NTISthis.com

Evidence Guide: ICTNWK421 - Install, configure and test network security

Student: __________________________________________________

Signature: _________________________________________________

Tips for gathering evidence to demonstrate your skills

The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!

From the Wiki University

 

ICTNWK421 - Install, configure and test network security

What evidence can you provide to prove your understanding of each of the following citeria?

Assess network security threats and vulnerabilities

  1. Review current system security against organisational asset security requirements to identify security threats and vulnerabilities
  2. Analyse network, software, hardware and system security threats and vulnerabilities to prioritise deficiencies to be addressed
  3. Make recommendations to management to address security deficiencies according to organisational asset security requirements
Review current system security against organisational asset security requirements to identify security threats and vulnerabilities

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Analyse network, software, hardware and system security threats and vulnerabilities to prioritise deficiencies to be addressed

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Make recommendations to management to address security deficiencies according to organisational asset security requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Implement countermeasures for identified threats and vulnerabilities

  1. Implement required level of perimeter security to meet organisational asset security requirements and according to identified threats and vulnerabilities
  2. Assess and implement server and network hardening techniques and measures
  3. Implement secure authentication and user account controls to secure data integrity and transmission
Implement required level of perimeter security to meet organisational asset security requirements and according to identified threats and vulnerabilities

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assess and implement server and network hardening techniques and measures

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Implement secure authentication and user account controls to secure data integrity and transmission

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Test and verify functionality and performance of countermeasures implemented

  1. Design function and performance test items to verify key functions and performance of countermeasures
  2. Conduct function and performance tests to modify and debug countermeasures
  3. Develop documentation on the current system settings and file according to organisational guidelines
Design function and performance test items to verify key functions and performance of countermeasures

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Conduct function and performance tests to modify and debug countermeasures

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Develop documentation on the current system settings and file according to organisational guidelines

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Maintain and improve network security

  1. Review logs and audit reports to identify and record security incidents, intrusions and attempts
  2. Carry out spot checks and audits to ensure that procedures are not being bypassed
  3. Document newly discovered security threats vulnerabilities and recommendations in a report for presentation to superior to gain approval recommendations to be implemented
Review logs and audit reports to identify and record security incidents, intrusions and attempts

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Carry out spot checks and audits to ensure that procedures are not being bypassed

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Document newly discovered security threats vulnerabilities and recommendations in a report for presentation to superior to gain approval recommendations to be implemented

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessed

Teacher: ___________________________________ Date: _________

Signature: ________________________________________________

Comments:

 

 

 

 

 

 

 

 

Instructions to Assessors

Required Skills and Knowledge