Professional Documents
Culture Documents
Welcome to the unit ICTNWK536 - Plan, implement and test enterprise communication solutions.
This unit describes the skills and knowledge required to manage the deployment and administration
of enterprise communication solutions.
It includes email and remote access email, web portal or content management solution, and enterprise
collaboration tools.
It applies to individuals working as information and communications technology (ICT) professionals
who configure and deploy software to supply email, collaboration and messaging services to meet the
needs of enterprise users.
RESEARCH AND IDENTIFY ENTERPRISE
COMMUNICATION SOLUTIONS TO MEET
ORGANISATIONAL REQUIREMENTS
When preparing to plan, implement and test enterprise communication solutions it will be necessary
to make sure that a series of communication solutions that may be used as a part of the overall
communications that need to be completed by the organisation are researched and identified.
As a part of the research that is completed, it is important to make sure that all organisational
requirements are able to be met by the proposed solutions.
COMPLETING NECESSARY RESEARCH
Research is a systematic investigation that will be conducted in order to find potential solutions to a
specific problem.
The problem, in this case, is the need to find communication solutions that will meet the
organisational needs.
ENTERPRISE COMMUNICATION SOLUTIONS
An email server application is a software that will run on the mail server in order to receive and
forward incoming messages and to process and send outgoing messages.
Common features of an email server application include:
SMTP/ POP3 / IMAP / HTTP/ LDAP and Proxy services with SSL / TLS support
Advanced Access and Security Controls
Effective Anti-Spam which can be tailored to your business
Extensive Groupware including email, calendars, contacts, tasks and journals
Intuitive Webmail works with your browser, or use FTGate Desktop Client
Mail Client auto-configure support (e.g. Outlook/Thunderbird)
IOS auto-configure support
Fast, powerful message processing
Mail server may include:
Axigen Mail Server
Linux or Unix Sendmail
Microsoft Exchange
Open Xchange Server
Postfix
FEATURES AND PURPOSE OF
ORGANISATIONAL COLLABORATION TOOLS
Organisational or business collaboration tools are a range of software and hardware tools that can be
used to support collaboration and sharing between work teams in different environments.
Collaboration tools enable:
Direct messaging and communication
Support of live documents
Sharing and access to the same screen views and documents
Integrated version control
The sharing of work area setups
These tools are designed to make sure that remote teams or even teams in the same environment
logging in from different computers are able to work together in real time.
Preventing the need for laborious and complicated information and document sharing actions.
FEATURES AND PURPOSE OF WEB PORTAL
OR CONTENT MANAGEMENT SOFTWARE
A web portal is a remote access area that enables personnel to log in and access content or other
applications such as email servers and collaboration tools.
Features of a web portal include:
Access and authentication requirements and security
Access to specific work areas and documents
Access to organisational applications as required
Content management software is designed to create a space where personnel are able to log in and
create and manage the organisations content in order to enable advanced communications to take
place.
Web portal or content-management software may include:
IBM websphere
JBoss
Microsoft SharePoint
Moodle or Equella
Oracle
IDENTIFYING ENTERPRISE
COMMUNICATION SOLUTIONS TO MEET
ORGANISATIONAL REQUIREMENTS
When completing research into each of the different communication solutions that will need to be
used to meet the organisational need, it is important to consider:
Budget
Purpose of communications within the organisation
Requirements for functionality
Security requirements
User profiles
Other organisational requirements
EVALUATE AND COMPARE ENTERPRISE
COMMUNICATION SOLUTIONS AGAINST
ORGANISATIONAL REQUIREMENTS
Once a range of communication solution options has been identified, it will be necessary to evaluate
and compare the solutions against the organisational requirements.
IDENTIFY ORGANISATIONAL
REQUIREMENTS
The process of evaluation will involve the collection of a range of specific information regarding the
features and functions of each solution.
It will be necessary to consider:
Features
Functions
Need for systems requirements
Compatibility requirements
Cost
Licensing requirements
Implementation requirements
COMPARE SOLUTION FEATURES AND
FUNCTIONS AGAINST THE
ORGANISATIONAL REQUIREMENTS
The process of comparison involves the measurement of each feature and function against the
identified organisational requirements in order to identify any similarities or compatibilities and any
differences or incompatibilities.
SELECT ENTERPRISE COMMUNICATION
SOLUTIONS TO ADDRESS ORGANISATIONAL
REQUIREMENTS
Once the evaluation and comparison of the communication solutions have been completed, it will be
necessary to make sure that appropriate selections are made according to the manner in which they
address organisational requirements.
DEVELOP A SELECTION PROCESS
A clear and measurable selection process will need to be developed to make sure that the most
appropriate solution for the organisation is able to be selected.
A suitable selection process may involve the completion of the following actions:
Rank and prioritise organisational requirements
Consult the outcomes of the evaluation and comparison that was completed
Rank the solutions in terms of their ability to meet organisational requirements
Conduct a cost benefit analysis
Conduct a risk assessment
Make and substantiate the selection
RANK AND PRIORITISE ORGANISATIONAL
REQUIREMENTS
It will be necessary to rank and prioritise the organisational requirements that have been identified in
terms of:
Importance
Urgency
The importance of the requirements will be based on its ability to assist the organisation in achieving
its goals and objectives.
It is important that all organisational requirements are ranked and prioritised and then provided with a
weighted number so that they can be used to make non-biased decisions about which of the proposed
options will be most suitable.
CONSULT THE OUTCOMES OF THE
EVALUATION AND COMPARISON THAT WAS
COMPLETED
The next step in the selection process will be to consult the outcomes of the evaluation and
comparison that was completed in order to identify which of the organisational requirements is met
by each of the options.
This information should be assessed against the ranking and prioritisation of the organisational
requirements in order to make sure that the selection is based on the most important and urgent needs
of the organisation.
RANK THE SOLUTIONS IN TERMS OF THEIR
ABILITY TO MEET ORGANISATIONAL
REQUIREMENTS
It will be necessary to rank the solutions in terms of their ability to meet organisational requirements
using the information collected during prioritisation and the outcomes of the evaluations and
comparisons that were completed.
CONDUCT A COST BENEFIT ANALYSIS
A cost-benefit analysis is a financial decision-making tool that applies financial value to each of the
organisational requirements and the features and functions of the solutions in order to make
mathematical calculations against the cost of each solution to determine which of the options will
provide the most benefit to the organisation for the least amount of cost.
This process should be completed for each of the communication solution options that have been
proposed so that this information is able to be used as a part of the decision-making process.
CONDUCT A RISK ASSESSMENT
A risk assessment should be completed for each of the options in order to make sure that any risk
exposure that the solutions result in for the organisation is able to be identified.
Suitable controls will need to be evaluated for each of the identified risks, and then the options should
be ranked in terms of risk so that this can be considered as a part of the final selection process.
MAKE AND SUBSTANTIATE THE SELECTION
All of the information that has been collected and assessed during the investigations process should
be used to determine which of the solutions will:
Best meet organisational requirements
Has the best cost-benefit ratio
Can be controlled appropriately in terms of risk
A final selection should be made, and evidence from the completed assessments should be used to
substantiate the decision.
ACQUIRE ENTERPRISE COMMUNICATION
SOLUTIONS IN ACCORDANCE WITH
ORGANISATIONAL REQUIREMENTS
Once the communication solution options have been identified, selected and approved, it will be
necessary to acquire the enterprise communication solutions in accordance with organisational
requirements.
ACQUIRE ENTERPRISE COMMUNICATION
SOLUTIONS
The process of acquiring enterprise communication solutions will involve the actions required to
make the selected items available to the organisation.
Organisational requirements for the acquisition process may include:
Methods for obtaining the items
Approvals processes
PROCUREMENT METHOD AND PROCESSES
Procurement is the process of purchasing or obtaining the necessary resources for an organisation so
that they are available to be used.
Organisations will have a procurement policy that will outline a range of factors that need to be
complied with, such as:
Purchase or subscription preferences
Licensing preferences
Approvals processes
Preferred vendors
Methods for selecting vendors and obtaining the items required
LICENSING AND REGISTRATION METHOD
When preparing to procure and acquire ICT communications solutions, it is important to consider the
licensing and registration requirements that apply to the solution, and this will vary designing on the
product and the vendor.
Options should be collected and then assessed against the procurement policies of the organisation so
that suitable selections can be made.
FORMAT FOR TOOLS
Different communication solutions may be acquired in different formats, and these will determine the
necessary method of implementation; it is important to consider:
Cloud-based tools
Locally installed applications
Server installed applications
ENSURE ACQUISITION IS COMPLETED
WITHIN REQUIRED TIMELINES
It will be necessary to ensure that all necessary acquisitions are completed within the required
timelines that apply to the project so that all tools and applications will be available for
implementation as required.
CONSULT WITH STAKEHOLDERS TO DEVELOP
IMPLEMENTATION PLAN ADDRESSING THE
ORGANISATIONAL REQUIREMENTS
It will be necessary to consult with stakeholders in order to develop an implementation plan that
addresses organisational requirements.
ORGANISATIONAL REQUIREMENTS FOR ICT
IMPLEMENTATION
The organisational requirements for ICT implementation are all of the needs that should be fulfilled
by the implementation in order for the implementation to be considered a success.
CONSULT WITH STAKEHOLDERS
A stakeholder analysis will need to be completed in order to identify the stakeholders that need to be
consulted in order to make sure that appropriate information is able to be attained to ensure that the
implementation plan that is created will meet the needs of the organisation.
Stakeholders to be consulted could include:
Users
Department heads
Management
Personnel
KEY REQUIREMENTS OF AN ICT
IMPLEMENTATION PLAN
When planning, implementing and testing enterprise communication solutions, it will be necessary to
understand the key requirements of an ICT implementation plan and these are:
Align the plan with the needs of the organisation
Assess licensing issues
Ensure regulatory and legislative requirements are met
Develop clear action plans
Assess costs
Prepare resources
Manage security requirements
Prepare system back up
Develop deployment plans
Prepare existing network
Create a plan for testing and monitoring
ALIGN THE PLAN WITH THE NEEDS OF THE
ORGANISATION
As a part of the ICT system implementation, it is important to make sure that any relevant licensing
issues are able to be managed, and this will require:
Assessment of software and hardware to be installed
Creation of licencing management register
Completion of all payment and registration requirements
ENSURE REGULATORY AND LEGISLATIVE
REQUIREMENTS ARE MET
It is important to assess the implementation actions in order to identify any regulatory and legislative
requirements that may apply.
It is important to consider:
Privacy
Confidentiality
Effective security of private information
Management of the organisations legal and regulatory obligations
DEVELOP CLEAR ACTION PLANS
Clear and specific action plans will need to be created for each of the steps and stages of the
implementation plan to make sure that the following organisational needs will be managed:
Continuity of business operations
Security and management of data
Protection of organisational assets
ASSESS COSTS
All expected costs for the implementation process will need to be considered and assessed in order to
make sure that appropriate cost benefits are able to be achieved and that the implementation that is
completed is aligned with the requirements of the organisation.
PREPARE RESOURCES
All resources that will be required as a part of the plan will need to be:
Identified
Costed
Obtained
Prepared
MANAGE SECURITY REQUIREMENTS
Security plans for each stage of the implementation will need to be created and managed to ensure
that the security policies of the organisation are suitably complied with at all times.
PREPARE SYSTEM BACK UP
During implementation activities, it is important to make sure that the system is protected from
unexpected loss during the implementation process.
It is important to make sure that the backup plans developed for:
Data
Settings
Configuration
Security
DEVELOP DEPLOYMENT PLANS
A deployment plan is a plan that will set out all of the steps that need to be taken to deploy new
software or hardware into the organisation to make sure that system continuity is able to be ensured.
PREPARE EXISTING NETWORK
It is important as a part of the implementation process that the network is prepared for any changes
that are to be made to the communication solutions that are to be used.
Prepare existing network may include:
Checking for incompatibilities with existing systems
Configuring domain names system (DNS) to support mail server
Installing any prerequisites
Reconfiguring other network services to support mail
Removing unsupported legacy components
Updating server operating systems to the latest version
Using vendor tools to check the network for readiness to install a mail server
CREATE A PLAN FOR TESTING AND
MONITORING
It is important to make sure that a suitable plan for testing and monitoring of the network is created
and implemented as a part of the overall implementation activities to make sure that the success of the
implementation is able to be ensured.
TOPIC 2 – IMPLEMENT ENTERPRISE
COMMUNICATION SOLUTIONS
The implementation plan that has been developed for the organisation will need to be assessed in
order to make sure that all implementation and configuration requirements that apply to each of the
solutions are able to be identified.
IMPLEMENTATION REQUIREMENTS
The implementation requirements for each of the communication solutions that are to be put into
place within the organisation will refer to all actions and standards that apply to the installation and
deployment of the items.
Implementation requirements may include:
Data protection requirements
Installation procedures and timelines to enable continuity of business operations
Testing and assessment procedures to make sure the implementation is completed as planned
Schedules and resources that will be used for the process
CONFIGURATION REQUIREMENTS
Once the items are installed, they will need to be set up so that they can be used safely and efficiently
within the system, and this is the process of configuration.
The configuration requirements will need to be identified based on:
Current system requirements
Vendor specifications for the communication solution
Compliance with security requirements that apply within the organisation
Compatibility with the current system
Usability requirements
Licensing requirements
Configuration requirements may include:
Install updates and patches
Set up firewalls and access
Create user accounts to manage access and authentication
Set up workspaces and interfaces
Adjust settings to meet the needs of the organisation
INSTALL UPDATES AND PATCHES
Once the communication applications have been installed, it will be necessary to install any necessary
updates and or patches to make sure that the most current and secure version of the item is installed.
All updates and patches installed will need to be recorded as a part of the configuration
documentation.
SET UP FIREWALLS AND ACCESS
Firewall permissions and restrictions will need to be set up to make sure that the permissions of the
communication solutions meet the security policies that apply to the organisation.
CREATE USER ACCOUNTS TO MANAGE
ACCESS AND AUTHENTICATION
User accounts for the different user groups within the organisation will need to be created, and
suitable permissions and restrictions will need to be applied to them, based on need and compliance
with the security requirements of the organisation.
SET UP WORKSPACES AND INTERFACES
All workspaces and graphic user interfaces will need to be set up to meet the needs of the
organisation, and this may include:
Appearance
Application short cuts
Default settings
Permissions and access requirements
ADJUST SETTINGS TO MEET THE NEEDS OF
THE ORGANISATION
Any settings that define the manner in which the communication solution will behave or can be used
will need to be manipulated to make sure that the solution meets:
User requirements
Security requirements
Organisational requirements
DETERMINE IF IMPLEMENTATION OF ENTERPRISE
COMMUNICATION SOLUTIONS MEETS IMPLEMENTATION
PLAN AND ORGANISATIONAL REQUIREMENTS AND
MODIFY IMPLEMENTATION TO ADDRESS VARIANCE
Detailed investigation measurement and comparison will need to be completed on the installed and
configured communication solutions against the planned implementation in order to determine if the
implementation meets to plan and organisational requirements.
An implementation assessment will involve a systematic assessment of each of the implementation
plan and organisational plan requirements against the outcomes that have been achieved during the
process of implementation.
MODIFY THE IMPLEMENTATION AS
REQUIRED TO ADDRESS ANY VARIANCE
Once suitable assessments have been made, it will be necessary to ensure that changes are made to
the implementation to address any variance.
Variance is any differences between the planned outcomes and the outcomes that were achieved.
Any modifications that are made to the implementation of the communication solutions will need to
be recorded and then re-assessed against the plan in order to ensure that suitable compliance has been
achieved.
TOPIC 3 – TEST AND MONITOR
IMPLEMENTATION OF ENTERPRISE
COMMUNICATION SOLUTIONS
TEST ENTERPRISE COMMUNICATION SOLUTIONS TO DETERMINE IF ENTERPRISE
COMMUNICATION SOLUTIONS ARE OPERATING CORRECTLY ACCORDING TO
SYSTEM SPECIFICATIONS
Once the implementation is complete, and all implementation steps and actions have been confirmed
as compliant with developed implementation plans and organisational requirements, it will be
necessary to complete necessary testing.
Testing will need to be completed to determine if the enterprise communication solutions are
operating correctly and according to system specifications.
TESTING PROCESSES
Testing processes are actions that are used to confirm operation and levels of performance in order to
make sure that operational and organisational needs have been met.
Different communication solutions will have different testing needs, and it is important to make sure
that these are considered and that suitable test plans are developed for each solution.
A suitable testing plan will be one that tests for all necessary requirements using appropriate solutions
and tools to confirm compliance with set requirements.
Testing processes may include:
Functional testing
Firewall and security testing
Utility testing
FUNCTIONAL TESTING
Functional testing will be completed by performing a range of test actions to ensure that the full
functionality and compatibility of the communication solution with the current network and ICT
system is able to be confirmed.
All actions that can be completed with the communication solutions should be tested to make sure
that functionality can be confirmed.
FIREWALL AND SECURITY TESTING
Firewall and security testing should be completed to make sure that appropriate firewall activity has
been achieved by the installation.
Firewall and security testing should include:
Penetration testing
Auditing
Complete network scanning
Scan for vulnerabilities
Ethically hack the system
Attempt to crack passwords
It is important to make sure that the following components are also assessed during the testing
process:
Access and authentication
Port access and open ports
Rules and permission lists
Vendor-specific security requirements
Compliance with the organisation's security policy
UTILITY TESTING
A range of utility testing should be completed to make sure that access and operation of the solutions
can be confirmed and these should include ping tests and other tests to confirm operations.
MONITOR AND ANALYSE PERFORMANCE AND LOGS OF
ENTERPRISE COMMUNICATION SOLUTIONS TO
DETERMINE IF ORGANISATIONAL REQUIREMENTS ARE
MET
It is important to make sure that appropriate monitoring and analysis of system performance and logs
is completed regarding the implemented enterprise communication solutions so that compliance with
organisational requirements is able to be confirmed.
MONITOR PERFORMANCE OF
COMMUNICATION SOLUTIONS
The performance of communications solutions can be monitored using a range of utilities and tests.
Performance may be monitored using:
Statistical computations
Error logs
Event logs
Alarm logs
Speed tests
Bandwidth usage measurements
Detailed traffic or security reports
MONITOR LOGS OF COMMUNICATION
SOLUTIONS
A range of logs should be compiled and assessed in order to identify any security or performance issues
that may apply to the solution.
Logs are registers of events that have occurred within the system and can be used to assess:
Access
Traffic
Authentications
Errors
Lost packets
Speed
Routing
MODIFY ENTERPRISE COMMUNICATION SOLUTIONS TO
ADDRESS INSTANCES WHERE ORGANISATIONAL
REQUIREMENTS ARE NOT MET
Once the testing and performance assessments using logs and a range of performance analysis and log
information has been completed, it will be necessary to modify enterprise communication solutions
where organisational requirements are not met.
The following actions will need to be completed:
Compare outcomes of testing and analysis to organisational requirements
Consider the causes of non-compliance
Develop solutions
Make necessary modifications
Record all changes to configurations and settings
Re-test and confirm compliance
COMPARE OUTCOMES OF TESTING AND
ANALYSIS TO ORGANISATIONAL
REQUIREMENTS
It will be necessary to compare the outcomes of the testing and analysis to organisational
requirements in order to identify any variance between the two items.
CONSIDER THE CAUSES OF NON-
COMPLIANCE
Where variance between desired outcomes and test results has been identified, it will be necessary to
consider what is causing the non-compliance, further testing and assessment may be required to
achieve this.
DEVELOP SOLUTIONS
Once the cause of the non-compliance has been confirmed, it will be necessary to develop suitable
solutions that can be used to rectify the communication solutions so that organisational requirements
are able to be met.
MAKE NECESSARY MODIFICATIONS
Necessary modifications to achieve compliance with organisational requirements will need to be made,
the modifications that will be required will vary depending on:
Communication solution installed
Current system installed
Results of testing and analysis
Specific organisational requirements
Types of common modifications that need to be completed include:
Changes to security settings
Changes to configurations of system or solution
Changes to permissions
RECORD ALL CHANGES TO
CONFIGURATIONS AND SETTINGS
Any changes that are made will need to be recorded as a part of the configuration register for the
communication solution to make sure that all changes can be tracked and confirmed if required.
RE-TEST AND CONFIRM COMPLIANCE
Once any modifications have been made to the system, it will be necessary to make sure that re-
testing and confirmation of compliance with operational and implementation requirements will need
to be made.
TOPIC 4- REQUIRED KNOWLEDGE
Back up is the process of making another copy of data and information assets in order to make
sure that there is another copy in the event of accidental data corruption or failure.
There are a range of different types of back up procedures that may be used depending on the
data type that is being protected, and these include:
Complete backups
Partial backups
Incremental backups
Daily backups
Restoration of data
COMPLETE BACKUPS
All files that have been selected are backed up, regardless of the setting of the attribute.
When a file is backed up, the attribute is cleared.
If the file is later modified, this attribute is set, which indicates that the file needs to be backed up.
Full backups take the longest to execute and use the most storage space of all types of backups.
PARTIAL BACKUPS
All files that have been altered since the last normal backup are copied.
When the files were modified after the last backup, they received an attribute, only files with this
attribute are backed up.
When a file is backed up, the archive attribute is cleared.
If the file is later modified, this attribute is reset, which indicates that the file needs to be backed up.
DAILY BACKUPS
All files created or modified on the same day as the backup will be copied.
This technique doesn't change the attributes of files.
RESTORATION OF DATA
Restoration of data involves the re-instating of data from a back up that has been created; specific
restoration points should be developed to make sure that data is able to be restored if it becomes
corrupt or lost.
FIREWALL CONFIGURATION
The configuration of firewalls involves the setting up of firewalls in a manner to make sure that the
security policies and functional requirements of the organisation are able to be met.
Firewall configuration should involve:
Access control list (ACL) development and implementation
IP port pass-through settings
ACCESS CONTROL LIST (ACL)
DEVELOPMENT AND IMPLEMENTATION
An access control list or ACL is a file or database that the firewall will use to configure the security
permissions and access requirements that apply to the different components within the network
depending on the user or object that seeks to access the components.
Within the ACL, all permissions that are attached to the objects that will be managed and sorted by
the firewall will need to be configured.
Permissions will determine what actions can be taken by the system processes and user accounts
within the system.
The firewall will either allow or deny these aspects based on the information contained within the
ACL.
IP PORT PASS-THROUGH SETTINGS
It will be necessary to set the firewalls to allow the IP port security filters to be applied according to
the needs of the security plan and policies that apply.
These permissions and settings that control IP port traffic pass through are known as IP port pass-
through.
The following configurations will need to be made:
Port rules and permissions
Port allocations
Port forwarding and addressing rules
Port range
Protocol settings
SECURITY AND AUTHENTICATION
PRACTICES
Security and authentication practices are the actions that are taken to make sure that access to the
communication solutions will only be granted to those that are authorised and approved to receive it
and the range of actions that will be taken to ensure this.
Security and authentication practices may include:
Developing user accounts
Maintaining security using encryption
Blocking unauthorised access
DEVELOPING USER ACCOUNTS
It will be necessary to develop user accounts to meet the permission and access needs of the
communication solutions and then to set suitable permissions for each user account group.
MAINTAINING SECURITY USING
ENCRYPTION
Suitable communication encryption and keys will need to be used to make sure that communication is
protected during sending.
BLOCKING UNAUTHORISED ACCESS
Authentication processes that suit the level of security required for each of the communication
solutions will need to be developed, and these may include:
Encrypted passwords
Two-step authentications
Tokens
It is important to make sure that only authorised, and authenticated accounts are able to gain access to
the system and can complete approved actions once they have gained access.
IMPORTANT FEATURES OF NETWORK
ADMINISTRATION, INCLUDING:
When planning, implementing and testing enterprise communication solutions, it will be necessary to
be aware of a range of important network administration features including:
Load balancing for applications
Server and directory administration
Infrastructure
Web server administration
LOAD BALANCING FOR APPLICATIONS
Load balancing involves resource allocation and traffic management actions in order to make sure
that the pressure of a load of network traffic is balanced in a manner that will result in effective and
efficient operations.
SERVER AND DIRECTORY ADMINISTRATION
Server or directory administration is the process of setting up servers and directories using a range of
file structures and systems and network protocols to ensure that all information and resources that are
stored as a part of the network to support applications are able to be effectively managed.
Server and directory administration will require:
Setting security permissions
Setting access lists
Closing unneeded open ports
Monitoring and managing logs and performance
INFRASTRUCTURE
The administration of the network infrastructure involves the configuration of all hardware and
software components of the network in order to support the applications and functions that are
required of the system.
Infrastructure should be administered through:
Monitoring
Management
Adjustments
WEB SERVER ADMINISTRATION
Web server administration involves the setting up and configuration and the management and
monitoring of a web server in order to make sure that it has appropriate:
File systems
Naming conventions
Traffic routes
Access and security
Functionality
Operation
SUMMARY
Now that you have completed this unit, you should have the skills and knowledge to manage the
deployment and administration of enterprise communication solutions.