The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!
From the Wiki University
What evidence can you provide to prove your understanding of each of the following citeria?
Prepare to assess security requirements
|
|
Job requirements are reviewed and clarified with appropriate person(s) in accordance with organisational requirements. Completed |
Evidence:
|
Discussions with customer are conducted to establish actual and potential security risks and clarify scope of work. Completed |
Evidence:
|
Effective interpersonal techniques are applied when interacting. Completed |
Evidence:
|
Site access and specific site requirements are identified and appropriate arrangements are made as required in accordance with client and organisational requirements. Completed |
Evidence:
|
Personal limitations in assessing security requirements are identified and assistance is sought from appropriate person(s), in accordance with organisational procedures. Completed |
Evidence:
|
Assess security requirements
|
|
Site restrictions, regulations and requirements are identified and complied with in accordance with legislative, client and organisational requirements. Completed |
Evidence:
|
Information is gathered from identified sources and is relevant to assignment requirements in accordance with legislative, client and organisational requirements. Completed |
Evidence:
|
A site assessment is carried out where possible to facilitate an accurate determination of security requirements. Completed |
Evidence:
|
Client assets, activities and existing security arrangements are reviewed to assess the level and range of security risk to client operations. Completed |
Evidence:
|
Weak points, risk areas and environmental factors affecting the security risk of the site are identified and assessed in accordance with organisational procedures. Completed |
Evidence:
|
Document security assessment
|
|
Information is recorded and stored in accordance with manufacturer specifications and organisational procedures. Completed |
Evidence:
|
A comprehensive assessment of client security requirements is completed within designated timeframes and presented for review to appropriate person(s). Completed |
Evidence:
|
A security survey is prepared in accordance with industry and organisational standards of style, format and accuracy. Completed |
Evidence:
|
Recommendations for security equipment/systems and alternative options are made in accordance with organisational requirements. Completed |
Evidence:
|
Documentation is processed in accordance with legislative, assignment and organisational requirements. Completed |
Evidence:
|