NTISthis.com

Evidence Guide: CPPSEC4017A - Determine security system configurations

Student: __________________________________________________

Signature: _________________________________________________

Tips for gathering evidence to demonstrate your skills

The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!

From the Wiki University

 

CPPSEC4017A - Determine security system configurations

What evidence can you provide to prove your understanding of each of the following citeria?

Research system requirements.

  1. Applicable provisions of legislative and organisational requirements relevant to designing networked security system configurations are identified and complied with.
  2. Assignment instructions and other relevant information is obtained and reviewed.
  3. Consultative processes are conducted with relevant persons to determine security system requirements.
  4. Risk assessment is conducted to identify actual and potential security risk in workplace environment.
  5. Appropriate controls and implementation methods are formulated and incorporated into security system design.
Applicable provisions of legislative and organisational requirements relevant to designing networked security system configurations are identified and complied with.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assignment instructions and other relevant information is obtained and reviewed.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Consultative processes are conducted with relevant persons to determine security system requirements.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Risk assessment is conducted to identify actual and potential security risk in workplace environment.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Appropriate controls and implementation methods are formulated and incorporated into security system design.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Validate system design.

  1. Security system schematics and specifications provide sufficient detail to enable accurate costings to be made.
  2. System architectural and service specifications address identified performance, maintenance and fault tolerance parameters.
  3. Compatibility of existing and proposed systems and units are confirmed in accordance with system plans and technical specifications.
  4. Materials that best meet system specifications are determined.
Security system schematics and specifications provide sufficient detail to enable accurate costings to be made.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

System architectural and service specifications address identified performance, maintenance and fault tolerance parameters.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Compatibility of existing and proposed systems and units are confirmed in accordance with system plans and technical specifications.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Materials that best meet system specifications are determined.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Report system configurations.

  1. Proposed security system configuration details and information are prepared and presented within specified timeframes, budget and quality constraints.
  2. Presented information uses clear and concise language and meets organisational standards for style, format and accuracy.
  3. Configuration design recommendations and options are supported by reliable and verifiable information.
  4. Feedback is sought and modifications to proposed security system configuration are made as required to meet assignment instructions.
  5. Confirmation of proposed security system configurations is obtained and processed in accordance with organisational procedures.
Proposed security system configuration details and information are prepared and presented within specified timeframes, budget and quality constraints.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Presented information uses clear and concise language and meets organisational standards for style, format and accuracy.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configuration design recommendations and options are supported by reliable and verifiable information.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Feedback is sought and modifications to proposed security system configuration are made as required to meet assignment instructions.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Confirmation of proposed security system configurations is obtained and processed in accordance with organisational procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessed

Teacher: ___________________________________ Date: _________

Signature: ________________________________________________

Comments:

 

 

 

 

 

 

 

 

Instructions to Assessors

Evidence Guide

The evidence guide provides advice on assessment and must be read in conjunction with the performance criteria, required skills and knowledge, range statement and the Assessment Guidelines for the Training Package.

Critical aspects for assessment and evidence required to demonstrate competency in this unit

A person who demonstrates competency in this unit must be able to provide evidence of:

accurately documenting and preparing security equipment and system specifications and configurations in formats suitable for presentation to client

clarifying client security system and network requirements and designing viable recommendations

developing detailed and accurate security system schematics and specifications including appropriate security equipment and materials which meet client needs.

Context of and specific resources for assessment

Context of assessment includes:

a setting in the workplace or environment that simulates the conditions of performance described in the elements, performance criteria and range statement.

Resource implications for assessment include:

access to plain English version of relevant statutes and procedures

access to a registered provider of assessment services

access to a suitable venue and equipment

assessment instruments including personal planner and assessment record book

work schedules, organisational policies and duty statements.

Reasonable adjustments must be made to assessment processes where required for people with disabilities. This could include access to modified equipment and other physical resources, and the provision of appropriate assessment support.

Method of assessment

This unit of competency could be assessed using the following methods of assessment:

observation of processes and procedures

questioning of underpinning knowledge and skills.

Guidance information for assessment

Assessment processes and techniques must be culturally appropriate and suitable to the language, literacy and numeracy capacity of the candidate and the competency being assessed. In all cases where practical assessment is used, it should be combined with targeted questioning to assess the underpinning knowledge.

Oral questioning or written assessment may be used to assess underpinning knowledge. In assessment situations where the candidate is offered a choice between oral questioning and written assessment, questions are to be identical.

Supplementary evidence may be obtained from relevant authenticated correspondence from existing supervisors, team leaders or specialist training staff.

Required Skills and Knowledge

This section describes the skills and knowledge and their level required for this unit.

Required skills

apply safe and efficient work practices

calculate time, measurements and quantities

coaching and mentoring to provide support to colleagues

communicate in a clear and concise manner

draw and draft plans, layouts, structures and system

interpret plans, designs and specifications

negotiation

organise work tasks in a methodical manner

prepare and present security systems and network specification and configuration documentation in suitable formats

risk assessment

solve problems.

Required knowledge

building construction methods and types

drawing and drafting symbols and techniques

duty of care

organisational and client confidentiality requirements

organisational pricing policies and procedures

requirements for installation of security systems and networks

types, functions and specifications of security systems and networks.

Range Statement

The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included.

Legislative requirements may relate to:

Australian standards and quality assurance requirements

cabling

general 'duty of care' responsibilities

licensing or certification requirements

privacy and confidentiality

relevant commonwealth, state and territory legislation, codes and national standards for:

anti-discrimination

cultural and ethnic diversity

environmental issues

equal employment opportunity

industrial relations

Occupational Health and Safety (OHS)

relevant industry codes of practice

trespass and the removal of persons.

Organisational requirements may relate to:

access and equity policies, principles and practices

business and performance plans

client service standards

code of conduct, code of ethics

communication and reporting procedures

complaint and dispute resolution procedures

emergency and evacuation procedures

employer and employee rights and responsibilities

OHS policies, procedures and programs

own role, responsibility and authority

personal and professional development

privacy and confidentiality of information

quality assurance and continuous improvement processes and standards

resource parameters and procedures

roles, functions and responsibilities of security personnel

storage and disposal of information.

Assignment instructionsmay include:

access to site and specific site requirements

budget allocations

completion dates

job requirements and tasks

resource requirements

specific client requirements

warranties and service information

work schedules.

Relevant personsmay include:

client

equipment and system manufacturers

other professional or technical staff

security consultants

security personnel

supervisor.

Riskrelates to:

the chance of something happening that will have an impact on objectives.

Security risks may relate to:

biological hazards

chemical spills

client contact

electrical faults

explosives

financial viability

injury to personnel

noise, light, heat, smoke

persons carrying weapons

persons causing a public nuisance

persons demonstrating suspicious behaviour

persons suffering from emotional or physical distress

persons under the influence of intoxicating substances

persons with criminal intent

persons, vehicles and equipment in unsuitable locations

property or people

security systems

suspicious packages or substances

systems or process failures

terrorism

violence or physical threats.

Schematicsmay detail:

cable routes

control panel locations

fixtures

frame location

locations of detectors

power points

security systems or network and equipment positioning

switchboards

telephone mainframes.

Confirmationmay be:

letter of verification or authorisation

signature

work order.