TAP> Multi-User Computer System Security Administration
Course Purpose People credited with this unit standard can understand the organisation’s security policy. What you’ll learn This standard is intended for people required to administer security systems for multi-user computer systems as fundamental knowledge of the areas covered. For …
Course Purpose
People credited with this unit standard can understand the organisation’s security policy.
What you’ll learn
This standard is intended for people required to administer security systems for multi-user computer systems as fundamental knowledge of the areas covered. For those working in or entering the Information Technology industry in Information Technology Services. As additional knowledge for those wanting to understand the areas covered. People credited with this unit standard can understand the organisation’s security policy. Manage the security of desktop computers connected to the system. Maintain security systems for a multi-user computer system. Manage security systems for a multi-user computer system. Review security systems for a multi-user computer system. Provide technical support for using security systems for a multi-user computer system. The performance of all outcomes is to a standard expected in a professional environment.
Duration: 1 Day
Featured Course
Issues affecting the management of a local area computer network
Curriculum
- 6 Sections
- 27 Lessons
- 3 Days
- Unit 1: Understand the organisation`s Security Policy.ASSESSMENT CRITERIA2
- Unit 2: Manage security of desktop computers connected to the system.ASSESSMENT CRITERIA5
- 0.0Desktop computers are scanned for viruses.
- 0.1Viruses found are recorded and removed according to company`s standards, procedures and Security Policy.
- 0.2Desktop computers are monitored for illegal software.
- 0.3Incidences of illegal software are recorded.
- 0.4Recording of viruses and illegal software are reported according to company`s standards and procedures.
- Unit 3: Maintain security systems for a multi-user computer system.ASSESSMENT CRITERIA5
- 0.0Back-ups are determined and stored according to organisational guidelines.
- 0.1Back-ups are restored according to organisation`s standards, procedures and Security Policy.
- 0.2Configuration changes are made to the security systems according to organisation requirements.
- 0.3Changes to the security systems are authorised and implemented according to organisation standards, procedures and Security Policy.
- 0.4Changes to the security systems maintain the integrity and security of the system.
- SPECIFIC OUTCOME 4: Manage security systems for a multi-user computer system.ASSESSMENT CRITERIA5
- 0.0Internal and external resources are used to identify and update security gaps.
- 0.1Security exposures and violations are identified, and action is taken according to organisation requirements and Security Policy.
- 0.2Access is provided according to organisation requirements and Security Policy.
- 0.3Monitoring and tuning of the security system ensures the operation and performance meets the manufacturer`s and organisation specifications.
- 0.4Monitoring and tuning of the security system ensures the operation and performance are in line with Security Policy.
- SPECIFIC OUTCOME 5: Review security systems for a multi-user computer system.ASSESSMENT CRITERIA8
- 0.0Security needs of the organisation are reviewed.
- 0.1Software is used to evaluate and report on the security in place in the systems.
- 0.2In-built security and access features of the systems operating system are reviewed.
- 0.3The file security categorisation scheme is reviewed.
- 0.4Control methods used on the system are reviewed.
- 0.5Module and system-wide controls are reviewed.
- 0.6The review procedure meets organisation standards and procedures.
- 0.7The review recommends improvements that need to be made to the security system.
- SPECIFIC OUTCOME 6: Provide technical support for the use of security systems for a multi-user computer system.ASSESSMENT CRITERIA2
Requirements
- NQF Level 5