Google Links

Follow the links below to find material targeted to the unit's elements, performance criteria, required skills and knowledge

Elements and Performance Criteria

  1. Assess network security threats and vulnerabilities to identify risk
  2. Implement countermeasures for identified vulnerabilities and threats
  3. Test and verify functionality and performance of security system implemented
  4. Provide systems for monitoring and maintaining security

Performance Evidence

Evidence of the ability to:

assess and identify security threats, vulnerabilities and risks

determine appropriate countermeasure for threat, vulnerability or risk

implement countermeasure per threat or risk

install, configure and test network elements to ensure perimeter security

test and verify function and performance of selected security measures

monitor network for suspicious activity and take appropriate action where necessary

document newly discovered threats, vulnerabilities and risks, including change recommendations for approval.

Note: If a specific volume or frequency is not stated, then evidence must be provided at least once.


Knowledge Evidence

To complete the unit requirements safely and effectively, the individual must:

outline authentication issues

summarise the security requirements of the client business domain, including:

organisation structure and business functionality

features and capabilities of networking technologies

privacy issues and privacy legislation

security information sources

risk analysis

outline common virtual private network (VPN) issues, including bandwidth and dynamic security environment

explain how to configure routers and switches

summarise current industry accepted hardware and software security products, including general features and capabilities

outline the function and operation of VPN concepts, including encryption, firewalls, packet tunnelling and authentication

outline network protocols and operating systems

summarise organisational issues surrounding security

outline security perimeters and their functions

describe security protocols, standards and data encryption

summarise security threats, including eavesdropping, data interception, data corruption and data falsification

outline types of VPNs, including site-to-site and user-to-site internet traffic and extranets

summarise the systems and procedures related to:

audit and intrusion detection systems

auditing and penetration testing techniques

cryptography

local area network (LAN), wireless local area network (WLAN) and wide area network (WAN)

screened subnets

transmission control protocols or internet protocols (TCPs/IPs) and applications

use of virus detection software.