People credited with this unit standard can understand the organisation’s security policy.

This standard is intended for people required to administer security systems for multi-user computer systems as fundamental knowledge of the areas covered. For those working in or entering the Information Technology industry in Information Technology Services. As additional knowledge for those wanting to understand the areas covered. People credited with this unit standard can understand the organisation’s security policy. Manage the security of desktop computers connected to the system. Maintain security systems for a multi-user computer system. Manage security systems for a multi-user computer system. Review security systems for a multi-user computer system. Provide technical support for using security systems for a multi-user computer system. The performance of all outcomes is to a standard expected in a professional environment.

Course Content

  • The organisation’s security policy is located
  • The organisation’s security policy is read and questions about unclear issues are addressed
  • Desktop computers are scanned for viruses 
  • Viruses found are recorded and removed according to the company’s standards, procedures and Security Policy 
  • Desktop computers are monitored for illegal software
  • Incidences of illegal software are recorded 
  • Recording of viruses and illegal software is reported according to the company’s standards and procedures
 
  • Back-ups are determined and stored according to organisational guidelines 
  • Back-ups are restored according to the organisation’s standards, procedures, and security policy
  • Configuration changes are made to the security systems according to organisation requirements
  • Changes to the security systems are authorised and implemented according to organisation standards, procedures, and security policy
  • Changes to the security systems maintain the integrity and security of the system
  • Internal and external resources are used to identify and update security gaps
  • Security exposures and violations are identified, and action is taken according to organisation requirements and security policy
  • Access is provided according to organisation requirements and Security Policy
  • Monitoring and tuning of the security system ensure the operation and performance meet the manufacturer’s and organisation’s specifications
  • Monitoring and tuning of the security system ensure the operation and performance are in line with security policy
  • The security needs of the organisation are reviewed
  • Software is used to evaluate and report on the security in place in the systems
  • In-built security and access features of the systems operating system are reviewed. The file security categorisation scheme is reviewed
  • The file security categorisation scheme is reviewed
  • Control methods used in the system are reviewed
  • Module and system-wide controls are reviewed 
  • The review procedure meets organisation standards and procedures
  • The review recommends improvements that need to be made to the security system
  • User problems relating to the security system are identified and resolved following organisation procedures 
  • Advice on the use of a security system is provided according to organisation requirements
  • Non-accredited: Short course only  
  • Duration: 1h 20m
  • Delivery: Classroom/Online/Blended
  • Access Period: 12 Months 
Print Button
Scroll to Top