Managing Systems Support and Security and Semester Project 2 - Interface and Database Design Document
The systems support and security phase begins when a system becomes operational and continues until the system reaches the end of its useful life. Acting as an internal consultant, the analyst provides guidance, support, and training. Successful systems often need the most support because users want to learn the features, try all the capabilities, and discover how the system can help them perform their tasks. In most organizations, more than half of all IT department effort goes into supporting existing systems.
You will also have a chance to provide me with your feedback on our course by completing your Course Evaluation.
At the end of this week, you will be able to:
- Explain the systems support and security phase
- Describe user support activities, including user training and help desks
- Define the four types of maintenance
- Explain various techniques for managing systems maintenance and support
- Describe techniques for measuring, managing, and planning system performance
- Explain risk management concepts
- Assess system security at six levels: physical security, network security, application security, file security, user security, and procedural security
- Describe backup and disaster recovery
- List factors indicating that a system has reached the end of its useful life
- Assess future challenges and opportunities for IT professionals
- Develop a strategic plan for career advancement and strong IT credentials
- Read Module 12: Managing Systems Support and Security.
- Participate in Module 12 SCR Case Simulation: Managing Systems Support and Security.
- For the Course Evaluation, you will need to take a screenshot of your the Completed Evaluation confirmation page. Here are two resources on taking a screenshot in either Windows or a Mac:
- Take the Unit 12 Test.
- Complete our second (and final) Semester Project #2 - Interface and Database Design Document.
- Complete Course Evaluation for Extra Credit.