Information Technology Engineers Examination. Network Specialist Examination. (Level 4) Syllabus. Details of Knowledge and Skills Required for



Similar documents
Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Information Technology Engineers Examination. Information Technology Service Manager Examination. (Level 4) Syllabus

Information Technology Engineers Examination. Systems Auditor Examination. (Level 4) Syllabus

University of Central Florida Class Specification Administrative and Professional. Network Operations Manager (Enterprise)

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

T141 Computer Systems Technician MTCU Code Program Learning Outcomes

Guide to the IT Passport Examination

Remote Services. Managing Open Systems with Remote Services

Please Note: Temporary Graduate 485 skills assessments applicants should only apply for ANZSCO codes listed in the Skilled Occupation List above.

Module: Sharepoint Administrator

City of Moreno Valley Date Adopted: April 6, 2007 CLASS SPECIFICATION Applications and Database Administrator

Special Item No Information Technology Professional Services. Government Site GSA Rate Effective March 6, 2015

Sample Career Ladder/Lattice for Information Technology

INFORMATION SYSTEMS SPECIALIST

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

CLASS SPECIFICATION Systems Support Analyst II

performs a variety of complicated tasks, may lead and direct the work of others, may report directly to a project

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security

Appendix A-2 Generic Job Titles for respective categories

State of Wisconsin DET File Transfer Protocol (FTP) Roles and Responsibilities

RFP Attachment C Classifications

Senior Network Administrator Page 2

Cloud Infrastructure Services for Service Providers VERYX TECHNOLOGIES

CHAPTER 2: Staffing ROLES OF STAFF. Roles Required to Provide Tech Support

Updating the International Standard Classification of Occupations (ISCO) Draft ISCO-08 Group Definitions: Occupations in ICT

Exhibit F. VA CAI - Staff Aug Job Titles and Descriptions Effective 2015

IT Service Management

CLASS SPECIFICATION Systems Support Analyst I

How To Use Adobe Software For A Business

Columbia College Process for Change Management Page 1 of 7

Capacity Plan. Template. Version X.x October 11, 2012

NOS for Network Support (903)

Planning and Administering Windows Server 2008 Servers

Knowledge Base Data Warehouse Methodology

Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008

Course 2788A: Designing High Availability Database Solutions Using Microsoft SQL Server 2005

About this Course This 5 day ILT course teaches IT Professionals to design and deploy Microsoft SharePoint 2010.

How To Ensure The C.E.A.S.A

APPENDIX 8 TO SCHEDULE 3.3

INFORMATION SYSTEMS SPECIALIST

State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP)

MS Design, Optimize and Maintain Database for Microsoft SQL Server 2008

COURSE NUMBER: CTS 2371

PREMIER SUPPORT STANDARD SERVICES BRONZE SILVER GOLD

Planning and Administering Windows Server 2008 Servers

Management Standards for Information Security Measures for the Central Government Computer Systems

NYSED DATA DASHBOARD SOLUTIONS RFP ATTACHMENT 6.4 MAINTENANCE AND SUPPORT SERVICES

INFORMATION TECHNOLOGY ENGINEER V

SRA International Managed Information Systems Internal Audit Report

Lesson 5-2: Network Maintenance and Management

Designing a Microsoft SharePoint 2010 Infrastructure

System Infrastructure Non-Functional Requirements Related Item List

Testing Intelligent Device Communications in a Distributed System

Dependable, Open and Real-time Architecture for Power Systems

MCSE SYLLABUS. Exam : Managing and Maintaining a Microsoft Windows Server 2003:

Information Technology Solutions. Managed IT Services

NEC s Efforts for Security NEC s Security Solution and Trend of Security Consulting Business

IT Sample Duties and Responsibilities Statements BAND B POSITION CONCEPT: JOURNEYWORKER / WORKING SUPERVISOR / LEAD WORKER

Supplier Security Assessment Questionnaire

The purpose of Capacity and Availability Management (CAM) is to plan and monitor the effective provision of resources to support service requirements.

APPENDIX 3 TO SCHEDULE 3.3 SECURITY SERVICES SOW

MCITP: Sharepoint Administrator Boot Camp (10174, 10231) H6C10S

MSP Service Matrix. Servers

Cisco Change Management: Best Practices White Paper

Information Technology Engineers Examination

Information Disclosure Reference Guide for Cloud Service Providers

APPENDIX 8 TO SCHEDULE 3.3

NTT DATA Big Data Reference Architecture Ver. 1.0

BENCHMARK EVALUATION. Highways and Public Works Information and Communications Technology

Network Technology (10101)

SERVICES BRONZE SILVER GOLD PLATINUM. On-Site emergency response time 3 Hours 3 Hours 1-2 Hours 1 Hour or Less

Exhibit to Data Center Services Service Component Provider Master Services Agreement

IT Networking and Security

Exhibit E - Support & Service Definitions. v1.11 /

Selecting the Right NAS File Server

Certified Information Systems Auditor (CISA)

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version and higher

Configuration Management in the Data Center

R3: Windows Server 2008 Administration. Course Overview. Course Outline. Course Length: 4 Day

On-Demand Virtual System Service

Assistant Information Technology Specialist. X X X software related to database development and administration Computer platforms and

Managing and Maintaining Windows Server 2008 Servers

SOFTWARE DEVELOPMENT STANDARD FOR SPACECRAFT

ADMINISTRATIVE SUPPORT AND CLERICAL OCCUPATIONS SIN 736 1

MCSE Objectives. Exam : TS:Exchange Server 2007, Configuring

Request for Proposal for Application Development and Maintenance Services for XML Store platforms

MCSA Objectives. Exam : TS:Exchange Server 2007, Configuring

CDP 3.0 Release Notes

UPGRADING SOCIAL PROTECTION INFORMATION TECHNOLOGY PROCESSES AND SYSTEMS: IMPLEMENTATION PLAN (OUTPUT 3.2)

SPRINT MANAGED SECURITY SERVICES PRODUCT ANNEX

RSA Authentication Manager 7.1 to 8.1 Migration Guide: Upgrading RSA SecurID Appliance 3.0 On Existing Hardware

Application-Oriented Storage Resource Management

Ames Consolidated Information Technology Services (A-CITS) Statement of Work

Networking Systems (10102)

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Domain 1 The Process of Auditing Information Systems

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

COMPARING STORAGE AREA NETWORKS AND NETWORK ATTACHED STORAGE

Custom Application Support Program Guide Version March 02, 2015

Cisco Application Networking for BEA WebLogic

Transcription:

Information Technology Engineers Examination Network Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination Version 2.0 May 2012

Corporate names or product names used in this syllabus are trademarks or registered trademarks of each company. and TM are not used in the syllabus. - 2 - Copyright(c) 2012 IPA All rights reserved

1 Requirements Definition of Network System 1-1 Requirements analysis of applications 1-2 Analysis of current 1-3 Establishment of work scope In order to analyze requirements from a network application, obtain from the network users and application system developers, which includes performance required by the application as well as transmitting and receiving sites, data quantity and frequency, data types, and data flow direction of the application. When adding an application to an existing network, investigate the traffic flowing in the current, grasp the operating status, find the issues, and evaluate the impact on other applications. When reconstructing the network infrastructure, investigate the traffic of the existing applications and clarify the current problems and issues. Determine the target application, and establish the work scope. Define the purpose, work scale, goal, and execution period of the design and construction projects of the. Techniques, procedures, and practices for collection Definition of goal and scope of the investigation Technical constraints, and standards and processing of hardware and Risk analysis techniques Information collection methods Traffic measurement Traffic analysis tools Application system configuration Network configuration Application configuration (middleware configuration) Network connection technologies and operational environment Availability of resources and project delivery date Person-hours Technical constraints Identifying the major source of user needs Setting the range and quantity of to be collected Analyzing answers from individuals and groups Selecting and obtaining data related to the task and identifying needs for data Assembling and summarizing requested Analyzing, and logically framing mutual dependency Creating detailed materials related to restrictions Traffic measurement and evaluation Inferring the bottleneck of a from the operating characteristics of the application and the system configuration Analyzing the system Creating detailed materials related to work scope Consolidating requirements suitable for the purpose Forecasting construction results Making a plan for demands and constraints of resource Visually representing the order and concurrency of tasks to be executed Setting attainment criteria - 3 - Copyright(c) 2012 IPA All rights reserved

1-4 Definition of requirements Define the design requirements (economic efficiency, performance, conformity to standards) and the operations management requirements (portability, expandability, reliability, security requirements) of the. In addition, review the requirements definition documentation with the network users and application system developers. System capability and system integration Network connection technologies and operational environment Network architectures (network hierarchy, protocols, topologies, and addressing architecture), hardware, and Identification of performance requirements Network security System lifecycle Network reliability Network operations How to proceed with the review Domestic and international standards related to networking Incorporating processing requirements of the organization into system requirements Identifying user expectations Recognizing conflicting requirements and presenting a solution Analyzing the correctness and consistency of Resolving technical issues Evaluating the system configuration Creating detailed materials to support the requirements 2 Design of Network Systems 2-1 Investigation and evaluation of application technologies and products Investigate and evaluate trends of technologies, products, communication services, vendor, installation examples, and standardization related to networking. Perform tests in advance if necessary. Information collection methods Network engineering technologies (network hierarchy, protocols, topologies, addressing architecture, traffic, reliability, security, encoding, data transmission, etc.), hardware, and Network application technologies (e-mail, file transfer, Web access technologies, inter-application communication, content distribution, etc.) Technical constraints, and standards and processing of hardware and Installation test Domestic and international standards related to networking Analyzing, and logically framing mutual dependency Understanding and evaluating technical Creating detailed materials related to restrictions - 4 - Copyright(c) 2012 IPA All rights reserved

2-2 Design of network systems Design the giving priority to the following matters: (1) Determine the system deployment of the server and clients as well as the network architecture including the protocol and topology, and then evaluate the estimated performance. Basic knowledge of network design Application system configuration Upper-layer services in the OSI model Standards and processing of the network connection technologies Architecture design tools and methodology Communication methods Traffic types and load Throughput Statistics relating to forecasting traffic load and throughput Address design Queuing theory Remote access and mobile access Separating realistic requirements from technical wishes Forecasting the results Analyzing trends in forecasting methodology Analyzing technical Utilizing network engineering technology (2) To ensure security, recognize the security policy and determine the network technologies and devices necessary to implement the required security measures. (3) As reliability measures, in order to ensure requisite communication in the event of failure of network devices or communication lines as well as failures due to disasters and accidents, determine how to provide backups and recovery of communication lines and network devices. Determine the network management method to ensure efficient management. System security and potential security holes Safe network Confidentiality of Laws related to networking Reliability Economic efficiency (trade-off between the installation costs and the operational and maintenance costs) Communication services Network connection technologies and operational environment Recognizing and implementing the security policy Evaluating and modifying security standards Designing secure networks (authentication, encryption, access control) Recognizing ethical issues Recognizing the requirement level of application reliability measures Balancing reliability measures and their costs Designing networks meeting the requirements - 5 - Copyright(c) 2012 IPA All rights reserved

(4) Create multiple design scenarios for the network architecture, security measures, and reliability measures. For each scenario, evaluate cost-effectiveness and feasibility. 2-3 Planning of business operations on the new 2-4 Creation of a work plan Create operational procedures for the new network. Also create a business migration plan from the existing network to the new network. Create a work plan to build the new network system. Create the work plan so that it minimally affects the user s business. The work plan should include recovery if failures should occur during the work. Make the work plan known to the network users, application system developers, and hardware and vendors. Coordinate with those involved to rectify problems if they exist. Network standards and processing Application system configuration Reliability and security Network technologies and device implementation Business operations Parties involved and work groups Change procedures The organization s issues related to security Integration methodology How to proceed with the work to implement the system and impact on users Network connection technologies and operational environment Optimal reuse of existing hardware Creating flow diagrams, and making use of diagram tools Forecasting achievement and results Presenting multiple ideas and Evaluating alternative plans, and making a final decision rationally Applying the standards and procedures of technical documents Identifying needs for Analyzing and summarizing Making use of project management tools Maintaining the organization s processes according to the organization s rules Understanding the user application and associating user needs with the application configuration Visually analyzing the relationships between processes and procedures as well as part-whole relationships Collecting and analyzing Interpreting and summarizing results Analyzing and the situation, and creating a plan within the business and financial constraints Planning and coordinating activities Planning and executing activities Making use of project management tools and scheduling Evaluating the ease and quality of network system implementation Coordinating with network users, application developers, and hardware/ vendors - 6 - Copyright(c) 2012 IPA All rights reserved

2-5 Design review Review the design, maintenance and operations plan, and work plan with the network users, application system developers, and hardware and vendors. Clarify the responsibility of each party involved. Procedures of the design review, and how to proceed with it Network connection technologies and operational environment Understanding and judging technical Evaluating the feasibility of the work plan 3 Construction and Test of the Network System 3-1 Setup Arrange for the devices and communication lines according to the work plan. Keep the users, vendors, and installation personnel informed about the plans. When a scheduling issue occurs, coordinate with the parties involved and document the results. 3-2 Installation work 3-3 Creation of test specifications Install the network devices and communication lines, install the network, and connect and configure the devices and communication lines. Clarify test requirements and scope, and create the test specifications. Prepare the test procedure. Also, create an appropriate test plan. Network configuration Software installation and configuration procedures Arrangement of equipment and lines Software installation and configuration procedures Data conversion problems and procedures Compatibility problems and solutions Hardware configuration Test tools and procedures Business requirements Applications Network environment Impact on system performance in the event of an error Analyzing the situation and Considering the risks Creating alternative plans Setting action plans Conforming to proper procedures Coordinating with parties involved and work groups for problem solving Documenting the business process flow in detail Building s Using a continuous improvement strategy and its tools Resolving problems in a timely manner Creating multiple schedules, setting and managing milestones, and coordinating with the parties involved Graphically representing and coordinating the impact on productivity Completing system analysis Analyzing and constructing the system structure Determining test devices Associating errors and system functions Analyzing causes and reasons for problems, and proposing action plans Analyzing data Determining the business situation and the appropriateness of the system Recognizing system strengths and limitations - 7 - Copyright(c) 2012 IPA All rights reserved

3-4 Execution of test 4 Operations and Maintenance of Network System 3-5 Analysis and evaluation of test results Execute tests according to the network system test specifications. Repeat the tests until it is determined that the functions and performance of the application are achieved in accordance with requirements. Document the pass or failure of the test results. In case of a failure, modify the defect, and execute the test again. If there is a problem, propose an improvement to the. 4-1 User support Set up the network user accounts, and make the available to users. Create and execute a training plan for users. Document procedures to ensure security, and make it known to users. Answer questions from users on system usage. 4-2 Creation of maintenance and update (upgrade) policies Create a maintenance policy. In addition, analyze the current capability, and then create plans to reconfigure, enhance, and increase appropriate devices taking economic efficiency into account. Test execution methodology and procedure Products and mutual relationship in the test environment Continuous improvement process for test execution Reporting procedure in the organization Organization s policies and operations Maintenance Expansion of procedures Documentation and archiving Security tools OS and Network configuration for users Applications Network system lifecycle Mutual dependency between the OS and networking system Backup procedure Making use of scheduling tools Analyzing the test results in detail Recording the test results Considering the correct way to proceed with the process Setting and managing milestones Applying rules and principles to processes and data, and deriving a conclusion Evaluating complicated ideas and Considering creative solution techniques, and constructing new plans and approaches Analyzing and evaluating the test results as an actual issue Applying rules and procedures to documentation and accounts Describing an overview of maintenance procedures Identifying and resolving problems Setting an account and a user s use environment Identifying user needs and expectations Forecasting achievement and results Proposing and executing action plans Evaluating complicated ideas and Evaluating system configuration and stability Obtaining new product Grasping the latest technology trend 4-3 Creation of a maintenance plan Create a maintenance plan according to the maintenance policy so that impact on users is kept to a minimum. Also, document maintenance requirements and maintenance procedures, and familiarize network users and application system operators with them. If a change is made, notify them of the details of the change immediately. Maintenance tools and procedures Network system operational procedures Evaluating the significance of defects Arranging and documenting on maintenance Forecasting technical results Understanding data, and logically explaining it with logic to the parties involved according to the purpose - 8 - Copyright(c) 2012 IPA All rights reserved

4-4 Conducting maintenance and update (upgrade) Conduct maintenance or update (upgrade) according to the maintenance plan. Record the details of maintenance activities. 5 Management of Network System 4-5 Backup and data recovery 4-6 Configuration management of 5-1 Monitoring of the network 5-2 Failure analysis and recovery Create a data backup procedure document for devices. Back up data according to the procedure in the maintenance plan. When a problem occurs, recover data efficiently without delay. For each of the devices and network that compose the, assign a name (e.g. an ID), and record the configuration data. Update the record when the configuration is changed or updated (upgraded). Determine the targets of performance and security monitoring, abnormality judgment criteria, and monitoring frequency, and execute monitoring. When a network abnormality or security breach is detected through monitoring, report the matter immediately to the network users and application system operators. To minimize damages from a network failure, identify the faulty portions, analyze the cause, and restore the system within a short time. Update procedures Reasons for updating Data conversion issues and procedures, and compatibility issues and solutions Maintenance and update procedures Documentation procedures and standards for maintenance documents Backup and recovery procedures Backup media Managing master records as a database, and accessing this database Organizational procedures for procurement and investment management Configuration management How to collect monitoring data Usage of monitoring tools OSs Applications Architectures, hardware and LAN/WAN Organization s security policies and procedures Documentation, archiving, and security tools How to analyze monitoring data OSs Applications Architectures, hardware and Network components and equipment management Troubleshooting procedures Executing improvements and modifications in accordance with technological evolution Evaluating system configuration and stability Planning an execution process Understanding system operations and response Understanding and evaluating received data Clearly and concisely representing Identifying system issues, and evaluating their importance Documenting and actions in a detailed support document Evaluating the effect of actions Planning and conducting data backup Making use of configuration element management tools Making use of a master record database Creating detailed support documents Monitoring the safe and efficient usage of resources Monitoring the configuration and efficient usage of the Analyzing monitoring data Documenting analysis results accurately and in detail Understanding trends in performance, and diagnosing performance deviations Making use of project management tools Analyzing and evaluating system operations to examine system effectiveness and efficiency Taking appropriate measures when an abnormality is found Interpreting and evaluating data Troubleshooting system malfunctions and halts Understanding trends in performance and diagnosing performance deviations - 9 - Copyright(c) 2012 IPA All rights reserved

5-3 Analysis of system performance 5-4 Analysis and measures against security breaches Through performance monitoring, analyze system performance according to the performance standards defined in the network system requirements. Perform benchmark tests periodically to check for performance degradation. Update the performance standards in accordance with changes in the due to updates (upgrades). Analyze system security by monitoring the according to the security standards defined in the requirements, and take security measures if there is a problem. Update the security standards in accordance with changes in the due to updates (upgrades). Traffic status Response Benchmark test System lifecycle Security monitoring procedures Intrusion detection/prevention tools and security diagnosis Countermeasures to security breaches Security holes and security patches Computer viruses Utilizing network monitoring and measurement tools Completing system analysis Making use of test tools Analyzing data to evaluate the accuracy of Diagnosing performance limitations Taking appropriate responses to security breaches Utilizing network monitoring, intrusion detection tools, and security diagnostic tools Utilizing vaccination tools Collecting continuously 6 Evaluation of the Network System 6-1 System evaluation 6-2 System improvement proposal Analyze performance, capability, and security status of the current, and then analyze and evaluate the current and potential issues and summarize the results in a report. Investigate trends in network technologies and products periodically, analyze the current issues (during the system lifecycle), and then propose appropriate improvement plans for the itself as well as its maintenance and operations, considering economic efficiency and expandability. Evaluation, monitoring, and reporting procedures and policies for the network system Organization s resources and its restrictions System monitoring process and procedures Documentation standards and distribution procedures in the organization Network system lifecycle Network engineering technology Network application technology Traffic forecast Information collection methods Technical constraints, and standards and processing of hardware and Analyzing and integrating Making use of modeling and simulation tools Evaluating and adjusting action plans Identifying improvement points Creating easy-to-understand reports Proposing modifications and improvements to the system, and analyzing the purpose and constraints Obtaining new product Grasping the latest technology trend Understanding trends in the configurations of other organizations 7 Consulting for Individual Information System 7-1 Advice on planning and analysis Provide technical advice on planning and analysis in individual system development from the viewpoint of project staff or consulting. Network system lifecycle Network system evaluation Network engineering technology Network application technology Understanding trends in the configurations of other organizations Pointing out technical improvement points - 10 - Copyright(c) 2012 IPA All rights reserved

Development 7-2 Advice on design, construction, and test Provide technical advice on design, construction, and testing in individual system development from the viewpoint of project staff or consulting. Network system design, construction, and testing LAN and line services Test execution methodology and procedure 7-3 Advice on operations and maintenance Provide technical advice on operations and maintenance in individual system development from the viewpoint of project staff or consulting. Network system operations and maintenance Network service Network device maintenance Understanding trends in the configurations of other organizations Pointing out technical improvement points Understanding trends in the configurations of other organizations Pointing out technical improvement points - 11 - Copyright(c) 2012 IPA All rights reserved

Network Specialist Examination (Level 4) Syllabus (Version 2.0) Information-technology Promotion Agency, Japan IT Human Resources Development Headquarters, Japan Information-Technology Engineers Examination Center (JITEC) 15th Floor, Bunkyo Green Court Center Office, 2-28-8, Hon-Komagome, Bunkyo-ku, Tokyo 113-6591 Japan Tel: 03-5978-7600 (main switchboard) Fax: 03-5978-7610 Website: http://www.jitec.ipa.go.jp/ 2012-05