Unit of Competency Mapping – Information for Teachers/Assessors – Information for Learners
ICTNWK503 Mapping and Delivery Guide
Install and maintain valid authentication processes
Version 1.0
Issue Date: May 2024
Qualification | - |
Unit of Competency | ICTNWK503 - Install and maintain valid authentication processes |
---|---|---|---|
Description | |||
Employability Skills | |||
Learning Outcomes and Application | This unit describes the skills and knowledge required to design, develop, install and maintain authentication processes to reduce the vulnerability of the system.It applies to individuals working as middle managers such as information security managers, network engineers or security analysts, who are responsible for implementing and monitoring the organisational security management system.No licensing, legislative or certification requirements apply to this unit at the time of publication. | ||
Duration and Setting | X weeks, nominally xx hours, delivered in a classroom/online/blended learning setting. Gather evidence to demonstrate consistent performance in conditions that are safe and replicate the workplace. Noise levels, production flow, interruptions and time variances must be typical of those experienced in the network industry, and include access to: a site or prototype where network authentication may be implemented and managed network support tools currently used in industry organisational security policies related to authentication manufacturers recommendations current authentication standards, including biometric authentication adaptors. Assessors must satisfy NVR/AQTF assessor requirements. |
||
Prerequisites/co-requisites | |||
Competency Field |
Development and validation strategy and guide for assessors and learners | Student Learning Resources | Handouts Activities |
Slides PPT |
Assessment 1 | Assessment 2 | Assessment 3 | Assessment 4 | |
---|---|---|---|---|---|---|---|---|
Elements of Competency | Performance Criteria | |||||||
Element: Determine authentication requirements |
| |||||||
Element: Configure authentication software or tools |
| |||||||
Element: Apply authentication methods |
| |||||||
Element: Monitor authentication system |
|