Google Links
Follow the links below to find material targeted to the unit's elements, performance criteria, required skills and knowledge
Performance Evidence
identify threats to perimeter securitydevelop design for a secure perimeterdeploy perimeter to meet security requirementsdesign and configure advanced features of perimeter devices to provide additional servicesdesign and configure an integrated VPN solutionconduct exhaustive testing of perimeter.Note: If a specific volume or frequency is not stated, then evidence must be provided at least once.
Knowledge Evidence
To complete the unit requirements safely and effectively, the individual must:
identify and describe emerging security issues and the need for security policiesdescribe the security perimeter issues related to networks, including:auditing and penetration testing techniquescapabilities of software and hardware perimeter solutionslogging analysis techniquesorganisational network infrastructuresecurity technologies according to perimeter designweaknesses of installed perimeter design.