Outline

Contents

keyboard_tab
Activity Instructions

In this workplace Apply activity, you will be selecting an operating system for a network.

This Apply activity allows you demonstrate competence (skills and behaviours) which form a part of your portfolio. This is real work you have done in your workplace that is unique to you and your employer.

As a Cyber Security Technologist, it is expected that you will be involved in working alongside system administrators and teams in advising and selecting the appropriate network or client operating system for your companies’ network. You will be a key part of the configuration, maintenance, and security for these, understanding what the threats and risks are of using the selected OS. You will also be responsible for security issues, patch management, group policies and ensuring the systems remain compliant and in line with appropriate security frameworks that your company uses (for example ISO 27001).

This will be based on a requirement for your organisation for either an internal or external customer.

Your task

Working with the network administrator or team, research and select the appropriate operating systems that are required for a network you have designed, considering the security threats and risks of each that are selected, how they are going to be set up and deployed across the network, implementing group policy, patch management or system hardening.  

Focus

  • The concepts, main functions and features of at least three Operating Systems (OS) and their security functions and associated security features
  • Configure, deploy, and use computer, digital network, and cyber security technology.

Suggested areas to cover

  • The choice of network or client operating system, this could be Windows, Unix, Linux, MacOS?
  • What current operating systems or products are already deployed in the business?
  • The available budget to purchase the OS’s, any financial constraints that the company has, the reliability, scalability, and security of the operating system for future business requirements
  • Future support for the OS, patch management and service packs, OS hardening, creating rules and policies, governing the system, and protecting from common vulnerabilities
  • The security features of each OS; what are the pros and cons of using each one?

Important notes

There isn’t a maximum duration to complete this activity. We estimate it will take at least two days (15 hours) to complete. The information supplied is for guidance.

You may be required to do some investigation into your business to find the answers. Be inquisitive and see what information you can find out.

Check Bud for the submission deadline.

Sensitive information

We understand that you may be working in sensitive or restricted environments, which may limit the information that you can share within the portfolio. In cases like this, you can anonymise any work you do.

It's also important for you to recognise where you should be redacting information when sharing evidence with third parties. This demonstrates good practice in cyber security, and demonstrates that you understand, and are following, your organisation's security policies.

Although you might not be able to provide the full evidence from a work task due to security constraints, where possible, you should still aim to describe the process you followed, the scope of the project, the complexity of the task and any stakeholders involved.

STARRS

When providing evidence in the portfolio, a recommended approach is to apply the STARRS method to each work task you are talking about. This will provide you with a clear direction on how to structure your evidence into the portfolio.

Situation: What is the situation? What is the issue/problem that needs solving?

Task: What were you tasked with doing? What were your objectives? What did you do, and what did the task involve? Explain your tasks and responsibilities

Action: What did you do? How did you do it? Who did you communicate with? What tools did you use? (This is where you can provide your screenshots / evidence)

Result: What did you do after you completed your actions? Did anything need updating? Did you communicate with anyone? What was the conclusion?

Reflect: What did you do well? What didn’t go as well as you had hoped?

Strengthen: In later stages when you look to consolidate your portfolio, have you provided the best evidence from your apprenticeship work? Do you need to collate additional supporting evidence?

Learning outcomes covered

K2: The concepts, main functions and features of at least three Operating Systems (OS) and their security functions and associated security features

S6: Analyse employer or customer requirements to derive security objectives and taking account of the threats and overall context develop a security case which sets out the proposed security measures in the context with reasoned justification.

S7: Identify and follow organisational policies and standards for information and cyber security and operate according to service level agreements or other defined performance targets

Before you start

Take your time and think what is being asked of you. Break down the work you need to complete and plan how you will accomplish each area.

Whilst you need to be detailed, you should only provide the necessary detail e.g. You don’t need to provide the detailed history of your company or detail every single research finding/source you used.

You will need to complete all the details above which you will submit in Bud to successfully complete this activity. The submission requirements are all listed above.

Good luck and enjoy the activity!

Difficulty
Intermediate
Duration
20m
Students
5
Description

In this workplace Apply activity, you will be selecting an operating system for a network.

This Apply activity allows you demonstrate competence (skills and behaviours) which form a part of your portfolio. This is real work you have done in your workplace that is unique to you and your employer.

About the Author
Avatar
QA
Training Provider
Students
10316
Labs
31
Courses
150
Learning Paths
33

QA: A world-leading tech and digital skills organisation

We help many of the world’s leading companies to build their tech and digital capabilities via our range of world class training courses, reskilling bootcamps, work-based learning programmes and Apprenticeships. We also create bespoke solutions, blending elements to meet specific client needs.