Unit of Competency Mapping – Information for Teachers/Assessors – Information for Learners
ICTNWK601 Mapping and Delivery Guide
Design and implement a security system
Version 1.0
Issue Date: July 2024
Qualification | - |
Unit of Competency | ICTNWK601 - Design and implement a security system |
---|---|---|---|
Description | |||
Employability Skills | |||
Learning Outcomes and Application | This unit describes the skills and knowledge required to use software tools, equipment and protocols to implement a security system.It applies to individuals who plan and implement networks, are involved in business budgeting, and determine and resolve network security threats.No licensing, legislative or certification requirements apply to this unit at the time of publication. | ||
Duration and Setting | X weeks, nominally xx hours, delivered in a classroom/online/blended learning setting. Gather evidence to demonstrate consistent performance in conditions that are safe and replicate the workplace. Noise levels, production flow, interruptions and time variances must be typical of those experienced in the network industry, and include access to: a site where network security may be evaluated and tightened hardware and software organisational guidelines, procedures and policies computers LAN or WLAN internet work technologies (hardware and software) security technologies (hardware and software). Assessors must satisfy NVR/AQTF assessor requirements. |
||
Prerequisites/co-requisites | |||
Competency Field |
Development and validation strategy and guide for assessors and learners | Student Learning Resources | Handouts Activities |
Slides PPT |
Assessment 1 | Assessment 2 | Assessment 3 | Assessment 4 | |
---|---|---|---|---|---|---|---|---|
Elements of Competency | Performance Criteria | |||||||
Element: Assess the security threats facing network Infrastructure |
| |||||||
Element: Secure edge devices (routers) |
| |||||||
Element: Implement authentication, authorisation and accounting (AAA) and secure access control system (ACS) |
| |||||||
Element: Mitigate threats to routers and networks using access control lists (ACLs) |
| |||||||
Element: Implement secure network management and reporting |
| |||||||
Element: Mitigate common layer 2 attacks |
| |||||||
Element: Implement the router OS firewall-feature set |
| |||||||
Element: Implement the intrusion detection and prevention system (IDPS) feature set in the router OS using secure device manager (SDM) |
| |||||||
Element: Implement site-to-site virtual private networks (VPNs) using SDM |
|