Unit of Competency Mapping – Information for Teachers/Assessors – Information for Learners
ICTNWK509 Mapping and Delivery Guide
Design and implement a security perimeter for ICT networks
Version 1.0
Issue Date: June 2024
Qualification | - |
Unit of Competency | ICTNWK509 - Design and implement a security perimeter for ICT networks |
---|---|---|---|
Description | |||
Employability Skills | |||
Learning Outcomes and Application | This unit describes the skills and knowledge required to build a high performance, high security, failure resistant security perimeter, for an enterprise information and communications technology (ICT) network.It applies to individuals with excellent ICT expertise who are working as middle managers, including information security managers, network engineers, network technicians and security analysts.No licensing, legislative or certification requirements apply to this unit at the time of publication. | ||
Duration and Setting | X weeks, nominally xx hours, delivered in a classroom/online/blended learning setting. Gather evidence to demonstrate consistent performance in conditions that are safe and replicate the workplace. Noise levels, production flow, interruptions and time variances must be typical of those experienced in the network industry, and include access to: site or prototype where perimeter security may be implemented and managed perimeter devices organisational security requirements. Assessors must satisfy NVR/AQTF assessor requirements. |
||
Prerequisites/co-requisites | |||
Competency Field |
Development and validation strategy and guide for assessors and learners | Student Learning Resources | Handouts Activities |
Slides PPT |
Assessment 1 | Assessment 2 | Assessment 3 | Assessment 4 | |
---|---|---|---|---|---|---|---|---|
Elements of Competency | Performance Criteria | |||||||
Element: Plan and design firewall solution |
| |||||||
Element: Configure perimeter to secure network |
| |||||||
Element: Plan, design and configure network devices to provide secure fallover and redundancy |
| |||||||
Element: Plan, design and configure a VPN solution |
| |||||||
Element: Test and verify design performance |
|