Unit of Competency Mapping – Information for Teachers/Assessors – Information for Learners
ICTNWK511 Mapping and Delivery Guide
Manage network security
Version 1.0
Issue Date: April 2024
Qualification | - |
Unit of Competency | ICTNWK511 - Manage network security |
---|---|---|---|
Description | |||
Employability Skills | |||
Learning Outcomes and Application | This unit describes the skills and knowledge required to implement and manage security functions throughout a network.It applies to individuals with excellent information and communications technology (ICT) expertise who lead the development of strategic reviews of security and provide technical advice, guidance and leadership in resolution of specified problems.No licensing, legislative or certification requirements apply to this unit at the time of publication. | ||
Duration and Setting | X weeks, nominally xx hours, delivered in a classroom/online/blended learning setting. Gather evidence to demonstrate consistent performance in conditions that are safe and replicate the workplace. Noise levels, production flow, interruptions and time variances must be typical of those experienced in the network industry, and include access to: a site or prototype where network security may be implemented and managed network support tools currently used in industry organisational security policies, manufacturer recommendations and security standards. Assessors must satisfy NVR/AQTF assessor requirements. |
||
Prerequisites/co-requisites | |||
Competency Field |
Development and validation strategy and guide for assessors and learners | Student Learning Resources | Handouts Activities |
Slides PPT |
Assessment 1 | Assessment 2 | Assessment 3 | Assessment 4 | |
---|---|---|---|---|---|---|---|---|
Elements of Competency | Performance Criteria | |||||||
Element: Define a process for designing security |
| |||||||
Element: Identify threats to network security |
| |||||||
Element: Analyse security risks |
| |||||||
Element: Create a security design |
| |||||||
Element: Design and implement responses to security incidents |
|