Google Links

Follow the links below to find material targeted to the unit's elements, performance criteria, required skills and knowledge

Elements and Performance Criteria

  1. Determine authentication requirements
  2. Configure authentication software or tools
  3. Apply authentication methods
  4. Monitor authentication system

Knowledge Evidence

To complete the unit requirements safely and effectively, the individual must:

summarise the problems and challenges dealing with organisational authentication issues, including resource accounting through authentication

discuss common virtual private network (VPN) issues, including:

quality of service (QoS) considerations

bandwidth

dynamic security environment

function and operation of VPN concepts

outline authentication adaptors

summarise biometric authentication adaptors

summarise digital certificates, such as VeriSign, X.509, and SSL

explain the function and operation of authentication controls including:

passwords

personal identification numbers (PINs)

smart cards

biometric devices

other authentication protocols

outline network authentication services, such as Kerberos and NT LAN Manager (NTLM)

summarise the features of common password protocols, such as:

challenge handshake authentication protocol (CHAP)

challenge phrases

password authentication protocol (PAP)

remote authentication dial-in user service (RADIUS) authentication

describe the principles of security tokens.