Search this site
Embedded Files
bit.ly/wrecdigitalsupport
  • Home
    • British Values
    • How to Submit Work
    • Interview Questions
    • Lesson-by-Lesson
    • Report Assessment
    • Syllabus Interpretation
    • Units with "must have"
    • Tutors
    • Housekeeping
    • Lesson Plan
  • Productivity
    • Microsoft Word
    • Paint.net
    • Mindmap
    • Windows
    • Google Sites
  • Where to Next
    • Ikigai
  • Webinars
    • Imperative.com
  • Unit 01
    • LO 1 - 1.1 Legislation
    • LO 1 - 1.2 Non-Compliance
    • LO 1 - 1.3 ISO
    • LO 1 - 1.4 Policies
    • LO 1 - 1.5 AUP
      • Example
    • LO 2 - 2.1 Skills
    • LO 2 - 2.2 Decisions
    • LO 2 - 2.3 Communication
    • LO 2 - 2.4 Collaboration
    • LO 2 - 2.5 Tasks
    • LO 2 - 2.6 Health & Safety
    • LO 3 - 3.1 Tools
    • LO 3 - 3.2 Solving Problems
    • LO 3 - 3.3 Continuous improvement
    • LO 3 - 3.4 Continuous improvement
    • LO 4 - 4.1 CPD
    • LO 4 - 4.2 Career Path
    • LO 4 - 4.3 CPD Plan
  • Unit 02
    • LO 1 - 1.1 Network Devices
    • LO 1 - 1.2 Configure devices
      • Cisco Packet Tracer
        • Firewall
    • LO 1 - 1.3 Troubleshoot
    • LO 2 - 2.1 Server Types
    • LO 2 - 2.2 Configure Servers
      • Windows Server Configuration
      • DNS Configuration
      • Install Windows Server
    • LO 2 - 2.3 Shared network resources
    • LO 3 - 3.1 Topologies
    • LO 3 - 3.2 Addressing
    • LO 3 - 3.3 Networks
    • LO 3 - 3.4 Infrastructure
      • OSI (Levels)
    • LO 4 - 4.1 Cloud Services
      • Web Hosting
    • LO 4 - 4.2 Cloud (pros/cons)
    • LO 4 - 4.3 Virtualisation
    • LO 4 - 4.4 Virtual. (where)
    • LO 4 - 4.5 Virtual. (pros/cons)
  • Unit 03
    • LO 1 - 1.1 Data Types
    • LO 1 - 1.2 D.T. (usage)
    • LO 1 - 1.3 Algorithms
    • LO 1 - 1.4 Data Storage
    • LO 1 - 1.5 D-base, -warehouse, -lake
    • LO 1 - 1.6 Storing Data
    • LO 1 - 1.7 Organising Data
    • LO 2 - 2.1 Data Classification
    • LO 2 - 2.2 Backing up
    • LO 2 - 2.3 B.U. Approaches
    • LO 2 - 2.4 B.U. considerations
    • LO 2 - 2.5 Perform Backup
      • Windows Server Backup
      • Windows 10
    • LO 3 - 3.1 Info. Systems
    • LO 3 - 3.2 InfSys (purpose)
    • LO 3 - 3.3 InfSys (functions)
    • LO 4 - 4.1 Data-Info System
    • LO 4 - 4.2 Secure DataSys
      • AD Certificate Server
      • Unsigned Certificate
    • LO 4 - 4.3 DataSys (use)
    • LO 4 - 4.4 Link DataSys
      • Embed Excel into Google Site
    • LO 5 - 5.1 Data quality
    • LO 5 - 5.2 ETL
      • Excel vs Power BI
    • LO 5 - 5.3 Data Analysis Tool
    • LO 5 - 5.4 Data (source, etc)
    • LO 6 - 6.1 Data Visualisation
    • LO 6 - 6.2 DataVis Methods
    • LO 6 - 6.3 Present Data Vis
    • POWER BI
  • Unit 04
    • LO 1 - 1.1 Security Data
    • LO 1 - 1.2 Data Catalogue
    • LO 1 - 1.3 DPIA
    • LO 1 - 1.4 InfoSec(principles)
    • LO 1 - 1.5 Manage InfSec
    • LO 1 - 1.6 Ctrl Access Protocols
    • LO 1 - 1.7 D.Catalog(create)
    • LO 2 - 2.1 Risks
    • LO 2 - 2.2 Threats-Vulnerabilities
      • EICAR
    • LO 2 - 2.3 Mitig'tn Controls
    • LO 3 - 3.1 SIEM Purpose
      • Splunk
      • AlienVault
    • LO 3 - 3.2 SIEM Process
    • LO 3 - 3.3 SIEM Data
    • LO 3 - 3.4 SIEM Report
    • LO 4 - 4.1 CVE / CVSS
    • LO 4 - 4.2 Scoring Matrix
    • LO 4 - 4.3 Risk Management
    • LO 4 - 4.4 Remediation
    • LO 4 - 4.5 Vulnerability Scan
  • Unit 05
    • LO 1 - 1.1 Helpdesk Functions
    • LO 1 - 1.2 Helpdesk Process
    • LO 1 - 1.3 SLA
    • LO 1 - 1.4 Per-Pro Report
    • LO 1 - 1.5 Levels of Support
    • LO 1 - 1.6 Resolve Ticket
    • LO 2 - 2.1 Digital Problems
    • LO 2 - 2.2 Helpdesk Requests
    • LO 2 - 2.3 Tools-Techniques
    • LO 2 - 2.4 Incident Mgmt
    • LO 2 - 2.5 Resolve Problems
    • LO 3 - 3.1 Syslog Server
      • Kiwi Syslog Server
    • LO 3 - 3.2 Syslog Info
    • LO 3 - 3.3 Syslog Install
      • Install Kiwi Syslog Server
      • PRTG
      • Firewall
    • LO 3 - 3.4 Syslog Interpret
    • LO 4 - 4.1 OSs
    • LO 4 - 4.2 OS Setup
    • LO 4 - 4.3 Disk Image OSs
      • Bootable USB
    • LO 4 - 4.4 OS Deployment
    • LO 4 - 4.5 OS Installation
      • OS Image & Deployment
      • Hardware Driver
    • LO 5 - 5.1 App Types
    • LO 5 - 5.2 Configure Software
    • LO 5 - 5.3 Deployment Methods
    • LO 5 - 5.4 Install, Configure, Test & Deploy
      • NTFS vs FAT vs exFAT
      • Ubuntu Installation
      • Windows Deployment Services
      • Install Power BI
      • Open Office Installation#
  • Unit 06
    • LO 1 - 1.1 Digital Transformation Purpose
    • LO 1 - 1.2 D.T. Characteristics
    • LO 1 - 1.3 D.T. Barriers
    • LO 1 - 1.4 Emerging Digital Technologies
    • LO 1 - 1.5 Digital Strategy
      • Digital Strategy Template
    • LO 2 - 2.1 Agile-Waterfall
      • Agile Details
    • LO 2 - 2.2 W-A (pros/cons)
    • LO 2 - 2.3 W-A Stages
    • LO 2 - 2.4 DevOps Software Development
    • LO 2 - 2.5 Continuous Innovation/Development
    • LO 3 - 3.1 Digital Applications
    • LO 3 - 3.2 Office Systems & Web Technologies
      • Mass Email List
    • LO 4 - 4.1 Coaching
    • LO 4 - 4.2 Coaching Situations
    • LO 4 - 4.3 GROW Model (Coaching)
    • LO 4 - 4.4 Communication Techniques
    • LO 4 - 4.5 Training Session
  • Cybersecurity
  • Jobs
  • Terms
  • Advanced Networking
    • Subnets
    • nmap
    • ipconfig
    • 0.0.0.0
    • Router
  • Linux
    • OSSEC Installation
  • Advanced Security
  • Misc
    • Ports
  • Courses
  • Certfications
bit.ly/wrecdigitalsupport
  • Home
    • British Values
    • How to Submit Work
    • Interview Questions
    • Lesson-by-Lesson
    • Report Assessment
    • Syllabus Interpretation
    • Units with "must have"
    • Tutors
    • Housekeeping
    • Lesson Plan
  • Productivity
    • Microsoft Word
    • Paint.net
    • Mindmap
    • Windows
    • Google Sites
  • Where to Next
    • Ikigai
  • Webinars
    • Imperative.com
  • Unit 01
    • LO 1 - 1.1 Legislation
    • LO 1 - 1.2 Non-Compliance
    • LO 1 - 1.3 ISO
    • LO 1 - 1.4 Policies
    • LO 1 - 1.5 AUP
      • Example
    • LO 2 - 2.1 Skills
    • LO 2 - 2.2 Decisions
    • LO 2 - 2.3 Communication
    • LO 2 - 2.4 Collaboration
    • LO 2 - 2.5 Tasks
    • LO 2 - 2.6 Health & Safety
    • LO 3 - 3.1 Tools
    • LO 3 - 3.2 Solving Problems
    • LO 3 - 3.3 Continuous improvement
    • LO 3 - 3.4 Continuous improvement
    • LO 4 - 4.1 CPD
    • LO 4 - 4.2 Career Path
    • LO 4 - 4.3 CPD Plan
  • Unit 02
    • LO 1 - 1.1 Network Devices
    • LO 1 - 1.2 Configure devices
      • Cisco Packet Tracer
        • Firewall
    • LO 1 - 1.3 Troubleshoot
    • LO 2 - 2.1 Server Types
    • LO 2 - 2.2 Configure Servers
      • Windows Server Configuration
      • DNS Configuration
      • Install Windows Server
    • LO 2 - 2.3 Shared network resources
    • LO 3 - 3.1 Topologies
    • LO 3 - 3.2 Addressing
    • LO 3 - 3.3 Networks
    • LO 3 - 3.4 Infrastructure
      • OSI (Levels)
    • LO 4 - 4.1 Cloud Services
      • Web Hosting
    • LO 4 - 4.2 Cloud (pros/cons)
    • LO 4 - 4.3 Virtualisation
    • LO 4 - 4.4 Virtual. (where)
    • LO 4 - 4.5 Virtual. (pros/cons)
  • Unit 03
    • LO 1 - 1.1 Data Types
    • LO 1 - 1.2 D.T. (usage)
    • LO 1 - 1.3 Algorithms
    • LO 1 - 1.4 Data Storage
    • LO 1 - 1.5 D-base, -warehouse, -lake
    • LO 1 - 1.6 Storing Data
    • LO 1 - 1.7 Organising Data
    • LO 2 - 2.1 Data Classification
    • LO 2 - 2.2 Backing up
    • LO 2 - 2.3 B.U. Approaches
    • LO 2 - 2.4 B.U. considerations
    • LO 2 - 2.5 Perform Backup
      • Windows Server Backup
      • Windows 10
    • LO 3 - 3.1 Info. Systems
    • LO 3 - 3.2 InfSys (purpose)
    • LO 3 - 3.3 InfSys (functions)
    • LO 4 - 4.1 Data-Info System
    • LO 4 - 4.2 Secure DataSys
      • AD Certificate Server
      • Unsigned Certificate
    • LO 4 - 4.3 DataSys (use)
    • LO 4 - 4.4 Link DataSys
      • Embed Excel into Google Site
    • LO 5 - 5.1 Data quality
    • LO 5 - 5.2 ETL
      • Excel vs Power BI
    • LO 5 - 5.3 Data Analysis Tool
    • LO 5 - 5.4 Data (source, etc)
    • LO 6 - 6.1 Data Visualisation
    • LO 6 - 6.2 DataVis Methods
    • LO 6 - 6.3 Present Data Vis
    • POWER BI
  • Unit 04
    • LO 1 - 1.1 Security Data
    • LO 1 - 1.2 Data Catalogue
    • LO 1 - 1.3 DPIA
    • LO 1 - 1.4 InfoSec(principles)
    • LO 1 - 1.5 Manage InfSec
    • LO 1 - 1.6 Ctrl Access Protocols
    • LO 1 - 1.7 D.Catalog(create)
    • LO 2 - 2.1 Risks
    • LO 2 - 2.2 Threats-Vulnerabilities
      • EICAR
    • LO 2 - 2.3 Mitig'tn Controls
    • LO 3 - 3.1 SIEM Purpose
      • Splunk
      • AlienVault
    • LO 3 - 3.2 SIEM Process
    • LO 3 - 3.3 SIEM Data
    • LO 3 - 3.4 SIEM Report
    • LO 4 - 4.1 CVE / CVSS
    • LO 4 - 4.2 Scoring Matrix
    • LO 4 - 4.3 Risk Management
    • LO 4 - 4.4 Remediation
    • LO 4 - 4.5 Vulnerability Scan
  • Unit 05
    • LO 1 - 1.1 Helpdesk Functions
    • LO 1 - 1.2 Helpdesk Process
    • LO 1 - 1.3 SLA
    • LO 1 - 1.4 Per-Pro Report
    • LO 1 - 1.5 Levels of Support
    • LO 1 - 1.6 Resolve Ticket
    • LO 2 - 2.1 Digital Problems
    • LO 2 - 2.2 Helpdesk Requests
    • LO 2 - 2.3 Tools-Techniques
    • LO 2 - 2.4 Incident Mgmt
    • LO 2 - 2.5 Resolve Problems
    • LO 3 - 3.1 Syslog Server
      • Kiwi Syslog Server
    • LO 3 - 3.2 Syslog Info
    • LO 3 - 3.3 Syslog Install
      • Install Kiwi Syslog Server
      • PRTG
      • Firewall
    • LO 3 - 3.4 Syslog Interpret
    • LO 4 - 4.1 OSs
    • LO 4 - 4.2 OS Setup
    • LO 4 - 4.3 Disk Image OSs
      • Bootable USB
    • LO 4 - 4.4 OS Deployment
    • LO 4 - 4.5 OS Installation
      • OS Image & Deployment
      • Hardware Driver
    • LO 5 - 5.1 App Types
    • LO 5 - 5.2 Configure Software
    • LO 5 - 5.3 Deployment Methods
    • LO 5 - 5.4 Install, Configure, Test & Deploy
      • NTFS vs FAT vs exFAT
      • Ubuntu Installation
      • Windows Deployment Services
      • Install Power BI
      • Open Office Installation#
  • Unit 06
    • LO 1 - 1.1 Digital Transformation Purpose
    • LO 1 - 1.2 D.T. Characteristics
    • LO 1 - 1.3 D.T. Barriers
    • LO 1 - 1.4 Emerging Digital Technologies
    • LO 1 - 1.5 Digital Strategy
      • Digital Strategy Template
    • LO 2 - 2.1 Agile-Waterfall
      • Agile Details
    • LO 2 - 2.2 W-A (pros/cons)
    • LO 2 - 2.3 W-A Stages
    • LO 2 - 2.4 DevOps Software Development
    • LO 2 - 2.5 Continuous Innovation/Development
    • LO 3 - 3.1 Digital Applications
    • LO 3 - 3.2 Office Systems & Web Technologies
      • Mass Email List
    • LO 4 - 4.1 Coaching
    • LO 4 - 4.2 Coaching Situations
    • LO 4 - 4.3 GROW Model (Coaching)
    • LO 4 - 4.4 Communication Techniques
    • LO 4 - 4.5 Training Session
  • Cybersecurity
  • Jobs
  • Terms
  • Advanced Networking
    • Subnets
    • nmap
    • ipconfig
    • 0.0.0.0
    • Router
  • Linux
    • OSSEC Installation
  • Advanced Security
  • Misc
    • Ports
  • Courses
  • Certfications
  • More
    • Home
      • British Values
      • How to Submit Work
      • Interview Questions
      • Lesson-by-Lesson
      • Report Assessment
      • Syllabus Interpretation
      • Units with "must have"
      • Tutors
      • Housekeeping
      • Lesson Plan
    • Productivity
      • Microsoft Word
      • Paint.net
      • Mindmap
      • Windows
      • Google Sites
    • Where to Next
      • Ikigai
    • Webinars
      • Imperative.com
    • Unit 01
      • LO 1 - 1.1 Legislation
      • LO 1 - 1.2 Non-Compliance
      • LO 1 - 1.3 ISO
      • LO 1 - 1.4 Policies
      • LO 1 - 1.5 AUP
        • Example
      • LO 2 - 2.1 Skills
      • LO 2 - 2.2 Decisions
      • LO 2 - 2.3 Communication
      • LO 2 - 2.4 Collaboration
      • LO 2 - 2.5 Tasks
      • LO 2 - 2.6 Health & Safety
      • LO 3 - 3.1 Tools
      • LO 3 - 3.2 Solving Problems
      • LO 3 - 3.3 Continuous improvement
      • LO 3 - 3.4 Continuous improvement
      • LO 4 - 4.1 CPD
      • LO 4 - 4.2 Career Path
      • LO 4 - 4.3 CPD Plan
    • Unit 02
      • LO 1 - 1.1 Network Devices
      • LO 1 - 1.2 Configure devices
        • Cisco Packet Tracer
          • Firewall
      • LO 1 - 1.3 Troubleshoot
      • LO 2 - 2.1 Server Types
      • LO 2 - 2.2 Configure Servers
        • Windows Server Configuration
        • DNS Configuration
        • Install Windows Server
      • LO 2 - 2.3 Shared network resources
      • LO 3 - 3.1 Topologies
      • LO 3 - 3.2 Addressing
      • LO 3 - 3.3 Networks
      • LO 3 - 3.4 Infrastructure
        • OSI (Levels)
      • LO 4 - 4.1 Cloud Services
        • Web Hosting
      • LO 4 - 4.2 Cloud (pros/cons)
      • LO 4 - 4.3 Virtualisation
      • LO 4 - 4.4 Virtual. (where)
      • LO 4 - 4.5 Virtual. (pros/cons)
    • Unit 03
      • LO 1 - 1.1 Data Types
      • LO 1 - 1.2 D.T. (usage)
      • LO 1 - 1.3 Algorithms
      • LO 1 - 1.4 Data Storage
      • LO 1 - 1.5 D-base, -warehouse, -lake
      • LO 1 - 1.6 Storing Data
      • LO 1 - 1.7 Organising Data
      • LO 2 - 2.1 Data Classification
      • LO 2 - 2.2 Backing up
      • LO 2 - 2.3 B.U. Approaches
      • LO 2 - 2.4 B.U. considerations
      • LO 2 - 2.5 Perform Backup
        • Windows Server Backup
        • Windows 10
      • LO 3 - 3.1 Info. Systems
      • LO 3 - 3.2 InfSys (purpose)
      • LO 3 - 3.3 InfSys (functions)
      • LO 4 - 4.1 Data-Info System
      • LO 4 - 4.2 Secure DataSys
        • AD Certificate Server
        • Unsigned Certificate
      • LO 4 - 4.3 DataSys (use)
      • LO 4 - 4.4 Link DataSys
        • Embed Excel into Google Site
      • LO 5 - 5.1 Data quality
      • LO 5 - 5.2 ETL
        • Excel vs Power BI
      • LO 5 - 5.3 Data Analysis Tool
      • LO 5 - 5.4 Data (source, etc)
      • LO 6 - 6.1 Data Visualisation
      • LO 6 - 6.2 DataVis Methods
      • LO 6 - 6.3 Present Data Vis
      • POWER BI
    • Unit 04
      • LO 1 - 1.1 Security Data
      • LO 1 - 1.2 Data Catalogue
      • LO 1 - 1.3 DPIA
      • LO 1 - 1.4 InfoSec(principles)
      • LO 1 - 1.5 Manage InfSec
      • LO 1 - 1.6 Ctrl Access Protocols
      • LO 1 - 1.7 D.Catalog(create)
      • LO 2 - 2.1 Risks
      • LO 2 - 2.2 Threats-Vulnerabilities
        • EICAR
      • LO 2 - 2.3 Mitig'tn Controls
      • LO 3 - 3.1 SIEM Purpose
        • Splunk
        • AlienVault
      • LO 3 - 3.2 SIEM Process
      • LO 3 - 3.3 SIEM Data
      • LO 3 - 3.4 SIEM Report
      • LO 4 - 4.1 CVE / CVSS
      • LO 4 - 4.2 Scoring Matrix
      • LO 4 - 4.3 Risk Management
      • LO 4 - 4.4 Remediation
      • LO 4 - 4.5 Vulnerability Scan
    • Unit 05
      • LO 1 - 1.1 Helpdesk Functions
      • LO 1 - 1.2 Helpdesk Process
      • LO 1 - 1.3 SLA
      • LO 1 - 1.4 Per-Pro Report
      • LO 1 - 1.5 Levels of Support
      • LO 1 - 1.6 Resolve Ticket
      • LO 2 - 2.1 Digital Problems
      • LO 2 - 2.2 Helpdesk Requests
      • LO 2 - 2.3 Tools-Techniques
      • LO 2 - 2.4 Incident Mgmt
      • LO 2 - 2.5 Resolve Problems
      • LO 3 - 3.1 Syslog Server
        • Kiwi Syslog Server
      • LO 3 - 3.2 Syslog Info
      • LO 3 - 3.3 Syslog Install
        • Install Kiwi Syslog Server
        • PRTG
        • Firewall
      • LO 3 - 3.4 Syslog Interpret
      • LO 4 - 4.1 OSs
      • LO 4 - 4.2 OS Setup
      • LO 4 - 4.3 Disk Image OSs
        • Bootable USB
      • LO 4 - 4.4 OS Deployment
      • LO 4 - 4.5 OS Installation
        • OS Image & Deployment
        • Hardware Driver
      • LO 5 - 5.1 App Types
      • LO 5 - 5.2 Configure Software
      • LO 5 - 5.3 Deployment Methods
      • LO 5 - 5.4 Install, Configure, Test & Deploy
        • NTFS vs FAT vs exFAT
        • Ubuntu Installation
        • Windows Deployment Services
        • Install Power BI
        • Open Office Installation#
    • Unit 06
      • LO 1 - 1.1 Digital Transformation Purpose
      • LO 1 - 1.2 D.T. Characteristics
      • LO 1 - 1.3 D.T. Barriers
      • LO 1 - 1.4 Emerging Digital Technologies
      • LO 1 - 1.5 Digital Strategy
        • Digital Strategy Template
      • LO 2 - 2.1 Agile-Waterfall
        • Agile Details
      • LO 2 - 2.2 W-A (pros/cons)
      • LO 2 - 2.3 W-A Stages
      • LO 2 - 2.4 DevOps Software Development
      • LO 2 - 2.5 Continuous Innovation/Development
      • LO 3 - 3.1 Digital Applications
      • LO 3 - 3.2 Office Systems & Web Technologies
        • Mass Email List
      • LO 4 - 4.1 Coaching
      • LO 4 - 4.2 Coaching Situations
      • LO 4 - 4.3 GROW Model (Coaching)
      • LO 4 - 4.4 Communication Techniques
      • LO 4 - 4.5 Training Session
    • Cybersecurity
    • Jobs
    • Terms
    • Advanced Networking
      • Subnets
      • nmap
      • ipconfig
      • 0.0.0.0
      • Router
    • Linux
      • OSSEC Installation
    • Advanced Security
    • Misc
      • Ports
    • Courses
    • Certfications

Unit 01 Working in the digital support sector

Unit 02 Network infrastructure and cloud services

Unit 03 Data management

Unit 04 Digital security

Unit 05 Supporting digital services

Unit 06 Supporting digital transformation

Level 3 qualifications aim to allow progression to higher level study, which requires knowledge and skills different from those gained at levels 1 and 2.

 
Level 3 qualifications enable learners to:

 

•         apply factual, procedural and theoretical subject knowledge

•         use relevant knowledge and methods to address complex, non-routine problems 

•         interpret and evaluate relevant information and ideas

•         understand the nature of the area of study or work 

•         demonstrate an awareness of different perspectives and approaches

•         identify, select and use appropriate cognitive and practical skills

•         use appropriate research to inform actions

•         review and evaluate the effectiveness of their own methods

Each learner must create a portfolio of evidence generated from appropriate assessment tasks, which demonstrates achievement of all the learning outcomes associated with each unit. It allows you to respond to a real-life situation that you may face when in employment. On completion of each unit, you must declare that the work produced is your own and I must countersign this. 


Required software for the remote version of this course:

  • Virtual Box by Oracle (Virtualisation)

  • > Download Windows Server 2019 (the screenshot to the right is for a a Windows computer [ISO])

  • Cisco Packet Tracer (Network creation/simulation)

  • PRTG

  • Power BI

Each link takes you to a direct link to download. The Cisco Packet Tracer makes you sign up for a course, which is free.

NCFE Level 3 Certificate in Digital Support Sector  (Syllabus)

Unit 01: Understanding Organisational Policies and Compliance in the Digital Support Sector

In this foundational unit, learners delve deep into the nuances of organisational policies, standards, and legislations that govern the digital support sector. The unit emphasises the critical role of adherence to UK and international legislation, offering insights into the potential consequences of non-compliance. Students will also explore a variety of ISO standards pertaining to security, quality, and safety in the sector, alongside the development of an acceptable usage policy for organizations.

Unit 02: Network Infrastructure and Cloud Services

You will learn the skills to manage and design network infrastructures proficiently. The unit explores the roles of various network devices within network architectures, providing hands-on experience in configuring and troubleshooting network devices. Furthermore, learners will develop a nuanced understanding of cloud services and virtualisation applications in modern network management.

Unit 03: Data Management

This unit engages learners with the complex world of data management, introducing them to various data types utilised in organizations and their respective uses. Students will delve into the intricacies of data storage, understanding the advantages and limitations of different data storage technologies and methodologies. Moreover, learners will become proficient in data organisation principles, learning to effectively manage, cleanse, and save data sets for analysis.

Unit 04: Digital Security and Information Management

This unit emphasises the pivotal role of information security management in safeguarding organisational data. Students will familiarize themselves with various tools and methodologies, including the use of Security Information and Event Management (SIEM) software. The unit guides learners through the creation of data catalogues and the understanding of Data Protection Impact Assessments, fostering well-rounded digital security professionals.

Unit 05: Supporting Digital Services

In this unit, learners are introduced to the dynamics of digital service support. Students will gain insights into the functioning of helpdesks, understanding the process of managing and resolving tickets effectively. The unit also discusses the relevance of service level agreements and the nuances of performance and progress reporting, preparing learners to excel in providing stellar digital service support.

Unit 06: Supporting Digital Transformation

The final unit prepares learners to become pioneers of digital transformation within organisations. It furnishes students with a thorough understanding of digital transformation fundamentals and the know-how to develop comprehensive digital strategies. Learners will explore current and emerging digital technologies, learning to evaluate their potential contributions to an organisation's digital transformation strategy. Moreover, the unit hones learners to become digital champions, adept at providing end-user support and spearheading digital transformation initiatives.

Through the six units of this Level 3 Certificate course, learners will be well-prepared to forge a successful career in the digital support sector, with a firm grasp of organizational policies, network management, data management, digital security, and transformative digital strategies. 

Potential areas of employment:

  • digital support technician 

  • digital applications technician

  • further education:

Introduction to the Digital Support Course.mp4
Google Sites
Report abuse
Page details
Page updated
Google Sites
Report abuse