IT Professional

Description

Cisco IT essential Mind Map on IT Professional, created by mgurung2 on 02/13/2014.
mgurung2
Mind Map by mgurung2, updated more than 1 year ago
mgurung2
Created by mgurung2 almost 11 years ago
34
0

Resource summary

IT Professional
  1. Communication and Troubleshooting
    1. When you are talking to a customer on phone it is very important to communicate well and represent yourself professionally. If you are with a customer in person, make sure you use your body language.
    2. Determine the problem
      1. • Know
        1. You should always call your customer with their name.
          1. When the customer is explaining you should say small word like-: Okay, Yes, I see, etc. This will let the customers know that you listening.
          2. • Relate
            1. Use short communication to make a one and one connection between you and your customers
              1. A technician should never interrupt when customers is asking questions as it will be rude and disrespectful.
              2. • Understand
                1. Know how good the customer is with the computer knowedge.
                  1. After when the costumer has finished telling their promble, always clarify what the customer has just said this will let them know that you have listen and understood the problem.
                2. Ethics and Legal consideration
                  1. Ethic
                    1. You should observe some general ethic groups and legal rules
                      1. You should always obey customers and thier properties like email, phone list, records or data on the computer.
                        1. First let the customer know before accessing account and administerator account
                        2. Legal
                          1. YOU SHOULD NOT DO WITHOUT THE CUSTOMER'S PERMISSION
                            1. Never make changes to customer's system software or hardware configuration. Never access a customer's or co-worker's account, Never use customer's company IT resouces for commerical purpose,
                        3. Leagal proceduredes overview
                          1. Data from computer sysem, network, wireless communication and storage devices need to be collected and analyzed for criminal investigation
                            1. The collection and analysis of data for this purpose is called computer forensics it encompasses both IT and specifics laws to make sure data is admissible
                              1. Persistent data- Data that are persistent stored in internal, external or optical drive. Even if the compter is turned off the data will not be deleted.
                                1. Volatilel data-vRAM, cache, registries and CPU has volatilel data. You should know how to save data beacuse ithe data will delete d as soon as you turn off the computer.
                            2. Cyber law
                              1. Computer security professionals is affected by cyberl law. To collect data from computer, data storage dvices, networks and wireless communication, cyber law expains the circumtances
                              2. Documenting
                                1. You should gather the evidence and how it was gathered and what tools was used to document.
                                  1. Document all the work you have done.
                                  2. Chain of Custody
                                    1. To admit the evidence, it must be authenticated. The person has to prove how the evidence was collected, where it has been stored and who has accessed it between the time of collection and entry to the court.
                                      1. This is known as Chain of Custody
                                    2. Persistent data
                                      1. Persistent data is stored on a local drive, such as an internal or external hard drive, or an optical drive. When the computer is turned off, this data is preserved.
                                      2. Volatile data
                                        1. It is important to know how to capture this data, because it disappears as soon as the computer is turned off.
                                        2. Call Center
                                          1. If the level one technician cannot solve the problem, it is escalated to a level two technician.
                                            1. Depending on the country, illegal computer or network usage may include:
                                              1. Enter text here
                                              Show full summary Hide full summary

                                              Similar

                                              IT Professional
                                              immerc
                                              Chapter 12
                                              ADahal
                                              Advanced Troubleshooting
                                              mgurung2
                                              Introduce to the personal computer.
                                              mgurung2
                                              Chapter 12
                                              mgurung2
                                              Breaking Bad
                                              PatrickNoonan
                                              Biology Unit 2 - DNA, meiosis, mitosis, cell cycle
                                              DauntlessAlpha
                                              Biology AQA 3.1.2 Proteins
                                              evie.daines
                                              Chemistry 2
                                              Peter Hoskins
                                              Truman Doctrine, Marshall Plan, Cominform and Comecon
                                              Alina A
                                              Část 2.
                                              Gábi Krsková