Google Links

Follow the links below to find material targeted to the unit's elements, performance criteria, required skills and knowledge

Elements and Performance Criteria

  1. Analyse the operation of the Internet
  2. Analyse internetwork protocols
  3. Research and report internetwork operations
  4. Analyse features and types of network security
  5. Research features of public key authentication and email network security protocols
  6. Research features of web, network management and system security
  7. Document evaluation report

Required Skills

Required skills

analytical skills to evaluate a range of complex technical data

communication skills to work effectively within a group and present information

information technology skills to use

software for desktop research

statistical data

word processing software

literacy skills to prepare reports given a specific format and read and interpret technical standards

planning and organisational skills to manage own work in specific time frames

research skills to gather and record data from measurements

technical skills to

operate test equipment

use telecommunications management networks

Required knowledge

administrative network management systems

algorithms

cryptography

encapsulation

encryption

enterprise solutions

firewalls

network topologies

operations network management systems

organisational policy and procedures

protocols

routing theory

system threats

transaction protocols

workplace and industry environment

Evidence Required

The evidence guide provides advice on assessment and must be read in conjunction with the performance criteria required skills and knowledge range statement and the Assessment Guidelines for the Training Package

Overview of assessment

Critical aspects for assessment and evidence required to demonstrate competency in this unit

Evidence of the ability to

analyse the operation of the Internet

implement Internet technology

select Internetwork protocols

research and report various internetwork operations

analyse features and types of network security methods and their weaknesses

analyse features of various cryptography systems

research and report the features of public key authentication and email network security protocols

research and report the features of web network management and system security

Context of and specific resources for assessment

Assessment must ensure

a telecommunications operations site with a mentor or supervisor appropriately experienced in relevant telecommunications technology and infrastructure

networked computers and relevant software

Method of assessment

A range of assessment methods should be used to assess practical skills and knowledge The following examples are appropriate for this unit

oral or written questioning to assess required knowledge

direct observation of the candidate carrying out relevant security checks within a networked communication system

review of reports completed by the candidate for different security breached scenarios

Guidance information for assessment

Holistic assessment with other units relevant to the industry sector workplaces and job role is recommended for example

ICTPMGA Manage a telecommunications project

ICTPMG8143A Manage a telecommunications project

ICTPMGA Evaluate and use telecommunications management networks

ICTPMG8149A Evaluate and use telecommunications management networks.

Aboriginal people and other people from a nonEnglish speaking background may have second language issues

Access must be provided to appropriate learning and assessment support when required

Assessment processes and techniques must be culturally appropriate and appropriate to the oral communication skill level and language and literacy capacity of the candidate and the work being performed

In all cases where practical assessment is used it will be combined with targeted questioning to assess required knowledge Questioning techniques should not require language literacy and numeracy skills beyond those required in this unit of competency

Where applicable physical resources should include equipment modified for people with special needs


Range Statement

The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included.

Network elements may include:

bridges

gateways

routers

servers

switches.

Transport protocols may include:

Ethernet

point-to-point protocol (PPP)

synchronous data link control (SDLC)

synchronous optical network (SONET).

Routing protocols may include:

adaptive

enhanced interior gateway routing protocol (EIGRP)

fixed

flooding

interior gateway routing protocol (IGRP)

open shortest path first (OSPF)

random

routing information protocol (RIP).

Label switching may include:

cell switching routers (CSR)

IP

tag.

Least cost algorithms may include:

Bellman-Ford's

Dijkstra's.

Design parameters may include:

datagram lifetime

error and flow control techniques

fragmentation

reassembly

routing.

Frame fields may include:

datagram format

internet control message protocol (ICMP)

IPv6 header and addressing

protocol data unit (PDU).

Multi-service protocols

may include:

border gateway protocol (BGP)

OSPF

resource reservation protocol (RSVP)

real time control protocol (RTCP)

real time protocol (RTP).

Email system protocols

may include:

data transparency:

ASCII

binary

EBCDIC

radix64 coding

Unicode

multipurpose mail extensions (MIME)

simple mail transfer protocol (SMTP).

Web-based protocols may include:

common gateway interface (CGI)

file transfer protocol (FTP)

hyper-text mark-up language protocol (HTML)

hyper-text transfer protocol (HTTP)

Java applets and application programmers interface (API).

Encryption algorithms may include:

Blowfish

Data Encryption Standard (DES)

Feistel Cipher

International Data Encryption Algorithm (IDEA).

Hashing functions may include:

hash message authentication checksum (HMAC)

Secure HAsh (SHA-1).

Public key cryptography algorithms may include:

Dieffie-Hellman key exchange

Rivest Shamir Adleman (RSA).

IPSec may include:

authentication header

internet protocol (IP) security

transport and tunnel modes of operation.

Key management processes may include:

internet security association and key management protocol (ISAKMP)

Oakley key determination protocol (OKDP).

Transaction protocols may include:

secure electronic transaction (SECT)

simple network management protocol (SNMP)

SNMPv1 (community facility and proxies)

SNMPv3 (message processing and the user security model)

secure socket layer (SSL).

System threats may include:

logic bombs

trap doors

Trojans

viruses

worms.