Overview

Framework:
RQF
Level:
Level 2
Unit No:
R/618/3689
Credits:
6
Guided learning hours:
48 hours

Aim

Learners will learn about network management functions, cloud computing and how to manage different network types using a range of tools and services, including ethical hacking.

Unit Learning Outcomes

1

Know about network management systems and tools.

AC 1.1:

Network management functions: configuration options (user groups), account management, performance, response times, traffic reporting.

Different operating systems software: Windows, Linux, mobile.

Considering differing protocols and layouts, including those utilising mobile devices, TCP/IP, POP, DNS.

Networking tools: Wireshark (https://www.wireshark.org/), system-specific software.

AC 1.2:

Network documentation: technical record of the hardware, software, servers, directory structure, user profiles, data, and how they all work together, should also include any information that helps administrators and IT practitioners to keep the network up and running smoothly such as testing reports and service logs.

Assessment Criteria

  • 1.1

    Describe network management functions.

  • 1.2

    Use network management tools to document a network.


2

Be able to implement network management procedures for a specific purpose.

AC 2.1:

Learners should demonstrate that they have the skills to manage a network and provide maintenance on an existing network.

Configuration options: user accounts, roaming profiles, server settings, local configurations, drive mappings, virus scanning options.

User interface configuration: drive access, software access.

Regular maintenance activities: backup and restore options, account creation and deletion, account modifications, password and account rights changes, system testing, virus scan.

Documentation updates and service logs.

Maximum performance: improved network speed and/or capacity.

Assessment Criteria

  • 2.1

    Use tools to manage and maintain a network ensuring maximum performance.


3

Understand how enabling network technologies can be used to support business.

AC 3.1:

Bring your own device (BYOD) management features: policies concerned with using own devices on a network (viewing past histories, sharing data), maintenance support in organisations (physical support, upgrading hardware and software), device configuration support (user accounts, access rights, access to peripheral devices such as printers).

AC 3.2:

  • Cloud systems:
  • Cloud types: private, public, hybrid.
  • Cloud deployment: how cloud services are deployed and accessed.
  • Cloud storage: access, permissions.
  • Security: considerations when using cloud technology.

Business value: scalability, security, hardware independence, costs, access, competitiveness, communication/collaboration.

Assessment Criteria

  • 3.1

    Discuss the features of bring your own device (BYOD) management.

  • 3.2

    Investigate the different types of cloud systems and their business value.


4

Be able to use enabling network technologies.

AC 4.1:

Ethical hacking to support network management, penetration testing, firewalls:

Examining security features as tools to support firewall management, access controls, user rights, virtual private network access.

Applying penetration testing as a tool to support network management (port scanning, vulnerability scanning, password cracking).

AC 4.2:

IoT network: connecting smart appliances and mobile devices on a 4G or 5G network.

Assessment Criteria

  • 4.1

    Apply ethical hacking tools to ensure network security.

  • 4.2

    Develop a network that uses the Internet of Things (IoT).