Loading...
Major Group
3
Technicians and Associate Professionals
Sub-Major Group
35
Information And Communications Technicians
Small Unit Group
Kod MASCO
3513-01
Compare
Computer Network Technician
STEM
Computer Network Technician setting up the various hardware and software components, as well as troubleshooting and resolving any issues along the way.

Alternative Names
Tasks
Troubleshooting and resolving issues with the network
Installing network hardware components and cables
Identifying and eliminating bottlenecks to ensure long-term network efficiency
Ensuring the network operates securely
Providing technical support to co-workers
-
MProfessional, Scientific And Technical Activities
-
IT-020-3:2013Computer System Operation
-
IT-030-3:2013Computer Network Services
-
IT-030-4:2013Computer Network Administration
-
IT-020-4:2013Computer Systems Administration
-
0611Information Technology and Information System
-
0612Software Engineering
-
0613Computer Science
Skills
Asas
Active Listening
Proficiency in giving full attention to what other people are saying, taking time to understand the points being made and asking questions as appropriate.
Critical Thinking
Proficiency in using logic and reasoning to identify the strengths and weaknesses of alternative solutions, conclusions or approaches to problems.
Decision Making
proficiency in choosing between two or more alternatives.
Reading Comprehension
Proficiency in understanding written sentences and paragraphs in work related documents.
Active Learning
Proficiency in applying new knowledge.
Khusus
Food Safety
proficiency in food handling, preparation, and storage practices that preserve food quality to prevent contamination and food-borne diseases.
Cybersecurity Assessment
proficiency to identify cybersecurity risk level and determine the maturity of their cybersecurity programs.
Network Administration
<p>proficiency in administering and managing the computer networks of one or many organisations.</p>
Penetration Testing
proficiency in simulating cyber attack against computer system to check for exploitable vulnerabilities.
