Infocomm TechnologyInformation and communications techniciansISCO 3513
ICT network technician
ICT network technicians install, maintain and troubleshoot networks, data communications equipment and network installed devices such as printers and storage area networks. They also analyse and fix network-related problems reported by users.
European Skills Framework
Skills and knowledge areas required for this occupation based on European classification.
Essential (20)
ICT network routingICT network routingThe processes and techniques for choosing the best paths within an ICT network through which a packet can travel.ICT network security risksICT network security risksThe security risk factors, such as hardware and software components, devices, interfaces and policies in ICT networks, risk assessment techniques that can be applied to assess the severity and the con...ICT network cable limitationsICT network cable limitationsThe limitations, such as distance limitations and resistance of types of cables, such as fibre cable, coax cable and ethernet cable which are used for realising networks.network standardsnetwork standardsRegulated standards that provide the technical guidelines, specifications, and requirements to ensure safe and efficient interoperability between devices, software, equipment, and organisations. Netwo...ICT networking hardwareICT networking hardwareThe ICT network equipment or computer networking devices, such as UPS systems, electrical systems, networking facilities and structured cabling systems.create solutions to problemscreate solutions to problemsSolve problems which arise in planning, prioritising, organising, directing/facilitating action and evaluating performance. Use systematic processes of collecting, analysing, and synthesising informat...identify suppliersidentify suppliersDetermine potential suppliers for further negotiation. Take into consideration aspects such as product quality, sustainability, local sourcing, seasonality and coverage of the area. Evaluate the likel...implement ICT security policiesimplement ICT security policiesImplement statements, assertions or rules that specify the appropriate use and protection of the ICT assets and systems from an organisation. These ICT security policies cover topics such as data clas...analyse network configuration and performanceanalyse network configuration and performanceAnalyse essential network data (e.g., router configuration files, routing protocols), network traffic capacity and performance characteristics of ICT networks, such as wide area network and local area...use back-up and recovery toolsuse back-up and recovery toolsUse tools which allow users to copy and archive computer software, configurations and data and recover them in case of loss.install electronic communication equipmentinstall electronic communication equipmentSet up and deploy digital and analogue electronic communications. Understand electronic diagrams and equipment specifications.use precision toolsuse precision toolsUse electronic, mechanical, electric, or optical precision tools, such as drilling machines, grinders, gear cutters and milling machines to boost accuracy while machining products.implement a virtual private networkimplement a virtual private networkCreate an encrypted connection between private networks, such as different local networks of a company, over the internet to ensure that only authorized users can access it and that the data cannot be...adjust ICT system capacityadjust ICT system capacityChange the scope of an ICT system by adding or reallocating additional ICT system components, such as network components, servers or storage to meet capacity or volume demands.maintain internet protocol configurationmaintain internet protocol configurationApply Internet Protocol Configuration (ipconfig) to gather data on Transmission Control Protocol/Internet Protocol (TCP/IP) configuration values in order to identify devices and their IP addresses.implement anti-virus softwareimplement anti-virus softwareDownload, install and update software to prevent, detect and remove malicious software, such as computer viruses.implement ICT network diagnostic toolsimplement ICT network diagnostic toolsUse software tools or components that monitor ICT network parameters, such as performance and throughput, provide data and statistics, diagnose errors, failures or bottlenecks and support decision mak...analyse network bandwidth requirementsanalyse network bandwidth requirementsStudy the requirements on the transmission capacity of an ICT network or other telecommunication system.implement a firewallimplement a firewallDownload, install and update a network security system designed to prevent unauthorized access to a private network.install signal repeatersinstall signal repeatersSet up and configure devices which enhance strength of signal of a communication channel to enable proper reception and reproduction in further places.
Optional (19)
network engineeringnetwork engineeringThe subfield of computer technology that concerns the managing the connectivity of networks through data, voice, calls and wireless network services.network management system toolsnetwork management system toolsThe software or hardware tools which enable monitoring, analysis and supervision of individual network components or network parts within a larger network system.Apache TomcatApache TomcatThe open-source web server Apache Tomcat provides a Java web server environment which uses a built in container where HTTP requests are loaded, allowing the Java web applications to run on local and s...procurement of ICT network equipmentprocurement of ICT network equipmentThe products available from network equipment providers and methods for selecting and procuring the equipment.digital systemsdigital systemsSystems to store, process and spread information in digital form. They are hardware, software and networks, as well as the ways in which these can be employed.electronics principleselectronics principlesThe study of electric energy, more specifically electron, control and its prominent principles regarding integrated circuits and electrical systems.ICT debugging toolsICT debugging toolsThe ICT tools used to test and debug programs and software code, such as GNU Debugger (GDB), Intel Debugger (IDB), Microsoft Visual Studio Debugger, Valgrind and WinDbg.ICT communications protocolsICT communications protocolsThe system of rules which allow the exchange of information between computers or other devices via computer networks.CiscoCiscoThe products available from the network equipment provider Cisco and methods for selecting and procuring the equipment.ICT security legislationICT security legislationThe set of legislative rules that safeguards information technology, ICT networks and computer systems and legal consequences which result from their misuse. Regulated measures include firewalls, intr...ICT system programmingICT system programmingThe methods and tools required to develop system software, specifications of system architectures and interfacing techniques between network and system modules and components.concepts of telecommunicationsconcepts of telecommunicationsThe telecommunication principles, theories, models, equipment and processes such as transfer rate, bandwidth, signal-to-noise ratio, bit error ratio and C/N ratio, as well as the effect of the qualiti...migrate existing datamigrate existing dataApply migration and conversion methods for existing data, in order to transfer or convert data between formats, storage or computer systems.design cloud architecturedesign cloud architectureDesign a multi-tier cloud architecture solution, which tolerates faults and is fit for the workload and other business needs. Identify elastic and scalable computing solutions, select high-performing ...solder electronicssolder electronicsOperate and use soldering tools and soldering iron, which supply high temperatures to melt the solder and to join electronic components.use ICT hardwareuse ICT hardwareAbility to use equipment such as monitor, mouse, keyboard, storage devices, printers, scanners etc to perform operations such as plugging in, starting up, shutting down, rebooting, saving files and ot...remove computer virus or malware from a computerremove computer virus or malware from a computerCarry out actions to remove computer viruses or other types of malware from a computer.implement spam protectionimplement spam protectionInstall and configure software that supports email-users to filter messages that contain malware or that are unsolicited.perform ICT security testingperform ICT security testingExecute types of security testing, such as network penetration testing, wireless testing, code reviews, wireless and/or firewall assessments in accordance with industry-accepted methods and protocols ...
Related Occupations
Other occupations in the Other category that share similar skill requirements.
AI Replacement Risk
50/ 100
Moderate Risk
Low riskHigh risk