The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!
From the Wiki University
What evidence can you provide to prove your understanding of each of the following citeria?
Develop evaluation strategy
|
|
Research and determine an organisation’s requirements for evaluation of IoT devices Completed |
Evidence:
|
Research organisational operations, environment and culture and determine perceived threats and vulnerabilities Completed |
Evidence:
|
Develop and document evaluation strategy according to organisational requirements, policies and procedures Completed |
Evidence:
|
Submit evaluation strategy to required personnel and seek and respond to feedback Completed |
Evidence:
|
Prepare to valuate IoT devices
|
|
Prepare devices for evaluation according to technical specifications Completed |
Evidence:
|
Secure data and networks according to technical specifications Completed |
Evidence:
|
Run evaluation according to documented strategy and organisational policies and procedures Completed |
Evidence:
|
Confirm and document identified vulnerabilities and threats according to organisational policies and procedures Completed |
Evidence:
|
Document evaluation results according to organisational guidelines and requirements Completed |
Evidence:
|
Interpret and finalise findings
|
|
Analyse evaluation findings and determine completeness and accuracy Completed |
Evidence:
|
Categorise negative findings into threats and vulnerability and determine level of potential impact to operational activities Completed |
Evidence:
|
Develop and document recommendations to remediate threat potential and lessen vulnerabilities Completed |
Evidence:
|
Document finalised results and recommendations according to organisational requirements Completed |
Evidence:
|
Lodge documentation according to organisational policies and procedures Completed |
Evidence:
|