Copy and paste from the following data to produce each assessment task. Write these in plain English and spell out how, when and where the task is to be carried out, under what conditions, and what resources are needed. Include guidelines about how well the candidate has to perform a task for it to be judged satisfactory.
Required skills
communication skills to liaise with internal and external personnel on technical, operational and business-related matters
numeracy skills to:
take test measurements
interpret results
evaluate performance
planning and organisational skills to plan, prioritise and monitor own work
research skills to interrogate vendor databases and websites
technical skills to:
write hypertext markup language (HTML)
write JavaScript and VBScript.
Required knowledge
client business domain, including client organisation structure and business functionality
current industry-accepted hardware and software products
desktop applications and operating systems as required
firewall functionality
hypertext transfer protocol (HTTP) daemons
secure socket layer (SSL) protocol
security patches
specific purpose security computers acting as bastion hosts
web-server operating systems.
The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included.
Business requirements may refer to: | business network people in the organisation system. |
Server may include: | application or web servers building environmental assessment (BEA) weblogic servers email servers file and print servers firewall servers file transfer protocol (FTP) servers IBM VisualAge and WebSphere Novell Directory Services (NDS) servers proxy or cache servers. |
Intrusion detection system may include: | Cisco HP Symantec Tripwire. |
User may include: | department within the organisation person within a department third party. |
Connection may include: | asymmetric digital subscriber line (ADSL) cable fixed line. |
Network may include: | data internet large and small local area networks (LANs) national wide area networks (WANs) private lines use of the public switched telephone network (PSTN) for dial-up modems only voice. |
Security protocols may include: | data over cable service interface specification domain name system security extensions IEEE 802.11 Protocol standard for secure wireless local area network products internet protocol security (IPSec) point-to-point network tunnelling protocol (PPTP)/Layer 2 tunnelling protocol (L2TP) secure electronic transactions secure multipurpose internet mail extensions secure shell SSL and transport layer security. |
Copy and paste from the following performance criteria to create an observation checklist for each task. When you have finished writing your assessment tool every one of these must have been addressed, preferably several times in a variety of contexts. To ensure this occurs download the assessment matrix for the unit; enter each assessment task as a column header and place check marks against each performance criteria that task addresses.
Observation Checklist