《IT基础设施集成项目运维人员培训方案.docx》由会员分享,可在线阅读,更多相关《IT基础设施集成项目运维人员培训方案.docx(4页珍藏版)》请在第一文库网上搜索。
1、IT基础设施集成项目后期运维培训方案TrainingProgramIx技术培训方案Technica1trainingprogram本项目培训是为保证凯特公司IT基础设施集成项目的正常运行和维护,为培训项目相关技术人员而制定的详细培训计划。培训课程分为网络系统、服务器存储系统、信息安全等部分,授课内容包括所供设备的原理和技术性能、操作维护方法、安装调测、排除故障及软件结构、定制和升级等方面。在系统集成和系统调测期间,对全程参与的相关技术人员进行面授指导。Thetrainingistoensurethenorma1operationandmaintenanceoftheKateprojectITi
2、nfrastructureintegrationprojectsoi1,forthetrainingofproject-re1atedtechnica1personne1todeve1opadetai1edtrainingp1an.Trainingcoursesaredividedintonetworksystem,theserverstoragesystem,informationsecurityandsoon,forteachingcontentinc1udestheprincip1esandtechniquesoftheequipment,methodsofoperationandmai
3、ntenance,insta11ationandthecommissioningtest,remova1offau1tandsoftwarearchitecture,customizationandpromotion.Duringthesystemintegrationandsystemtesting,givefacetofaceguidancethere1evanttechnica1personne1invo1vedintheentirecourse.2、项目培训方案和计划Trainingprogramsandp1ans一、培训目的ObjectivesofThisTraining本项目培训方
4、案旨在为“凯特公司IT基础设施集成项目”培养一批技术过硬的骨干和专家队伍,为“凯特公司IT基础设施集成项目”的工程实施配合及安全可靠运行,提供人员和技术保障。Theprojecttrainingprogramisdesignedfortrainingthebackboneofagroupofski11fu1andexpertteamforKateOi1CompanyTinfrastructureintegrationprojects,providepersonne1andtechnica1supportfortheimp1ementationandsafeandre1iab1eoperatio
5、nofKateOi1CompanyITinfrastructureintegrationprojects.二、培训人员的基本要求ZBasicRequirementsforTrainingofPersonneI一般情况下,要求受训人员应具备下列条件:Ingenera1,requirethetraineesmeetthefo11owingconditions:人员的基本要求是大专以上学历、具备计算机的基础知识和技能。Thebasicrequirementisthataco11egeeducation,havebasiccomputerknow1edgeandski11s.网络及设备维护人员应具备网
6、络和计算机硬件的基础知识。Networkandequipmentmaintenancepersonne1shou1dhavethebasicsknow1edgeofnetworkandcomputerhardware.高级网管人员应具有相关设备配置的基础知识。Senioradministratorsshou1dhavethebasicknow1edgeofre1ateddeviceconfiguration.培训人员由用户统一组织、选拔和派遣。Trainingofpersonne1isunifiedorganized,se1ectedanddispatchedbytheuser.三、培训形式3
7、.Formsoftraining培训形式分为:现场培训和集中培训两种。Formoftrainingisdividedinto:twotypes:on-sitetrainingandco11ectivetraining四、培训地点4.TheTraining1ocations现场培训地点在用户现场。On-sitetraining1ocationisintheusersite五、培训教员5.TrainingofTrainers熟悉产品内容和相关的应用技术,具有丰富的项目实施经验和培训经历,具有良好的表达能力和沟通技巧。Fami1iarwiththeproductcontentandre1atedap
8、p1icationtechno1ogy,hasextensiveexperienceinprojectimp1ementationandtrainingexperience,hasgoodexpressionski11sandcommunicationski11s.3、培训内容TrainingCOntent理解安装配置交换机和路由器所要求掌握的概念、命令和经验,通过示范、练习,学员可学到足够的知识来给今后的网络管理、维护工作提供足够的技术能力。Understandtheconcepts,commands,andexperiencethattheinsta11ationandconfigurat
9、ionofswitchesandroutersarerequiredtomaster;throughdemonstration,practice,studentscan1earnenoughknow1edgetoprovideadequatetechnica1Capacityforthemanagement,maintenanceofnetworkinfurther理解安装配置服务器、存储、备份系统、应用系统所要求掌握的概念、命令和经验,通过示范、练习,学员可学到足够的知识来给今后的系统管理、维护工作提供足够的技术能力。Understandtheconcepts,commands,andexp
10、eriencethattheinsta11ationandconfigurationofservers,storage,backupsystems,app1icationsystemsarerequiredtomaster;throughdemonstration,practice,studentscan1earnenoughknow1edgetoprovideadequatetechnica1capacityforfuturesystemmanagement,maintenance.理解安装配置UTM、反垃圾邮件系统等安全系统所要求掌握的概念、命令和经验,通过示范、练习,学员可学到足够的知识
11、来给今后的系统管理、维护工作提供足够的技术能力。Understandtheconcepts,commands,andexperiencethattheinsta11ationandconfigurationofUTM,anti-spamsystemsandothersecuritysystemsrequiredtomaster;throughdemonstration,practice,studentscan1earnenoughknow1edgetoprovideadequatetechnica1capacityforfuturesystemmanagement,maintenance.课程
12、安排表如下:Courseschedu1eisasfo11owsDay1课程Course网络类型、网络媒介、交换基础、TCP/IP、IP地址和路由、配制和操作交换机和路由器设备、视频会议系统、门禁系统、ip电话。Networktype,Networkmedia,exchangebasis,TCP/IRIPaddressandrouting,configurationandoperationofswitchesandrouters,videoconferencingsystems,accesscontro1systems,ipphoneDay2课程Course刀片服务器、存储、备份系统、虚拟技术、
13、应用系统、安装配置基本命令及操作、存储系统管理、备份策略的定制、管理应用系统B1adeservers,storage,backupsystems,virtua1techno1ogy,app1icationsystems,insta11andconfigurethebasiccommandsandoperations,storagemanagement,backupstrategyofcustomization,managementapp1icationsystemDay3课程CourseUT1、反垃圾邮件系统CiSCoACS、动态令牌等安全系统的安装配置、安全策略的制定、安全事件告警及处理、保密制度UTMzanti-spamsystem,CiscoACS,insta11ationandconfigurationofdynamictokensandothersecuritysystems,securitypo1icydeve1opment,securityeventa1armandhand1ing,secrecysystem