CBLM
CBLM
List of Competencies
BASIC COMPETENCIES
Unit of Competency Module Title Code
Participating in
Participate in workplace
workplace 500311105
communication
communication
Work in a team Working in a team
500311106
environment environment
Practice career Practicing career
500311107
professionalism professionalism
Practice occupational Practicing
health and safety occupational health 500311108
procedures and safety procedures
COMMON COMPETENCIES
Welcome!
Remember to:
Work through all the information and complete the activities in each
section.
Read information sheets and complete the Self-checks, suggested
references are included to supplement the materials provided in this
module.
Most probably, your trainer will also be your supervisor or manager.
He is there to support you and show you the correct way to do things.
You will be given plenty of opportunities to ask question and practice
on the job. Make sure you practice your new skills during the regular
Date Developed: Document No. CSHCI-CSS
June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
work shifts. This way, you will improve your speed, memory and your
confidence.
Use the self-check, Operation sheet or Job/task sheet at the end of
each section to test your own progress. Use the Performance Criteria
checklist or Procedural Checklist located after the sheet to check your
own performance.
When you feel confident that you have had sufficient practice, ask
your Trainer to evaluate you. The results of your assessment will be
recorded in your Progress Chart and Accomplishment Chart.
You need to complete this module before you can perform the next
module, Maintain and Repair Computer System.
MODULE CONTENT
LEARNING OUTCOMES:
ASSESSMENT CRITERIA:
1. User folder is created in accordance with network operating system
(NOS) features
2. User access level is configured based on NOS features and established
network access policies/end-user requirements.
3. Security check is performed in accordance with established network
access policies/end-user requirements.
4. Normal functions of server are checked in accordance with
manufacturer’s instructions.
Date Developed: Document No. CSHCI-CSS
June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
5. Required modules /add-ons are Installed/updated based on NOS
installation procedures.
6. Network services to be configured are confirmed based on
user/system requirements.
7. Operations of network services are checked based on user/system
requirements.
8. Unplanned events or conditions are responded to in accordance with
established procedures.
9. Pre-deployment procedures is undertaken based on enterprise policies
and procedures
10. Operation and security check are undertaken based on end-
user requirements
11. Reports are Prepared/Completed according to enterprise
policies and procedures.
Learning Outcome #1
SET-UP USSERS ACCESS
Learning Objectives:
After reading this INFORMATION SHEET, you must be able to:
1. Define briefly what Network Operating System is.
2. Identify the different features of Network Operating System.
Introduction
Set-up Uses Access focuses on the Networking Operating Systems and
their features. The primary purpose of the network operating system is to
allow shared file and printer access among multiple computer in a network,
typically a local area network (LAN), a private network or to other networks.
User administration
System maintenance activities like backup
Tasks associated with file management
Security monitoring on all resources in the network
CLIENT
- It is a piece of computer hardware or software that accesses a service
made available by a server. The server is often (but not always) on
another computer system, in which case the client accesses the
service by way of a network.
- The term applies to programs or devices that are part of a client-server
model.
- A client is the requesting program or user in a client/server
relationship.
- For example, the user of a Web browser is effectively making client
requests for pages from servers all over the Web.
- The browser itself is a client in its relationship with the computer that
is getting and returning the requested HTML file. The computer
handling the request and sending back the HTML file is a server.
SERVER
- It is a computer or computer program that manages access to a
centralized resource or service in a network.
- In a computer networking, a server computer designed to process
requests and deliver data to other (client) computers over a local
network or the Internet.
WINDOWS SERVER
- Windows server is group of operating systems designed by Microsoft
that supports enterprise-level management, data storage,
applications, and communications.
- A series of server operating systems developed by Microsoft
Corporation.
- Windows servers are more powerful versions of their desktop
operating system counterparts and counterparts and are designed to
more efficiently handle corporate networking, Internet/intranet
hosting, databases, enterprise-scale messaging and similar functions.
- Previous versions of Windows Server have focused on stability,
security, networking, and various improvements to the file system.
- Other improvements also have included improvements to deployment
technologies, as well as increased hardware support. Microsoft has
also created specialized SKUs of windows Server that focus on the
home and small business markets.
LINUX SERVER
- A Linux server is a high-powered variant of the Linux open source
operating system that’s designed to handled the more demanding
needs of business applications such as network and system
administration, database management and Web services.
- Linux servers are frequently selected over other server operating
systems for their stability, security and flexibility advantages. Leading
Linux server operating systems include CentOS, Debian, Ubuntu
Server, and Gentoo.
DOMAIN
- It is a group of computers and devices on a network that are
administered as a unit with common rules and procedures. Within the
Internet, domains are defined by the IP address. All address are said
to be in the same domain.
WORKGROUP
- In a computer networking, a workgroup is a collection of computers
on a local area network (LAN) that share common resources and
responsibilities. Workgroups provide easy sharing of files, printers and
other network resources.
- The Microsoft Windows family of operating systems supports
assigning of computers to named workgroups.
To use Windows Server 2008 you need to meet the following hardware
requirements:
Component
Requirement:
Date Developed: Document No. CSHCI-CSS
June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
Processor
Minimum: 1GHz (x86 processor) or 1.4GHz(x64 processor)
Recommended: 2GHz or faster
Note: An Intel Itanium 2 processor is required for Windows Server 2008 for
Itanium-based Systems
Memory
Minimum: 512MB RAM
Recommended: 2GB RAM or greater
Maximum (32-bit systems): 4GB (Standard) or 64GB (Enterprise and
Datacenter)
• Maximum (64-bit systems): 32GB (Standard) or 2TB (Enterprise,
Datacenter and Itanium-based Systems)
Available Disk Space
Minimum: 10GB
Recommended: 40GB or greater
Note: Computers with more than 16GB of RAM will require more disk space
for paging, hibernation, and dump files
Drive
DVD-ROM drive
Display and Peripherals
Super VGA (800 x 600) or higher-resolution monitor
Keyboard
• Microsoft Mouse or compatible pointing device
Upgrade notes:
I will not discuss the upgrade process in this article, but for your general
knowledge, the upgrade paths available for Windows Server 2008 shown in
the table below:
If you are currently running:
You can upgrade to:
If you do not have the Product ID available right now, you can leave the box
empty, and click Next. You will need to provide the Product ID later, after
the server installation is over. Press No.
6. Because you did not provide the correct ID, the installation process
cannot determine what kind of Windows Server 2008 license you own, and
therefore you will be prompted to select your correct version in the next
screen, assuming you are telling
7. If you did provide the right Product ID, select the Full version of the right
Windows version you're prompted, and click Next.
9. In the "Which type of installation do you want?" window, click the only
available option – Custom (Advanced).
10. In the "Where do you want to install Windows?", if you're installing the
server on a regular IDE hard disk, click to select the first disk, usually Disk
0, and click Next. If you're installing on a hard disk that's connected to a
SCSI controller,
11. The installation now begins, and you can go and have lunch. Copying
the setup files from the flashdrive to the hard drive only takes about one
minute. However, extracting and uncompressing the files takes a good deal
longer. After 20 minutes, the operate.
12. Then the server reboots you'll be prompted with the new Windows Server
2008 type of login screen. Press CTRL+ALT+DEL to log in.
14. The default Administrator is blank, so just type Administrator and press
Enter.
15. You will be prompted to change the user's password. You have no choice
but to press Ok.
16. In the password changing dialog box, leave the default password blank
(duh, read step #15…), and enter a new, complex, at-least-7-characters-long
new password twice. A password like "topsecret" is not valid (it's not
complex), but one like "T0pSe
17. Someone thought it would be cool to nag you once more, so now you'll
be prompted to accept the fact that the password had been changed. Press
Ok.
Multiple Choices:
Instructions: Choose the letter with the correct answer. Write the letter of
your choice on your answer sheet.
ANSWER KEY
1. C
2. A
3. A
4. D
5. D
Equipment: Computer
Steps/Procedure:
Assessment Method:
Criteria
Learning Objectives:
1. Define server
2. Enumerate types of server
3. Describe each type of server
4. Discuss how to install active directory domain up to deployment of
printer.
Introduction:
Server
it is a physical computer that provides services to all client computers
connected to it, allowing them (client computer) to access available
information or resources.
Is an application or device that performs service for connected clients
as part of client-server architecture. A workstation is a personal
computer that is used for high-end applications such as graphic
design, video editing, CAD, 3-D design, or other CPU and RAM
intensive programs.
8. File Servers
- Provides access to files.
9. Game Server
- Servers that implements games or services for a game
such as social elements of game play.
10. Media Server
- Delivers media such as streaming video or audio.
11. Proxy Server
- Acts as an intermediary between clients and servers to
implement functions such as security, monitoring or
anonymization.
12. System Services
- A system is software that perform automation,
calculations and other functions that aren’t directly used
by people. They are often implemented with a service that
run on servers such as microservices.
ACTIVE DIRECTORY
What is Active Directory and Why Should I care?
7. On the Name the Forest Root Domain page, enter the domain name
that you choose during preparation steps. Then, click Next.
11. On the Location for Database, Log Files, and SYSVOL page, accept the
default values and then click Next.
13. On the Summary page, review your selections and then click Next.
The installation begins.
14. If you want the server to restart automatically after the installation is
completed, select the Reboot on completion check box.
15. If you did not select the Reboot on completion check box, click
Finish in the wizard. Then, restart the server.
Step 7: Restart
Restart your computer.
Step 7: After a few moments the installation result will occur. Click Close to
proceed.
Step 8: Print Server Location
Open the newly installed printer in the server. Open server manager >click
Multiple Choices: Choose the letter with the correct answer. Write your
answer on your answer sheet.
1. B
2. A
3. A
4. B
5. D
Performance Objective:
Given the needed materials and equipment, you should be able to install active
directory, join two clients (Windows 7, windows 10 users), redirect files or folder from
client to server, and install and configure printer within 4 hours in accordance with
the industry standards.
Supplies/Materials:
Steps/Procedure:
Assessment Methods:
Name of school?
Date?
Learning Objective:
After reading this Information Sheet you should be able to:
1. Define Network Security
2. Explain the Concept of Network Security.
3. Discuss the Network Security Basics and Methods.
Introduction:
We take a broad look at the task, roles and tools used to prevent
unauthorized people or programs from accessing your networks and the
devices connected to them.
NETWORK SECURITY
Is the process of taking physical and software preventive measures to
protect the underlying networking infrastructure, modification,
destruction, or improper disclosure, thereby creating a secure
platform for computers, users, and programs to perform their
permitted critical functions within a secure environment.
Implemented by the tasks and tools you use to prevent unauthorized
people or programs from accessing your networks and the devices
connected to them. In essence, your computer can’t be hacked is
hackers can’t get to it over the network.
Consist of the policies and practices adopted to prevent and monitor
unauthorized access, misuse, modification, or denial of a computer
network and network-accessible resources.
Involves the authorization of access to data in a network, which is
controlled by the network administrator. Users choose or are assigned
an ID and password or other authenticating information that allows
them access to information and programs within their authority.
Covers a variety of computer networks, both public and private, that
are used in everybody jobs; conducting transactions and
communications among business, government agencies and
individuals. Networks can be private such as within the company, and
others which might be open to public access.
Is involved in organization, enterprises, and other types of
institutions. It’s does as its title explains: It secures the network, as
well as protecting and overseeing operations being done. The most
common simply way of protecting a network resource is by assigning
it a unique name and a corresponding password.
Is the practice of preventing and protection against unauthorized
intrusion into corporate networks. As a philosophy, it complements
Date Developed: Document No. CSHCI-CSS
June 2019
Trainers Methodology Level I Issued by: Page:
Developed by: CSHCI
Computer System Services NC II
Jessica S.J. Montano Revision #
00
endpoint security, which focuses on how those devices interact, and
on the connective tissue between them.
One thing you can be hopeful for is that either job is a career path
with a future. Alissa Johnson, currently the CISO of Xerox, was a network
security engineer at Northrup Grumman before eventually climbing the
ladder into her current executive role.
Security Management
Security management for networks is different for all kinds of
situations. A home or small office may only require basic security while large
IDENTIFICATION
1. Network Security implemented by the tasks and tools you use to prevent
unauthorized people or programs from accessing your networks and the
devices connected to them.
2. A large businesses may only require basic security while home or small
offices may require high-maintenance and advanced software and hardware
to prevent malicious attacks from hacking and spamming.
https://www.howtogeek.com/99323/installing-active-directory-on-server-
2008-r2/
http://cssnctwo.weebly.com/
http://dailytechnotips.blogspot.com/2013/06/
https://www.howtogeek.com/99323/installing-active-directory-on-server-
2008-r2