System Administration Part 3

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

4 hours 21 minutes
Video Transcription
create manage and trained users. This is again. This is kind of where most people are gonna know you from. Is creating their user cats, managing them and training them. Um, this is actually something that we're going to show you how to do very briefly later on. In this course,
I t is one of the first and last groups to interact with employees. When people come on board with HR, and then they meet with I t and sets him up with their accounts, sets him up with passwords or e mails, everything. Then when people are being fired, I t or generally or when they're exiting, for whatever reason. But firing is a particularly fun area in a not fun way where people were coming to, I t
have all of their data, all of their accounts remove.
Now, a lot of times, companies will actually have I t doing this ahead of time or doing this, you know, while they're doing the exit interview or whatever.
Because one of the great dangers to any company is insider threat, one of the great danger standing organization. As I'm sure the federal government can tell you over the past several years. Is insider threat people stealing your date and running off with it?
So one of the challenges of being an I T. Is being able to manage those users very effectively from the date of entry to the date of exit.
And to do that successfully, user rolls are essential. So having multiple personas on your network administrators, local administrators, database administrators, normal users, managers there are all these different roles that might exist for how much data acts people have. And again, that gets us into the data integrity, confidence Alan Authentication. Those story, particularly
are, are what user rules are designed to manage.
And, again,
people really don't understand psychology. For those of you who've never worked to help this job, I can tell you that at times it can be soul crushing. The questions received
now that's not always the case. There are plenty of helped us jobs are a lot of fun, but you will always get weird questions from people. I had someone call me to tell me that their cell phone wasn't working from their cell phone. I have had people send me an email and say they can't get into outlook just all sorts of very strange things like that
that come from just a lack of knowledge or like awareness. So as a system admin as a help desk professionals, whatever kind of administrator you are,
part of your job is educating employees.
Joe, uh, real quick. I just want to ask you one question. Have you ever had that user that calls and says, Hey, I can't access my computer at all. Nothing's going on the screen's blank or, you know or it's black. What's going on? And then you find out it's just they didn't plug it in.
I turned it on, actually an interesting detail. So when you're doing this sort of thing for the government, a lot of people there don't really understand how technology works. But because they worked in the government for so long there,
adamant that they do, they caught. They're confident another computer works. They don't need your stupid advice. They need you to fix the problem so the old, you know, unplug it and plug it back in or the make sure it's plugged in kind of thing. People often won't do, and they'll just say they did that because they believe that they've already solved that problem. So one of the things that we started doing for the group that I was working with at the time
is well, actually tell users,
Take the court out of the back of your computer and blowing it because sometimes dust gets in the cord and you can blow the dust out and you can play it back in a little work, basically the same way you do it like an old Sega cartridge. Now this is not true. This is nonsense. That doesn't work. That's not what it's for it'll. But what it does do is it forces them toe, actually unplug and plug it back in,
and about 75% of the time that will solve that problem.
Great example. Use a useful shortcut for all of you. Yes, so policies and regulations we talked about part of your job is a system admin is following in enforcing these policies now. Organizational, you're looking at password requirements, data retention, destruction and acceptable use. Policy is pretty much all the paperwork you signed when you started a company you don't really read.
That's ideas. Job to enforce from a technical perspective, you know, making sure people aren't
if you're not supposed be accessing social media from your comm here from your work computer, preventing that, if not supposed be accessing illegal sites or certain there are all sorts of different possibilities. Ah, lot of companies don't allow VP ends unless it's company managed.
Just things like that.
Ideas jobs never enforced that
on regulations is sort of the legal side of that. So consumer protection encryption. If you're dealing financial data or really in general, there should be some encryption on all of your stuff.
And then, of course, data retention of destruction,
especially with, you know, California privacy acts and things like that that are coming out in which people have the right to be forgotten or the right to delete their data
on. It's really important as a system that you understand the retention and destruction not only policies but also laws, so that you could make sure that your company is compliant with that, and so that you could make sure that you don't get soon because getting suits sucks and being having someone able to point at you and say you are the reason we got sued is an awesome time to update your resume.
And then, of course, the last one that I mentioned and this is this really isn't its own heading. It's really that it applies to all of the other headings, but problem solving again. Most people's interaction with an I T professionals going to be a zit helped us is going to be X is wrong with my computer. Help me fix it. Fix. Maybe Azizi is telling them to unplug it, plug it back in the fix, maybe is complex,
as actually in a re imaging their machine
or fixing you know, these network configurations rebooting the firewall there, tons of possible issues that a 90 professional could run into every day. And their main job is to think on their feet, be prepared and stay calm. Your user is going to be panicking all the time.
They're going to be freaking out. I've got this meeting in five minutes. I've got this. I've got this client. I have to talk to you. I have bluffing that's going on.
It's always an emergency when they call you, because unfortunately, a lot of users don't call you until it's an emergency.
on sort of something that all address with that. One of the things they actually teach rescue swimmers in the Navy and in the Coast Guard is when you're when you're rescuing someone, oftentimes they will struggle, depending on your level of swimmer and depending on your experience, often they will teach you to subdue people to the point of choking them out
so that you can safely get them out of the water.
I'm not recommending that I t professionals choke out their co workers. Police Don't take that from this. I mean, no, no, don't do that.
But the point is, you have to be the calm one, and you have to be able to deal with what is a crisis situation for them in a way that is going to keep them from making it worse. So your primary job is I to your primary job is this assignment is to solve a problem quickly, effectively and calmly
Up Next
Introduction to IT & Cybersecurity

In this FREE IT and cybersecurity training for beginners, you will learn about the four primary disciplines of information technology (IT) and cybersecurity. This introduction to IT course is designed to help you decide which career path is right for you.

Instructed By