Unit of Competency Mapping – Information for Teachers/Assessors – Information for Learners

ICTTEN8195A Mapping and Delivery Guide
Evaluate and apply network security

Version 1.0
Issue Date: April 2024


Qualification -
Unit of Competency ICTTEN8195A - Evaluate and apply network security
Description This unit describes the performance outcomes, skills and knowledge required to analyse the security features of an internet protocol (IP) based telecommunications network.This applies to IT networking and telecommunications networking topologies.No licensing, legislative, regulatory or certification requirements apply to this unit at the time of endorsement but users should confirm requirements with the relevant federal, state or territory authority.
Employability Skills This unit contains employability skills.
Learning Outcomes and Application Telecommunication engineers apply the skills and knowledge in this unit to analyse and report on the security of an ICT network, particularly Internet security.They are responsible for the evaluation of security of ICT networks using converging switching and transmission technologies in local area networks (LAN) and wide area networks (WAN), broadband networks, internet protocol TV (IPTV) and virtual networks.
Duration and Setting X weeks, nominally xx hours, delivered in a classroom/online/blended learning setting.
Prerequisites/co-requisites
Competency Field Telecommunications networks engineering
Development and validation strategy and guide for assessors and learners Student Learning Resources Handouts
Activities
Slides
PPT
Assessment 1 Assessment 2 Assessment 3 Assessment 4
Elements of Competency Performance Criteria              
Element: Analyse the operation of the Internet
  • Evaluate the interrelationship of IP to open systems interconnect (OSI) seven layer model and the impact on network topologies and network elements
  • Assess media access control (MAC) and IP addressing and their application in security
  • Report on transmission control protocol/internet protocol (TCP/IP) operations and the use of transport protocols for transmitting data over the network
  • Examine the various types of routing protocols and implication on security
  • Analyse forms of label switching as applied to data packets
  • Use software to simulate the least cost algorithms
       
Element: Analyse internetwork protocols
  • Compare connection-oriented and connection-less networks in internetworking applications
  • Research the design parameters used in networks
  • Produce a report on IP multi-casting protocols and systems including IP frame fields of the data frames
       
Element: Research and report internetwork operations
  • Analyse protocol considerations of voice over internet protocol (VoIP)
  • Research the protocols G723.1, G729 and G729A standards and evaluate their application in internetworking
  • Determine the format of JPEG and GIF files as applied to still pictures
  • Determine the format of MPEG-2 and H.32x series multimedia protocols for motion pictures
  • Evaluate the features of different of multi-service protocols and of different email system protocols in networking operations
  • Produce a report on the features the different web-based protocols used in internetworking operations
       
Element: Analyse features and types of network security
  • Analyse procedures and processes used for security attacks and use of protection mechanisms
  • Research conventional encryption algorithms and determine possible locations of encryption devices
  • Produce a report on conventional encryption key distribution problems and how message authentication and verification is achieved
  • Research one-way hashing and secure hashing functions
  • Produce a report on digital signature standard (DSS) principles including public key cryptography algorithms for network security
       
Element: Research features of public key authentication and email network security protocols
  • Research public key authentication using Kerberos
  • Analyse how electronic mail security is achieved using pretty good privacy (PGP)
  • Research and report on IPSec protocol security
  • Produce a report on encapsulating security payload (ESP) including Internet key management processes
       
Element: Research features of web, network management and system security
  • Analyse how web threats and attacks occur in an IP network and determine system intruders and threats
  • Research the operation of transaction protocols
  • Evaluate the processes used for selection and protection of system passwords
  • Evaluate system threats and methods used to counter act the threats
  • Produce a report on anti-virus protection strategies, including firewall design principles, types and configurations
       
Element: Document evaluation report
  • Present a final report to include research and evaluation of network security management principles and the application to the network in the workplace with enhancement recommendations
       


Evidence Required

List the assessment methods to be used and the context and resources required for assessment. Copy and paste the relevant sections from the evidence guide below and then re-write these in plain English.

The evidence guide provides advice on assessment and must be read in conjunction with the performance criteria, required skills and knowledge, range statement and the Assessment Guidelines for the Training Package.

Overview of assessment

Critical aspects for assessment and evidence required to demonstrate competency in this unit

Evidence of the ability to:

analyse the operation of the Internet

implement Internet technology

select Internetwork protocols

research and report various internetwork operations

analyse features and types of network security methods and their weaknesses

analyse features of various cryptography systems

research and report the features of public key authentication and email network security protocols

research and report the features of web, network management and system security.

Context of and specific resources for assessment

Assessment must ensure:

a telecommunications operations site with a mentor or supervisor appropriately experienced in relevant telecommunications technology and infrastructure

networked computers and relevant software.

Method of assessment

A range of assessment methods should be used to assess practical skills and knowledge. The following examples are appropriate for this unit:

oral or written questioning to assess required knowledge

direct observation of the candidate carrying out relevant security checks within a networked communication system

review of reports completed by the candidate for different security breached scenarios.

Guidance information for assessment

Holistic assessment with other units relevant to the industry sector, workplaces and job role is recommended, for example:

ICTPMG8143A Manage a telecommunications project

ICTPMG8149A Evaluate and use telecommunications management networks.

Aboriginal people and other people from a non-English speaking background may have second language issues.

Access must be provided to appropriate learning and assessment support when required.

Assessment processes and techniques must be culturally appropriate, and appropriate to the oral communication skill level, and language and literacy capacity of the candidate and the work being performed.

In all cases where practical assessment is used it will be combined with targeted questioning to assess required knowledge. Questioning techniques should not require language, literacy and numeracy skills beyond those required in this unit of competency.

Where applicable, physical resources should include equipment modified for people with special needs.


Submission Requirements

List each assessment task's title, type (eg project, observation/demonstration, essay, assignment, checklist) and due date here

Assessment task 1: [title]      Due date:

(add new lines for each of the assessment tasks)


Assessment Tasks

Copy and paste from the following data to produce each assessment task. Write these in plain English and spell out how, when and where the task is to be carried out, under what conditions, and what resources are needed. Include guidelines about how well the candidate has to perform a task for it to be judged satisfactory.

Required skills

analytical skills to evaluate a range of complex technical data

communication skills to work effectively within a group and present information

information technology skills to use:

software for desktop research

statistical data

word processing software

literacy skills to prepare reports given a specific format and read and interpret technical standards

planning and organisational skills to manage own work in specific time frames

research skills to gather and record data from measurements

technical skills to:

operate test equipment

use telecommunications management networks

Required knowledge

administrative network management systems

algorithms

cryptography

encapsulation

encryption

enterprise solutions

firewalls

network topologies

operations network management systems

organisational policy and procedures

protocols

routing theory

system threats

transaction protocols

workplace and industry environment

The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included.

Network elements may include:

bridges

gateways

routers

servers

switches.

Transport protocols may include:

Ethernet

point-to-point protocol (PPP)

synchronous data link control (SDLC)

synchronous optical network (SONET).

Routing protocols may include:

adaptive

enhanced interior gateway routing protocol (EIGRP)

fixed

flooding

interior gateway routing protocol (IGRP)

open shortest path first (OSPF)

random

routing information protocol (RIP).

Label switching may include:

cell switching routers (CSR)

IP

tag.

Least cost algorithms may include:

Bellman-Ford's

Dijkstra's.

Design parameters may include:

datagram lifetime

error and flow control techniques

fragmentation

reassembly

routing.

Frame fields may include:

datagram format

internet control message protocol (ICMP)

IPv6 header and addressing

protocol data unit (PDU).

Multi-service protocols

may include:

border gateway protocol (BGP)

OSPF

resource reservation protocol (RSVP)

real time control protocol (RTCP)

real time protocol (RTP).

Email system protocols

may include:

data transparency:

ASCII

binary

EBCDIC

radix64 coding

Unicode

multipurpose mail extensions (MIME)

simple mail transfer protocol (SMTP).

Web-based protocols may include:

common gateway interface (CGI)

file transfer protocol (FTP)

hyper-text mark-up language protocol (HTML)

hyper-text transfer protocol (HTTP)

Java applets and application programmers interface (API).

Encryption algorithms may include:

Blowfish

Data Encryption Standard (DES)

Feistel Cipher

International Data Encryption Algorithm (IDEA).

Hashing functions may include:

hash message authentication checksum (HMAC)

Secure HAsh (SHA-1).

Public key cryptography algorithms may include:

Dieffie-Hellman key exchange

Rivest Shamir Adleman (RSA).

IPSec may include:

authentication header

internet protocol (IP) security

transport and tunnel modes of operation.

Key management processes may include:

internet security association and key management protocol (ISAKMP)

Oakley key determination protocol (OKDP).

Transaction protocols may include:

secure electronic transaction (SECT)

simple network management protocol (SNMP)

SNMPv1 (community facility and proxies)

SNMPv3 (message processing and the user security model)

secure socket layer (SSL).

System threats may include:

logic bombs

trap doors

Trojans

viruses

worms.

Copy and paste from the following performance criteria to create an observation checklist for each task. When you have finished writing your assessment tool every one of these must have been addressed, preferably several times in a variety of contexts. To ensure this occurs download the assessment matrix for the unit; enter each assessment task as a column header and place check marks against each performance criteria that task addresses.

Observation Checklist

Tasks to be observed according to workplace/college/TAFE policy and procedures, relevant legislation and Codes of Practice Yes No Comments/feedback
Evaluate the interrelationship of IP to open systems interconnect (OSI) seven layer model and the impact on network topologies and network elements 
Assess media access control (MAC) and IP addressing and their application in security 
Report on transmission control protocol/internet protocol (TCP/IP) operations and the use of transport protocols for transmitting data over the network 
Examine the various types of routing protocols and implication on security 
Analyse forms of label switching as applied to data packets 
Use software to simulate the least cost algorithms 
Compare connection-oriented and connection-less networks in internetworking applications 
Research the design parameters used in networks 
Produce a report on IP multi-casting protocols and systems including IP frame fields of the data frames 
Analyse protocol considerations of voice over internet protocol (VoIP) 
Research the protocols G723.1, G729 and G729A standards and evaluate their application in internetworking 
Determine the format of JPEG and GIF files as applied to still pictures 
Determine the format of MPEG-2 and H.32x series multimedia protocols for motion pictures 
Evaluate the features of different of multi-service protocols and of different email system protocols in networking operations 
Produce a report on the features the different web-based protocols used in internetworking operations 
Analyse procedures and processes used for security attacks and use of protection mechanisms 
Research conventional encryption algorithms and determine possible locations of encryption devices 
Produce a report on conventional encryption key distribution problems and how message authentication and verification is achieved 
Research one-way hashing and secure hashing functions 
Produce a report on digital signature standard (DSS) principles including public key cryptography algorithms for network security 
Research public key authentication using Kerberos 
Analyse how electronic mail security is achieved using pretty good privacy (PGP) 
Research and report on IPSec protocol security 
Produce a report on encapsulating security payload (ESP) including Internet key management processes 
Analyse how web threats and attacks occur in an IP network and determine system intruders and threats 
Research the operation of transaction protocols 
Evaluate the processes used for selection and protection of system passwords 
Evaluate system threats and methods used to counter act the threats 
Produce a report on anti-virus protection strategies, including firewall design principles, types and configurations 
Present a final report to include research and evaluation of network security management principles and the application to the network in the workplace with enhancement recommendations 

Forms

Assessment Cover Sheet

ICTTEN8195A - Evaluate and apply network security
Assessment task 1: [title]

Student name:

Student ID:

I declare that the assessment tasks submitted for this unit are my own work.

Student signature:

Result: Competent Not yet competent

Feedback to student

 

 

 

 

 

 

 

 

Assessor name:

Signature:

Date:


Assessment Record Sheet

ICTTEN8195A - Evaluate and apply network security

Student name:

Student ID:

Assessment task 1: [title] Result: Competent Not yet competent

(add lines for each task)

Feedback to student:

 

 

 

 

 

 

 

 

Overall assessment result: Competent Not yet competent

Assessor name:

Signature:

Date:

Student signature:

Date: