Assessor Resource

TLIK4008A
Implement and monitor network security

Assessment tool

Version 1.0
Issue Date: May 2024


Work may be undertaken in various contexts within the transport and distribution industry.

The unit generally applies to those who provide leadership of others individually or in teams.

This unit is normally packaged at AQF IV or above.

This unit involves the skills and knowledge required to implement and monitor network security. It involves identifying all security threats to the network and implementing approved controls to maintain network security integrity. This unit is derived from ICAITS123A Manage network security Licensing, legislative, regulatory or certification requirements are applicable to this unit.

You may want to include more information here about the target group and the purpose of the assessments (eg formative, summative, recognition)

Prerequisites

Not Applicable


Employability Skills

This unit contains employability skills.




Evidence Required

List the assessment methods to be used and the context and resources required for assessment. Copy and paste the relevant sections from the evidence guide below and then re-write these in plain English.

The evidence guide provides advice on assessment and must be read in conjunction with the performance criteria, required knowledge and skills, the range statement and the assessment guidelines for this Training Package.

Critical aspects for assessment and evidence required to demonstrate competency in this unit

The evidence required to demonstrate competency in this unit must be relevant to and satisfy all of the requirements of the elements and performance criteria of this unit and include demonstration of applying:

the underpinning knowledge and skills

relevant legislation and workplace procedures

other relevant aspects of the range statement

Context of and specific resources for assessment

Performance is demonstrated consistently over a period of time and in a suitable range of contexts

Resources for assessment include:

a range of relevant exercises, case studies and/or other simulated practical and knowledge assessment, and/or

access to an appropriate range of relevant operational situations in the workplace

In both real and simulated environments, access is required to:

relevant and appropriate materials and equipment, and

applicable documentation including workplace procedures, regulations, codes of practice and operation manuals

Method of assessment

Assessment of this unit must be undertaken by a registered training organisation

As a minimum, assessment of knowledge must be conducted through appropriate written/oral tests

Practical assessment must occur:

through activities in an appropriately simulated environment at the registered training organisation, and/or

in an appropriate range of situations in the workplace


Submission Requirements

List each assessment task's title, type (eg project, observation/demonstration, essay, assingnment, checklist) and due date here

Assessment task 1: [title]      Due date:

(add new lines for each of the assessment tasks)


Assessment Tasks

Copy and paste from the following data to produce each assessment task. Write these in plain English and spell out how, when and where the task is to be carried out, under what conditions, and what resources are needed. Include guidelines about how well the candidate has to perform a task for it to be judged satisfactory.

REQUIRED KNOWLEDGE AND SKILLS

This describes the essential knowledge and skills and their level required for this unit.

Required knowledge:

Relevant sections of national and state or territory regulatory requirements and codes of practice

Current industry accepted hardware and software products with broad knowledge of general features and capabilities

Broad general knowledge of the client business domain, business function and organisation

Networking technologies, with broad knowledge of general features and capabilities incorporating substantial depth in some areas

Risk analysis, with broad knowledge of general features incorporating substantial depth in some areas

Specific security technology, with broad knowledge of general features incorporating substantial depth in some areas

Procedures for operating electronic communications equipment

Requirements for completing relevant documentation

Code of practice for working collaboratively with others

Typical defects that can occur and related action that should be taken

Procedures for identifying equipment defects and assessing for appropriate action

Principles, purpose and location of controls, monitoring devices, and systems

Steps involved in planning the work activities

Procedures for adjusting controls to optimise the operation of the equipment

Sources of information on differences in equipment and related standard operating and servicing procedures

Required skills:

Use plain English literacy and communication skills in relation to analysis, evaluation and presentation of information

Use questioning and active listening skills

Read and interpret instructions, procedures, information and signs relevant to work activities

Write reports for business requiring depth in some areas, analysis and evaluation of information in a defined range of areas

Complete documentation related to work activities

Operate electronic communication and other equipment to required protocol

Work collaboratively with others

Solve problems for a defined range of unpredictable problems involving participation in the development of strategic initiatives

Use research to identify, analyse and evaluate broad features of a particular business domain and best practice in network security methodologies and technologies

Project plan in relation to scope, time, cost, quality, communications and risk management

Adapt appropriately to cultural differences in the workplace, including modes of behaviour and interactions with others

Promptly report and/or rectify any identified problems, faults or malfunctions in accordance with regulatory requirements and workplace procedures

Monitor work activities in terms of planned schedule

Monitor performance of equipment

The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance.

Software most likely to be:

packaged software

supplied from many varying vendors

security, audit, virus checking and encryption modules

Depending on the organisation concerned, workplace procedures may be called:

standard operating procedures (SOPs)

company procedures

enterprise procedures

organisational procedures

established procedures

Communication in the work area may include:

phone

electronic data interchange (EDI)

fax

email

internet

intranet

RF systems

oral, aural or signed communications

Consultative processes may involve:

other employees and supervisors

suppliers of network security equipment

relevant authorities and institutions

management

Documentation and records may include:

quality assurance procedures

emergency procedures

operations manuals

manufacturers specifications for network equipment

technical instructions

relevant Australian Standards and certification requirements

Copy and paste from the following performance criteria to create an observation checklist for each task. When you have finished writing your assessment tool every one of these must have been addressed, preferably several times in a variety of contexts. To ensure this occurs download the assessment matrix for the unit; enter each assessment task as a column header and place check marks against each performance criteria that task addresses.

Observation Checklist

Tasks to be observed according to workplace/college/TAFE policy and procedures, relevant legislation and Codes of Practice Yes No Comments/feedback
Implement risk analysis of security threats faced by organisation network 
Evaluate and identify internal and external threats to network such as hackers, eavesdropping and viruses 
Plans for cost effective improvements to network security are presented to management for approval and authorisation 
External or intra network security devices and controls such as firewalls are presented to management for approval 
Controls to add to the network to manage elements such as user access or hackers, eavesdropping and viruses are identified 
Approved equipment and controls are installed and configured to provide required levels of security 
Recommendations are made for additional equipment and updates to maintain security integrity 

Forms

Assessment Cover Sheet

TLIK4008A - Implement and monitor network security
Assessment task 1: [title]

Student name:

Student ID:

I declare that the assessment tasks submitted for this unit are my own work.

Student signature:

Result: Competent Not yet competent

Feedback to student

 

 

 

 

 

 

 

 

Assessor name:

Signature:

Date:


Assessment Record Sheet

TLIK4008A - Implement and monitor network security

Student name:

Student ID:

Assessment task 1: [title] Result: Competent Not yet competent

(add lines for each task)

Feedback to student:

 

 

 

 

 

 

 

 

Overall assessment result: Competent Not yet competent

Assessor name:

Signature:

Date:

Student signature:

Date: