Professional Documents
Culture Documents
Learner Resource ICTNWK536
Learner Resource ICTNWK536
LEARNER RESOURCE
This material is developed by Enhance Your Future Pty Ltd for Australian Institute of
Science and Technology (AIST)
This unit describes the skills and knowledge required to manage the deployment and
administration of enterprise communication solutions. It includes email and remote
access email, web portal or content management solution, and enterprise collaboration
tools.
You should read through this resource to develop your knowledge in preparation for
your assessment. At the back of the resource are a list of references you may find useful
to review.
As a student it is important to extend your learning and to search out textbooks, internet
sites, talk to people at work and read newspaper articles and journals which can provide
additional learning material.
Your trainer may include additional information and provide activities, PowerPoint
slide presentations, and assessments in class to support your learning.
Your performance and knowledge using written and practical activities that
apply to a workplace environment.
Your ability to apply your learning to the workplace.
Your ability to recognise common principles and actively use these on the job.
You will receive an overall result of Competent or Not Yet Competent for the assessment
of this unit. The assessment is a competency based assessment, which has no pass or
fail. You are either competent or not yet competent. Not Yet Competent means that you
still are in the process of understanding and acquiring the skills and knowledge required
to be marked competent.
All of your assessment and training is provided as a positive learning tool. Your
trainer/assessor will guide your learning and provide feedback on your responses to the
assessment. For valid and reliable assessment of this unit, a range of assessment
methods will be used to assess practical skills and knowledge.
Written Activity
Case Study
Observation
Practical tasks
Short answer questions
Third Party Report
To be successful in this unit, you will need to relate your learning to your workplace.
You may be required to demonstrate your skills and be observed by your assessor in
your workplace environment. Some units provide for a simulated work environment,
and your trainer and assessor will outline the requirements in these instances.
Performance Evidence
The candidate must demonstrate the ability to complete the tasks outlined in the
elements and performance criteria of this unit; including evidence of the ability to:
Plan, implement and test enterprise communication solutions including:
Testing processes
o Firewall configuration
o Infrastructure
Networked servers
Workstations
Switch
Assessors of this unit must satisfy the assessor requirements in applicable vocational
education and training legislation, frameworks and/or standards.
PRE-REQUISITES
This unit must be assessed after the following pre-requisite unit:
This unit describes the skills and knowledge required to manage the deployment and
administration of enterprise communication solutions. It includes email and remote
access email, web portal or content management solution, and enterprise collaboration
tools.
Let’s begin!
Collaboration tools
SMTP/ POP3 / IMAP / HTTP/ LDAP and Proxy services with SSL / TLS
support
Advanced Access and Security Controls
Effective Anti-Spam which can be tailored to your business
Extensive Groupware including email, calendars, contacts, tasks and journals
Intuitive Webmail works with your browser, or use FTGate Desktop Client
Mail Client auto-configure support (e.g. Outlook/Thunderbird)
IOS auto-configure support
Fast, powerful message processing
1
Microsoft Exchange
Postfix
These tools are designed to make sure that remote teams or even teams in the same
environment logging in from different computers are able to work together in real time.
Preventing the need for laborious and complicated information and document sharing
actions.
Domino or Lotus
Groupwise (Novell)
Microsoft SharePoint
Moodle or Equella
wiki engines
Easy Administration
Powerful Publishing Tools
Built-in SEO Tools
Social Media Integration
Detailed Analytics
Simple Workflow and Publishing Controls
Security
Multi-Platform Capabilities
Exemplary Support
Tiered Permissions
Robust Content Templates
Microdata Support for Voice Search
Comprehensive Search
Versioning for Quick Rollback
Business Alignment
2
IBM websphere
JBoss
Microsoft SharePoint
Moodle or Equella
Oracle
2
https://enginess.io/insights/must-have-enterprise-cms-features
Developed by Enhance Your Future Pty Ltd 17
ICTNWK536 - Plan, implement and test enterprise communication solutions Version 3
Course Code and Name
Identifying enterprise communication solutions to meet
organisational requirements
When completing research into each of the different communication solutions that will
need to be used to meet the organisational need, it is important to consider:
Budget
Security requirements
User profiles
Functionality
License type
Cost
Ease of use
Detailed assessments into the needs of the organisation will need to be completed using:
Research
Consultation
Listed
Quantified
Features
Functions
Compatibility requirements
Cost
Licensing requirements
Implementation requirements
This information should be collected and then placed into a matrix or table so that it can
be compared against the organisation’s requirements.
A suitable selection process may involve the completion of the following actions:
Importance
Urgency
The importance of the requirements will be based on its ability to assist the organisation
in achieving its goals and objectives. The urgency of these requirements will be based on
current vs future requirements for the organisation.
It is important that all organisational requirements are ranked and prioritised and then
provided with a weighted number so that they can be used to make non-biased
decisions about which of the proposed options will be most suitable.
This process should be completed for each of the communication solution options that
have been proposed so that this information is able to be used as a part of the decision-
making process.
A final selection should be made, and evidence from the completed assessments should
be used to substantiate the decision.
Reports may need to be provided to upper management so that final approval for the
selections that have been made can be attained.
Approvals processes
Organisations will have a procurement policy that will outline a range of factors that
need to be complied with, such as:
Licensing preferences
Approvals processes
Preferred vendors
Options should be collected and then assessed against the procurement policies of the
organisation so that suitable selections can be made.
Cloud-based tools
Selections on the format can be made using the information that is held within the
procurement policy of the organisation or consulting with management regarding their
preferences.
Users
Department heads
Management
Personnel
Meetings
Surveys
Focus groups
Organisational needs
Organisational goals
As a part of this, it will be necessary to make sure that a range of information is used and
reviewed, such as:
Vision statement
Mission statement
User cases
Modelling information
It is important to consider:
Privacy
Confidentiality
Assess costs
All expected costs for the implementation process will need to be considered and
assessed in order to make sure that appropriate cost benefits are able to be achieved
and that the implementation that is completed is aligned with the requirements of the
organisation.
Identified
Costed
Obtained
Prepared
Data
Settings
Configuration
Security
Using vendor tools to check the network for readiness to install a mail server
Implementation requirements
The implementation requirements for each of the communication solutions that are to
be put into place within the organisation will refer to all actions and standards that
apply to the installation and deployment of the items.
Configuration requirements
Once the items are installed, they will need to be set up so that they can be used safely
and efficiently within the system, and this is the process of configuration.
Usability requirements
Licensing requirements
Appearance
Default settings
User requirements
Security requirements
Organisational requirements
It is important to make sure that assessments are made regarding the following areas:
Firewall configuration
Security configurations
Variance is any differences between the planned outcomes and the outcomes that were
achieved.
Any modifications that are made to the implementation of the communication solutions
will need to be recorded and then re-assessed against the plan in order to ensure that
suitable compliance has been achieved.
Testing processes
Testing processes are actions that are used to confirm operation and levels of
performance in order to make sure that operational and organisational needs have been
met. Different communication solutions will have different testing needs, and it is
important to make sure that these are considered and that suitable test plans are
developed for each solution. A suitable testing plan will be one that tests for all
necessary requirements using appropriate solutions and tools to confirm compliance
with set requirements.
Functional testing
Functional testing will be completed by performing a range of test actions to ensure that
the full functionality and compatibility of the communication solution with the current
network and ICT system is able to be confirmed.
Penetration testing
Auditing
It is important to make sure that the following components are also assessed during the
testing process:
Utility testing
A range of utility testing should be completed to make sure that access and operation of
the solutions can be confirmed and these should include ping tests and other tests to
confirm operations.
Statistical computations
Error logs
Event logs
Alarm logs
Speed tests
Logs are registers of events that have occurred within the system and can be used to
assess:
Access
Developed by Enhance Your Future Pty Ltd 38
ICTNWK536 - Plan, implement and test enterprise communication solutions Version 3
Course Code and Name
Traffic
Authentications
Errors
Lost packets
Speed
Routing
It is important to collect and assess log information and to use it to make sure that the
organisation's needs are being met by the solution.
Develop solutions
Once the cause of the non-compliance has been confirmed, it will be necessary to
develop suitable solutions that can be used to rectify the communication solutions so
that organisational requirements are able to be met.
Changes to permissions
There are a range of different types of back up procedures that may be used depending
on the data type that is being protected, and these include:
Complete backups
All files that have been selected are backed up, regardless of the setting of the attribute.
When a file is backed up, the attribute is cleared. If the file is later modified, this
attribute is set, which indicates that the file needs to be backed up. Full backups take the
longest to execute and use the most storage space of all types of backups.
Partial backups
This is a type of backup that includes only certain files or directories.
Daily backups
All files created or modified on the same day as the backup will be copied. This
technique doesn't change the attributes of files.
Restoration of data
Restoration of data involves the re-instating of data from a back up that has been
created; specific restoration points should be developed to make sure that data is able to
be restored if it becomes corrupt or lost.
Firewall configuration
The configuration of firewalls involves the setting up of firewalls in a manner to make
sure that the security policies and functional requirements of the organisation are able
to be met.
Within the ACL, all permissions that are attached to the objects that will be managed
and sorted by the firewall will need to be configured.
User accounts
System processes
Permissions will determine what actions can be taken by the system processes and user
accounts within the system. The firewall will either allow or deny these aspects based
on the information contained within the ACL.
Port allocations
Port range
Protocol settings
Encrypted passwords
Two-step authentications
Tokens
It is important to make sure that only authorised, and authenticated accounts are able to
gain access to the system and can complete approved actions once they have gained
access.
Infrastructure
The administration of the network infrastructure involves the configuration of all
hardware and software components of the network in order to support the applications
and functions that are required of the system.
Monitoring
Management
Adjustments
File systems
Naming conventions
Traffic routes
Functionality
Operation
It will be necessary to make sure that access and error logs are monitored and any
suspicious or non-compliant activity is responded to as required.
If you have any questions about this resource, please ask your trainer. They will be only
too happy to assist you when required.
Images