The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!
From the Wiki University
What evidence can you provide to prove your understanding of each of the following citeria?
Plan to implement wireless network security
|
|
Research and evaluate organisational and regulatory security policies that have been used to benchmark acceptable network security standards Completed |
Evidence:
|
Assess customer requirements and needs against regulatory security compliance and OHS considerations Completed |
Evidence:
|
Produce a plan with security-solution documentation for future growth and security needs Completed |
Evidence:
|
Design, implement and test guest access services
|
|
Analyse and select the appropriate architecture for guest access services Completed |
Evidence:
|
Produce a map and set up guest access accounts Completed |
Evidence:
|
Configure WLAN controller authorisation Completed |
Evidence:
|
Configure the anchor and internal controllers Completed |
Evidence:
|
Troubleshoot guest access issues Completed |
Evidence:
|
Design, implement and test the security of wireless client devices
|
|
Design and configure authentication of clients and management frame protection on clients and controllers Completed |
Evidence:
|
Configure access control servers for integration with wireless network Completed |
Evidence:
|
Configure client and server-side digital certificate services Completed |
Evidence:
|
Troubleshoot secure wireless connectivity services Completed |
Evidence:
|
Design, implement and test the integration of wireless network with organisational network admission control systems
|
|
Analyse network admission control architectures to assess the feasibility of network integration Completed |
Evidence:
|
Analyse the high-level authentication process flow to ensure compatible integration Completed |
Evidence:
|
Configure and test the wireless controller for admission control Completed |
Evidence:
|
Troubleshoot integration issues of network with access control Completed |
Evidence:
|
Evaluate and plan secure wireless connectivity services
|
|
Configure the intrusion detection system (IDS) to monitor the network activities for malicious activities or policy violations Completed |
Evidence:
|
Analyse the report produced by the IDS to review threat-mitigation strategies Completed |
Evidence:
|
Update security solution plan to mitigate wireless vulnerabilities to ensure network integrity Completed |
Evidence:
|
Manage the requirements to integrate the WLAN with advanced security platforms
|
|
Evaluate end-to-end security solutions and assess how they integrate with the planned wireless solutions Completed |
Evidence:
|
Analyse the firewall configuration requirements of WLANs to ensure compliance with organisational policies Completed |
Evidence:
|
Configure and test the WLAN controllers for wired and wireless intrusion prevention and detection system (IPDS) security protection Completed |
Evidence:
|