Unit of Competency Mapping – Information for Teachers/Assessors – Information for Learners
ICTTEN811 Mapping and Delivery Guide
Evaluate and apply network security
Version 1.0
Issue Date: May 2024
Qualification | - |
Unit of Competency | ICTTEN811 - Evaluate and apply network security |
---|---|---|---|
Description | |||
Employability Skills | |||
Learning Outcomes and Application | This unit describes the skills and knowledge required to evaluate security of information communications technology (ICT) networks, using converging switching and transmission technologies in local area networks (LAN) and wide area networks (WAN), broadband networks, internet protocol TV (IPTV) and virtual networks.It applies to individuals with excellent communication and IT skills working as telecommunications engineers.No licensing, legislative or certification requirements apply to this unit at the time of publication. | ||
Duration and Setting | X weeks, nominally xx hours, delivered in a classroom/online/blended learning setting. Gather evidence to demonstrate consistent performance in conditions that are safe and replicate the workplace. Noise levels, production flow, interruptions and time variances should be typical of those experienced in the telecommunications networks engineering field of work and include access to: a telecommunications operations site a mentor or supervisor appropriately experienced in relevant telecommunications technology and infrastructure networked computers and relevant software. Assessors of this unit must satisfy the requirements for assessors in applicable vocational education and training legislation, frameworks and/or standards. |
||
Prerequisites/co-requisites | |||
Competency Field |
Development and validation strategy and guide for assessors and learners | Student Learning Resources | Handouts Activities |
Slides PPT |
Assessment 1 | Assessment 2 | Assessment 3 | Assessment 4 | |
---|---|---|---|---|---|---|---|---|
Elements of Competency | Performance Criteria | |||||||
Element: Analyse operation of the internet |
| |||||||
Element: Analyse internetwork protocols |
| |||||||
Element: Research and report internetwork operations |
| |||||||
Element: Analyse features and types of network security |
| |||||||
Element: Research features of public key authentication and email network security protocols |
| |||||||
Element: Research features of web, network management and system security |
| |||||||
Element: Document evaluation report |
|