List the assessment methods to be used and the context and resources required for assessment. Copy and paste the relevant sections from the evidence guide below and then re-write these in plain English.
ELEMENT | PERFORMANCE CRITERIA |
Elements describe the essential outcomes. | Performance criteria describe the performance needed to demonstrate achievement of the element. |
1. Analyse operation of the internet | 1.1 Evaluate the interrelationship of IP to open systems interconnect (OSI) seven layer model and the impact on network topologies and network elements 1.2 Assess media access control (MAC) and IP addressing, and their application in security 1.3 Report on transmission control protocol/internet protocol (TCP/IP) operations and use of transport protocols for transmitting data over the network 1.4 Examine various types of routing protocols and the implications on security 1.5 Analyse forms of label switching as applied to data packets 1.6 Use software to simulate least-cost algorithms |
2. Analyse internetwork protocols | 2.1 Compare connection-oriented and connection-less networks in internetworking applications 2.2 Research design parameters used in networks 2.3 Produce a report on IP multi-casting protocols and systems, including IP frame fields of data frames |
3. Research and report internetwork operations | 3.1 Analyse protocol considerations of voice over internet protocol (VoIP) 3.2 Research protocols G723.1, G729 and G729A standards and evaluate their application in internetworking 3.3 Determine the format of JPEG and GIF files as applied to still pictures 3.4 Determine the format of MPEG-2 and H.32x series multimedia protocols for motion pictures 3.5 Evaluate features of different of multi-service protocols and of different email system protocols in networking operations 3.6 Produce a report on features different web-based protocols used in internetworking operations |
4. Analyse features and types of network security | 4.1 Analyse procedures and processes used for security attacks and use of protection mechanisms 4.2 Research conventional encryption algorithms and determine possible locations of encryption devices 4.3 Produce a report on conventional encryption key distribution problems and how message authentication and verification is achieved 4.4 Research one-way hashing and secure hashing functions 4.5 Produce a report on digital signature standard (DSS) principles, including public key cryptography algorithms for network security |
5. Research features of public key authentication and email network security protocols | 5.1 Research public key authentication using Kerberos 5.2 Analyse how electronic mail security is achieved using pretty good privacy (PGP) 5.3 Research and report on internet protocol security (IPSec) 5.4 Produce a report on encapsulating security payload (ESP), including internet key management processes |
6. Research features of web, network management and system security | 6.1 Analyse how web threats and attacks occur in an IP network and determine system intruders and threats 6.2 Research operation of transaction protocols 6.3 Evaluate processes used for selection and protection of system passwords 6.4 Evaluate system threats and methods used to counteract the threats 6.5 Produce a report on anti-virus protection strategies, including firewall design principles, types and configurations |
7. Document evaluation report | 7.1 Present a final report to include research and evaluation of network security management principles and network application in the workplace with enhancement recommendations |
Evidence of ability to:
investigate and report on protocols used for data transmission over IP networks
investigate and report on network security in terms of internet protocols, digital signature standard (DSS) principles and asymmetric key cryptography on IP networks
research and report features of web, network management and system security management in IP networks
recommend enhancements to security management in IP networks.
Note: If a specific volume or frequency is not stated, then evidence must be provided at least once.
To complete the unit requirements safely and effectively, the individual must:
explain administrative network management systems
evaluate algorithms used in IP network security
specify the purpose of cryptography in security systems
explain encapsulation and encryption in data transmission
describe examples of enterprise solutions
explain firewalls
outline common network topologies
summarise operations network management systems
explain routing theory
explain and give examples of system threats
outline transaction protocols.
Gather evidence to demonstrate consistent performance in conditions that are safe and replicate the workplace. Noise levels, production flow, interruptions and time variances should be typical of those experienced in the telecommunications networks engineering field of work and include access to:
a telecommunications operations site
a mentor or supervisor appropriately experienced in relevant telecommunications technology and infrastructure
networked computers and relevant software.
Assessors of this unit must satisfy the requirements for assessors in applicable vocational education and training legislation, frameworks and/or standards.