NTISthis.com

Evidence Guide: ICTNWK546 - Manage network security

Student: __________________________________________________

Signature: _________________________________________________

Tips for gathering evidence to demonstrate your skills

The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!

From the Wiki University

 

ICTNWK546 - Manage network security

What evidence can you provide to prove your understanding of each of the following citeria?

Plan security design process

  1. Define planning phase for network security design according to organisational requirements
  2. Define building phase for network security design according to organisational requirements
  3. Define managing phase for network security design according to organisational requirements
Define planning phase for network security design according to organisational requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Define building phase for network security design according to organisational requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Define managing phase for network security design according to organisational requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Identify threats to network security

  1. Determine major threat themes to network security
  2. Determine the potential origin of major threats according to network security design specifications
  3. Identify industry standard common network vulnerability types
  4. Design and document threat model according to network security design specifications
Determine major threat themes to network security

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Determine the potential origin of major threats according to network security design specifications

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Identify industry standard common network vulnerability types

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Design and document threat model according to network security design specifications

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Analyse security risks

  1. Identify organisational assets requiring protection
  2. Categorise and document assets and determine their value according to organisational requirements
  3. Determine and document risk management plan according to organisational requirements
Identify organisational assets requiring protection

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Categorise and document assets and determine their value according to organisational requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Determine and document risk management plan according to organisational requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Create a security design

  1. Determine attacker scenarios and threats according to network security design specifications
  2. Design and document network components security measures
  3. Develop and document security policies
  4. Submit document to required personnel and seek and respond to feedback
Determine attacker scenarios and threats according to network security design specifications

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Design and document network components security measures

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Develop and document security policies

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Submit document to required personnel and seek and respond to feedback

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Design security incidents response

  1. Design and document auditing and incidents response procedure
  2. Submit to required personnel, seek and respond to feedback
Design and document auditing and incidents response procedure

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Submit to required personnel, seek and respond to feedback

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessed

Teacher: ___________________________________ Date: _________

Signature: ________________________________________________

Comments:

 

 

 

 

 

 

 

 

Instructions to Assessors

Required Skills and Knowledge

The candidate must demonstrate the ability to complete the tasks outlined in the elements, performance criteria and foundation skills of this unit, including evidence of the ability to:

evaluate security information and use it to plan control methods and countermeasures to manage prescribed network security requirements on at least one occasion.

In the course of the above, the candidate must:

document plans, policies and processes.

The candidate must be able to demonstrate knowledge to complete the tasks outlined in the elements, performance criteria and foundation skills of this unit, including knowledge of:

industry standard ICT networks and their configuration

network attacks, vulnerabilities and related weaknesses of installed infrastructure, including:

security technologies

emerging security issues

network security measures, including:

auditing and penetration testing techniques

logging analysis techniques

organisational network infrastructure

capabilities of software and hardware solutions

general features of emerging security policies, with depth in security procedures

network management and security process controls

network security implementation risk management plans and procedures, including:

network security planning

implementation

cost analysis and budgeting.