Loading...
Major Group
3
Technicians and Associate Professionals
Sub-Major Group
35
Information And Communications Technicians
Small Unit Group
Kod MASCO
3513-04
Compare
System Security & Application ICT Technician
STEM
System Security & Application ICT Technician install, maintain, repair and operate information systems and any ICT related equipment (laptops, desktops, servers, tablets, smart phones, communications equipment, printers and any piece of computer related peripheral networks), and any type of software (drivers, operating systems, applications).

Alternative Names
Tasks
mengenal pasti kawasan yang memerlukan kelengkapan dan perisian yang perlu dinaik taraf
install computer hardware, networks, network software, operating system software, and application software
operate and maintain data communication systems other than networks
operate, maintain, and troubleshoot network systems
help users with network and data communication problems
-
MProfessional, Scientific And Technical Activities
-
IT-020-3:2013Computer System Operation
-
IT-030-4:2013Computer Network Administration
-
IT-020-4:2013Computer Systems Administration
-
0611Information Technology and Information System
-
0612Software Engineering
-
0613Computer Science
Skills
Asas
Active Listening
Proficiency in giving full attention to what other people are saying, taking time to understand the points being made and asking questions as appropriate.
Critical Thinking
Proficiency in using logic and reasoning to identify the strengths and weaknesses of alternative solutions, conclusions or approaches to problems.
Decision Making
proficiency in choosing between two or more alternatives.
Reading Comprehension
Proficiency in understanding written sentences and paragraphs in work related documents.
Active Learning
Proficiency in applying new knowledge.
Khusus
Network Security
proficiency in protecting of the underlying networking infrastructure from unauthorized access, misuse, or theft.
Coding
proficiency in computer language used to develop apps, websites, and software.
Cybersecurity Assessment
proficiency to identify cybersecurity risk level and determine the maturity of their cybersecurity programs.
Data Management Protection
proficiency in management and monitoring of data backup and protection services of a computer network or IT environment.
Penetration Testing
proficiency in simulating cyber attack against computer system to check for exploitable vulnerabilities.
