NTISthis.com

Evidence Guide: ICTCYS611 - Configure security devices for organisations

Student: __________________________________________________

Signature: _________________________________________________

Tips for gathering evidence to demonstrate your skills

The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!

From the Wiki University

 

ICTCYS611 - Configure security devices for organisations

What evidence can you provide to prove your understanding of each of the following citeria?

Prepare configuration of security devices

  1. Conduct a needs analysis and determine organisation’s needs to configure security devices
  2. Determine devices required for configuration according to organisational requirements
  3. Determine network and system security requirements
  4. Obtain and review manufacturing and technical requirements for devices
  5. Research and document device risk threats and vulnerabilities according to organisational requirements
Conduct a needs analysis and determine organisation’s needs to configure security devices

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Determine devices required for configuration according to organisational requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Determine network and system security requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Obtain and review manufacturing and technical requirements for devices

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Research and document device risk threats and vulnerabilities according to organisational requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Design configuration plan

  1. Develop and document configuration plan according to organisational requirements
  2. Submit plan to required personnel and seek and respond to feedback
  3. Finalise plan and communicate to required personnel in preparation for configuration
Develop and document configuration plan according to organisational requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Submit plan to required personnel and seek and respond to feedback

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Finalise plan and communicate to required personnel in preparation for configuration

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure security devices

  1. Isolate devices according to technical specification and configuration plan
  2. Configure virtual networks according to specifications and plan
  3. Configure secure site-to-site connectivity and VPN requirements
  4. Implement required encryption according to specifications and plan
  5. Implement a DMZ according to specifications and plan
Isolate devices according to technical specification and configuration plan

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure virtual networks according to specifications and plan

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure secure site-to-site connectivity and VPN requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Implement required encryption according to specifications and plan

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Implement a DMZ according to specifications and plan

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Test configured devices

  1. Test configuration capabilities against requirements
  2. Conduct penetration test and record outcomes according to organisational requirements
  3. Document and communicate test findings to required personnel and implement any required configuration changes
  4. Lodge documentation according to organisational policies and procedures
Test configuration capabilities against requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Conduct penetration test and record outcomes according to organisational requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Document and communicate test findings to required personnel and implement any required configuration changes

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Lodge documentation according to organisational policies and procedures

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessed

Teacher: ___________________________________ Date: _________

Signature: ________________________________________________

Comments:

 

 

 

 

 

 

 

 

Instructions to Assessors

Required Skills and Knowledge

The candidate must demonstrate the ability to complete the tasks outlined in the elements, performance criteria and foundation skills of this unit, including evidence of the ability to:

design a security configuration plan and implement device configuration for at least three different security devices.

In the course of the above, the candidate must:

conduct cyber security needs analysis

document processes and outcomes.

The candidate must be able to demonstrate knowledge to complete the tasks outlined in the elements, performance criteria and foundation skills of this unit, including knowledge of:

procedures for configuring, verifying and troubleshooting security devices

cyber security device configuration methodologies

conducting cyber security needs analysis

configuring security networks required to configure security devices.