The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!
From the Wiki University
What evidence can you provide to prove your understanding of each of the following citeria?
Analyse the operation of the Internet
|
|
Evaluate the interrelationship of IP to open systems interconnect (OSI) seven layer model and the impact on network topologies and network elements Completed |
Evidence:
|
Assess media access control (MAC) and IP addressing and their application in security Completed |
Evidence:
|
Report on transmission control protocol/internet protocol (TCP/IP) operations and the use of transport protocols for transmitting data over the network Completed |
Evidence:
|
Examine the various types of routing protocols and implication on security Completed |
Evidence:
|
Analyse forms of label switching as applied to data packets Completed |
Evidence:
|
Use software to simulate the least cost algorithms Completed |
Evidence:
|
Analyse internetwork protocols
|
|
Compare connection-oriented and connection-less networks in internetworking applications Completed |
Evidence:
|
Research the design parameters used in networks Completed |
Evidence:
|
Produce a report on IP multi-casting protocols and systems including IP frame fields of the data frames Completed |
Evidence:
|
Research and report internetwork operations
|
|
Analyse protocol considerations of voice over internet protocol (VoIP) Completed |
Evidence:
|
Research the protocols G723.1, G729 and G729A standards and evaluate their application in internetworking Completed |
Evidence:
|
Determine the format of JPEG and GIF files as applied to still pictures Completed |
Evidence:
|
Determine the format of MPEG-2 and H.32x series multimedia protocols for motion pictures Completed |
Evidence:
|
Evaluate the features of different of multi-service protocols and of different email system protocols in networking operations Completed |
Evidence:
|
Produce a report on the features the different web-based protocols used in internetworking operations Completed |
Evidence:
|
Analyse features and types of network security
|
|
Analyse procedures and processes used for security attacks and use of protection mechanisms Completed |
Evidence:
|
Research conventional encryption algorithms and determine possible locations of encryption devices Completed |
Evidence:
|
Produce a report on conventional encryption key distribution problems and how message authentication and verification is achieved Completed |
Evidence:
|
Research one-way hashing and secure hashing functions Completed |
Evidence:
|
Produce a report on digital signature standard (DSS) principles including public key cryptography algorithms for network security Completed |
Evidence:
|
Research features of public key authentication and email network security protocols
|
|
Research public key authentication using Kerberos Completed |
Evidence:
|
Analyse how electronic mail security is achieved using pretty good privacy (PGP) Completed |
Evidence:
|
Research and report on IPSec protocol security Completed |
Evidence:
|
Produce a report on encapsulating security payload (ESP) including Internet key management processes Completed |
Evidence:
|
Research features of web, network management and system security
|
|
Analyse how web threats and attacks occur in an IP network and determine system intruders and threats Completed |
Evidence:
|
Research the operation of transaction protocols Completed |
Evidence:
|
Evaluate the processes used for selection and protection of system passwords Completed |
Evidence:
|
Evaluate system threats and methods used to counter act the threats Completed |
Evidence:
|
Produce a report on anti-virus protection strategies, including firewall design principles, types and configurations Completed |
Evidence:
|
Document evaluation report
|
|
Present a final report to include research and evaluation of network security management principles and the application to the network in the workplace with enhancement recommendations Completed |
Evidence:
|