Google Links
Follow the links below to find material targeted to the unit's elements, performance criteria, required skills and knowledge
Elements and Performance Criteria
Performance Evidence
Knowledge Evidence
To complete the unit requirements safely and effectively, the individual must:
outline authentication issuessummarise the security requirements of the client business domain, including:organisation structure and business functionalityfeatures and capabilities of networking technologiesprivacy issues and privacy legislationsecurity information sourcesrisk analysisoutline common virtual private network (VPN) issues, including bandwidth and dynamic security environmentexplain how to configure routers and switchessummarise current industry accepted hardware and software security products, including general features and capabilitiesoutline the function and operation of VPN concepts, including encryption, firewalls, packet tunnelling and authenticationoutline network protocols and operating systemssummarise organisational issues surrounding securityoutline security perimeters and their functionsdescribe security protocols, standards and data encryptionsummarise security threats, including eavesdropping, data interception, data corruption and data falsificationoutline types of VPNs, including site-to-site and user-to-site internet traffic and extranetssummarise the systems and procedures related to:audit and intrusion detection systemsauditing and penetration testing techniquescryptographylocal area network (LAN), wireless local area network (WLAN) and wide area network (WAN)screened subnetstransmission control protocols or internet protocols (TCPs/IPs) and applicationsuse of virus detection software.