0% found this document useful (0 votes)
73 views2 pages

Module 5 - B

Network administrators perform many common tasks to support end users of IT systems. These tasks include: 1) Performing network administration fundamentals on various operating systems like Windows, Linux, and Cisco IOS. 2) Installing and configuring software, hardware, and networking components to set up machines for testing and administration. 3) Managing user accounts, services, applications, systems, and data through graphical user interfaces and command line tools.

Uploaded by

Chethan Krishna
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
73 views2 pages

Module 5 - B

Network administrators perform many common tasks to support end users of IT systems. These tasks include: 1) Performing network administration fundamentals on various operating systems like Windows, Linux, and Cisco IOS. 2) Installing and configuring software, hardware, and networking components to set up machines for testing and administration. 3) Managing user accounts, services, applications, systems, and data through graphical user interfaces and command line tools.

Uploaded by

Chethan Krishna
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Module 5

What are common tasks that network administrators perform for end users of IT?

• Network administration fundamentals on Windows, Linux, SunOS, and Cisco IOS.


These basic skills are essential in any cybersecurity organization, but they are also very
useful, in general, in any information technology (IT) organization.
• Security professionals that do testing must be able to set up their own machines, install
their own software, and configure for network communications.
• Administrative accounts are required in order to do software installation and most
activities basic hardware installation including various types of cables and video cards.
• Step by step installation instructions are provided for standalone pedestal PCs and rack-
mounted computers and devices.
• operating system installations and explain unique aspects of selected operating systems
and desktops. On Linux systems, desktops are somewhat interchangeable.
• the creation of CDs and DVDs on different operating systems and VMware, including
some basic tools, such as Brasero.
• anti-malware protection, including anti-virus, anti-spyware, firewalls, and other
protection tools.
• One of the first steps in every security test is getting connected to the local network. I
explain networking setup using both IPv4 and IPv6 notation, including hex and CIDR
notations.
• application installation and archiving, with variations for Windows, different types of
Linux, and VMware.
• system management controls including through a GUI and on the command line for
various environments.
• Remote logins is a very common and useful technique for remotely managing systems,
including with a GUI and command-line tools.
• User administration is the management of the lifecycle of users, including creation and
deletion of accounts.
• Managing services is an essential skill when working with network applications, such
as e-mail, security shells, and databases.
• Disk mounting is one approach for moving data between systems. Other techniques for
moving data include SFTP, and file sharing.
• Each family of systems uses a different line separator standard in text files: Windows
versus Linux versus Macintosh. You must perform conversions to successfully move
text files between these system types.
• Copying disks and disk backups are essential operations for building systems and
managing security tools.
• Formatting of new hard disks is necessary to set up the proper directory information
before files can be stored.
• Configuring a hardware firewall device (e.g. CISCO ASA) is an essential skill for
managing and maintaining computer networks.
• VM conversions and migrations are necessary activities to manage security tool suites
and create (or replicate) target machines on a network.
• In VMs, systems can be tested without risk of damaging operating systems,
applications, services, and data.

You might also like