Unit of Competency Mapping – Information for Teachers/Assessors – Information for Learners
ICTTEN8195A Mapping and Delivery Guide
Evaluate and apply network security
Version 1.0
Issue Date: May 2024
Qualification | - |
Unit of Competency | ICTTEN8195A - Evaluate and apply network security |
---|---|---|---|
Description | This unit describes the performance outcomes, skills and knowledge required to analyse the security features of an internet protocol (IP) based telecommunications network.This applies to IT networking and telecommunications networking topologies.No licensing, legislative, regulatory or certification requirements apply to this unit at the time of endorsement but users should confirm requirements with the relevant federal, state or territory authority. | ||
Employability Skills | This unit contains employability skills. | ||
Learning Outcomes and Application | Telecommunication engineers apply the skills and knowledge in this unit to analyse and report on the security of an ICT network, particularly Internet security.They are responsible for the evaluation of security of ICT networks using converging switching and transmission technologies in local area networks (LAN) and wide area networks (WAN), broadband networks, internet protocol TV (IPTV) and virtual networks. | ||
Duration and Setting | X weeks, nominally xx hours, delivered in a classroom/online/blended learning setting. |
||
Prerequisites/co-requisites | |||
Competency Field | Telecommunications networks engineering |
Development and validation strategy and guide for assessors and learners | Student Learning Resources | Handouts Activities |
Slides PPT |
Assessment 1 | Assessment 2 | Assessment 3 | Assessment 4 | |
---|---|---|---|---|---|---|---|---|
Elements of Competency | Performance Criteria | |||||||
Element: Analyse the operation of the Internet |
| |||||||
Element: Analyse internetwork protocols |
| |||||||
Element: Research and report internetwork operations |
| |||||||
Element: Analyse features and types of network security |
| |||||||
Element: Research features of public key authentication and email network security protocols |
| |||||||
Element: Research features of web, network management and system security |
| |||||||
Element: Document evaluation report |
|