PBL: Network Design. Competency: Networking Installation Planning & Configuration (sizing, expandability, redundancy)



Similar documents
FBLA: NETWORKING CONCEPTS. Competency: General Network Terminology and Concepts

FBLA: COMPUTER PROBLEM SOLVING. Competency: Personal Computer Components

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

MCSE Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required)

IT Networking and Security

BUSINESS AND INFORMATION TECHNOLOGY COMPUTER NETWORK ADMINISTRATOR LEVEL II GRADES 11-12

Course Syllabus. Fundamentals of Windows Server 2008 Network and Applications Infrastructure. Key Data. Audience. Prerequisites. At Course Completion

Networking Technology Online Course Outline

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

ITKwebcollege.ADMIN-Basics Fundamentals of Microsoft Windows Server

CompTIA Network+ (Exam N10-005)

MCSE Objectives. Exam : TS:Exchange Server 2007, Configuring

המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון טל' פקס בשיתוף עם מכללת הנגב ע"ש ספיר

Introduction. Assessment Test

CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA. Test Code: 8148 Version: 01

MOC 6435A Designing a Windows Server 2008 Network Infrastructure

MCSA: Windows Server 2008

MCSE SYLLABUS. Exam : Managing and Maintaining a Microsoft Windows Server 2003:

Fundamentals of Windows Server 2008 Network and Applications Infrastructure

Network Security Guidelines. e-governance

ICANWK406A Install, configure and test network security

Implementing and Administering Security in a Microsoft Windows Server 2003 Network

IT Networking and Security

CCT vs. CCENT Skill Set Comparison

Recommended IP Telephony Architecture

Training Name Installing and Configuring Windows Server 2012

MCSA Security + Certification Program

Local Area Networks (LANs) Blueprint (May 2012 Release)

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

Lesson 1 Quiz Certification Partners, LLC. All Rights Reserved. Version 2.0

Cisco Networking Professional-6Months Project Based Training

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Test Code: 8148 / Version 1

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

Network and Security Controls

VPN. Date: 4/15/2004 By: Heena Patel

FBLA Computer Problem Solving aligned with Common Core FBLA: Computer Problem Solving RST RST

Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0

Fundamentals of Network Security - Theory and Practice-

Course 6292A: Installing and Configuring Windows 7 Client. About this Course. Audience Profile

MCSA Objectives. Exam : TS:Exchange Server 2007, Configuring

Network Technology (10101)

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Associate in Science Degree in Computer Network Systems Engineering

Planning and Maintaining a Microsoft Windows Server Network Infrastructure

What the student will need:

סילבוס -MCITP מנהלי רשתות

NETWORK SYSTEMS ENGINEER II

Gigabit SSL VPN Security Router

InCert Network Security Professional Certificate Description for Candidates

Mobile MOUSe SERVER ADMINISTRATOR ONLINE COURSE OUTLINE

How To Protect Your Network From Attack

Information Technology Career Cluster Advanced Cybersecurity Course Number:

IP Telephony Management

Advanced Higher Computing. Computer Networks. Homework Sheets

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

OVERVIEW OF TYPICAL WINDOWS SERVER ROLES

Computer Network Engineering

Network Security Administrator

Course Description and Outline. IT Essential II: Network Operating Systems V2.0

AV-006: Installing, Administering and Configuring Windows Server 2012

CDS and Clearing Limited Thapathali, Kathmandu 7 th Level (Technical) Syllabus

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Implementing a Microsoft Windows 2000 Network Infrastructure

Configuring and Administering Windows 7

Eleventh Hour Security+

MICROSOFT CERTIFIED SYSTEMS ENGINEER Windows 2003 Track

Understanding Windows Server 2003 Networking p. 1 The OSI Model p. 2 Protocol Stacks p. 4 Communication between Stacks p. 13 Microsoft's Network

ACADEMIC PROGRAM REVIEW PC AGE 145 TALMADGE ROAD EDISON, NJ REVIEW DATE. Report Amended October 2011

Course 50322B: Configuring and Administering Windows 7

Configuring Windows Server 2008 Network Infrastructure

MSP Service Matrix. Servers

ANNE ARUNDEL COMMUNITY COLLEGE ARNOLD, MARYLAND COURSE OUTLINE CATALOG DESCRIPTION

SSVP SIP School VoIP Professional Certification

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

CTS2134 Introduction to Networking. Module Network Security

modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:

Installing and Configuring Windows 7 Client

WORK PROCESS SCHEDULE COMPUTER SYSTEMS ANALYST O*NET-SOC CODE: RAPIDS CODE: 2017HY. Work Process and Classroom Training Duties and Hours

Basics of Internet Security

Retention & Destruction

Network Access Security. Lesson 10

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Protecting the Home Network (Firewall)

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Introduction p. 2. Introduction to Information Security p. 1. Introduction

MCSA Instructor-led Live Online Training Program. Course Outline MCSA Deploying and Managing Windows Server 2012

Steelcape Product Overview and Functional Description

Career and Technical Education Adapted CTE Course Blueprint of Essential Standards. Business, Finance, and Information Technology Education

Table of Contents. Page 1 of 6 (Last updated 30 July 2015)

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

MCITP MCITP: Enterprise Administrator on Windows Server 2008 (5 Modules)

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

Troubleshooting and Maintaining Cisco IP Networks Volume 1

ASM Educational Center (ASM) Est. 1992

Planning for Windows Server 2008 Servers

Transcription:

Competency: Networking Installation Planning & Configuration (sizing, expandability, redundancy) 1. Demonstrate knowledge of the key functions and subsystems of the network. 2. Define the types of network architecture: work group (peer to peer) and server based (domain controlled) and explain how to determine what to use. 3. Identify services delivered by a server, such as application server, communication server, domain/directory server, fax server, file and print server, mail server, and Web server. 4. Gather data to identify customer requirements. 5. Identify and analyze system and network requirements. 6. Identify time, technology, and resource constraints. 7. Identify physical requirements for system implementation. 8. Research product and vendor architecture and equipment specifications/limitations. 9. Prepare cost/benefit/risk analysis. 10. Develop testing strategy. 11. Prepare overall plan for integrating new processes, protocols, and equipment. 12. Analyze facilities bandwidth requirements and capacity planning (e.g., power cable/wire conduit). 13. Revise processes/structure based on testing and certification. 14. Identify hardware/software selection criteria. 15. Select and install a LAN/WAN technology that meet defined set of requirements. 16. Assess user needs to determine which network operating systems (OS) to use. 17. Set up/configure workstation-network connections and test network connectivity using a network analyzer. 18. Set up/configure network components (e.g., interface cards, routers, and switches) 19. Plan, configure, and optimize a TCP/IP physical and logical network. 20. Install network cabling with proper termination according to appropriate standards. 21. Set up a network-wide printing strategy to meet the needs of users. 22. Identify major considerations faced when installing a network operating system (OS). 23. Install a server operating system. 24. Identify and upgrade desktop and server computer hardware and peripherals. 25. Determine methods for segmenting and balancing the network load including number of servers needed. 26. Describe and give examples of application-specific servers. 27. Identify software licensing requirements and categories. 28. Configure and manage file systems and desktop settings and customize. 29. Evaluate the correctness and effectiveness of implementing the network system. Page 1

Competency: Problem Solving/Troubleshooting 1. Identify and analyze potential hardware compatibility problems. 2. Identify and analyze precautions included in programs used on networks (e.g., self-metering, security keys, and required configuration settings). 3. Identify network areas in which application problems could exist (e.g., memory allocation, file lock settings, and resource availability). 4. Perform preventative maintenance on computers and peripherals using available diagnostic tools. 5. Perform software license audits. 6. Coordinate security procedures. 7. Restore LAN operating systems and replace LAN hardware components. 8. Execute testing in accordance with established plans and schedule and interpret test results. 9. Document errors reported/tracked and develop central log strategy. 10. Identify TCP/IP routing trouble shooting tools and troubleshoot TCP/IP routing. 11. Optimize and troubleshoot DNS. 12. Minimize impact of problems on productivity (e.g., minimize downtime). 13. Demonstrate knowledge of basic troubleshooting steps. 14. Evaluate problem-solving outcomes to determine whether the problem was solved as intended and to determine needed follow-up actions. 15. Identify new or replacement networking components needed. 16. Identify causes of remote connectivity problems (e.g., authentication failure, protocol configuration, and physical connectivity). 17. Configure a client to connect to the following servers, UNIX/Linus, Netware, Windows, and Macintosh. 18. Identify client connectivity problems (e.g., incorrect protocol/client software/authentication configuration, or insufficient rights/permission). 19. Identify the utility and interpret the output based on output from a diagnostic utility (e.g., tracert, ping, and ipconfig). 20. Determine the impact of modifying, adding, or removing network services (e.g., DHCP, DNS, and WINS) on network resources and users. 21. Identify the cause of the problem involving a wiring/infrastructure (e.g., bad media, interference, and network hardware). 22. Interpret visual indicators (e.g., link lights and collision lights) to determine the nature of a network problem. Page 2

Competency: Network Administrator Functions 1. Determine file organization by owners, users, and privileges. 2. Establish naming conventions for the network, files, accounts, and services. 3. Determine methods for increasing performance (e.g., segmenting and balancing the network load and resolving channel and cable bottlenecks.) 4. Describe and analyze the role of the network manager and the basic principles of network management. 5. Determine procedures for network optimization and tuning. 6. Determine procedures for managing network assets (e.g., users, groups, and printers). 7. Perform administration functions using network management software. 8. Install and monitor server software applications. 9. Perform system analysis and bandwidth optimization. 10. Perform resource management (e.g., apply standards, address protocols, monitor network activity, perform trend analyses, functional verifications, audits, and monitoring.) 11. Respond to system messages. 12. Document actions taken (e.g., backups, virus prevention, and software distribution). 13. Evaluate software activities and execute network diagnostic program for software and hardware. 14. Manage disk resources by planning how resources are shared and by setting up and administering rights (e.g., permissions and quotas). 15. Identify uses and features of e-mail and calendaring and appropriate policies and procedures for implementation. 16. Provide technical support and orientation to network system. 17. Manage and distribute critical software updates that resolve known security vulnerabilities and other stability issues. Competency: Backup and Disaster Recovery 1. Describe the purpose of a disaster recovery plan for a network. 2. Differentiate between disaster recovery and business continuity. 3. Compare different options of backing up and securing data and restoring a system and perform system backup. 4. Identify common backup devices. 5. Identify the criteria for selecting a backup system. 6. Establish process for archiving files. 7. Select and test a disaster recovery plan. 8. Identify method for avoiding common computer system disasters (e.g., UPS and RAID). 9. Use the features of a server operating system to prevent a disaster or recover when one occurs. 10. Develop backup process and backup and restore data. 11. Implement backup procedures in accordance with a regular schedule. 12. Configure a shadow copy. 13. Identify and maintain battery backup equipment. 14. Install surge suppression protection. 15. Implement recovery procedures as needed. Page 3

Competency: Configuration Network Resources & Services 1. Identify the purpose of network services and protocols. 2. Identify and monitor your network perimeter including rogue devices, VPN servers, and wireless access points. 3. Determine the impact of modifying, adding, or removing network services for network resources and users. 4. Design remote connectivity. 5. Configure network cards and network settings. 6. Describe the purpose and benefits of using a proxy service. 7. Describe the functions of remote access protocols and services, such as telnet, SSH, and remote desktop. 8. Identify and investigate emerging networks and technologies. 9. Configure VLAN to map an IP network. 10. Provide accurate tracking and monitoring of VLAN. 11. Implement security controls such as MAC or DAC to ensure user policies are enabled. 12. Design IP networks and respond to IP based tenders. 13. Calculate subnet and supernet numbers in seconds. 14. Recognize the importance of areas in OSPF design. 15. Recognize the implications of multicasting, VOIP, IPv6. 16. Demonstrate an understanding of the role of routers, switches, modems, and other network devices. Competency: Configuration of Internet Resources Web Service, DMZ, FTP, etc. 1. Configure Internet access for a network. 2. Configure IP addresses and name resolution. 3. Describe and implement IPP (Internet Printing Protocol) services. 4. Explain and implement Secure Sockets Layer (SSL) authentication. 5. Describe the structure and architecture that make up the domain name system (DNS). 6. Plan, manage and monitor DNS servers to ensure that they are functioning properly and to optimize network performance. 7. Explain the characteristics, uses, and benefits of software firewalls and hardware firewalls. 8. Describe the key features of Web servers. 9. Install and Configure Web-based services using utilities and HTML-based administration tools. 10. Establish WWW service, FTP service, SNMP service, and NNTP service. 11. Illustrate Virtual Private Networks (VPN) and the purpose of remote access protocols, including Point-to-Point Tunneling Protocol (PPTP), and Layer 2 Tunneling Protocol (L2TP). 12. Distinguish among the following security methods: DMX, (including dual-homed and triple-homed firewalls), VLan, intranet, extranet, and PKI. 13. Demonstrate knowledge of the principles and operation of wire (e.g., coaxial and fiber optics) and wireless systems. 14. Demonstrate knowledge of the principles and operation of fiber optics, analog, and digital circuits. 15. Describe the role of BGP in Internet routing. Page 4

Competency: Security 1. Identify security requirements and the need for data protection. 2. Develop, document, and implement a network security plan (e.g., install, configure, upgrade and optimize security). 3. Perform preventative maintenance for computer and network security. 4. Demonstrate understanding of physical and logical security issues and solutions. 5. Identify the security procedures and policies necessary to maintain, monitor, and support a network. 6. Identify potential risks and entrance points, including internal and external risks and the tools used to neutralize them (e.g., firewalls, monitoring, antivirus, spyware, and spam protection). 7. Explain principles of basic network security (e.g., IP spoofing, packet sniffing, password compromise, and encryption). 8. Describe the importance and demonstrate forms of network security (e.g., password strategies and user accounts). 9. Identify the characteristics, uses, and benefits of software firewalls and hardware firewalls. 10. Illustrate what fundamental legal issues are involved with security management. 11. Identify various security, video, building utility monitoring systems and how they link to the network. 12. Describe and implement various forms of malware protection for servers, including antivirus software; spam, adware, and spyware filtering; and patch management. 13. Implement Active Directory security and file and folder security in a server-centric network. 14. Identify, define, and describe the relevance of security goals (e.g., integrity, confidentiality, and availability). 15. List the major types of malicious code and identify appropriate countermeasures. 16. Detail types of social engineering attacks. 17. Recognize and understand the administration of securing the following technologies: remote access, e-mail, Web directory, file transfer, and wireless. 18. Identify key elements of VPN (virtual Private Network) and RAS (Row Access Strobe) technology for secure connectivity. 19. Define the difference between host and network based detection. 20. Identify some characteristics of an intrusion detection system. 21. Identify and be able to differentiate different cryptographic standards and protocols. 22. Perform troubleshooting analysis using historical logs to recreate past events. 23. Maintain physical security of classified data, hardware or software. 24. Design security for computers, for accounts, and for authentication. 25. Design an audit policy and incident response procedures. Page 5

References: Career Cluster for Information Technology. 2008. National Association of State Directors of Career Technical Education Consortium. Washington, DC. Business Education Standards. National Business Education Association. Reston, VA. Information Technology Fundamentals and Computer Network Software Operations /Competency Lists. 2009-2010. Virginia Department of Education. Richmond, VA. Network Administration. 1998. Career and Technical Education. Missouri Department of Elementary and Secondary Education. Jefferson City, MO. Computer Operating Systems and Information Technology Foundations. 2005. Career and Technical Education, Tennessee Department of Education. Nashville, TN. Networking 1 and 2 Course Student Profiles. 2008. South Carolina Career and Technology, South Carolina Department of Education. Columbia, SC. Information Support Services and Networking Strands. 2007. Massachusetts VTEC Frameworks. Office for Career/Vocational Technical Education, Massachusetts Department of Elementary and Secondary Education, Malden, MA. IT Technical Support and Networking Course, Student Performance Standards. 2010. Florida Department of Education, Tallahassee, FL. Information Technology Essentials, Georgia Standards. 2009. Career Technical and Agriculture Education, Georgia Department of Education. Atlanta, GA. Information Technology Industry Sector Curriculum Standards. 2005. Career and Workforce Innovations Unit, California Department of Education, Sacramento, CA. Information and Support Services, Business and Information Technology Standards. 2006. Career & Technical Education. Indiana Department of Education, Indianapolis, IN. Internet and Computing Core Certification Standards. 2008. Certiport, Inc. American Fork, UT. Computer Networking Fundamentals Job Ready Assessment. 2009. NOCTI. Big Rapids, MI. Network Planning and Design. 2010. WiKipedia. http://en.wikipedia.org/wiki/network_planning_and_design Network Technologies Course Standards. 2009. Career and Technical Education. Arizona Department of Education, Phoenix, AZ. Network + Preparation Course Competencies. 2010. Technical College System of Georgia, Atlanta, GA. Comp TIA A+ Certification Exam Objectives. Computing Technology Industry Association, Downers Grove, IL, 2008. Network and Computer Systems Administration. Skills Net. Network Systems and Data Communication Analysis. Skills Net. Page 6