Demonstrate safety procedures, proficiency, and skills concerning technology in work environment
Identify proper netiquette when using e-mail, social media, and other technologies for communication purposes
Identify potential abuse and unethical uses
Describe possible threats for laptops, tablets, computers, and networks
Discuss consequences of unethical uses of technology [such as piracy, downloading, license infringement, and inappropriate use of software, hardware, and devices] in the workplace
Explain importance of data security, confidentiality, and integrity
Build cabling [passthrough, crossover, and TAP]
Design a basic network topology
Compare and contrast common operating systems and common file systems
Implement Active X and Java Security
Set up shared documents/folders and back up data using a utility
Explain network design elements and components
Implement common protocols and services
Troubleshoot security issues related to wireless networking
Summarize types of attacks. threats, and vulnerabilities
Compare and contrast the function and purpose of authentication services
Install and configure security controls when performing account management
Use appropriate cryptographic methods, Public Key Infrastructure (PKI), certificate management, and associated components
Orientation
Safety Meetings
Fundamentals of Computing
On-the-job training
Security Policies & Protocols
Assists in developing security policies and protocols
Locates organizational policies intended to maintain security and minimize risk and explains their use
Explains company or organization's policies regarding the storage, use and transfer of sensitive data, including intellectual property and personally identifiable information. Identifies data life cycle, data storage facilities, technologies and describe
Assists in enforcing company compliance with network security policies and protocols
Ensures that password characteristics are explained and enforced and that updates are required and enforced based on appropriate time intervals
Assists employees in the use of technologies that restrict or allow for remote access to the organization's information technology network
Articulates the business need or mission of the organization as it pertains to the use of IT systems and the storage of sensitive data
Technical Support
Provides technical support to users or customers
Manages inventory of IT resources
Installs and configures hardware, software and peripheral equipment for system users
Tests computer system performance
Troubleshoots system hardware and software
Diagnoses and resolves customer-reported system incidents
Administers equipment
Network Support
Diagnoses network connectivity problems
Repairs network connectivity problems
Tests and maintains network infrastructure including software and hardware devices
Implements security measures for users in system and ensures that system designs incorporate security configuration guidelines
Assists in network backup and recovery procedures
Integrates new systems into existing network architecture
Establishes adequate access controls based on principles of least privilege and need-to-know
Server Support
Conducts functional and connectivity testing to ensure continuing operability
Conducts periodic server maintenance including cleaning (physically and electronically), disk checks, system configuration and monitoring, data downloads, backups and testing
Manages accounts, network rights and access to systems and equipment
Supports network components specific to the server platform (i.e. NIC card, or network plane on blade chassis, or other components based on work assignment).
Diagnoses faulty system/server hardware; seeks appropriate support or assistance to perform server repairs
Resolves hardware/software interface and interoperability problems
Checks system hardware availability, functionality, integrity and efficiency
Documents compliance with or changes to system administration standard operating procedures
Monitors and maintains server configuration
Verifies data redundancy and system recovery procedures
Assists in the coordination or installation of new or modified hardware, operating systems and other baseline software
Provides ongoing optimization and problem-solving support
Configuration Management
Installs and maintains cyber security detection, monitoring and threat management software
Coordinates with network administrators to administer the updating of rules and signatures for intrusion/detection protection systems, anti-virus and network black and white list
Manages IP addresses based on current threat environment
Risk and Vulnerabilities
Ensures that data back up and restoration systems are functional and consistent with company's document retention policy and business continuity needs
Applies security policies to meet security objectives of the system
Documents systems security operations and maintenance activities
Threat Detection
Identifies organizational trends with regard to the security posture of systems; identifies unusual patterns or activities
Assists in researching cost-effective security controls to mitigate risks
Documents and escalates incidents that may cause immediate or long-term impact to the environment
Defense to Intrusion and Attack
Performs virus scanning on digital media
Tracks and documents computer network defense incidents from initial detection through final resolution.
Customer Engagement
Perform basic interpersonal skills needed in a help desk environment.
Perform interpersonal skills needed in a help desk environment including conflict resolution.
Participate in efforts to provide engineering support or leadership.
Interested in this apprenticeship?
Sign up to receive notifications about changes and updates about Network Systems and Security Technician.