.7 Diagnosing and Troubleshooting F.2.4.2 F.2.4.3 F.2.5.1 F.2.5.2 F.2.5.3 F.2.5.4 F.2.5.5 F.2.6.1 F.2.7.1 F.2.7.2 F.2.7.3 F.2.7.4 Describe fragmentation and explain why it occurs. Know what defragmentation is and use a utility to perform defragmentation. Recognise unwanted files on a disk and use an available utility to remove unwanted files. Know what shared resources are. Be aware of their benefits and their security and privacy risks. Create shared resources like: file resources and printer resources. Know how to install a network printer. Know how to check the printer status (print queue status). Know how to cancel, pause or reorder a print job. Know how to use the available utility for managing users and groups. Be able to use the available diagnostic programs to analyse the current hardware and software settings. Be able to make and use a repair disk, emergency disk, for recovery. Also, know the way the disk works. Be able to diagnose printing problems. Know the available utility used to monitor memory and its functions. 2011 ECDL Foundation Ref: EUCIP IT Administrator - Fundamentals - Syllabus V1.0 Page 7 of 13

F.2.7.5 Use the availability utility to monitor the events, system log. F.2.8 Databases F.2.8.1 Be aware of the need for consistent data storage on servers. F.3 Networks F.3.1 OSI Reference Model F.3.2 Physical, Datalink and Network Layers F.3.3 Transport, Session and Presentation Layers F.2.8.2 F.2.8.3 F.2.8.4 F.3.1.1 F.3.2.1 F.3.2.2 F.3.2.3 F.3.2.4 F.3.2.5 F.3.2.6 F.3.2.7 F.3.3.1 Know the requirements for installing a DBMS. Be aware of the term ACID and the related issues. Be aware of the transaction log and its purpose. Describe the role of the different OSI model layers: physical, data link, network, transport, session, presentation, and application. Describe the properties of analog and digital signals. Distinguish between bits and bytes in digital binary signals. Understand and distinguish between types of Network Cables, that can be used, such as coaxial, twisted pair, fiber optic. Know their capabilities and limitations. Recognise the main network topologies like: bus, star, ring, tree. Describe Ethernet systems like: data transmission rates and media. Describe circuit and packet switching concepts. Explain the purpose of an addressing system. Illustrate the aims of IP protocol. Describe IP addressing, the relationship between IP addresses and network. Describe principles of routing. Define port, well-known-port, and connection. Describe the purpose of TCP protocol. 2011 ECDL Foundation Ref: EUCIP IT Administrator - Fundamentals - Syllabus V1.0 Page 8 of 13

F.3.3.2 F.3.3.3 F.3.3.4 Describe the purpose of Network Address Translation (NAT), Port Address Translation (PAT). Recognise different types of NAT like: SNAT, DNAT. Recognise the function of the Dynamic Host Configuration Protocol (DHCP). Understand how Multipurpose Internet Mail Extensions (MIME) protocol can be used as a way to manage different objects. F.3.4 Application Layer F.3.4.1 Describe the purpose of TELNET. F.3.5 World Wide Web (WWW) F.3.4.2 F.3.5.1 F.3.5.2 F.3.5.3 F.3.5.4 F.3.5.5 Describe the purpose of file transfer protocol (FTP). Define the term uniform resource locator (URL). Describe the aim and the main operations of the domain name system (DNS). Describe the purpose of the HTTP, HTTPS protocols. Define the term cookie. Recognise the benefits and dangers of cookies. Understand the purpose of the main markup languages and style sheets like: HTML, XML, CSS. F.3.6 E-Mail F.3.6.1 Describe the purpose and components of simple mail transfer protocol (SMTP). Describe the structure of an e-mail address. F.3.7 Groupware and Sharing F.3.6.2 F.3.6.3 F.3.7.1 F.3.7.2 F.3.7.3 Understand the purpose of the POP3, IMAP protocols. Understand how MIME relates to SMTP. Describe the purpose and features of instant messaging (IM) systems. Describe the purpose and use of a mailing list. Describe the purpose and use of a forum. 2011 ECDL Foundation Ref: EUCIP IT Administrator - Fundamentals - Syllabus V1.0 Page 9 of 13

F.3.8 Connecting to a Network F.3.9 Network Services Usage and Configuration F.3.7.4 F.3.7.5 F.3.8.1 F.3.8.2 F.3.8.3 F.3.8.4 F.3.9.1 F.3.9.2 F.3.9.3 F.3.9.4 F.3.9.5 F.3.9.6 F.3.9.7 F.3.9.8 Understand the term netiquette. Describe the purpose of file sharing protocols like: SMB, CIFS. Connect a computer to an Ethernet segment like: 10BaseT, 100BaseT, 100BaseF. Connect a computer to a wireless network. Know how to use Access Point. Know why and how to set the channel, encryption and device authentication. Install network card drivers on different operating systems. Configure IP base parameters on different operating systems. Know how to install, configure and update Internet browser software. Be able to check for and change the default browser. Install, update and configure mail software like: POP3, IMAP, SMTP, news server. Configure e-mail accounts and related items like: POP or imap server, SMTP server. Configure automatic handling rules for e-mail. Setup email format types like: HTML, text. Use an FTP program for simple file transfers. Share disks, directories, printers using various operating systems. Use ICMP with the ping command to test server reachability and network behaviour under stress. F.4 IT Security F.4.1 Basic Concepts F.4.1.1 Understand the main aspects of information security: confidentiality, integrity, availability. 2011 ECDL Foundation Ref: EUCIP IT Administrator - Fundamentals - Syllabus V1.0 Page 10 of 13

F.4.2 Authentication, Availability and Access Control F.4.1.2 F.4.1.3 F.4.1.4 F.4.1.5 F.4.1.6 F.4.2.1 F.4.2.2 F.4.2.3 Understand the need for disaster recovery and business continuity plans in an organisation. Be aware of the main principles, advantages and limitations of symmetric and asymmetric encryption. Be aware of the hash and digest functions. Understand the key principles and characteristics of encryption for enforcing confidentiality. Understand how to use hashing and digest to enforce integrity and authentication. Understand how digital signatures are used to enforce non-repudiation. Understand the main principles of SSL. Understand how smartcards are used to store private keys and for ciphering, deciphering. Describe different authentication schemes like: plain text, challenge/response, public key. Know the principles of access control and the main approaches like: MAC, DAC, RBAC. Know different types of information availability requirements. F.4.3 Malware F.4.3.1 Understand how a command can be executed on a PC and how these methods can be used to infect computers. F.4.3.2 F.4.3.3 F.4.3.4 Understand the terms adware, spyware. Recognise methods used to distribute adware, spyware like: using MIME types, macros, applets. Know how to defend a PC from these methods like: disabling macros, disabling dangerous MIME types, only enabling signed applets, training computer operators. Recognise basic types of viral software like: trojans, viruses, worms. Know how an anti-virus program works. Understand the purpose and limitations of anti-virus programs. 2011 ECDL Foundation Ref: EUCIP IT Administrator - Fundamentals - Syllabus V1.0 Page 11 of 13

F.4.4 Public Key Infrastructure F.4.4.1 Understand public key infrastructure (PKI) and its principal components: Registration Authority and Certification Authority. F.4.5 Network Security F.4.5.1 Be aware of the main type of attacks to the TCP/IP stack like: sniffing, spoofing, rerouting, connection hijacking, (distributed) denial of service. F.4.5.2 F.4.5.3 F.4.5.4 F.4.5.5 F.4.5.6 F.4.5.7 F.4.5.8 Understand the security risks related to wireless networks and the available solutions. Understand the concept of services as access points to servers, and that unnecessary services should not be enabled. Be aware of malicious usage like: abusive usage, denial of service, data falsification. Be aware of the risks of DNS misuse. Be aware of the main authentication schemes and their vulnerability. Be aware servers can be exploited due to protocols or software weaknesses. Recognise relevant security information that can be found in system log files. Understand the difference between http, https based web sites. Understand that an e-mail source address and associated information can be forged. Understand the term spam. Outline methods to control spam. F.4.6 Firewalls F.4.6.1 Understand the term firewall and the advantages and limitations of a firewall. F.4.6.2 F.4.6.3 Understand the term demilitarized zone (DMZ). Understand how to use a proxy to save IP addresses and secure an internal network. 2011 ECDL Foundation Ref: EUCIP IT Administrator - Fundamentals - Syllabus V1.0 Page 12 of 13

F.4.7 Social, Ethical and Legal Aspects of Computer Security F.4.6.4 F.4.7.1 F.4.7.2 F.4.7.3 F.4.7.4 F.4.7.5 Understand IP firewall principles for restricting IP services access. Understand proxy firewall principles for restricting and securing protocol handling. Understand the terms privacy, anonymity, pseudonymity. Know the main legal requirements relating to protecting personal data in your country. Understand ethical issues associated with monitoring in the job like: email monitoring, websurfing controlling, job surveillance. Recognise common forms of computer crime like: device theft, phishing, cracking, identity theft. Be aware of Data Protection Legislation (European 95/46 Directive) and understand the associated implications for personal data processing. 2011 ECDL Foundation Ref: EUCIP IT Administrator - Fundamentals - Syllabus V1.0 Page 13 of 13