NTISthis.com

Evidence Guide: ICTCYS613 - Utilise design methodologies for security architecture

Student: __________________________________________________

Signature: _________________________________________________

Tips for gathering evidence to demonstrate your skills

The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!

From the Wiki University

 

ICTCYS613 - Utilise design methodologies for security architecture

What evidence can you provide to prove your understanding of each of the following citeria?

Prepare to design security infrastructure

  1. Analyse an organisation’s operation and infrastructure to identify security requirements
  2. Research and identify industry standard design methodologies utilised in security architecture design
  3. Determine required security level and perimeters, security features and security mode
  4. Establish all data types to be included in security architecture
  5. Document all security architecture findings and confirm with required personnel
Analyse an organisation’s operation and infrastructure to identify security requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Research and identify industry standard design methodologies utilised in security architecture design

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Determine required security level and perimeters, security features and security mode

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Establish all data types to be included in security architecture

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Document all security architecture findings and confirm with required personnel

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Design security architecture

  1. Establish and document specific requirements and features of security requirements
  2. Design and document security solution according to organisational requirements
  3. Submit documentation to required personnel for initial feedback
Establish and document specific requirements and features of security requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Design and document security solution according to organisational requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Submit documentation to required personnel for initial feedback

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Finalise security architecture

  1. Demonstrate security design utilises major industry standard design methodologies
  2. Demonstrate security design addresses organisational cyber security requirements
  3. Submit documentation to required personnel and seek and respond to feedback
Demonstrate security design utilises major industry standard design methodologies

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Demonstrate security design addresses organisational cyber security requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Submit documentation to required personnel and seek and respond to feedback

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessed

Teacher: ___________________________________ Date: _________

Signature: ________________________________________________

Comments:

 

 

 

 

 

 

 

 

Instructions to Assessors

Required Skills and Knowledge

The candidate must demonstrate the ability to complete the tasks outlined in the elements, performance criteria and foundation skills of this unit, including evidence of the ability to:

use methodologies to design at least one cyber security solution for an organisation on at least one occasion.

In the course of the above, the candidate must:

research and analyse industry standard design methodologies for designing security architecture

document finalised security solution.

The candidate must be able to demonstrate knowledge to complete the tasks outlined in the elements, performance criteria and foundation skills of this unit, including knowledge of:

industry standard cyber security design methodologies

principles of cyber security

principles of security architecture

different types of cyber security risks required to design security architecture

presenting security architecture in document form.