NTISthis.com

Evidence Guide: ICTCYS602 - Implement cyber security operations

Student: __________________________________________________

Signature: _________________________________________________

Tips for gathering evidence to demonstrate your skills

The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!

From the Wiki University

 

ICTCYS602 - Implement cyber security operations

What evidence can you provide to prove your understanding of each of the following citeria?

Assess organisational cyber security operations

  1. Identify existing organisational cyber security operations
  2. Identify organisational cyber security requirements
  3. Analyse effectiveness of organisations existing cyber operations against organisational requirements
  4. Document findings of analysis according to organisational requirements
Identify existing organisational cyber security operations

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Identify organisational cyber security requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Analyse effectiveness of organisations existing cyber operations against organisational requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Document findings of analysis according to organisational requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Determine and document organisational operations

  1. Determine and document required updates to existing organisational operation
  2. Determine and document service disruption and task requirements for implementing cyber operations
  3. Distribute document to required personnel in preparation for required implementation
Determine and document required updates to existing organisational operation

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Determine and document service disruption and task requirements for implementing cyber operations

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Distribute document to required personnel in preparation for required implementation

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Implement organisational cyber security operations

  1. Initiate implementation of cyber security operations according to task requirements
  2. Implement required operational and analytical processes
  3. Implement personnel requirements according to task requirements
  4. Implement incident reporting and escalating procedures
  5. Implement required hardware and software support requirements
  6. Test operational processes of cyber security operations and determine alignment to requirements
  7. Analyse performance and document required operational changes
  8. Update cyber security operations according to analysis results and determine required alignment to task requirements
  9. Review final cyber security strategy and document and lodge document according to organisational procedures
Initiate implementation of cyber security operations according to task requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Implement required operational and analytical processes

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Implement personnel requirements according to task requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Implement incident reporting and escalating procedures

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Implement required hardware and software support requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Test operational processes of cyber security operations and determine alignment to requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Analyse performance and document required operational changes

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Update cyber security operations according to analysis results and determine required alignment to task requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Review final cyber security strategy and document and lodge document according to organisational procedures

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessed

Teacher: ___________________________________ Date: _________

Signature: ________________________________________________

Comments:

 

 

 

 

 

 

 

 

Instructions to Assessors

Required Skills and Knowledge

The candidate must demonstrate the ability to complete the tasks outlined in the elements, performance criteria and foundation skills of this unit, including evidence of the ability to:

plan, implement and test cyber security operations on at least one occasion.

In the course of the above, the candidate must:

establish existing operational environment within organisation

analyse effectiveness of existing operations.

The candidate must be able to demonstrate knowledge to complete the tasks outlined in the elements, performance criteria and foundation skills of this unit, including knowledge of:

inherent requirements of cyber security operations environment

organisational procedures applicable to implementing cyber security operations, including:

documentation processes

establishing requirements and features of cyber security operations strategies

testing methodologies.