System Administrator & Application Administrator Training

The System Administrator is an analyst, engineer, or consultant who implements, manages, and/or operates a system or systems at the direction of the System Owner, Data Owner and/or Data Custodian. The System Administrator is responsible for the following:

  1. Assists University management in the day-to-day administration of IT systems.
  2. Implements security controls and other requirements of the University’s information security program on IT systems for which the System Administrator has been assigned responsibility.
  3. Each system should have at least two System Administrators (one primary, one secondary).
  4. Monitor system logs for anomalous activity and notify IT Security of any potential threats or compromises of the system.
  5. Ensure system and security updates are applied in a timely manner.
  6. Complete annual, role-based training.

The Application Administrator is the University manager responsible for the operations and maintenance of the application, at the direction of the System Owner, Data Owner, and/or Data Custodian, and is responsible for the following:

  1. Implement security baseline, controls and other requirements of the University’s information security program on IT applications for which the Application Administrator has been assigned responsibility.
  2. If the application requires communication with other University systems, work with the Division of Information Technology to update or implement firewall rules and integrations with other systems.
  3. Assign access and accounts, adhering to Section 5: Logical Access Control. Promptly remove access of those who no longer need access and maintain principle of least privilege.
  4. Each system should have at least two Application Administrators (one primary, one secondary).
  5. Monitor application logs for anomalous activity and notify IT Security of any potential threats or compromises of the application or accounts.
  6. Ensure application and security updates are applied in a timely manner.
  7. Complete annual role-based training.

The Radford University IT Security Standard 5003s [PDF] requires all System Owners and Data Owners to complete training annually.  The IT Security Office provides this training via Desire 2 Learn throughout the year, but an individual assigned to these positions can request one-on-one training.

How to Request This Service

Send an email to itsecurity@radford.edu to request training.  Please include your contact information so we can setup a session with you.