Overview
Aim
Learners will learn about network management functions, cloud computing and how to manage different network types using a range of tools and services, including ethical hacking.
Learners will learn about network management functions, cloud computing and how to manage different network types using a range of tools and services, including ethical hacking.
Know about network management systems and tools.
AC 1.1:
Network management functions: configuration options (user groups), account management, performance, response times, traffic reporting.
Different operating systems software: Windows, Linux, mobile.
Considering differing protocols and layouts, including those utilising mobile devices, TCP/IP, POP, DNS.
Networking tools: Wireshark (https://www.wireshark.org/), system-specific software.
AC 1.2:
Network documentation: technical record of the hardware, software, servers, directory structure, user profiles, data, and how they all work together, should also include any information that helps administrators and IT practitioners to keep the network up and running smoothly such as testing reports and service logs.
Describe network management functions.
Use network management tools to document a network.
Be able to implement network management procedures for a specific purpose.
AC 2.1:
Learners should demonstrate that they have the skills to manage a network and provide maintenance on an existing network.
Configuration options: user accounts, roaming profiles, server settings, local configurations, drive mappings, virus scanning options.
User interface configuration: drive access, software access.
Regular maintenance activities: backup and restore options, account creation and deletion, account modifications, password and account rights changes, system testing, virus scan.
Documentation updates and service logs.
Maximum performance: improved network speed and/or capacity.
Use tools to manage and maintain a network ensuring maximum performance.
Understand how enabling network technologies can be used to support business.
AC 3.1:
Bring your own device (BYOD) management features: policies concerned with using own devices on a network (viewing past histories, sharing data), maintenance support in organisations (physical support, upgrading hardware and software), device configuration support (user accounts, access rights, access to peripheral devices such as printers).
AC 3.2:
Business value: scalability, security, hardware independence, costs, access, competitiveness, communication/collaboration.
Discuss the features of bring your own device (BYOD) management.
Investigate the different types of cloud systems and their business value.
Be able to use enabling network technologies.
AC 4.1:
Ethical hacking to support network management, penetration testing, firewalls:
Examining security features as tools to support firewall management, access controls, user rights, virtual private network access.
Applying penetration testing as a tool to support network management (port scanning, vulnerability scanning, password cracking).
AC 4.2:
IoT network: connecting smart appliances and mobile devices on a 4G or 5G network.
Apply ethical hacking tools to ensure network security.
Develop a network that uses the Internet of Things (IoT).