Tasks and Duties
Objective: In this task, you will design and implement a virtual network simulation to demonstrate your ability to establish, maintain, and troubleshoot network systems. The focus is on building a small-scale network environment using virtual machines or simulation software (such as GNS3 or Packet Tracer) to practice network maintenance and monitoring. You are expected to demonstrate methods for monitoring network performance, identifying issues, and applying solutions to maintain uninterrupted operations.
Expected Deliverables: A comprehensive PDF report that includes: a network topology diagram, configuration files or scripts used within your setup, screenshots demonstrating the successful monitoring of network traffic, and a detailed explanation of the troubleshooting process used for any issues encountered during your simulation.
Key Steps:
- Research and select appropriate simulation software.
- Design a network topology that includes routers, switches, and at least two end-nodes.
- Implement network monitoring tools (e.g., ping, traceroute, SNMP managers) within your simulation.
- Simulate network issues and document troubleshooting steps and resolutions.
- Compile your findings, configurations, and explanations into a PDF report.
Evaluation Criteria:
- Clarity and detail of the network diagram and configuration files.
- Effectiveness of implemented network monitoring solutions.
- Depth of analysis regarding troubleshooting procedures.
- Quality, organization, and professionalism of the submitted PDF report.
- Adherence to the estimated timeline (30-35 hours).
Objective: This task requires you to simulate a software troubleshooting scenario where you encounter and resolve technical issues within a software application. You will create a controlled error environment using a simple software application (e.g., a web application or a small desktop tool). The goal is for you to identify the error, apply debugging techniques, and document the root cause analysis alongside the corrective actions taken.
Expected Deliverables: A detailed PDF report that includes: an explanation of the error scenario, the source code of the application with documented errors, step-by-step debugging procedures, screenshots or logs capturing the error and its resolution, and recommendations to mitigate such issues in future projects.
Key Steps:
- Select or develop a simple software application that can be used to simulate an error condition.
- Intentionally introduce a bug or error within the code.
- Utilize debugging tools (such as IDE debuggers, log analysis, or error tracking tools) to identify and isolate the error.
- Document the debugging process and corrective measures in detail.
- Compile your source code, debugging logs, screenshots, and analysis into a comprehensive PDF report.
Evaluation Criteria:
- Accuracy and completeness of the debugging process documentation.
- Clarity in explaining the root cause of the error.
- Quality and functionality of the corrected code.
- Professional presentation and organization of the PDF report.
- Adherence to the estimated 30-35 hour timeline.
Objective: In this task, you will design and develop a small-scale IT automation script that addresses a specific operational need within an IT environment. This could involve automating routine tasks such as system backups, log file analysis, or user account management. The key is to demonstrate your ability to write clean, efficient, and effective code that automates a repetitive task, thus contributing to overall operational efficiency.
Expected Deliverables: Submit a package containing your automation script (preferably in Python, Bash, or another popular scripting language) along with a PDF document that details your development process, including the problem statement, design approach, code explanation, test cases with outputs, and screenshots showing the execution of the script in a simulated environment.
Key Steps:
- Identify a common IT task that can be automated.
- Design a solution and write an automation script to perform the task.
- Test the script thoroughly in a simulated or real environment.
- Document your entire process, including initial research, design decisions, challenges encountered, and how those challenges were overcome.
- Prepare a PDF report that complements your submitted code with detailed explanations and screenshots.
Evaluation Criteria:
- Functionality and reliability of the automation script.
- Originality and creativity of the solution.
- Depth of documentation and clarity in the PDF report.
- Quality of testing and the robustness of error handling in your script.
- Overall adherence to the estimated timeline of 30-35 hours.
Objective: This task focuses on cybersecurity by requiring you to conduct a simulated risk assessment of an IT environment. You will create a scenario that represents a typical small business network and identify potential vulnerabilities and security gaps. Your work should involve simulating possible attack vectors, performing basic penetration tests, and developing risk mitigation strategies based on publicly available resources and best practices in cybersecurity.
Expected Deliverables: A detailed PDF report that includes: an overview of the simulated IT environment, a risk assessment matrix outlining identified vulnerabilities, documentation of simulated attack scenarios (with screenshots if applicable), guided mitigation strategies for each identified risk, and an evaluation of the overall security posture of the simulated environment.
Key Steps:
- Design a simulated small business IT network with common components (servers, workstations, routers, etc.).
- Research and identify common security vulnerabilities applicable to your simulated environment.
- Simulate potential attack scenarios using available cybersecurity tools and document the process.
- Develop a risk mitigation plan and recommend best practices for improving security.
- Compile all the findings, methods, and recommendations into a well-structured PDF report.
Evaluation Criteria:
- Thoroughness in identifying and evaluating potential security threats.
- Accuracy and detail in the simulated attack scenarios and risk assessment.
- Quality and practicality of the recommended mitigation strategies.
- Overall organization, clarity, and professionalism of the submitted PDF report.
- Adherence to the estimated project timeline of 30-35 hours.