0% found this document useful (0 votes)
13 views59 pages

CBLM

The document provides learning materials for setting up computer servers. It includes an introduction to competency-based learning materials, lists the unit and modules, and outlines the learning outcomes and assessment criteria for setting up user access, configuring network services, and performing testing, documentation and pre-deployment procedures for computer servers.

Uploaded by

Sheena Marquez
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views59 pages

CBLM

The document provides learning materials for setting up computer servers. It includes an introduction to competency-based learning materials, lists the unit and modules, and outlines the learning outcomes and assessment criteria for setting up user access, configuring network services, and performing testing, documentation and pre-deployment procedures for computer servers.

Uploaded by

Sheena Marquez
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 59

COMPETENCY BASED LEARNING MATERIALS

Sector: ELECTRONICS SECTOR


Qualification Title: COMPUTER SYSTEM SERVICING NC II

Unit of Competency: SET-UP COMPUTER SERVER

Module Title: SETTING-UP COMPUTER SERVER

Technical Education and Skills Development Authority


CABUGAO SCHOOL OF HANDICRAFT AND COTTAGE INDUSTRY
Cabugao, Bato, Catanduanes

COMPUTER SYSTEMS SERVICING NC II


COMPETENCY –BASED LEARNING MATERIALS

List of Competencies

BASIC COMPETENCIES
Unit of Competency Module Title Code
Participating in
Participate in workplace
workplace 500311105
communication
communication
Work in a team Working in a team
500311106
environment environment
Practice career Practicing career
500311107
professionalism professionalism
Practice occupational Practicing
health and safety occupational health 500311108
procedures and safety procedures
COMMON COMPETENCIES

Apply quality standards Applying quality ELC315202


standards
Perform Computer Performing Computer
ELC311201
Operations Operations
Performing
Perform Mensuration and
Mensuration and ELC311201
Calculation
Calculation
Prepare and Interpret Preparing and ELC311202
Technical Drawing Interpreting Technical
Date Developed: Document No. CSHCI-CSS
June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
Drawing
Use Hand Tools Using Hand Tools ELC724201
Terminating and
Terminate and Connect
Connecting Electrical
Electrical Wiring and ELC724202
Wiring and Electronic
Electronic Circuits
Circuits
Test Electronic Testing Electronic
ELC724205
Components Components
CORE COMPETENCIES
Installing and ELC724201
Install and configure
configuring computer
computer system
system
Setting-Up Computer ELC724333
Set-Up Computer Networks
Networks
Setting-Up Computer ELC724333
Set-Up Computer Servers
Servers
Maintaining and ELC724334
Maintain and Repair
Repairing Computer
Computer system
system

Date Developed: Document No. CSHCI-CSS


June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
HOW TO USE THIS COMPETENCY-BASED LEARNING MATERIAL

Welcome!

The unit of competency, “Set-up Computer Servers”, is one of


competencies of COMPUTER SYSTEMS SERVICING NC II, a course which
comprises the knowledge, skills and attitudes required for a TVET trainer to
posses.

The module, Setting-up Computer Servers, contains training materials


and activities related in identifying learner’s requirements, preparing session
plan, preparing basic instructional materials and organizing learning and
teaching activities for you to complete.

In this module you are required to go through the series of learning


activities in order to complete each learning outcome. In each learning
outcome are Information Sheets, Self-Checks, and Task or Job Sheet. Follow
and perform the activities on your own. If you have questions, do not
hesitate to ask for assistance from your facilitator.

Remember to:

 Work through all the information and complete the activities in each
section.
 Read information sheets and complete the Self-checks, suggested
references are included to supplement the materials provided in this
module.
 Most probably, your trainer will also be your supervisor or manager.
He is there to support you and show you the correct way to do things.
 You will be given plenty of opportunities to ask question and practice
on the job. Make sure you practice your new skills during the regular
Date Developed: Document No. CSHCI-CSS
June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
work shifts. This way, you will improve your speed, memory and your
confidence.
 Use the self-check, Operation sheet or Job/task sheet at the end of
each section to test your own progress. Use the Performance Criteria
checklist or Procedural Checklist located after the sheet to check your
own performance.
 When you feel confident that you have had sufficient practice, ask
your Trainer to evaluate you. The results of your assessment will be
recorded in your Progress Chart and Accomplishment Chart.
You need to complete this module before you can perform the next
module, Maintain and Repair Computer System.

MODULE CONTENT

QUALIFICATION TITLE: Computer Systems Servicing NC II


UNIT OF COMPETENCY: Set-up Computer Servers
MODULE TITLE: Setting-up Computer Servers
MODULE DESCRIPTOR:
This module covers the knowledge, skills and attitudes needed to
Setting-up computer servers for LANs and small-office home-office (SOHO)
systems. It consists of competencies to set-up user access and configures
network services as well as to perform testing, documentation and pre-
deployment procedures.

NOMINAL DURATION: 30 hours

LEARNING OUTCOMES:

At the end of this module you MUST be able to:


1. Set-up User Access
2. Configure Network Services
3. Perform testing, documentation and Pre-deployment procedures

ASSESSMENT CRITERIA:
1. User folder is created in accordance with network operating system
(NOS) features
2. User access level is configured based on NOS features and established
network access policies/end-user requirements.
3. Security check is performed in accordance with established network
access policies/end-user requirements.
4. Normal functions of server are checked in accordance with
manufacturer’s instructions.
Date Developed: Document No. CSHCI-CSS
June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
5. Required modules /add-ons are Installed/updated based on NOS
installation procedures.
6. Network services to be configured are confirmed based on
user/system requirements.
7. Operations of network services are checked based on user/system
requirements.
8. Unplanned events or conditions are responded to in accordance with
established procedures.
9. Pre-deployment procedures is undertaken based on enterprise policies
and procedures
10. Operation and security check are undertaken based on end-
user requirements
11. Reports are Prepared/Completed according to enterprise
policies and procedures.

Date Developed: Document No. CSHCI-CSS


June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
LEARNING OUTCOME SUMMARY

Learning Outcome No. 1:


SET-UP USERS ACCESS
CONTENTS:
1. Network Operating System (NOS) features.
2. Configure user access level based on Network Operating System (NOS)
features.
3. Perform Security Check in accordance with established network
access policies/end-user requirements.
ASSESSMENT CRITERIA:
1. User folder is created in accordance with network operating system
(NOS) features.
2. User access level is configured based on NOS features and established
network access policies/end-user requirements.
3. Security check is performed in accordance with established network
access policies/end-user requirements.
CONDITIONS:
Students/ Trainees must be provided with the following:
1. Workplace Location
2. OH & S policies and procedure
 OH & S policies
 Manuals
3. Computer Systems and Networks
 1 Server
 Peripherals
 1 Desktop Computers
4. Materials
 Wires and Cables
 Appropriate Software
 Computer Storage Media
5. Equipment/testing devices
 Computer
6. Personal Protective Equipment
 Anti-static wrist Wrap
ASSESSMENT METHODS:
1. Witten Test
2. Interview
3. Practical Demonstration

Date Developed: Document No. CSHCI-CSS


June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
LEARNING EXPERIENCE

Learning Outcome #1
SET-UP USSERS ACCESS

Learning Activities Special Instruction


Read Information Sheet 3.1-1 on Read and understand the
Creation of User Folder with Network Information Sheet 3.1-1 and Answer
Operating System (NOS) Features. Self Check 3.1-1. You must answer
Answer Self-check 3.1-1 on Creation all questions correctly before
of User Folder with Network proceeding to the next activity.
Operating System (NOS) Features.
Compare Answers to Answer Key Watch demonstration on Creation of
3.1-1 User Folder with Network Operating
Task Sheet 3.1-1 on Creation of User System (NOS) Features. After the
Folder with Network Operating demonstration Perform Task Sheet
System (NOS) Features. 3.1-1.Task sheet will help you
Perform Task Sheet on Creation of practice your skills.
User Folder with Network Operating
System (NOS) Features. You may refer to the given examples
Evaluate Own Performance Using and templates (e.g. network
Performance Criteria Checklist 3.1-1 operating system features) to achieve
Task Sheet 3.1-1.

The performance criteria checklist


will guide you help you evaluate your
work as you are practicing your skill.

Evaluate your own work using the


performance Criteria. When you are
ready present your work to your
trainer for final evaluation and
recording.

If you have questions about the


templates, please ask your trainer.
Read Information Sheet 3.1-2 on Read and understand the Information
Configuration User Access Level based Sheet 3.1-2 and Answer Self Sheet 3.1-
on Network Operating System (NOS) 2. You must answer all questions
Answer Self-check 3.1-2 on correctly before proceeding to the next
Configuration User Access Level based activity.
on Network Operating System (NOS)
Compare Answer to Answer Key 3.1-2 Watch demonstration on Configuration
Task Sheet 3.1-2 on Configuration User User Access Level based on Networking
Access Level based on Network Operating System (NOS). After the
Date Developed: Document No. CSHCI-CSS
June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
Operating System (NOS) demonstration Perform Task Sheet 3.1-
Perform Task Sheet on Configuration 2. Task Sheet will help you practice your
User Access Level based on Network skills.
Operating System (NOS)
Evaluate Own Performance Using You may refer to the given examples and
Performance Criteria Checklist 3.1-2 templates (e.g. configuration network
operating system (NOS)) to achieve Task
Sheet 3.1-2.

The performance criteria checklist will


guide you help you evaluate your work
as you are practicing your skill.

Evaluate your own work using the


Performance Criteria. When you are
ready, present your work to your trainer
for final evaluation and recording.

If you have questions about the


templates, please ask your trainer.
Read Information Sheet 3.1-3 on Read and understand the
Security check Information Sheet 3.1-3 and Answer
Answer Self-check 3.1-3 on Security Self Check 3.1-3. You must answer
Check all questions correctly before
Compare Answer to Answer Key 3.1-3 proceeding to the next activity.
Task Sheet 3.1-2 on Security Check
Perform Task Sheet on Security Check Watch demonstration on Security
Evaluate Own Performance Using
Check. After the demonstration
Performance Criteria Checklist 3.1-3
Perform Task Sheet 3.1-3.Task sheet
will help you practice your skills.

You may refer to the given examples


and templates (e.g. security check) to
achieve Task Sheet 3.1-3.

The performance criteria checklist


will guide you help you evaluate your
work as you are practicing your skill.

Evaluate your own work using the


performance Criteria. When you are
ready present your work to your
trainer for final evaluation and
recording.

If you have questions about the


templates, please ask your trainer.
Date Developed: Document No. CSHCI-CSS
June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
After reading all activities of this
Learning Outcome, you are ready to
proceed to the next Learning Outcome
on Set-up user’s access.

Date Developed: Document No. CSHCI-CSS


June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
INFORMATION SHEET 1.1-1

NETWORK OPERATING SYSTEM (NOS)

Learning Objectives:
After reading this INFORMATION SHEET, you must be able to:
1. Define briefly what Network Operating System is.
2. Identify the different features of Network Operating System.

Introduction
Set-up Uses Access focuses on the Networking Operating Systems and
their features. The primary purpose of the network operating system is to
allow shared file and printer access among multiple computer in a network,
typically a local area network (LAN), a private network or to other networks.

 NETWORK OPERATING SYSTEM


- A network operating system (NOS) is a
computer operating system; a system
that is designed primarily to support
workstation, personal computer, and in
some instances older terminal that are
connected on a local area network
(LAN).
- The term network operating system is
generally reserved for software that
enhances a basic operating system by
adding networking features. Novell
Netware, Artisoft’s LANtastic, Microsoft
Windows Server, and Windows NT are examples of a NOS.

FEATURES OF NETWORKING OPERATING SYSTEM

 Basic operating system features support like protocol support,


processor support, hardware detection and multiprocessing support
for applications.
 Security features like authentication, restrictions, authorizations and
access control.
 Features for file, Web service, printing and replication.
 Directory and name services management.
 User management features along with provisions for remote access
and system management.
 Internetworking features like routing and WAN ports.
Date Developed: Document No. CSHCI-CSS
June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
 Clustering capabilities.

COMMON TASKS ASSOCIATED WITH NETWORK OPEARTING SYSTEM

 User administration
 System maintenance activities like backup
 Tasks associated with file management
 Security monitoring on all resources in the network

CLIENT
- It is a piece of computer hardware or software that accesses a service
made available by a server. The server is often (but not always) on
another computer system, in which case the client accesses the
service by way of a network.
- The term applies to programs or devices that are part of a client-server
model.
- A client is the requesting program or user in a client/server
relationship.
- For example, the user of a Web browser is effectively making client
requests for pages from servers all over the Web.
- The browser itself is a client in its relationship with the computer that
is getting and returning the requested HTML file. The computer
handling the request and sending back the HTML file is a server.

SERVER
- It is a computer or computer program that manages access to a
centralized resource or service in a network.
- In a computer networking, a server computer designed to process
requests and deliver data to other (client) computers over a local
network or the Internet.

Date Developed: Document No. CSHCI-CSS


June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
- Many types of servers exist, including web servers, mail servers, and
file servers, each type runs software specific to the purpose of server.
- For example, a Web server may run Apache HTTP Server or Microsoft
IIS, which both provide access to websites over the Internet.

WINDOWS SERVER
- Windows server is group of operating systems designed by Microsoft
that supports enterprise-level management, data storage,
applications, and communications.
- A series of server operating systems developed by Microsoft
Corporation.
- Windows servers are more powerful versions of their desktop
operating system counterparts and counterparts and are designed to
more efficiently handle corporate networking, Internet/intranet
hosting, databases, enterprise-scale messaging and similar functions.
- Previous versions of Windows Server have focused on stability,
security, networking, and various improvements to the file system.
- Other improvements also have included improvements to deployment
technologies, as well as increased hardware support. Microsoft has
also created specialized SKUs of windows Server that focus on the
home and small business markets.

LINUX SERVER
- A Linux server is a high-powered variant of the Linux open source
operating system that’s designed to handled the more demanding
needs of business applications such as network and system
administration, database management and Web services.
- Linux servers are frequently selected over other server operating
systems for their stability, security and flexibility advantages. Leading
Linux server operating systems include CentOS, Debian, Ubuntu
Server, and Gentoo.

Date Developed: Document No. CSHCI-CSS


June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
TYPES OF NETWORK OPERATING SYSTEM

1. CLIENT/SERVER NETWORKING OPERATING SYSTES


 Can based on a client/server architecture in which a server
enables multiple clients to share resources. Client/server
network operating systems allow the applications in one or more
dedicated file servers. The server is the center of the system,
allowing access to resources and instituting security.
 Advantages:
- Centralized servers are more stable.
- Security is provided through the server.
- New technology and hardware can be easily integrated into the
system.
- Servers are able to be accessed remotely from different locations
and types of systems.
 Disadvantages:
- Cost of buying and running a server are high.
- Dependence on a central location for operation.
- Requires regular maintenance and updates.
EXAMPLE:
 Bittorrent
 Napster and Gnutella
 Windows for Workgroups
 appleShare

Date Developed: Document No. CSHCI-CSS


June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
2. Peer-to-peer network operating system users are allowed to share
resources and files located on their computers and access shared resources
from others. This system is not based with having a file server or centralized
management source. A peer-to-peer network sets all connected computers
equal; they all share the same abilities to use resources available on the
network.
 Advantages:
- Ease of set-up
- Less hardware needed, no server needs to be purchased.
 Disadvantages:
- No central location for storage.
- Lack of security that a client/server types offers.
EXAMPLE:
 Windows Server
 Linux Server
 Mac OS X Server

 DOMAIN
- It is a group of computers and devices on a network that are
administered as a unit with common rules and procedures. Within the
Internet, domains are defined by the IP address. All address are said
to be in the same domain.

 WORKGROUP
- In a computer networking, a workgroup is a collection of computers
on a local area network (LAN) that share common resources and
responsibilities. Workgroups provide easy sharing of files, printers and
other network resources.
- The Microsoft Windows family of operating systems supports
assigning of computers to named workgroups.

Date Developed: Document No. CSHCI-CSS


June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
 WINDOWS SERVER R2
 Is the most advanced Windows Server Operating system yet, designed
to power the next generation of networks, application, and We
services. With Windows Server 2008, you can develop, deliver, and
manage rich user experiences and applications, provide a highly
secure network infrastructure, and increase technological efficiency
and value within your organization.
 Is a server operating system developed by Microsoft which builds on
the enhancements built on the Windows Server 2008. The operating
system OS which is highly integrated with the client edition of
windows 7 offers improvements in scalability and availability, as well
as power consumption

 WHAT DOES THE R2 STANDS FOR IN WINDOWS SERVER?


 windows server r2 means “Release 2 and the primary
reason why Microsoft office uses the r2 nomenclature as
opposed to revising the major product version is as follow r2
release.

 HOW TO INSTALL WINDOWS SERVER 2008 STEP BY STEP

Using Vista's installation routine is a major benefit, especially for a server


OS. Administrators can partition the system's hard drives during setup.
More importantly, they can install the necessary AHCI or RAID storage
drivers from a CD/DVD or even a USB thumb drive. Thus, error-prone
floppies can finally be sent to the garbage bin.
Note: Windows Server 2008 can also be installed as a Server Core
installation, which is a cut-down version of Windows without the Windows
Explorer GUI. Because you don't have the Windows Explorer to provide the
GUI interface that you are used to, you configure everything through the
command line interface or remotely using a Microsoft Management Console
(MMC). The Server Core can be used for dedicated machines with basic roles
such as Domain controller/Active Directory Domain Services, DNS Server,
DHCP Server, file server, print server, Windows Media Server, IIS 7 web
server and Windows Server Virtualization virtual server.

To use Windows Server 2008 you need to meet the following hardware
requirements:
Component
Requirement:
Date Developed: Document No. CSHCI-CSS
June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
Processor
 Minimum: 1GHz (x86 processor) or 1.4GHz(x64 processor)
 Recommended: 2GHz or faster

Note: An Intel Itanium 2 processor is required for Windows Server 2008 for
Itanium-based Systems
Memory
 Minimum: 512MB RAM
 Recommended: 2GB RAM or greater
 Maximum (32-bit systems): 4GB (Standard) or 64GB (Enterprise and
Datacenter)
• Maximum (64-bit systems): 32GB (Standard) or 2TB (Enterprise,
Datacenter and Itanium-based Systems)
Available Disk Space
 Minimum: 10GB
 Recommended: 40GB or greater

Note: Computers with more than 16GB of RAM will require more disk space
for paging, hibernation, and dump files
Drive
DVD-ROM drive
Display and Peripherals
 Super VGA (800 x 600) or higher-resolution monitor
 Keyboard
• Microsoft Mouse or compatible pointing device
Upgrade notes:
I will not discuss the upgrade process in this article, but for your general
knowledge, the upgrade paths available for Windows Server 2008 shown in
the table below:
If you are currently running:
You can upgrade to:

Date Developed: Document No. CSHCI-CSS


June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
Windows Server 2003 Standard Edition (R2, Service Pack 1 or Service Pack
2)
Full Installation of Windows Server 2008 Standard Edition
Full Installation of Windows Server 2008 Enterprise Edition
Windows Server 2003 Enterprise Edition (R2, Service Pack 1 or Service Pack
2)
Full Installation of Windows Server 2008 Enterprise Edition
Windows Server 2003 Datacenter Edition (R2, Service Pack 1 or Service
Pack 2)
Full Installation of Windows Server 2008 Datacenter Edition

 FOLLOW THIS PROCEDURE TO INSTALL WINDOWS


1. Insert the appropriate Windows Server 2008 installation
flashdrive. If you don't have an installation DVD for Windows
Server 2008, you can download one for free from Microsoft's
Windows 2008 Server Trial website.

2. Reboot the computer.

3. When prompted for an installation language and other regional options,


make your selection and press Next.

4. Next, press Install Now to begin the installation process.


Date Developed: Document No. CSHCI-CSS
June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
5. Product activation is now also identical with that found in Windows Vista.
Enter your Product ID in the next window, and if you want to automatically
activate Windows the moment the installation finishes, click Next.

If you do not have the Product ID available right now, you can leave the box
empty, and click Next. You will need to provide the Product ID later, after
the server installation is over. Press No.

6. Because you did not provide the correct ID, the installation process
cannot determine what kind of Windows Server 2008 license you own, and
therefore you will be prompted to select your correct version in the next
screen, assuming you are telling

7. If you did provide the right Product ID, select the Full version of the right
Windows version you're prompted, and click Next.

Date Developed: Document No. CSHCI-CSS


June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
8. Read and accept the license terms by clicking to select the checkbox and
pressing Next.

9. In the "Which type of installation do you want?" window, click the only
available option – Custom (Advanced).

10. In the "Where do you want to install Windows?", if you're installing the
server on a regular IDE hard disk, click to select the first disk, usually Disk
0, and click Next. If you're installing on a hard disk that's connected to a
SCSI controller,

11. The installation now begins, and you can go and have lunch. Copying
the setup files from the flashdrive to the hard drive only takes about one
minute. However, extracting and uncompressing the files takes a good deal
longer. After 20 minutes, the operate.

12. Then the server reboots you'll be prompted with the new Windows Server
2008 type of login screen. Press CTRL+ALT+DEL to log in.

Date Developed: Document No. CSHCI-CSS


June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
13. Click on Other User.

14. The default Administrator is blank, so just type Administrator and press
Enter.

15. You will be prompted to change the user's password. You have no choice
but to press Ok.

16. In the password changing dialog box, leave the default password blank
(duh, read step #15…), and enter a new, complex, at-least-7-characters-long
new password twice. A password like "topsecret" is not valid (it's not
complex), but one like "T0pSe

17. Someone thought it would be cool to nag you once more, so now you'll
be prompted to accept the fact that the password had been changed. Press
Ok.

Date Developed: Document No. CSHCI-CSS


June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
Self-Check 1.1-1

Multiple Choices:
Instructions: Choose the letter with the correct answer. Write the letter of
your choice on your answer sheet.

1. A computer operating system; a system that is designed primarily to


support workstation, personal computer, and in some instances older
terminal that is connected on a local area network (LAN).
A. Windows server
B. Client
C. Network Operating System
D. Linux Server
2. It is a piece of computer hardware or software that access a service made
available by a server.
A. Client
B. Server
C. Windows Server
D. Network Operating System
3. Is a group of operating systems designed by Microsoft that supports
enterprise-level management, data storage, applications, and
communications?
A. Windows Server
B. Linux Server
C. Server
D. Client
4. Is a high-powered variant of the Linux open source operating system
that’s designed to handle the more demanding needs of business
applications such as network and system administration, database
management and Web services?
A. Client
B. Windows Server
C. Network Operating System
D. Linux Server

5. It is a computer or computer program that manages access to a


centralized resource or service in a network.
Date Developed: Document No. CSHCI-CSS
June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
A. Client
B. Windows Server
C. Linux Server
D. Server

ANSWER KEY

1. C
2. A
3. A
4. D
5. D

Date Developed: Document No. CSHCI-CSS


June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
TASK SHEET 3.1-1

Title: Install Windows Server 2008


Performance Objectives: Given the needed materials, you should be able to
install windows server 2008r2 within 2 hours in accordance with the
industry standards.

Supplies/Materials: installers flash drive

Equipment: Computer

Steps/Procedure:

1. Prepare your supplies/materials needed in installing windows server


2008
2. Proceed to the station (with PC unit) assigned to you.
3. Insert the appropriate Windows Server 2008 installation flash drive.
4. Reboot the computer.
5. Make your selection and press, next.
6. Next, press Install Now to begin the installation process.
7. Enter your product ID in the next window, and if you want to
automatically activate Windows the moment the installation finishes,
click Next. (If you do not have the Product ID available right now, you
can leave the box empty, and click Next. You will need to provide the
Product ID later, after the server installation is over. Press No.)
8. Select your correct version in the next screen, assuming you are
telling.
9. If you did provide the right Product ID, select the Full version of the
right Windows version you're prompted, and click Next.
10. Read and accept the license terms by clicking to select the checkbox
and pressing Next.
11. In the "Which type of installation do you want?" window, click the only
available option – Custom (Advanced).
12. In the "Where do you want to install Windows?", if you're installing the
server on a regular IDE hard disk, click to select the first disk, usually
Disk 0, and click Next. If you're installing on a hard disk that's
connected to a SCSI controller,
The installation now begins, and you can go and have lunch.
Copying the setup files from the flashdrive to the hard drive only
takes about one minute. However, extracting and uncompressing
the files takes a good deal longer. After 20 minutes, the operate.
13. Press CTRL+ALT+DEL to log in.
14. Click on Other User.
15. The default Administrator is blank, so just type Administrator and
press Enter.

Date Developed: Document No. CSHCI-CSS


June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
16. Change the user's password. You have no choice but to press Ok.
17. In the password changing dialog box, leave the default password
blank (duh, read step #15…), and enter a new, complex, at-least-7-
characters-long new password twice. A password like "topsecret" is not
valid (it's not complex), but one like "T0pSe
1. Someone thought it would be cool to nag you once more, so now
you'll be prompted to accept the fact that the password had been
changed. Press Ok.
18. Evaluate your own performance by using Performance Criteria
Checklist.
19. Present your work on your trainer.

Assessment Method:

Use of Performance Criteria Checklist 3.1-1

Date Developed: Document No. CSHCI-CSS


June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
PERFORMANCE CRITERIA CHECKLIST 3.1-1

Criteria

Did you….? YES NO

1. Prepare your supplies/materials needed in


installing windows server 2008?
2. Proceed to the station (with PC unit) assigned to
you?
3. Insert the appropriate Windows Server 2008
installation flash drive?
4. Reboot the computer?

5. Make your selection and press, next?

6. Next, press Install Now to begin the installation


process?
7. Enter your product ID in the next window, and if
you want to automatically activate Windows the
moment the installation finishes, click Next. (If
you do not have the Product ID available right
now, you can leave the box empty, and click
Next. You will need to provide the Product ID
later, after the server installation is over. Press
No.)?
8. Select your correct version in the next screen,
assuming you are telling?

9. If you did provide the right Product ID, select the


Full version of the right Windows version you're
prompted, and click Next?

10. Read and accept the license terms by clicking to


select the checkbox and pressing Next?

11. In the "Which type of installation do you


want?" window, click the only available option –
Custom (Advanced)?

12. In the "Where do you want to install


Windows?", if you're installing the server on a
regular IDE hard disk, click to select the first
disk, usually Disk 0, and click Next. If you're
installing on a hard disk that's connected to a
SCSI controller,
The installation now begins, and you can go and
Date Developed: Document No. CSHCI-CSS
June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
have lunch. Copying the setup files from the
flashdrive to the hard drive only takes about one
minute. However, extracting and uncompressing
the files takes a good deal longer. After 20
minutes, the operate?

13. Press CTRL+ALT+DEL to log in?

14. Click on Other User?

15. The default Administrator is blank, so just


type Administrator and press Enter?

16. Change the user's password. You have no


choice but to press Ok.?

17. In the password changing dialog box, leave


the default password blank ( read step #15…),
and enter a new, complex, at-least-7-characters-
long new password twice. A password like
"topsecret" is not valid (it's not complex), but one
like "T0pSe
1. Someone thought it would be cool to nag
you once more, so now you'll be prompted
to accept the fact that the password had
been changed. Press Ok.?

18. Evaluate your own performance by using


Performance Criteria Checklist?

19. Present your work on your trainer?

Date Developed: Document No. CSHCI-CSS


June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
Date Developed: Document No. CSHCI-CSS
June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
INFORMATION SHEETS 3.1-2

NETWORK OPERATING SYSTEM CONFIGURATION

Learning Objectives:

After reading this Information Sheet, you should be able to:

1. Define server
2. Enumerate types of server
3. Describe each type of server
4. Discuss how to install active directory domain up to deployment of
printer.

Introduction:

“Cannot establish a connection to server” message of hopelessness for those


who are uploading files online, posting photos on Facebook, downloading a
torrent file from peer network, and streaming videos online. But what is this
message all about? What is the server that this message referring to, or in
another hand, what is a server?

 Server
 it is a physical computer that provides services to all client computers
connected to it, allowing them (client computer) to access available
information or resources.
 Is an application or device that performs service for connected clients
as part of client-server architecture. A workstation is a personal
computer that is used for high-end applications such as graphic
design, video editing, CAD, 3-D design, or other CPU and RAM
intensive programs.

An entity in the client/server programming model, where a server is a


software or a program, running on one or multiple computers, that manages
resources and services of the network while handling requests from different
computers to access said resources.

 TYPICAL TYPES OF SERVER


1. Web Servers
- The internet is based on web servers that respond to
request from clients such as web browsers.
2. Application Servers
- A server that provides services to applications such as a
mobile app. For example, a weather app on your phone
might contact to a server for weather data.
Date Developed: Document No. CSHCI-CSS
June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
3. Communications Server
- Servers that provide clients with network connectively and
other communications such as voice. For example, a
telecommunications device that provides 3G or WIFI tp
phones and other clients.
4. Name Servers
- Servers that look up addresses such as mapping a
domain name to an IP. This is basic infrastructure for
networks such as the internet.
5. Directory Service
- Servers that look up resources on a network such as
users, groups and devices. Acts as infrastructure that is
essential to network security such as authenticating
users.
6. API
- A server that implements functionality for other software
by offering an API.
7. Database Server
- Provides access to files.

8. File Servers
- Provides access to files.
9. Game Server
- Servers that implements games or services for a game
such as social elements of game play.
10. Media Server
- Delivers media such as streaming video or audio.
11. Proxy Server
- Acts as an intermediary between clients and servers to
implement functions such as security, monitoring or
anonymization.
12. System Services
- A system is software that perform automation,
calculations and other functions that aren’t directly used
by people. They are often implemented with a service that
run on servers such as microservices.

The advantage of using a server computer

 Servers contain more powerful processors than a desktop computer.


They support multiple processors, multiple cores, and multiple
threads. So, a lot of virtual machines can reside in a single server
without any compromise in performance.
 Servers support advanced RAM technologies like DDR4 SDRAM that is
scalable, gives better performance and more secure.

Date Developed: Document No. CSHCI-CSS


June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
 Have a higher storage capacity as multiple disks can be inserted into
them.
 Servers are manufactured and optimized for 24x7 operating, while
desktops are not.
 Servers are mostly rack-mountable. They are compact (1U/2U) in size
and hence don’t take up much space (unlike the tower-based desktop
CPU’s). Since servers are rack mountable, they can take advantage of
structured cabling.
 Built to support multiple user applications and multiple user access.
Desktops generally support single users.
 Have multiple Network Interface Cards and support technologies like
Adapter teaming and link aggregation. So, multiple interfaces can be
bonded together to achieve higher throughput and traffic can fail-over
to adapters.
 Graphical capabilities of servers are generally very basic as they are
not expected to give graphical outputs themselves but serves are
optimized for multi-user applications like database access.
 Support hot-swappable hard disks.
 Maintained by a system administrator from a central location (like a
data center). So, it is easier to apply security policies to the server and
back-up all critical data. With individual desktops, these things are up
to the users.

 ACTIVE DIRECTORY
 What is Active Directory and Why Should I care?

Active Directory is the brain of a Window Server Network. It is a database


that keeps track of a huge amount of stuff and gives us a centralized way to
manage all our network machine, users, and resources.

 Type of that Active Directory Provides


1. Users and Groups
2. Services (i.e. Email, etc.)
3. Resources (Printer, shared folder folders, etc
4.
 ACTIVE DIRECTORY INSTALLATION
Now that you have prepared the server, you can prepare the server, you can
install AD DS.

Tips: As an alternative to performing steps 1 through 3, you can type


dcpromo.exe at the command prompt. Then skip step 4.

Date Developed: Document No. CSHCI-CSS


June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
1. If it is not already open, open the Server Manager window.
2. Select Roles > Active Directory Domain Services.
3. In the Summarysection,clickRun the Active Directory Domain
Services Installation Wizard (dcpromo.exe).

4. On the Welcome page of the Active Directory Domain Services


Installation Wizard, ensure that the Use advanced mode installation
check box is cleared, and then click Next.

5. On the Operating System Capability page, click Next.

6. On the Choose a Deployment Configuration page, select Create a new


domain in a new forest and then click Next.

7. On the Name the Forest Root Domain page, enter the domain name
that you choose during preparation steps. Then, click Next.

Date Developed: Document No. CSHCI-CSS


June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
8. After the installation verifies the NetBIOS name, on the Set Forest
Functional Level page, select Windows Server 2008 R2 in the Forest
function level list. Then, click Next.

The installation examines and verifies your DNS setting.


9. On the Additional Domain Controller Options page, ensure that the
DNS server check box is selected, and then click Next.

10. In the message dialog box that appears, click Yes.

11. On the Location for Database, Log Files, and SYSVOL page, accept the
default values and then click Next.

Date Developed: Document No. CSHCI-CSS


June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
12. On the Directory Services Restore Mode Administrator Password page,
enter the domain administrator password that you chose during the
preparation steps. This is not your admin password that was emailed to
you during the creation of your server, although you can use that
password if you want to. Then, click Next.

13. On the Summary page, review your selections and then click Next.
The installation begins.

14. If you want the server to restart automatically after the installation is
completed, select the Reboot on completion check box.

15. If you did not select the Reboot on completion check box, click
Finish in the wizard. Then, restart the server.

Date Developed: Document No. CSHCI-CSS


June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
16. After a few minutes, reconnect to your server by using the
Console in your Control Panel or RDP.
17. To log in, perform the following steps:
a. Click Switch User, and then click Other User.
b. For the user, enter the full domain name that you chose, followed
by a back slash and Administrator (for example, Example.com\
Administrator).
c. Enter the password that was emailed to you when you first built the
server. If you changed your password
for the local admin account to this server before you began the
installation of Active Directory Domain Services, use that password.
d. Click the log in button.

The installation of Active Directory Domain Services on your server is


complete.
 JOIN DOMAIN using:
a. Windows 7 Client
b. Windows 10 Client

 Preparing Client Workstation

Step 1: Open Run Command


Press windows+r in your keyboard then type ncpa.cpl then click OK.

Step 2: Accessing Local Area Connection Properties


Local area connection will appear. Right-click Local Area Connection then
click Properties.

Date Developed: Document No. CSHCI-CSS


June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
Step 3: Local Area Connection Properties
Click Internet Protocol Version 4(TCP/IPv4) then click Properties.

Step 4: Network Configuration Setting


Add the following network configuration

Step 1: Open Computer Properties


On the Taskbar, click Start, right-click Computer and click Properties

Step 2: Change Setting


Click change setting

Date Developed: Document No. CSHCI-CSS


June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
Step 3: Access System Properties
In the System Properties dialog box, click the Computer Name tab and click
the Change button.
Note: If the computer is running Microsoft Windows 7 Home Premium, Basic
or Starter the Domain radio is disabled, indicating that the computer is not
allowed to join a domain.

Step 4: Join Domain


After specifying the name of the computer and the domain to join, click OK.
You would be asked to provide a user name and a password for a user who
has the permissions to let a computer join a domain.

Step 5: Adding Administrator’s Credentials


Type the username of users with admin privilege which allowed a computer
to join a domain >press Tab then type the accounts password.

Date Developed: Document No. CSHCI-CSS


June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
Step 6: Welcome Message
After entering a user and a password, click OK, you will receive a welcome
message.

Step 7: Restart
Restart your computer.

Step 8: Logon Screen


After the computer restarted, press CTRL + ALT + DELETE to Log On.

Step 9: Switch User


Click Switch User

Date Developed: Document No. CSHCI-CSS


June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
Step 10: Change User
Click Other user

Step 11: Credentials


Type the logon name of the user who has an account in the network’s
domain and press Tab then type the password click the arrow line to login. If
the login is successful will be prompted.
Note: in this example I used itsmeismael user’s logon together with css.com
domain. However, I can also use itsmeismael@css.com username to logon
into css.com domain.

Date Developed: Document No. CSHCI-CSS


June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
 FOLDER REDIRECTION
 Allows you as an administrator to point a number of special folders,
such as Documents, Music, and Downloads, to locations of your
choice. The most common use of this is to locate folders such as My
Documents on a network share so it that can be centrally backed up.
 As of Windows Server 2008 R2, the folders you can redirect are as
follow
 Appdata (roaming)  Favorites
 Desktop  Contacts
 Start Menu  Downloads
 Documents  Links
 Pictures  Searches
 Music  Saved Games
 Video

 Setting-up Folder Redirection


Step 1: Create Folder
Create a folder in a server for file container.

Step 2: Folder Properties


Right click in new created folder> Click properties

Step 3: Sharing Folder


Choose sharing> click share

Date Developed: Document No. CSHCI-CSS


June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
 Printer Deployment

 Deploy Printer Using Default Domain Policy (Part 2: Configure


Printer Deployment)

Step 1: Open Server Manager


Click Start >Administrative Tool> Click Server Manager

Step 2: Add Role


Click Add Role

Step 3: Print Document Services Role


Click Print and Document Services > Click Next

Step 4: Print an Document Summary


Click Next

Date Developed: Document No. CSHCI-CSS


June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
Step 5: Role Services
Check Print Server >Click Next to continue.

Step 6: Confirm Installation


Click Install.

Step 7: After a few moments the installation result will occur. Click Close to
proceed.
Step 8: Print Server Location
Open the newly installed printer in the server. Open server manager >click

role (+sign) > click


Print and documents services (+sign) > Print Servers click the name of
server (e.g. WIN-QJUIAVGUB5[local] click Printer.

Date Developed: Document No. CSHCI-CSS


June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
Step 9: Manage Sharing
Right click EPSON L565 > Click Manage Sharing.

Step 10: Printer Sharing


Check Share this printer > Click Apply> Click OK.
Note: You can change the printer’s share name, but it is an optional.
Step 11: Printer Deployment
Right click Epson 1565 series > Click Deploy with group policy….

Step 12: Browsing GPO (Group Policy Object)


Click Brows
Step 13: Default Domain Policy
Click Default Domain Policy > Click OK.

Step 14: Finalizing


Check The users that this GPO applies to (per user) and The computers that
this GPO applies to (per machine) > click Add > Click Apply > Click OK. The
print management message will occur click OK to continue.

Check the desired setting that suits your specific need.

Date Developed: Document No. CSHCI-CSS


June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
Deploy the printer that can be use by machine or domain users. The per-
user installation of the printer means that the application is available only
for a particular user. The per-machine configuration of printer means that
the application is available for all users of a computer. Per machine
configuration and per users are being applied.

Step 15: Print


After the successful configuration restart the server and both clients to
apply the changes. Login your domain users in your Windows client and
print phrases/words to verify if the configuration is successfully configured.
See the image to confirm the result.

Date Developed: Document No. CSHCI-CSS


June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
Self-Check 3.1-2

Multiple Choices: Choose the letter with the correct answer. Write your
answer on your answer sheet.

1. Server that provides clients with network connectivity and other


communications such as voice. For example, a telecommunications
device that provides 3G or Wi-Fi to phones and other clients.
A. Media Server
B. Communication Server
C. Name Server
D. File Server
2. A system is software that performs automation, calculations and other
functions that aren’t directly used by people. They are often
implemented with a service that runs on servers such as
microservices.
A. System Services
B. File server
C. Media Server
D. Proxy Server
3. It is a server that looks up resources on a network such as users,
groups and devices. Acts as infrastructure that is essential to network
security such as authenticating users.
A. Directory Services
B. Name Server
C. File Server
D. Game Server
4. A Server that implements games or services for a game such as social
elements of gameplay.
A. File Server
B. Game Server
C. API
D. Proxy Server
5. Delivers media such as streaming video or audio.
A. Name Server
B. Proxy Server
C. Communication Server
D. Media Server

Date Developed: Document No. CSHCI-CSS


June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
Answer Key 3.1-2

1. B
2. A
3. A
4. B
5. D

Date Developed: Document No. CSHCI-CSS


June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
JOB SHEET 1.1-3

Title: Configure Network Operation

Performance Objective:

Given the needed materials and equipment, you should be able to install active
directory, join two clients (Windows 7, windows 10 users), redirect files or folder from
client to server, and install and configure printer within 4 hours in accordance with
the industry standards.

Supplies/Materials:

Flash drives with installers

Tools and Equipment:

Computer with Windows Server 2008 R2

Steps/Procedure:

1. Prepare your flash drive installers for installation.


2. Open the Server manager window.
3. Add the Active Directory Domain Services Role
4. Install Active Directory Domain Services (DCPROMO)
5. Join Domain using
a. Windows 7 clients workstation in to a domain (css.com). Use the
first user account to login in our domain.
b. Join Windows 10 client wireless station in to a domain
(css.com).use the second user account to logging in our domain.
6. Create a redirection folder in the server.
Where: Folder Name= Home Folder
Shared Accessibility= Domain Users
7. Install and Configure Printer.
8. Deploy print server.
9. Allow users to print in every client computers that are connected to an
existing domain.
10. Users must print the following in every client.
a. Full Name
b. Name of School
c. Date
11. Evaluate your own performance by using the Performance Criteria
Checklist.
12. Present your work on your trainer’s.

Assessment Methods:

Date Developed: Document No. CSHCI-CSS


June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
Use of Performance Criteria Checklist, Demonstration and
Interview.

Date Developed: Document No. CSHCI-CSS


June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
PERFORMANCE CRITERIA CHECKLIST 3.1-2
Criteria Yes No
Did you…
1. Prepare your flash drive installers for installation.?

Open the Server manager window?


Add the Active Directory Domain Services Role?

Install Active Directory Domain Services (DCPROMO)?

Join Domain using?

Windows 7 clients workstation in to a domain (css.com).


Use the first user account to login in our domain.?

Create a redirection folder in the server?

Folder Name: Home Folder?

Shared Accessibility: Domain users?


Install and Configure Printer?
Deploy print server.
Allow users to print in every client computers that are
connected to an existing domain?

Users must print the following in every client?


Full name?

Windows 10 client wireless station in to a domain


(css.com).use the second user account to logging in our
domain?

Create a redirection folder in the server?


Folder Name: Home Folder?

Name of school?

Date?

Date Developed: Document No. CSHCI-CSS


June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
INFORMATION SHEET 3.1-3
NETWORK SECURITY

Learning Objective:
After reading this Information Sheet you should be able to:
1. Define Network Security
2. Explain the Concept of Network Security.
3. Discuss the Network Security Basics and Methods.

Introduction:

We take a broad look at the task, roles and tools used to prevent
unauthorized people or programs from accessing your networks and the
devices connected to them.

 NETWORK SECURITY
 Is the process of taking physical and software preventive measures to
protect the underlying networking infrastructure, modification,
destruction, or improper disclosure, thereby creating a secure
platform for computers, users, and programs to perform their
permitted critical functions within a secure environment.
 Implemented by the tasks and tools you use to prevent unauthorized
people or programs from accessing your networks and the devices
connected to them. In essence, your computer can’t be hacked is
hackers can’t get to it over the network.
 Consist of the policies and practices adopted to prevent and monitor
unauthorized access, misuse, modification, or denial of a computer
network and network-accessible resources.
 Involves the authorization of access to data in a network, which is
controlled by the network administrator. Users choose or are assigned
an ID and password or other authenticating information that allows
them access to information and programs within their authority.
 Covers a variety of computer networks, both public and private, that
are used in everybody jobs; conducting transactions and
communications among business, government agencies and
individuals. Networks can be private such as within the company, and
others which might be open to public access.
 Is involved in organization, enterprises, and other types of
institutions. It’s does as its title explains: It secures the network, as
well as protecting and overseeing operations being done. The most
common simply way of protecting a network resource is by assigning
it a unique name and a corresponding password.
 Is the practice of preventing and protection against unauthorized
intrusion into corporate networks. As a philosophy, it complements
Date Developed: Document No. CSHCI-CSS
June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
endpoint security, which focuses on how those devices interact, and
on the connective tissue between them.

 Network Security Basics


Definitions are fine as top-level statements of intent. But how do you
lay out a plan for implementing that vision? Stephen Northcutt wrote a
primer on the basic network security for CSOonline over a decade ago, but
we feel strongly that his vision of the three phases of network security is still
relevant and should be the underlying framework for your strategy. In his
telling, network security consists of:
 Protection: you should configure your system and networks as
correctly as possible.
 Detection: you must be able to identify when the configuration has
changed or when some network traffic indicates a problem.
 Reaction: after identifying problems quickly, you must respond to
them and return to a safe state as rapidly as possible
This, in short, is a defense in depth strategy. If there’s one common theme
among security experts, it’s that relying on one single line of defense is
dangerous, because any single defensive tool can be defeated by a
determined adversary. Your network isn’t a line or a point: it’s a territory,
and even if an attacker has invaded part of it, you still have the resources to
regroup and expel them, if you’ve organized your defense properly.

 Network Security Methods


To implement this kind of defense in depth, there are a variety of
specialized techniques and types of network security you will want to roll
out. Cisco, a networking infrastructure company, uses the following schema
to break down the different types of network security, and while some of it is
informed by their product categories, it’s a useful way to think about the
different ways to secure a network.
 Access control: you should be able to block unauthorized users and
devices from accessing your network. Users that are permitted
network access should only be able to work with the limited set of
resources for which they’ve been authorized.
 Anti-malware: viruses, worms, and Trojans by definition attempt to
spread across a network, and can lurk dormant on infected machines
for days or weeks. Your security effort should do its best to prevent
initial infection and also root out malware that does make its way onto
your network.
 Application security: insecure applications are often the vectors by
which attackers get access to your network. You need to employ
hardware, software, and security processes to lock those apps down.
 Behavioral analytics: you should know what normal network behavior
looks like so that you can spot anomalies or breaches.

Date Developed: Document No. CSHCI-CSS


June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
 Data loss prevention: human beings are inevitably the weakest
security link. You need to implement technologies and processes to
ensure that staffers don’t deliberately or inadvertently send sensitive
data outside the network.
 Email security: phishing is one of the most common ways attackers
gain access to a network. Email security tools can block both
incoming attacks and outbound messages with sensitive data.
 Firewalls: perhaps the granddaddy of the network security world, they
follow the rules you define to permit or deny traffic at the border
between your trusted zone and the wild west outside. They don’t
preclude the need for a defense-in-depth strategy, but they’re still a
must-have.
 Intrusion detection and prevention: these system scan network traffic
to identify and block attacks, often by correlating network activity
signatures with databases of known attack techniques.
 Mobile device and wireless security: wireless devices have all the
potential security flaws of any other networked gadget-but also can
connect to just about any wireless network anywhere, requiring extra
scrutiny.
 Network segmentation: software-defined segmentation puts network
traffic into different classifications and makes enforcing security
policies easier.
 Security information and event management (SIEM): these products
aim to automatically pull together information from a variety of a
network tools to provide data you need to identify and respond to
threats.
 VPN: a tool (typically based on IPsec or SSL) that authenticates the
communication between a device and a secure network, creating a
secure, encrypted “tunnel” across the open internet.
 Web security: you need to be able to control internal staff’s web use in
order to block web-based threats from using browsers as a vector to
infect your network.

 Network Security and the Cloud


More and more enterprises are offloading some of their computing
needs to cloud service provides, creating hybrid infrastructures where their
own internal network has to interoperate seamlessly-and securely- with
servers hosted by third parties. Sometimes this infrastructure itself is a self-
contained network, which can be either physical (several cloud servers
working together) or virtual (multiple VM instances running together and
“networking” with each other on a single physical server).

To handle the security aspects, many cloud vendors establish


centralized security control policies on their own platform. However, the
trick here is that those security systems won’t always match up with your
Date Developed: Document No. CSHCI-CSS
June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
policies and procedures for your internal networks, and this mismatch can
add to the workload for network security pros. There are a variety of tools
and techniques available to you that can help ease some of this worry, but
the truth is that this area is still in flux and the convenience of the cloud
can mean network security headaches for you.

Network Security Software


To cover all those bases, you’ll need a variety of software and
hardware tools in your toolkit. Most venerable, as we’ve noted, is the
firewall. The drumbeat has been to say that the days when a firewall was the
sum total of your network security is long gone, with defense in depth
needed to fight threats behind (and ever in front of) the firewall. Indeed, it
seems that one of the nicest things you can say about a firewall product in a
review is that calling it a firewall is selling it short.

But firewalls can’t be jettisoned entirely. They’re properly one element


in your hybrid defense-in-depth strategy. And as eSecurity Planet explains,
there are a number of different types of network security we covered earlier:
 Network firewalls
 Next-generations firewalls
 Web application firewalls
 Database firewalls
 Unified threat management
 Cloud firewalls
 Container firewalls
 Network segmentation firewalls

Beyond the firewall, a network security pro will deploy a number of


tools to keep track of what’s happening on their networks. Some of these
tools are corporate products from big vendors, while others come in the form
of free open source utilities that sysadmins have been using since the early
days of Unix. A great source is SecTools.org, which maintains a charmingly
Web 1.0 website that keeps constant track of the most popular network
security tools, as voted on by users. Top categories include:
 Packet sniffers, which give deep insight into data traffic
 Vulnerability scanners like Nessus
 Intrusion detection and prevention software, like the legendary Snort
 Penetration testing software

That last category might raise some eyebrows-after all, what’s


penetration testing if not an attempt to hack into a network? But part of
making sure you’re locked down involves seeing how hard or easy it is to
break in, and pros know it; ethical hacking is an important part of network
security. That’s why you’ll see tools like Aircrack- which exists to sniff out

Date Developed: Document No. CSHCI-CSS


June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
wireless network security keys- alongside staid corporate offerings that cost
tens of thousands dollars on the SecTools.org list.
In an environment where you need to get many tools to work together,
you might also want to deploy SIEM software, which we touched on above.
SIEM products evolved from logging software, and analyze network data
collected by a number of different tools to detect suspicious behavior on
your network.
Network Security Jobs and Salaries
If you’re looking for a career in network security, you’re I luck: these
jobs are in high demand, and they pay well. Staffing agency Mondo pegged
network security analyst as one of the six highest paying cybersecurity
analyst as one of the six highest paying cybersecurity jobs, claiming they
could earn between $90,000 and $150,000 a year.

What does a network security analyst do, exactly? And is it different


from a network security engineer? When it comes to job titles, there’s always
less clarity than you’d like, as the pros hashing things out and talking about
their career paths on this Reddit thread demonstrate nicely.

In theory, a network security engineer is more likely to be building out


security systems, while a network security analyst is more likely to be
tasked with both titles do a little of each, and what you do will hinge more
on your job description than your two-word title. For what it’s worth,
Glassdoor pegs network security analysts as being slightly lower paid, at
around $80K a year rather than $82K for network security engineers. But
your mileage very much may vary and you should take any salary numbers
with a grain of salt.)

One thing you can be hopeful for is that either job is a career path
with a future. Alissa Johnson, currently the CISO of Xerox, was a network
security engineer at Northrup Grumman before eventually climbing the
ladder into her current executive role.

 Network Security Certifications


While there aren’t many certifications that focus on network security
alone, there are a number that can help you prove your bona fides, either
because they’re security certifications with a network component or a
network certification that includes material on security. Some of the most
prestigious include:
 CISSP, the “crown jewel” of cybersecurity certification
 CompTIA’s Network+
 Cisco Certified Network Associate
 Certified Ethical Hacker certification, for you aspiring penetration
testers out there.
Date Developed: Document No. CSHCI-CSS
June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
 Network Security Concept

Network Security starts with an authentication, commonly with a


username and a password. Since this requires just one detail
authenticating the user name-i.e., the is sometimes termed one-factor
authentication. With two-factor authentication, something the user
‘has’ is also (e.g., a security token or ‘dongle’, an with three factor
authentication, something the user ‘is’ is also used (e.g., a fingerprint
or retinal scan.

Once authenticated, a firewall enforces access policies such as


what services are allowed to be accessed by the network user. Though
effective to prevent unauthorized access, this component may fail to
check potentially harmful content such as computer worms or Trojans
being transmitted over the network. Anti-virus software or an
intrusion prevention system (IPS) helps detect and inhibit the action of
such malware. An anomaly-based intrusion detection system may also
monitor the network like wire shark traffic and may be logged for
audit purposes and for later high-level analysis. Newer systems
combining unsupervised machine learning with full network attackers
from malicious insiders or targeted external attackers that have
compromised a user machine or account.

Communication between two hosts using a network may be


encypted to maintain privacy.

Honeypots, essentially decoy network-accessible resources, any


be deployed in a network as surveillance and early-warning tools, as
the honeypots are not normally accessed for legitimate purposes.
Techniques used by the attackers that attempt to keep an eye on new
exploitation techniques. Such analysis may be used to further tighten
security of the actual network being protected by the honeypout. A
honeypot can also direct an attacker’s attention away from legitimate
servers. A honeypot encourages attackers to spend their time and
energy on the decoy server while distracting their attention from the
data on the real server. Similar to a honeypot, a honeynet is a network
set up with intentional vulnerabilities. Its purpose is also to invite
attacks so that the attackers’ methods can be studied and that
information can be used to increase network security. A honeynet
typically contains on or more honeypots.

 Security Management
Security management for networks is different for all kinds of
situations. A home or small office may only require basic security while large

Date Developed: Document No. CSHCI-CSS


June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
businesses may require high-maintenance and advanced software and
hardware to prevent malicious attacks from hacking and spamming.
Types of attacks:
Networks are subject to attacks can be from two categories: “Passive” when
a network intruder intercepts data traveling through the network, and
“Active” in which an intruder initiates commands to disrupt the network’s
normal operation or to conduct reconnaissance and lateral movement to find
and gain access to assets available via network.

Types of attacks include:


Passive:
 Network
 Wiretapping
 Port scanner
 Idle scan
 Encryption
 Traffic analysis
Active:
 Virus
 Eavesdropping
 Data modification
 Denial-of-service attack
 DNS spoofing
 Man in the idle
 ARP poisoning
 VLAN hopping
 Smurf attack
 Heap overflow
 Format string attack
 SQL injection
 Phishing
 Cross-site scripting
 CSRF
 Cyber-attack

Date Developed: Document No. CSHCI-CSS


June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
Self-Check 3.1-3

IDENTIFICATION

Direction: Write TRUE if the statement is correct and FALSE if the


statement is wrong. Write your answers on a separate sheet of paper.

1. Network Security implemented by the tasks and tools you use to prevent
unauthorized people or programs from accessing your networks and the
devices connected to them.

2. A large businesses may only require basic security while home or small
offices may require high-maintenance and advanced software and hardware
to prevent malicious attacks from hacking and spamming.

3. Network Security consist of the policies and practices adopted to prevent


and monitor unauthorized access, misuse, modification, or denial of a
computer network and network-accessible resources.

4. Passive in which an intruder initiates commands to disrupt the network’s


normal operation or to conduct reconnaissance and lateral movement to find
and gain access to assets available via network.

Date Developed: Document No. CSHCI-CSS


June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
ANSWER KEY 3-1.3
1. True
2. False
3. True
4. False

Date Developed: Document No. CSHCI-CSS


June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
REFERENCES/FURTHER READING

https://www.howtogeek.com/99323/installing-active-directory-on-server-
2008-r2/

http://cssnctwo.weebly.com/

http://dailytechnotips.blogspot.com/2013/06/

https://www.howtogeek.com/99323/installing-active-directory-on-server-
2008-r2

Date Developed: Document No. CSHCI-CSS


June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy