competency in skills and knowledge through assessment tests,
but are not required to complete a specific number of hours.
I.T. Helpdesk Support Technician
Cisco Systems, Inc.
Work Process Content
On the Job Training
Sets up and removes employee or client workstations or devices, including setting up access controls
9
- Sets up desktop, laptop and other devices for employees
- Installs software on network or individual users' computers, laptops or devices and sets appropriate access controls or authorities
- Sets up user identifications and passwords and implements policies regarding passwords and user/administrator permissions
- Establishes secure external connections to network or desktops using secure remote access technology
- Installs printers on networks or individual devices
- Sets up network map, employee folders and centralized data repositories
- Sets up email account for users and establishes storage limits and backup parameters
- Maintains and manages software licenses
- Removes users from network, archives data and files, removes workstations and disables devices for users exiting the organization or prohibited from using IT resources
Installs, provides user support for, or troubleshoots hardware and commercial software
6
- Uses FAQ's or other job aids to troubleshoot hardware or software faults
- Uses logic to discover source of faults and recommends appropriate solutions
- Demonstrates ability to use basic software, including set-up of preferred default settings, instructs other users on the basic features of standard software packages, and identifies and remedies typical faults in relevant software packages
- Identifies situations in which the fault must be escalated to a higher-level technology support individual, including an outside vendor
- Contacts outside vendors or vendor-supported help desk to solve difficult problems or procure software patches
- Prioritizes "tickets" or requests for help based on business need, staff hierarchy or urgency of problems
Supports internal or external clients in the use of audio/visual technology and conference technology
6
- Sets up and links audiovisual equipment, including projectors, screens, laptops, cameras and related device
- Installs, launches, operates and troubleshoots software designed to facilitate presentations, web-based conferencing and audioconferencing
- Test equipment and software prior to use to ensure sound and video quality is acceptable
- Sets up, schedules and manages web-based or video conferences
- Provides support to users during meetings, conferences or webinars
- Sets up user accounts on voice technologies or systems, including voicemail
Installs, maintains and troubleshoots networks
8
- Installs and maintains wired and wireless networks
- Connects devices to networks physically and using remote access technologies
- Installs network security software and devices and monitors system for signs of hacking, intrusion or viruses
- Test resiliency of security devices or software and monitor bandwidth utilization
- Establishes and sets access levels and permissions based on employees' job roles and company policies
- Assists in setting up, configuring and managing servers including data storage
- Sets up user identification parameters on servers
- Assists in monitoring server use, efficacy of data back-up and storage systems and integrity of redundant systems or technologies
Makes minor software modifications to improve performance or customize to user needs
5
- Surveys user needs to understand what modifications are needed
- Modifies a program within a software package, including securing permission from vendors to do so
- Inserts or loads organizational templates or standards into software, such as presentation templates in PowerPoint or equivalent software
- Monitor computer performance and recommend/make upgrades or modifications as necessary to improve speed or other performance parameters
- Uses software to set up needed business functions, such as workflows, tracking, archiving or other functions
Assists in maintaining or updating web content and manages user access profiles and authorities
5
- Sets user/author access permissions based on organization's policies
- Uploads new content to organization's website or removes old content as instructed
- Test functionality of links embedded in the website
- Notifies appropriate person if incorrect, outdated or otherwise problematic content is identified
- Notifies appropriate person if website is not functioning properly
Monitors and helps maintain network security by adhering to security policies
7
- Monitors adherence to password policies, including enforcement of password update intervals
- Sets user access levels and permissions based on organizational policies
- Monitors antiviral software to understand potential threats and updates as needed
- Reads, attends conferences or interacts with other IT professionals to know and understand current threat levels and mechanisms
- Ensures that encryption technology and access controls are utilized to protect sensitive data
- Ensures that off-site staff are using secure connections to access network
- Assists in or monitors use of back-up technologies and network redundancies to minimize risk
Related Instruction Content
Training Provider(s):
Introduction to Packet Tracer
10
This course teaches basic operations of the tool with multiple hands-on activities helping you to visualize a network using everyday examples, including Internet of Things (IoT). Topic: · Data interactions in a network · Network visualization in logical and physical modes · Critical Thinking Knowledge: · Explain how data interacts while traveling in a network · Explain network structures, both physical and logical · Explain how to use critical thinking in problem solving
IT Essentials
70
This course covers the fundamentals of computer and mobile device hardware and software, and advanced concepts such as security, networking, and the responsibilities of an IT professional. Apprentices completing this course will be able to describe the internal components of a computer, assemble a computer system, install operating systems, and troubleshoot them using software tools and diagnostics. Apprentices will also be able to connect to the Internet and share resources in a networked environment. Topics include scripting basics, using remote access technologies, IoT (Internet of Things) device configuration and communication types, documentation and change management best practices, and also, disaster prevention and recovery methods. Expanded topics include virtualization, cloud computing, and security. Chapter 1. Introduction to Personal Computer Hardware Select the appropriate computer components to build, repair, or upgrade personal computers. 1.1 Personal Computers Explain how personal computer components work together. 1.2 PC Components Explain the Features and Functions of components. 1.3 Computer Disassembly Disassemble a PC. Chapter 2. PC Assembly Install components to build, repair, or upgrade personal computers. 2.1 Assemble the Computer Build a computer. Chapter 3. Advanced Computer Hardware Install and configure components to upgrade a computer. 3.1 Boot the Computer Explain how to verify BIOS and UEFI settings. 3.2 Electrical Power Explain electrical power. 3.3 Advanced Computer Functionality Explain computer functionality. 3.4 Computer Configuration Select components to upgrade a computer to meet requirements 3.5 Protecting the Environment Explain the necessary procedures to protect the environment Chapter 4. Preventive Maintenance and Troubleshooting Perform Troubleshooting on Personal Computers 4.1 Preventive Maintenance Explain why preventive maintenance must be performed on personal computers. 4.2 Troubleshooting Process Troubleshoot problems with PC and Peripheral devices Certification 1: PC Hardware and Preventive Maintenance Chapter 5. Networking Concepts Explain how computers communicate on a network 5.1 Networking Components and Types Explain the components and types of computer networks. 5.2 Networking Protocols, Standards, and Services Explain networking protocols, standards and services. 5.3 Network Devices Explain the purpose of devices on a network. 5.4 Network cables Build a network cable. Chapter 6. Applied Networking Configure devices to communicate on a network 6.1 Device to Network Connection Configure devices for wired and wireless networks. 6.2 Basic Troubleshooting Process for Networks Troubleshoot problems and solutions related to networks. Certification 2: Networking Basics Chapter 7. Laptops and Other Mobile Devices Explain how to Troubleshoot Laptops and Other Mobile Devices 7.1 Characteristics of Laptops and Other Mobile Devices Explain the features and functions of laptops and other mobile devices. 7.2 Laptop Configuration Explain how to configure laptop power settings and wireless settings. 7.3 Laptop Hardware and Component Installation and Configuration Explain how to remove and install laptop components. 7.4 Other Mobile Device Hardware Overview Explain the purpose and characteristics of other mobile devices. 7.5 Network Connectivity and Email Explain how to configure network connectivity and email on mobile devices. 7.6 Preventive Maintenance for Laptops and Other Mobile Devices Use common preventive maintenance techniques for Laptops and other Mobile Devices. 7.7 Basic Troubleshooting Process for Laptops and other Mobile Devices Explain how to troubleshoot Laptops and other Mobile Devices. Chapter 8. Printers Install a printer to meet requirements 8.1 Common Printer Features Explain the purpose and characteristics of different types of printers. 8.2 Printer Type Comparison Compare Different Types of Printers 8.3 Installing and Configuring Printers Install a printer. 8.4 Sharing Printers Configure printer sharing. 8.5 Maintaining and Troubleshooting Printers Explain how to improve printer availability. Certification 3: Mobile Devices and Printers Chapter 9. Virtualization and Cloud Computing Describe virtualization and cloud computing. 9.1 Virtualization Explain Cloud and Virtualization. 9.2 Cloud Computing Compare and contrast cloud computing concepts Chapter 10. Windows Installation Install Windows operating systems. 10.1 Modern Operation Systems Explain operating system requirements 10.2 Disk Management Create a partition in Windows using the Disk Management Utility 10.3 Installation and Boot Sequence Install a Windows Operating System Chapter 11. Windows Configuration Perform management and maintenance of Windows operating systems 11.1 Windows Desktop and File Explorer Configure the Windows Desktop and File Explorer. 11.2 Configure Windows using Control Panels Configuring Windows with Control Panels. 11.3 System Administration Use Windows tools and utilities to manage Windows system. 11.4 Command-Line Tools Use Microsoft Windows command line tools. 11.5 Windows Networking 11.6 Common Preventive Maintenance Techniques for Operating Systems 11.7 Basic Troubleshooting Process for Windows Operating System Certification 4: Windows Operation and Configuration Chapter 12. Mobile, Linux, and OSX Operating Systems Explain how to configure, secure, and troubleshoot mobile, Mac, and Linux operating systems. 12.1 Mobile Operating Systems Explain the purpose and characteristics of mobile operating systems. 12.2 Methods for Securing Mobile Devices Explain methods for securing mobile devices. 12.3 Linux and macOS Operating Systems Explain the purpose and characteristics of macOS and Linux operating systems. 12.4 Basic Troubleshooting Process for Mobile, Linux, and macOS Operating Systems Explain how to troubleshoot other operating systems. Chapter 13. Security Implement basic host, data, and network security 13.1 Security Threats Explain Security Threats 13.2 Security Procedures Explain Security Procedures 13.3 Securing Windows Workstations Configure basic security settings and policies for end devices 13.4 Wireless Security Configure wireless security 13.5 Basic Troubleshooting Process for Security Explain the six steps of the troubleshooting process for security Certification 5: Mobile OS and Security Chapter 14. The IT Professional Explain the roles and responsibilities of the IT Professional 14.1 Communication Skills and the IT Professional Explain why good communication skills are a critical part of IT work. 14.2 Operational Procedures Explain how to manage change and unplanned disruptions in a business environment. 14.3 Ethical and Legal Considerations Explain appropriate behavior when faced with the legal and ethical issues that arise in the IT industry. 14.4 Call Center Technicians Explain the call center environment and technician responsibilities.
Networking Essentials
70
This Cisco Networking Academy CCNAv7 course will help apprentices develop workforce readiness skills and build a foundation for success in networking-related careers and degree programs. CCNAv7 teaches comprehensive networking concepts and skills, from network applications to the protocols and services provided to those applications. Apprentices will progress from basic networking to more complex enterprise and theoretical networking models. Apprentices learn, apply, and practice CCNA knowledge and skills through a series of in-depth hands-on experiences and simulated activities that reinforce their learning. Upon completion of this course, apprentices will be prepared to take the Cisco CCNA Unified certification exam. Explaining Single-Area OSPFv2 Concepts · Describe OSPF. · Describe OSPF packets. · Explain OSPF operation. Configuring Single-Area OSPFv2 · Configure an OSPFv2 router ID. · Configure single-area OSPFv2. · Explain multi-access OSPF networks. · Modify single-area OSPFv2. · Configure OSPF to propagate a default route. · Verify single-area OSPFv2. Analyzing Network Security Concepts · Describe cybersecurity. · Describe threat actors. · Describe threat actor tools. · Describe malware. · Describe network attacks. · Identify IP vulnerabilities and threats. · Identify TCP and UDP vulnerabilities. · Identify network security best practices. · Explain cryptography. Describing ACL Concepts · Describe the purpose of ACLs. · Explain wildcard masks. · Explain ACL creation. · Compare types of IPv4 ACLs. Exploring ACLs for IPv4 Configuration · Configure standard IPv44 ACLs. · Modify IPv4 ACLs. · Secure VTY ports with a standard IPv4 ACL. · Configure extended IPv4 ACLs. Configuring NAT for IPv4 · Describe NAT. · Differentiate types of NAT. · Evaluate NAT. · Configure static NAT. · Configure dynamic NAT. · Configure PAT. · Describe NAT64. Explaining WAN Concepts · Explain WANs. · Explain WAN operations. · Compare traditional connectivity. · Compare modern connectivity. · Compare Internet-based connectivity. Describing VPN and IPsec Concepts · Describe VPN technology. · Describe VPNs. · Explain IPsec. Analyzing QoS Concepts · Explain network transmission quality. · Describe traffic characteristics. · Explain queuing algorithms. · Identify QoS models. · Define QoS implementation techniques. Managing Networks · Describe device discovery with CDP. · Describe device discovery with LLDP. · Implement NTP. · Explain SNMP. · Explain syslog. · Maintain router and switch file. · Manage an IOS image. Designing Networks · Explain hierarchical networks · Explain scalable networks. · Explain switch hardware. · Describe router hardware. Troubleshooting Networks · Explain network documentation. · Compare troubleshooting processes. · Identify troubleshooting tools. · Determine symptoms and causes of network problems. · Troubleshoot IP connectivity. Exploring Network Virtualization · Describe cloud computing. · Describe virtualization. · Explain virtual network infrastructure. · Describe software-defined networking. · Describe controllers. Describing Network Automation · Describe automation. · Compare data formats. · Explain the function of REST. · Compare configuration management tools. · Explain the purpose of the IBN and Cisco DNA center.
Teamwork and Collaboration
8
As Needed
Communication
10
As Needed
Problem Solving
5
As Needed
Critical Thinking
3
As Needed
5. Conflict Management
3
As Needed
Time Management
5
As Needed
Customer Service
3
As Needed