NTISthis.com

Evidence Guide: ICANWK529A - Install and manage complex ICT networks

Student: __________________________________________________

Signature: _________________________________________________

Tips for gathering evidence to demonstrate your skills

The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!

From the Wiki University

 

ICANWK529A - Install and manage complex ICT networks

What evidence can you provide to prove your understanding of each of the following citeria?

Plan and design a complex network to meet business requirements

  1. Review network design, business requirements and latest vendor technical specifications for network components
  2. Research options available for providing the network functionality required
  3. Plan network implementation to provide network services and resources to meet business requirements
Review network design, business requirements and latest vendor technical specifications for network components

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Research options available for providing the network functionality required

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Plan network implementation to provide network services and resources to meet business requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Design and implement a security strategy

  1. Analyse requirements for internal and external security
  2. Design security strategy to meet requirements
  3. Implement security strategy
  4. Undertake ongoing monitoring of the viability and reliability of network security, through testing and use of technical tools
  5. Continually monitor internal and external network access for security breaches
Analyse requirements for internal and external security

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Design security strategy to meet requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Implement security strategy

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Undertake ongoing monitoring of the viability and reliability of network security, through testing and use of technical tools

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Continually monitor internal and external network access for security breaches

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Install and configure a complex network to meet business requirements

  1. Check and install cabling and associated components according to industry standards
  2. Install and configure servers, routers, switches or other devices to provide internet protocol (IP) addressing and routing
  3. Install and configure servers, routers, switches or other devices to provide name resolution
  4. Install and configure servers, routers, switches or other devices to provide network services
  5. Install and configure remote access services
  6. Install and configure devices to provide data management services
Check and install cabling and associated components according to industry standards

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Install and configure servers, routers, switches or other devices to provide internet protocol (IP) addressing and routing

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Install and configure servers, routers, switches or other devices to provide name resolution

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Install and configure servers, routers, switches or other devices to provide network services

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Install and configure remote access services

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Install and configure devices to provide data management services

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Provide integrated network services across a complex network

  1. Integrate multiple network services across network
  2. Analyse and resolve interoperability issues
  3. Optimise performance
  4. Rectify security conflicts arising from integrating services
Integrate multiple network services across network

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Analyse and resolve interoperability issues

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Optimise performance

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Rectify security conflicts arising from integrating services

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Plan, design and implement voice and video business communications system

  1. Install software and configure and test voice over internet protocol (VoIP) and videoconferencing services
  2. Incorporate the use of a communications server to provide real-time multimedia communications
  3. Select common voice and videoconferencing codecs according to standards and practices
Install software and configure and test voice over internet protocol (VoIP) and videoconferencing services

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Incorporate the use of a communications server to provide real-time multimedia communications

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Select common voice and videoconferencing codecs according to standards and practices

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Manage and support a complex network

  1. Identify and evaluate appropriate network management tools to assist in the administration of the complex network
  2. Select and install network management tools according to industry and organisational standards
  3. Set and monitor alerts and logs
  4. Capture and analyse network performance data
  5. Implement automated server updates
  6. Implement desktop management policies
  7. Implement automated virus checking
  8. Use remote management tools
Identify and evaluate appropriate network management tools to assist in the administration of the complex network

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Select and install network management tools according to industry and organisational standards

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Set and monitor alerts and logs

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Capture and analyse network performance data

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Implement automated server updates

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Implement desktop management policies

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Implement automated virus checking

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Use remote management tools

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Test network functionality and obtain sign-off

  1. Test network functionality and record results
  2. Record results of network functionality test
  3. Complete network documentation according to organisational standards
Test network functionality and record results

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Record results of network functionality test

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Complete network documentation according to organisational standards

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessed

Teacher: ___________________________________ Date: _________

Signature: ________________________________________________

Comments:

 

 

 

 

 

 

 

 

Instructions to Assessors

Evidence Guide

The evidence guide provides advice on assessment and must be read in conjunction with the performance criteria, required skills and knowledge, range statement and the Assessment Guidelines for the Training Package.

Overview of assessment

Critical aspects for assessment and evidence required to demonstrate competency in this unit

Evidence of the ability to:

design and implement a complex network that involves integrating multiple network services to meet business requirements

design and implement an appropriate security strategy for a complex network

monitor and test the performance of aspects of the solution

provide ongoing management and support of the network.

Context of and specific resources for assessment

Assessment must ensure access to:

network design and business requirements documents

a complex network or hardware and software required to build a network involving multiple servers, multiple physical locations (or simulation of) and a combination of network services

appropriate learning and assessment support when required.

Where applicable, physical resources should include equipment modified for people with special needs.

Method of assessment

A range of assessment methods should be used to assess practical skills and knowledge. The following examples are appropriate for this unit:

review of report that outlines design process undertaken, including challenges faced and how these were addressed

direct observation of the candidate installing and configuring components of a complex network

technical documentation detailing configuration of the complete network

verbal or written questioning of candidate to assess required skills and knowledge

evaluation of report that outlines testing procedures, test results and changes made as a result of testing

evaluation of system designed and implemented in terms of performance and suitability for business needs.

Guidance information for assessment

Holistic assessment with other units relevant to the industry sector, workplace and job role is recommended, where appropriate.

Assessment processes and techniques must be culturally appropriate, and suitable to the communication skill level, language, literacy and numeracy capacity of the candidate and the work being performed.

Indigenous people and other people from a non-English speaking background may need additional support.

In cases where practical assessment is used it should be combined with targeted questioning to assess required knowledge.

Required Skills and Knowledge

Required skills

analytical skills to use complex technical data to develop network designs

communication skills to consult with customers

literacy skills to:

interpret technical documentation

write reports

numeracy skills to:

take test measurements

interpret results

evaluate performance and interoperability of network services

problem-solving skills to solve a range of predictable network problems

research skills to identify, analyse and evaluate broad features of a particular business domain and best practice in networking technologies, including hardware and software to be installed

technical skills to:

implement dynamic name system (DNS), IP addressing and secure virtual private network (VPN) tunnels

install and configure application software to provide specific services

install, configure and secure server operating systems

install, configure and secure switches and routers

integrate multiple network services without conflict

set up and use network monitoring and management tools

test network functionality.

Required knowledge

firewall configuration

IP addressing and network configuration

network:

infrastructure

load-balancing for applications

security

server operating systems

service configuration, including:

DNS

dynamic host configuration protocol (DHCP)

file transfer protocol (FTP)

mail

network time protocol (NTP)

proxy

server messages block (SMB)

web

service management

troubleshooting tools and techniques, including network diagnostic utilities

user authentication and directory services

VoIP

VPN.

Range Statement

The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included.

Network components may include:

cables

digital subscriber line (DSL) modems

local area network (LAN)

modems

routers

servers

switches

WAN

wireless access point.

Network services may include:

database service

DHCP

DNS

FTP

firewall

hypertext transfer protocol (HTTP, HTTPS)

internet message access protocol (IMAP)

network file system (NFS)

NTP

post office protocol (POP)

print services

proxy

SMB

simple mail transfer protocol (SMTP)

simple network management protocol (SNMP)

transmission control protocol or internet protocol (TCP/IP).

Network resources may include:

backup and data security

business applications

collaboration tools

conferencing

data storage

databases

email

internet services

printers, faxes and scanners

streaming video

VoIP.

Security strategy may include:

automated updates:

Red Hat Network (RHN)

Windows Server Update Services (WSUS)

encryption

Firewall - demilitarised zone (DMZ)

proxy

public key infrastructure (PKI) and secure socket layer (SSL) certificates

secure remote access

server hardening

smart cards

tokens

user authentication

virus checking

VPN.

Tools may include:

cable testing

carrier connection tests

data and voice integration measurements

equipment testing

frequency analysers

network performance software

packet tracers

policing and shaping tools.

Data management services may include:

backup and recovery

disk quotas

distributed file systems

indexing

online and offline storage

storage area networks (SANs).

Integrate multiple network services may include:

Kerberos

lightweight directory access protocol (LDAP)

Samba

seamless access to Linux and Windows hosted data and services

single login to gain access to multiple services (federated authentication)

VoIP over VPN.