NTISthis.com

Evidence Guide: TLIK4008A - Implement and monitor network security

Student: __________________________________________________

Signature: _________________________________________________

Tips for gathering evidence to demonstrate your skills

The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!

From the Wiki University

 

TLIK4008A - Implement and monitor network security

What evidence can you provide to prove your understanding of each of the following citeria?

Identify threats

  1. Implement risk analysis of security threats faced by organisation network
  2. Evaluate and identify internal and external threats to network such as hackers, eavesdropping and viruses
Implement risk analysis of security threats faced by organisation network

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Evaluate and identify internal and external threats to network such as hackers, eavesdropping and viruses

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Identify appropriate controls

  1. Plans for cost effective improvements to network security are presented to management for approval and authorisation
  2. External or intra network security devices and controls such as firewalls are presented to management for approval
  3. Controls to add to the network to manage elements such as user access or hackers, eavesdropping and viruses are identified
Plans for cost effective improvements to network security are presented to management for approval and authorisation

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

External or intra network security devices and controls such as firewalls are presented to management for approval

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Controls to add to the network to manage elements such as user access or hackers, eavesdropping and viruses are identified

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Implement security

  1. Approved equipment and controls are installed and configured to provide required levels of security
  2. Recommendations are made for additional equipment and updates to maintain security integrity
Approved equipment and controls are installed and configured to provide required levels of security

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Recommendations are made for additional equipment and updates to maintain security integrity

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessed

Teacher: ___________________________________ Date: _________

Signature: ________________________________________________

Comments:

 

 

 

 

 

 

 

 

Instructions to Assessors

Evidence Guide

The evidence guide provides advice on assessment and must be read in conjunction with the performance criteria, required knowledge and skills, the range statement and the assessment guidelines for this Training Package.

Critical aspects for assessment and evidence required to demonstrate competency in this unit

The evidence required to demonstrate competency in this unit must be relevant to and satisfy all of the requirements of the elements and performance criteria of this unit and include demonstration of applying:

the underpinning knowledge and skills

relevant legislation and workplace procedures

other relevant aspects of the range statement

Context of and specific resources for assessment

Performance is demonstrated consistently over a period of time and in a suitable range of contexts

Resources for assessment include:

a range of relevant exercises, case studies and/or other simulated practical and knowledge assessment, and/or

access to an appropriate range of relevant operational situations in the workplace

In both real and simulated environments, access is required to:

relevant and appropriate materials and equipment, and

applicable documentation including workplace procedures, regulations, codes of practice and operation manuals

Method of assessment

Assessment of this unit must be undertaken by a registered training organisation

As a minimum, assessment of knowledge must be conducted through appropriate written/oral tests

Practical assessment must occur:

through activities in an appropriately simulated environment at the registered training organisation, and/or

in an appropriate range of situations in the workplace

Required Skills and Knowledge

REQUIRED KNOWLEDGE AND SKILLS

This describes the essential knowledge and skills and their level required for this unit.

Required knowledge:

Relevant sections of national and state or territory regulatory requirements and codes of practice

Current industry accepted hardware and software products with broad knowledge of general features and capabilities

Broad general knowledge of the client business domain, business function and organisation

Networking technologies, with broad knowledge of general features and capabilities incorporating substantial depth in some areas

Risk analysis, with broad knowledge of general features incorporating substantial depth in some areas

Specific security technology, with broad knowledge of general features incorporating substantial depth in some areas

Procedures for operating electronic communications equipment

Requirements for completing relevant documentation

Code of practice for working collaboratively with others

Typical defects that can occur and related action that should be taken

Procedures for identifying equipment defects and assessing for appropriate action

Principles, purpose and location of controls, monitoring devices, and systems

Steps involved in planning the work activities

Procedures for adjusting controls to optimise the operation of the equipment

Sources of information on differences in equipment and related standard operating and servicing procedures

Required skills:

Use plain English literacy and communication skills in relation to analysis, evaluation and presentation of information

Use questioning and active listening skills

Read and interpret instructions, procedures, information and signs relevant to work activities

Write reports for business requiring depth in some areas, analysis and evaluation of information in a defined range of areas

Complete documentation related to work activities

Operate electronic communication and other equipment to required protocol

Work collaboratively with others

Solve problems for a defined range of unpredictable problems involving participation in the development of strategic initiatives

Use research to identify, analyse and evaluate broad features of a particular business domain and best practice in network security methodologies and technologies

Project plan in relation to scope, time, cost, quality, communications and risk management

Adapt appropriately to cultural differences in the workplace, including modes of behaviour and interactions with others

Promptly report and/or rectify any identified problems, faults or malfunctions in accordance with regulatory requirements and workplace procedures

Monitor work activities in terms of planned schedule

Monitor performance of equipment

Range Statement

The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance.

Software most likely to be:

packaged software

supplied from many varying vendors

security, audit, virus checking and encryption modules

Depending on the organisation concerned, workplace procedures may be called:

standard operating procedures (SOPs)

company procedures

enterprise procedures

organisational procedures

established procedures

Communication in the work area may include:

phone

electronic data interchange (EDI)

fax

email

internet

intranet

RF systems

oral, aural or signed communications

Consultative processes may involve:

other employees and supervisors

suppliers of network security equipment

relevant authorities and institutions

management

Documentation and records may include:

quality assurance procedures

emergency procedures

operations manuals

manufacturers specifications for network equipment

technical instructions

relevant Australian Standards and certification requirements