Copy and paste from the following data to produce each assessment task. Write these in plain English and spell out how, when and where the task is to be carried out, under what conditions, and what resources are needed. Include guidelines about how well the candidate has to perform a task for it to be judged satisfactory.
Required skills
analytical skills to undertake a network security risk assessment
initiative and enterprise skills to develop enterprise policies, strategies and procedures
literacy skills to:
interpret audit rules
produce security documentation
numeracy skills to undertake a cost-benefit comparison
technical skills to:
implement LAN, WLAN, VPN and WAN solutions
implement security strategies and configure network security software and hardware.
Required knowledge
characteristics of:
auditing and penetration testing techniques
configuration of routers and switches
security protocols, standards and data encryption
detailed knowledge of:
authentication issues
network protocols and operating systems
processes and techniques related to security perimeters and their functions
security threats, including eavesdropping, data interception, data corruption and data falsification
transmission control protocol or internet protocol (TCP/IP) protocols and applications
VPNs features, issues and functions
overview knowledge of:
audit and intrusion detection systems
LAN, WLAN and WAN
organisational issues surrounding security cryptography
screened subnets
virus detection software.
The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included.
Policies may include: | audit systems incident response procedures network intrusion detection systems. |
Standards, protocols and management systems may include: | AAA security access control lists, context-based control lists data over cable service interface specification domain name system security extensions generic routing encapsulation IEEE 802.11 Protocol standard for secure wireless local area network products internet group management protocol IP security protocol network port addresses translation (NAT or PAT) point-to-point network tunnelling protocol secure: electronic transactions multi-purpose internet mail extensions shell socket layer and transport layer security. |
Commercial and business requirements may include: | availability backup confidentiality firewalls hacking prevention integrity password logons. |
Framework components may include: | deployment of public key infrastructure (PKI), CA and key management services firewall technologies multi-platform directory services supporting relevant standards operating system capable of providing access control, audit services support for generalised security services interfaces, personnel security trusted hardware and operating system at selective desktops, servers, network points and mainframes. |
Hardware may include: | desktop and laptop computers, networked and stand-alone firewall devices network-monitoring appliances routers switches wired and wireless networks. |
Software may include: | audit encryption modules operating system packaged software but can be supplied from many varying vendors and can include security virus checking. |
System may include: | applications databases external service providers, such as internet service providers (ISPs) and digital certification suppliers gateways operating system servers. |
Copy and paste from the following performance criteria to create an observation checklist for each task. When you have finished writing your assessment tool every one of these must have been addressed, preferably several times in a variety of contexts. To ensure this occurs download the assessment matrix for the unit; enter each assessment task as a column header and place check marks against each performance criteria that task addresses.
Observation Checklist