Elements and Performance Criteria
- Analyse operation of the internet
- Evaluate the interrelationship of IP to open systems interconnect (OSI) seven layer model and the impact on network topologies and network elements
- Assess media access control (MAC) and IP addressing, and their application in security
- Report on transmission control protocol/internet protocol (TCP/IP) operations and use of transport protocols for transmitting data over the network
- Examine various types of routing protocols and the implications on security
- Analyse forms of label switching as applied to data packets
- Use software to simulate least-cost algorithms
- Analyse internetwork protocols
- Research and report internetwork operations
- Analyse protocol considerations of voice over internet protocol (VoIP)
- Research protocols G723.1, G729 and G729A standards and evaluate their application in internetworking
- Determine the format of JPEG and GIF files as applied to still pictures
- Determine the format of MPEG-2 and H.32x series multimedia protocols for motion pictures
- Evaluate features of different of multi-service protocols and of different email system protocols in networking operations
- Produce a report on features different web-based protocols used in internetworking operations
- Analyse features and types of network security
- Analyse procedures and processes used for security attacks and use of protection mechanisms
- Research conventional encryption algorithms and determine possible locations of encryption devices
- Produce a report on conventional encryption key distribution problems and how message authentication and verification is achieved
- Research one-way hashing and secure hashing functions
- Produce a report on digital signature standard (DSS) principles, including public key cryptography algorithms for network security
- Research features of public key authentication and email network security protocols
- Research features of web, network management and system security
- Analyse how web threats and attacks occur in an IP network and determine system intruders and threats
- Research operation of transaction protocols
- Evaluate processes used for selection and protection of system passwords
- Evaluate system threats and methods used to counteract the threats
- Produce a report on anti-virus protection strategies, including firewall design principles, types and configurations
- Document evaluation report