The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!
From the Wiki University
What evidence can you provide to prove your understanding of each of the following citeria?
Assess organisational cyber security operations
|
|
Identify existing organisational cyber security operations Completed |
Evidence:
|
Identify organisational cyber security requirements Completed |
Evidence:
|
Analyse effectiveness of organisations existing cyber operations against organisational requirements Completed |
Evidence:
|
Document findings of analysis according to organisational requirements Completed |
Evidence:
|
Determine and document organisational operations
|
|
Determine and document required updates to existing organisational operation Completed |
Evidence:
|
Determine and document service disruption and task requirements for implementing cyber operations Completed |
Evidence:
|
Distribute document to required personnel in preparation for required implementation Completed |
Evidence:
|
Implement organisational cyber security operations
|
|
Initiate implementation of cyber security operations according to task requirements Completed |
Evidence:
|
Implement required operational and analytical processes Completed |
Evidence:
|
Implement personnel requirements according to task requirements Completed |
Evidence:
|
Implement incident reporting and escalating procedures Completed |
Evidence:
|
Implement required hardware and software support requirements Completed |
Evidence:
|
Test operational processes of cyber security operations and determine alignment to requirements Completed |
Evidence:
|
Analyse performance and document required operational changes Completed |
Evidence:
|
Update cyber security operations according to analysis results and determine required alignment to task requirements Completed |
Evidence:
|
Review final cyber security strategy and document and lodge document according to organisational procedures Completed |
Evidence:
|