Unit of Competency Mapping – Information for Teachers/Assessors – Information for Learners

ICTICT424 Mapping and Delivery Guide
Address cyber security requirements

Version 1.0
Issue Date: May 2024


Qualification -
Unit of Competency ICTICT424 - Address cyber security requirements
Description
Employability Skills
Learning Outcomes and Application This unit describes the skills and knowledge required to determine the cyber security requirements of an organisation and use a range of resources to protect valuable assets.This unit applies to individuals who are required to participate in the identification and implementation of cyber security controls.No licensing, legislative or certification requirements apply to this unit at the time of publication.
Duration and Setting X weeks, nominally xx hours, delivered in a classroom/online/blended learning setting.
Prerequisites/co-requisites
Competency Field
Development and validation strategy and guide for assessors and learners Student Learning Resources Handouts
Activities
Slides
PPT
Assessment 1 Assessment 2 Assessment 3 Assessment 4
Elements of Competency Performance Criteria              
Element: Analyse cyber security requirements
  • Identify and document valuable assets to create register of valuable assets
  • Perform threat and risk assessment on valuable assets register to identify and document cyber security requirements
  • Review current cyber security controls against the cyber security requirements to identify cyber security gaps
       
Element: Select and implement cyber security controls
  • Identify cyber security controls which address cyber security gaps
  • Determine specific cyber security controls to address cyber security gaps against the organisation’s risk appetite
  • Seek feedback from organisational representative and agree on cyber security controls to implement
  • Implement, test and document agreed cyber security controls to address cyber security gaps
  • Seek feedback from organisational representative to identify discrepancies between cyber security controls and cyber security requirements
       
Element: Maintain and improve security controls
  • Determine currency of valuable assets register to identify new valuable assets and changed threats and risks
  • Identify, determine, and agree on cyber security controls to address new cyber security gaps
  • Implement and document new and modified cyber security controls to address cyber security gaps
       

Submission Requirements

List each assessment task's title, type (eg project, observation/demonstration, essay, assignment, checklist) and due date here

Assessment task 1: [title]      Due date:

(add new lines for each of the assessment tasks)


Assessment Tasks

Copy and paste from the following data to produce each assessment task. Write these in plain English and spell out how, when and where the task is to be carried out, under what conditions, and what resources are needed. Include guidelines about how well the candidate has to perform a task for it to be judged satisfactory.
Copy and paste from the following performance criteria to create an observation checklist for each task. When you have finished writing your assessment tool every one of these must have been addressed, preferably several times in a variety of contexts. To ensure this occurs download the assessment matrix for the unit; enter each assessment task as a column header and place check marks against each performance criteria that task addresses.

Observation Checklist

Tasks to be observed according to workplace/college/TAFE policy and procedures, relevant legislation and Codes of Practice Yes No Comments/feedback
Identify and document valuable assets to create register of valuable assets 
Perform threat and risk assessment on valuable assets register to identify and document cyber security requirements 
Review current cyber security controls against the cyber security requirements to identify cyber security gaps 
Identify cyber security controls which address cyber security gaps 
Determine specific cyber security controls to address cyber security gaps against the organisation’s risk appetite 
Seek feedback from organisational representative and agree on cyber security controls to implement 
Implement, test and document agreed cyber security controls to address cyber security gaps 
Seek feedback from organisational representative to identify discrepancies between cyber security controls and cyber security requirements 
Determine currency of valuable assets register to identify new valuable assets and changed threats and risks 
Identify, determine, and agree on cyber security controls to address new cyber security gaps 
Implement and document new and modified cyber security controls to address cyber security gaps 

Forms

Assessment Cover Sheet

ICTICT424 - Address cyber security requirements
Assessment task 1: [title]

Student name:

Student ID:

I declare that the assessment tasks submitted for this unit are my own work.

Student signature:

Result: Competent Not yet competent

Feedback to student

 

 

 

 

 

 

 

 

Assessor name:

Signature:

Date:


Assessment Record Sheet

ICTICT424 - Address cyber security requirements

Student name:

Student ID:

Assessment task 1: [title] Result: Competent Not yet competent

(add lines for each task)

Feedback to student:

 

 

 

 

 

 

 

 

Overall assessment result: Competent Not yet competent

Assessor name:

Signature:

Date:

Student signature:

Date: