Engineering Graduate Training Scheme "A" Information Engineering. Model Training Guide



Similar documents
Engineering Graduate Training Scheme "A" Electronics Engineering. Model Training Guide

ICTTEN5204A Produce technical solutions from business specifications

ICANWK406A Install, configure and test network security

Engineering Graduate Training Scheme "A" Manufacturing & Industrial Engineering. Model Training Guide

Please Note: Temporary Graduate 485 skills assessments applicants should only apply for ANZSCO codes listed in the Skilled Occupation List above.

University of Central Florida Class Specification Administrative and Professional. Network Operations Manager (Enterprise)

ICT Category Sub Category Description Architecture and Design

NOS for Network Support (903)

Functional Area 3. Skill Level 301: Applications Systems Analysis and Programming Supervisor (Mercer 1998 Job 011)

Information Technology Services

How To Manage A Network Safely

ICT budget and staffing trends in the UK

Introduction to Network Management

PROGRAM CRITERIA FOR ELECTRICAL ENGINEERING TECHNOLOGY

Signal Customized Helpdesk Course

Health Information Technology

ICAWEB423A Ensure dynamic website security

Release: 1. ICANWK607A Design and implement wireless network security

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

ICT budget and staffing trends in Healthcare

Updating the International Standard Classification of Occupations (ISCO) Draft ISCO-08 Group Definitions: Occupations in ICT

Information Technology 2015 Programmes

FUNCTIONAL AREA 12. Network Administration (NET)

ICAWEB405A Monitor traffic and compile website traffic reports

CCNA Networking for Home and Small Business (Discovery 1)

MSP Service Matrix. Servers

ICTTEN4051A Install configuration programs on PC based customer equipment

EUROPASS DIPLOMA SUPPLEMENT

Certified Information Systems Auditor (CISA)

Computer and Information Science

IT LABOR CATEGORY REQUIREMENTS AND DESCRIPTIONS

How To Ensure Network Security

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction

How To Protect Decd Information From Harm

Managed Services. Business Intelligence Solutions

Advanced Diploma In Hardware, Networking & Server Configuration

Accreditation standards for training providers

Exhibit F. VA CAI - Staff Aug Job Titles and Descriptions Effective 2015

GMS NETWORK ADVANCED WIRELESS SERVICE PRODUCT SPECIFICATION

IT Security. Securing Your Business Investments

INFORMATION TECHNOLOGY ENGINEER V

VIRGINIA ASSOCIATION OF COMMUNITY SERVICES BOARDS HIPAA READINESS STEERING COMMITTEE

IBM Tivoli Access Manager and VeriSign Managed Strong Authentication Services. Combine resources for one complete online business security solution.

ICTTEN5168A Design and implement an enterprise voice over internet protocol and a unified communications network

Network Services Internet VPN

LAS VEGAS - CLARK COUNTY LIBRARY DISTRICT

Recommended Programs Per School

Higher Certificate in Information Systems (Network Engineering) * (1 year full-time, 2½ years part-time)

Universal Network Access Policy

SENIOR INFORMATION SYSTEMS MANAGER

Introduction to Information Technology Course Number 10009

Symphony Plus Cyber security for the power and water industries

Master of Science in Software Engineering (MSC)

Testing Intelligent Device Communications in a Distributed System

UMHLABUYALINGANA MUNICIPALITY IT PERFORMANCE AND CAPACITY MANAGEMENT POLICY

Information security controls. Briefing for clients on Experian information security controls

Detailed Syllabus \\Iconsserver\projects\MaxValue-Phase2\Purchased_images PGPX IN TELECOM MANAGEMENT

IT - General Controls Questionnaire

Release: 1. CPPSEC4015A Maintain networked security system

APPENDIX C TABLE OF CONTENTS

PLCs and SCADA Systems

JOB DESCRIPTION/PERSON SPECIFICATION

SAN Conceptual and Design Basics

Senior Network Administrator Page 2

Newcastle University Information Security Procedures Version 3

Out-of-Band Management: the Integrated Approach to Remote IT Infrastructure Management

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---

CESG Certification of Cyber Security Training Courses

ANNUAL SURVEY ON INFOCOMM MANPOWER FOR 2012

Internet Content Provider Safeguards Customer Networks and Services

JOB DESCRIPTION. Service Desk Technician

itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future.

ICAA5141C Design and develop dynamic websites to meet technical requirements

EMPLOYEE S NAME: Vacant BASIC FUNCTION

Data Network Security Policy

Release: 1. ICANWK502A Implement secure encryption technologies

ICTTEN2209A Build and maintain a secure network

Internet Security Good Practice Guide. August 2009

Cloud Security: Getting It Right

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

NETWORK ADMINISTRATOR

NETCARE LIMITED HUMAN RESOURCES ONBOARDING AND ORIENTATION POLICY POLICY NUMBER HR12 HUMAN RESOURCES DEPARTMENT PREPARATION DATE MARCH 2013

Information Technology General Controls Review (ITGC) Audit Program Prepared by:

General Computer Controls

How To Support High Performance Computing

ADMINISTRATIVE STAFF:

Fibre Networks Deliver Customer Value

Chapter 5. Data Communication And Internet Technology

Fear Not What Security Can Do to Your Firm; Instead, Imagine What Your Firm Can Do When Secured!

General Dynamics One Source, LLC Alliant GS00Q09BGD0030 Labor Category Descriptions April

Network Security Administrator

OCR LEVEL 3 CAMBRIDGE TECHNICAL

: Office System Environment

Common Remote Service Platform (crsp) Security Concept

ICANWK602A Plan, configure and test advanced server based security

ICT Qualifications Mandatory Review

Information Resources Security Guidelines

Information Technology Security Procedures

March 2008 Grant Halverson CEO, GFG Group. Regional Processing Models

Transcription:

Engineering Graduate Training Scheme "A" Information Engineering Model Training Guide 1 Model Training Guide (MTG) The Model Training Guide is, as the name suggests, a guide to Companies on the practical experiences considered relevant in the formal training of potential Professional Engineers. 2 Training Programme (TP) The Training Programme is the plan prepared by a Company which is designed to meet the experiences listed in the MTG. This plan is presented for approval (to HKIE) on Form TD1 Part 2 as a part of the Assessment/Reassessment procedures. The TP must cover the experiences necessary to ensure that Trainees can meet the objectives set out in the Training Record-of-Objectives. 3 Training Period - Nominally 2 years The length of the training is based on meeting the objectives and not determined by time. The times shown below are therefore indicators only, the time that a normal trainee would take to meet the relevant objectives. The training period could and often be longer or in some cases shorter than the nominal training period! 4 Training Aim It is important to note that the Scheme A Graduate Training is designed to be the fast track by which a graduate can obtain full professional status. The training therefore covers both Technical and Professional matters. 5 Continuing Professional Development (CPD) An implicit part of the Scheme A training is related to CPD which should be an integral and relevant part of the development of the graduate trainee. 6 Training Stages I Introduction to the Company and to Company Scheme A II Supporting the information environment III Operational environment IV Advanced Topics V Quality Audit VI Objective Design Training VII Engineering Administration 1

7 Training Content (I) Introduction (1 month core) 1. Information about the company (size, history, subsidiaries, products, services, markets, competitors, management structure, management functions, people communications, locations of facilities & their layout, safety, health, welfare of employees, joint management staff consultation, etc.) 2. Information about training programme, prospects & career development (specialist skills, taxonomy, work of related discipline, management techniques, sources of guidance, etc.), sources of information, Web Page address. 3. Appreciation of information ethics like copyright, data privacy, role of the Data Privacy Commissioner, data protection & security, e commerce transaction applications, Hong Kong legislation on these as well as intellectual property, codes of practice. 4. Users of Information Infrastructure. Working in a department/unit which is a heavy user of the information resources, their role in formulating information strategies, computer application development methodologies, user requirements, acceptance criteria, testing & evaluation, handling changes, user training, identifications of cost and benefits, etc.. Observing Office Automation. Computer Supported Co-operating Working and Mission-critical systems. (II) Supporting the Information Environment (3 to 6 months core) Familiarisation with: 1. Existing standards in technology, documentation, networking, programming, program development environment, databases, degree of formality and methodologies used in design specifications, etc. 2. Change Requests, Configuration Management and Trouble Reporting Procedures initiation, analysis, authorisation, allocation of resources, review, acceptance, etc. 3. Study of, existing information systems designs; understanding the linkage between sub-systems; how components are assembled to form sub-systems; information security policy; how they evolve; how they are re-engineered; history of changes, test data, test results; documentation. 4. Study of telecommunications system; understanding the basic operation principles; current available wired and wireless services; network security control and management, future evolution; relevant marketing and regulatory issues. 5. Information Systems Administration processor hardware, telecommunications hardware, operating systems, networking protocols and products, database packages, hyper text protocols, web services, date encryption and PKI, Dynamic re-configuration etc. 2

6. Diagnosis of problems, trouble shooting, testing for functionality, diagnostic tools, debugging approaches. Help-Desk functions. 7. Data Collection for future use network traffic, system utilization and usage patterns, frequency of page visits, their analysis, design improvement as a result, etc. (III) Operational Environment (2 to 4 months core) This is a combination of Computer Systems acting as Servers. User Workstations acting as Clients, Network Administration, Operating System Maintenance & Upgrades, Cabling, Liaison with Service Providers, Computer Machine Room/ Internet Data Centre operations, optical/magnetic tape/disk library and its maintenance, automatic logging, error recovery, cold restart, warm restart, uninterruptible power supply, system administration, adding new users, hardware and software vendors and liaising with them, security aspects, spare parts maintenance, visiting user locations, feedback from users on their satisfaction with the information infrastructure, documentation regarding operational aspects, reporting breakdowns, security breach, theft, loss due to damage etc.. The network aspects will include modems, modem pool, cabling systems, trunking, optical-fibre, routers, bridges, network controllers, multi-plexors, Internet and Intranet, dials-up line versus leased-line versus VPN (Virtual Private Network), traffic management, congestion control, anti-virus and anti-spam control software for problem determination, human resources development, organisational structure, staff development, security, trusting colleagues, performance appraisal, promotion, merit increase, professional updating, etc. etc. (IV) Advanced Topics (up to 3 months) This provides opportunity to update the trainee on new developments in the technology area (operating systems, networking, middleware, broadband network, switching and transmission systems, wireless mobile communications, lightwave communications, distributed processing, high-performance and grid computing distributed databases, replication, transaction processing, programming, graphics, Internet, World Wide Web, wireless access etc. etc.). The new developments could also be in the applications area (e.g. Smart Card for the Transportation Sector, Digital Library, Electronic Commerce, Electronic Publishing, Edu-tainment (i.e. Education plus Entertainment), Artificial Intelligence, Robotics, Virtual Reality, Computer Animation, Computer Supported Cooperative Work Place, Portal Applications, Utility Computing etc. Organisations must demonstrate their pro-active approach as opposed to a reactive approach. (V) Quality Audit (1 to 3 months core) These days quality cannot be taken for granted. It has to be planned, researched and managed. The trainee cannot take an active role. The trainee cannot initiate new steps or supervise current work. The trainee can only play a passive role. It is thus expected that awareness build-up is the essence of this aspect of training. He or she should identify people involved, the organisational structure, mechanisms and procedures, documentation, authority limits, management support, international standards (e.g. ISO 9000). There must be a demonstration of the awareness of the trainee in order to satisfactorily complete this module of the training programme. 3

(VI) Objective Design Training (7 to 12 months core) It involves the trainee in various aspects of the Information Infrastructure. This module is quite different from stages II and III which do not involve any design activity. In as much as design is the hallmark of an engineer, he or she must be involved in technology-oriented design aspects as well as management oriented aspects of planning, implementing and commissioning of new systems and/or major enhancements to existing systems. 1. Technically orientated design aspects Requirement Analysis Architectural Design Detailed Design and Usability (User) Acceptance Test Plan Coding Unit Testing Integration Testing System Commissioning 2. Management orientated planning aspects Software Planning Tool Estimation of Development/Project Documentation Requirements Specification Software Specification Software sizing Project Planning & Control Project Management Management Process Models A standard methodology such as SSADM is recommended. Design should include considerations for maintainability as well as reusability. All aspects of this work should draw on experience of Section II as well as Section V. In particular, familiarity with international and installation standards should find practice here. The Objective Training may involve learning of new methodologies, programming tools, programming languages, language extensions and Computer Aided Software Engineering (CASE) Tools. It is expected that the trainees will be provided with a good working environment such as advanced workstations, CASE Tools (Integrated Tools preferred), good library, Computer Aided Learning facilities etc.. Close supervision of trainees should meet with the dual objectives of effective technology. (VII) Engineering Administration (up to 1 month) This optional element will cover personnel administration, budgeting, office work, office automation, communication, paper work etc. germane to any engineering discipline, as also marketing, customer interface, after sales support, contracting, etc. 4

N.B. 1. This guide should be read in conjunction with Membership Admission Requirements booklet M3. 2. To meet the requirements of the Institution s Approved Formal Training Scheme A, trainees must be under the supervision of an Engineering Supervisor and have followed an approved formal training scheme. 3. During their training, each trainee is required to maintain a Training Log Book, a Training Record of Objectives and a CPD Log Book. 5