NTISthis.com

Evidence Guide: ICTCLD506 - Implement virtual network in cloud environments

Student: __________________________________________________

Signature: _________________________________________________

Tips for gathering evidence to demonstrate your skills

The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!

From the Wiki University

 

ICTCLD506 - Implement virtual network in cloud environments

What evidence can you provide to prove your understanding of each of the following citeria?

Prepare to design and configure virtual networks

  1. Gather multi-tier application networking requirements according to business needs
  2. Identify business and industry requirements for virtual network in cloud environment
  3. Research and identify available security options for virtual network
Gather multi-tier application networking requirements according to business needs

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Identify business and industry requirements for virtual network in cloud environment

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Research and identify available security options for virtual network

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Design and configure virtual networks

  1. Design virtual network according to networking and business requirements for a multi-tier application
  2. Allocate virtual network and subnets for documented IP ranges
  3. Enable network gateways and its service as required
  4. Configure route tables and routing targets as required
  5. Configure security controls to support test environment
  6. Check expected network traffic is permitted into, through and out of virtual network
  7. Collect and monitor network traffic logs and metrics
  8. Test external connectivity to a resource within virtual network and demonstrate only permitted traffic reaches the resource
  9. Troubleshoot and fix errors as required
Design virtual network according to networking and business requirements for a multi-tier application

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Allocate virtual network and subnets for documented IP ranges

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Enable network gateways and its service as required

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure route tables and routing targets as required

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure security controls to support test environment

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Check expected network traffic is permitted into, through and out of virtual network

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Collect and monitor network traffic logs and metrics

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Test external connectivity to a resource within virtual network and demonstrate only permitted traffic reaches the resource

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Troubleshoot and fix errors as required

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure virtual network peering

  1. Establish peering connection between two virtual networks
  2. Adjust routing tables to direct traffic between both networks
  3. Demonstrate network connectivity between hosts in each network
  4. Test and troubleshoot network peering configuration
Establish peering connection between two virtual networks

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Adjust routing tables to direct traffic between both networks

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Demonstrate network connectivity between hosts in each network

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Test and troubleshoot network peering configuration

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Document virtual networks

  1. Document work, including a network diagram, and submit to required personnel as required
  2. Obtain final task sign off from required personnel as required
Document work, including a network diagram, and submit to required personnel as required

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Obtain final task sign off from required personnel as required

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessed

Teacher: ___________________________________ Date: _________

Signature: ________________________________________________

Comments:

 

 

 

 

 

 

 

 

Instructions to Assessors

Required Skills and Knowledge

The candidate must demonstrate the ability to complete the tasks outlined in the elements, performance criteria and foundation skills of this unit, and to:

design and deploy virtual network to support a multi-tier application in a cloud environment

modify at least one network configuration to peer with another virtual network.

In the course of the above, the candidate must:

enable security controls and confirm that controls accurately affect network traffic as required

use cloud management console, cloud software development kits or command line tools

create user documentation.

The candidate must demonstrate knowledge to complete the tasks outlined in the elements, performance criteria and foundation skills of this unit. This includes knowledge of:

industry technology standards used in cloud computing solutions and services

industry standard hardware and software products, their general features, capabilities and application, including storage technology

roles and principles of virtual networks in cloud environments

uses and purpose of routing, routing targets, subnets, networking security controls, virtual private network (VPN) and IP address ranges

uses of technology to connect to resources within a virtual network, including secure shell (SSH), virtual private network (VPN) and peering

uses and differences between:

public and private subnets

networking gateways

routing targets

network security controls

testing and debugging techniques

methodology and techniques to collect and analyse network traffic metrics and traffic logs.