The Further Education and Training Awards Council (FETAC) was set up as a statutory body on 11 June 2001 by the Minister for Education and Science. Under the Qualifications (Education & Training) Act, 1999, FETAC now has responsibility for making awards previously made by NCVA. Module Descriptor Systems Software Level 6 L32517 www.fetac.ie
1 Module Title Systems Software 2 Module Code L32517 3 Level 6 4 Credit Value 1 credit 5 Purpose This module is a statement of the standards to be achieved to gain a FETAC credit in Systems Software at Level 6. It is designed to provide a solid foundation for the student in the fundamentals of distributed computing systems. 6 Preferred Entry Level An appropriate award at Level 5 Certificate in or equivalent qualifications and/or relevant life and work experiences. 7 Special Requirements This should be delivered together with modules in Client/Server Networking and Network Theory 8 General Aims Learners who successfully complete this module will: 8.1 Recognise that systems software complements a diversity of hardware platforms 8.2 Recognise that systems software presents the user with a uniform computing environment 8.3 Install, configure and optimise a variety of computer operating systems, e.g., Windows XP, Linux, MacOS 8.4 Install, configure and optimise a variety of computer peripherals for operation between two or more disparate operating systems 8.5 Use appropriate procedures to manage a variety of major operating system subsystems, e.g, virtual memory, file systems, networking 8.6 Identify the names, locations and purposes of major operating system files and folders, e.g. config.sys, autoexec.bat, winnt, ntdetect.com, ntoskrnl.exe, XF86Config, /bin, /etc, smbclient
8.7 Identify and use major operating system utilities and tools, e.g. msconfig, regedit, regedt32, sysprep, chmod, grep xinit, ifconfig, ps, gunzip, 8.8 Demonstrate the ability to make preparation for and recover from system failures 8.9 Recognise and interpret common error codes and implement suitable recovery procedures, e.g., BSODs, Last Known Good configuration, boot with extensions off 8. Recognise when to use common diagnostic utilities and system tools to perform elementary maintenance of system software 9 Units The specific learning outcomes are grouped into 4 units. Unit 1 Unit 2 Unit 3 Unit 4 Principles of Computer Filing Systems Configuration and Maintenance of Systems Software Computer Security Troubleshooting Specific Learning Outcomes Unit 1 Principles of Computer Filing Systems Learners should be able to:.1.1 Define what is meant by the term computer filing system.1.2 Identify the major desktop components and interfaces and state their functions on a variety of operating systems.1.3 Identify the names, locations, purposes, and contents of major system files in contemporary MS Windows systems, e.g., io.sys, msdos.sys, config.sys, ntdetect.com, ntuser.dat, etc.1.4 Identify the names, locations, purposes, and contents of major system files in contemporary Linux/Unix system files, e.g., LILO, GRUB, init, crontab, mount, mtools, xf86config, etc.1.5 Identify the names, locations, purposes, and contents of major system files in contemporary MacOS system files, e.g., Finder, Chooser, System Folder, Extensions Manager, etc.1.6 Explain what is meant by the terms linked library, virtual machine, swap file, swap partition.1.7 Recognise the difference between the fundamental file systems, e.g., FAT32, NTFS, Ext2, Ext3, Darwin, FreeBSD.1.8 Format and partition a hard disk to support one or more file system types 1
.1.9 Explain how various filing systems use services and system utilities to accommodate access to and processing of files.1. Navigate root directories, subdirectories and system paths using a command line interface (VDOS, bash, etc) and a GUI (Finder, X-Windows, etc).1.11 Explain and demonstrate the use of piping, filtering, wildcards, redirecting, aliasing.1.12 Distinguish between the file and folder naming techniques as used in Windows, Unix/Linux and MacOS operating systems.1.13 Create, rename, move, copy, edit, sort and delete files and folders in a variety of different system environments.1.14 Associate files of an unknown file type with the correct program or utility Unit 2 Configuration and Maintenance of Systems Software Learners should be able to:.2.1 Understand the need for regular maintenance/upgrade of the operating system.2.2 Install system updates and service packs on a variety of operating systems, as appropriate, e.g., Windows Update, MacOS Software Update, rpm.2.3 Install, configure and test networking devices on a variety of operating systems, e.g., modems, NICs.2.4 Install, configure and test networking services on a variety of operating systems.2.5 Harden a variety of operating systems using appropriate system utilities and third party utilities, e.g., BIOS, IPSec, ssh, enumerated services, security templates, firewalls, anti-virus software.2.6 Install, configure and test distributed software utilities on a variety of operating systems, e.g., Samba, PC-Mac-Net FileShare, PPP to RAS, Mac-on-Linux.2.7 Install and configure a boot manager.2.8 Configure and implement a dual boot computer system.2.9 Share specific system resources and system devices between disparate operating systems.2. Compile and analyse a benchmark profile using an appropriate distributed system utility, e.g., Ethereal, MSBA, LanGuard.2.11 Use virtual desktops and operating system emulators, e.g., Virtual PC, dosemu, VNC, GuestPC 2
Unit 3 Computer Security Learners should be able to:.3.1 Explain the need for security with regard to computer systems.3.2 Identify 3 possible threats to an unsecured computing environment.3.3 Configure and implement a local system security policy.3.4 Develop security benchmarks for a variety of operating systems.3.5 Outline and deploy simple strategies for overcoming the more common threats to the security of a computer system.3.6 Explain what is meant by the terms threat model, honeypot, risk avoidance, foot printing, rootkit, backdoor, DoS.3.7 Configure and deploy security based software utilities on a variety of operating systems, e.g., PortScan, finger, AntiSpyware, etc.3.8 Identify, analyse and remove the presence of a virus infection and/or spyware infection.3.9 Identify, analyse and remove the presence of a spam engine and/or infection.3. Identify, analyse and remove the presence of a rootkit Unit 4 Troubleshooting Learners should be able to:.4.1 Identify the more common operational and usability problems within a computer system and develop a plan for resolving them.4.2 Document, log or record all information regarding the nature of the problem and the preferred solution if obtainable.4.3 Distinguish between well-defined and ill-defined problems.4.4 Distinguish between hardware and software errors.4.5 Install, configure and implement standard system diagnostic tools, e.g., perfmon, netmon, ifconfig, dd.4.6 Recognise and interpret common error codes and implement suitable recovery procedures, e.g., MacOS system errors, BSODs, Last Known Good Configuration, boot errors.4.7 Develop and implement a password recovery policy.4.8 Establish electronic logging procedures to audit important system events.4.9 Create and utilise emergency repair disks 3
.4. Create and deploy standard disk images for use in system recovery scenarios.4.11 Use system help files and other system resources as appropriate 11 Portfolio of Assessment Please refer to the glossary of assessment techniques and the note on assessment principles at the end of this module descriptor. All assessment is carried out in accordance with FETAC regulations. Assessment is devised by the internal assessor, with external moderation by FETAC. Summary Skills Demonstration 70% Examination 30% 11.1 Skills Demonstration The internal assessor will devise a brief that requires candidates to produce evidence that demonstrates an understanding and application of a range of specific learning outcomes. Specifically, candidates will be expected to demonstrate a competency in installing, securing and configuring both a Microsoft Windows system and a non-microsoft Windows system in a dual-boot environment. In both skills demonstrations, candidates will be assessed in a broad range of practical skills and adherence to safe working practices throughout. 11.2 Examination The internal assessor will devise a theory-based examination that assesses the candidate s ability to recall and apply theory and understanding, requiring responses to a range of structured questions. These questions may be answered in different media such as in writing or orally. The examination will be based on a range of learning outcomes and will be 2 hours in duration. The format of the examination will be as follows: 6 structured questions. Candidates are required to answer 4 (0 marks each). 12 Grading Pass 50-64% Merit 65-79% Distinction 80-0% 4
Individual Candidate Marking Sheet 1 Systems Software L32517 Skills Demonstration 70% Candidate Name: PPSN: Centre: Centre No.: Assessment Criteria Configuring a Dual-Boot Computer System appropriate preparation of hard disk(s) appropriate use of software set-up tools and procedures securing/optimising a dual-boot computer system configuration of local security policies demonstrating a mastery of navigating filing system(s) show evidence of critical analysis and reasoning skills Maximum Mark 20 20 Candidate Mark Subtotal 90 System Software Administration appropriate preparation and planning creating a baseline computer system safe use and careful deployment of system software utilities, i.e., diagnostics, testing identify and remove a virus, spyware infection and rootkit recover a failed computer system share a peripheral device between two disparate computer systems show evidence of critical analysis and reasoning skills Subtotal 90 TOTAL MARKS This mark should be transferred to the Module Results Summary Sheet 180 Internal Assessor s Signature: Date: External Authenticator s Signature: Date: 5
Individual Candidate Marking Sheet 2 Systems Software L32517 Examination (Theory-Based) 30% Candidate Name: PPSN: Centre: Centre No.: Assessment Criteria Structured Questions 6 structured questions, answer any 4 (0 marks each). (Indicate questions answered) Maximum Mark Candidate Mark Question No:. 40 40 40 40 TOTAL MARKS This mark should be transferred to the Module Results Summary Sheet 120 Internal Assessor s Signature: Date: External Authenticator s Signature: Date: 6