Google Links
Follow the links below to find material targeted to the unit's elements, performance criteria, required skills and knowledge
Required Skills
anticipate and respond to a range of attacks
identify and interrogate complex and varied areas of attack
develop and refine security of the network
resolve network vulnerabilities
test network functions and security
processes and techniques related to using network tools
Evidence Required
Range Statement
Command line tools may include: | arparpingdighostnameifconfigipconfigmtrnbtstatnetstatnslookupPingroutetraceroute. |
GUI environment may include: | Linux platformsMac platformsWindows platforms. |
Hardware tools may include: | butt setcable strippercable testersmultimeteroptical time-domain reflectometer (OTDR)protocol analyserpunch down toolsnipstemperature monitortime-domain reflectometer (TDR)toner probevoltage event recorder. |
Software tools may include: | intrusion detection softwareintrusion prevention softwarepacket sniffers or network analysersport scannersprotocol analysers. |
Areas of vulnerability may include: | exploitsunsecured portswide-scale attacksworms. |