The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!
From the Wiki University
What evidence can you provide to prove your understanding of each of the following citeria?
Research system requirements.
|
|
Applicable provisions of legislative and organisational requirements relevant to designing networked security system configurations are identified and complied with. Completed |
Evidence:
|
Assignment instructions and other relevant information is obtained and reviewed. Completed |
Evidence:
|
Consultative processes are conducted with relevant persons to determine security system requirements. Completed |
Evidence:
|
Risk assessment is conducted to identify actual and potential security risk in workplace environment. Completed |
Evidence:
|
Appropriate controls and implementation methods are formulated and incorporated into security system design. Completed |
Evidence:
|
Validate system design.
|
|
Security system schematics and specifications provide sufficient detail to enable accurate costings to be made. Completed |
Evidence:
|
System architectural and service specifications address identified performance, maintenance and fault tolerance parameters. Completed |
Evidence:
|
Compatibility of existing and proposed systems and units are confirmed in accordance with system plans and technical specifications. Completed |
Evidence:
|
Materials that best meet system specifications are determined. Completed |
Evidence:
|
Report system configurations.
|
|
Proposed security system configuration details and information are prepared and presented within specified timeframes, budget and quality constraints. Completed |
Evidence:
|
Presented information uses clear and concise language and meets organisational standards for style, format and accuracy. Completed |
Evidence:
|
Configuration design recommendations and options are supported by reliable and verifiable information. Completed |
Evidence:
|
Feedback is sought and modifications to proposed security system configuration are made as required to meet assignment instructions. Completed |
Evidence:
|
Confirmation of proposed security system configurations is obtained and processed in accordance with organisational procedures. Completed |
Evidence:
|