You install and implement network components and services in a physical -, virtual - or cloud environment, according to the needs of an organisation or its users, or based on an existing plan.?
| The student installs and configures network devices on the network based upon an existing plan.
|
You monitor, test and troubleshoot network components and services, suggesting areas for improvement and developing structural solutions to identified problems.
| The student tests endpoints. |
| The student monitors the production environment proactively.
|
| The student gives advice on improvements to system and network configurations, based upon monitoring results.
|
| The student tests network devices.
|
You configure and manage network components and services to work together correctly, taking into account the impact of changes.
| The student maintains the installed systems.
|
You recognise security risks within the network environment and act correctly and deontologically to address them to stakeholders and mitigate them.
| The student follows the defined procedures in case of security breaches in order to minimalise the impact of the breach on systems, data and users.
|
| The student reports security risks on the network to the superior.
|
You inform, advise and support the organisation or its users regarding the correct and safe use of the network environment.
| The student configures endpoints in the network according to criteria as agreed upon. |
| The student gives professional assistance in case of correct use of systems, services and applications which have been implemented by him/her.
|
You apply the standards, best practices and applicable procedures within an organisation regarding installation, configuration, automation, management and security.
| The student configures network devices according to applicable standards.
|
You adopt a deontological attitude and apply the standards and applicable procedures within an organisation regarding privacy and information security.
| The student follows the advice of a superior regarding data security and privacy.
|
| The student acts deontologically in a real IT context.
|
You apply the agreements and applicable procedures within an organisation regarding reporting and documentation.
| The student documents his/her activities in the working environment.
|
| The student reports his/her activities and the progress made within a project.
|
You suggest and implement solutions to achieve a scalable, fault-tolerant and high-performance network infrastructure, taking into account IT business continuity.
| The student gives an overview of necessary actions and tools to ensure the continuity of the system and network infrastructure.
|
| The student mentions problems to relevant people concerned in due time.
|
You identify opportunities to automate tasks within the implementation and maintenance of an IT infrastructure and convert them to appropriate code concepts or tools.
| The student automates recurring tasks based upon relevant and presently available techniques within a production environment.
|
You reflect on your functioning, identify development needs in yourself and look for opportunities to meet these needs and to expand or deepen your own skills.
| The student writes a self-reflection on different soft and hard skills.
|
| The student reflects on the working environment by means of a SWOT analysis.
|
| The student reflects on the study by means of a SWOT analysis.
|
| The student points out his/her development needs and takes action.
|
You participate positively-critically, constructively, actively and even-handedly in a multidisciplinary team, respecting deadlines and completing your own action points with quality.
| The student works constructively and proactively in a team within a professional environment.
|
You use professional English terminology correctly and use professional communication tailored to the target audience.
| The student gives an oral report about the delivered work, adjusted to the target group.
|