Unit of Competency Mapping – Information for Teachers/Assessors – Information for Learners
ICTNWK608 Mapping and Delivery Guide
Configure network devices for a secure network infrastructure
Version 1.0
Issue Date: May 2024
Qualification | - |
Unit of Competency | ICTNWK608 - Configure network devices for a secure network infrastructure |
---|---|---|---|
Description | |||
Employability Skills | |||
Learning Outcomes and Application | This unit describes the skills and knowledge required to use software tools, equipment and protocols to configure network devices in the design of the infrastructure of a secure network.It applies to individuals with advanced information and communications technology (ICT) skills who adapt router and switch operating system capabilities to mitigate attacks.No licensing, legislative or certification requirements apply to this unit at the time of publication. | ||
Duration and Setting | X weeks, nominally xx hours, delivered in a classroom/online/blended learning setting. Gather evidence to demonstrate consistent performance in conditions that are safe and replicate the workplace. Noise levels, production flow, interruptions and time variances must be typical of those experienced in the networking industry, and include access to: a site or prototype where network security may be evaluated and tightened hardware and software organisational guidelines, procedures and policies computers hardware and software LAN and WLAN internetwork technologies hardware and software security technologies. Assessors must satisfy NVR/AQTF assessor requirements |
||
Prerequisites/co-requisites | |||
Competency Field |
Development and validation strategy and guide for assessors and learners | Student Learning Resources | Handouts Activities |
Slides PPT |
Assessment 1 | Assessment 2 | Assessment 3 | Assessment 4 | |
---|---|---|---|---|---|---|---|---|
Elements of Competency | Performance Criteria | |||||||
Element: Implement layer 2 security |
| |||||||
Element: Configure router OS intrusion prevention system (OS-IPS) to mitigate threats to network resources |
| |||||||
Element: Configure virtual private networks (VPNs) to provide secure connectivity for site-to-site and remote access communications |
| |||||||
Element: Implement network foundation protection (NFP) |
|