Copy and paste from the following data to produce each assessment task. Write these in plain English and spell out how, when and where the task is to be carried out, under what conditions, and what resources are needed. Include guidelines about how well the candidate has to perform a task for it to be judged satisfactory.
Required skills
communication skills to liaise with client to determine functional requirements of network
literacy skills to document client requirements
problem-solving skills to troubleshoot and debug:
connectivity issues
security issues
research skills to determine most suitable solution for client
technical skills to:
design, develop and implement various wireless network solutions
implement wireless networking strategies and configure wireless network software and hardware
implement WLANs.
Required knowledge
features of security threats
overview knowledge of:
audit and intrusion detection systems
auditing and penetration testing techniques
authentication methods
network protocols and operating systems
security protocols, standards and data encryption
detailed knowledge of:
bandwidth and quality of service
factors affecting signal quality
layer 2 and layer 3 design issues
SOHO
transmission control protocol or internet protocol (TCP/IP) protocols and applications
wireless security strategies
wireless topologies
WLAN solutions.
The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included.
Client may include: | external organisations individuals internal departments internal employees. |
Organisational requirements may include: | preventative maintenance and diagnostic policy problem-solving processes roles and technical responsibilities in network management vendor and product service level support agreements work environment. |
Components may include: | wireless access and software hardware: asymmetric digital subscriber line (ADSL) modems antennas and other connectivity devices mobile equipment modems wireless access points networks personal computers power controllers remote sites servers UPS workstations cabling: category 5e category 6 category 7 coaxial and fibre. |
User may include: | department within the organisation person within a department third party community members. |
Network may include: | domestic small enterprise WLANs. |
Commercial and business requirements may include: | availability backup and recovery of data confidentiality firewalls hacking prevention integrity password logons remote access to internal network. |
Security may include: | AAA Diameter EAP or LEAP IPSec PKM smart cards SSL tokens WEP WPA or WPA2. |
Documentation may follow: | audit trails client training International Organization for Standardization (ISO), International Electrotechnical Commission (IEC) and Australian Standards (AS) standards maintaining equipment inventory naming standards project management templates and report writing satisfaction reports version control. |
Tools may include: | data and voice integration measurements network performance software. |
Copy and paste from the following performance criteria to create an observation checklist for each task. When you have finished writing your assessment tool every one of these must have been addressed, preferably several times in a variety of contexts. To ensure this occurs download the assessment matrix for the unit; enter each assessment task as a column header and place check marks against each performance criteria that task addresses.
Observation Checklist