NTISthis.com

Evidence Guide: ICTNWK416 - Build security into virtual private networks

Student: __________________________________________________

Signature: _________________________________________________

Tips for gathering evidence to demonstrate your skills

The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!

From the Wiki University

 

ICTNWK416 - Build security into virtual private networks

What evidence can you provide to prove your understanding of each of the following citeria?

Configure router to provide for network security monitoring and management

  1. Create and apply audit rules consistent with policies, standards, protocols and management systems
  2. Configure router to provide appropriate level of asset security and monitoring of security consistent with commercial and business requirements
  3. Monitor and manage system to assess the level of security and attempts to breach security of framework components
  4. Employ appropriate hardware and software to monitor and address security issues and provide VPN solutions
Create and apply audit rules consistent with policies, standards, protocols and management systems

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure router to provide appropriate level of asset security and monitoring of security consistent with commercial and business requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Monitor and manage system to assess the level of security and attempts to breach security of framework components

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Employ appropriate hardware and software to monitor and address security issues and provide VPN solutions

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Secure a site-to-site VPN

  1. Configure internet key exchange (IKE) and internet protocol security (IPSec)
  2. Configure site-to-site IPSec VPN using pre-shared keys
  3. Configure site-to-site IPSec VPN using digital certificates
Configure internet key exchange (IKE) and internet protocol security (IPSec)

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure site-to-site IPSec VPN using pre-shared keys

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure site-to-site IPSec VPN using digital certificates

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Secure a remote access VPN

  1. Configure a VPN server
  2. Install and administer a router management console
  3. Develop documentation on current system settings and framework components, and file securely for future reference
Configure a VPN server

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Install and administer a router management console

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Develop documentation on current system settings and framework components, and file securely for future reference

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessed

Teacher: ___________________________________ Date: _________

Signature: ________________________________________________

Comments:

 

 

 

 

 

 

 

 

Instructions to Assessors

Evidence Guide

ELEMENT

PERFORMANCE CRITERIA

Elements describe the essential outcomes.

Performance criteria describe the performance needed to demonstrate achievement of the element.

1. Configure router to provide for network security monitoring and management

1.1 Create and apply audit rules consistent with policies, standards, protocols and management systems

1.2 Configure router to provide appropriate level of asset security and monitoring of security consistent with commercial and business requirements

1.3 Monitor and manage system to assess the level of security and attempts to breach security of framework components

1.4 Employ appropriate hardware and software to monitor and address security issues and provide VPN solutions

2. Secure a site-to-site VPN

2.1 Configure internet key exchange (IKE) and internet protocol security (IPSec)

2.2 Configure site-to-site IPSec VPN using pre-shared keys

2.3 Configure site-to-site IPSec VPN using digital certificates

3. Secure a remote access VPN

3.1 Configure a VPN server

3.2 Install and administer a router management console

3.3 Develop documentation on current system settings and framework components, and file securely for future reference

Required Skills and Knowledge

ELEMENT

PERFORMANCE CRITERIA

Elements describe the essential outcomes.

Performance criteria describe the performance needed to demonstrate achievement of the element.

1. Configure router to provide for network security monitoring and management

1.1 Create and apply audit rules consistent with policies, standards, protocols and management systems

1.2 Configure router to provide appropriate level of asset security and monitoring of security consistent with commercial and business requirements

1.3 Monitor and manage system to assess the level of security and attempts to breach security of framework components

1.4 Employ appropriate hardware and software to monitor and address security issues and provide VPN solutions

2. Secure a site-to-site VPN

2.1 Configure internet key exchange (IKE) and internet protocol security (IPSec)

2.2 Configure site-to-site IPSec VPN using pre-shared keys

2.3 Configure site-to-site IPSec VPN using digital certificates

3. Secure a remote access VPN

3.1 Configure a VPN server

3.2 Install and administer a router management console

3.3 Develop documentation on current system settings and framework components, and file securely for future reference

Evidence of the ability to:

configure a router to provide the required security

implement and maintain security functionality for a virtual private network (VPN), including:

site to site VPN

remote access VPN

produce security documentation.

Note: If a specific volume or frequency is not stated, then evidence must be provided at least once.

To complete the unit requirements safely and effectively, the individual must:

outline the characteristics of a VPN system, including:

site to site

remote access systems

network protocols and operating systems relevant to VPN, including its features, issues and functions

describe the security requirements for a VPN, including:

auditing and penetration testing techniques

configuration of routers and switches

security protocols, standards and data encryption

processes and techniques related to security perimeters and their functions

security threats, including eavesdropping, data interception, data corruption and data falsification

transmission control protocol or internet protocol (TCP/IP) protocols and applications audit and intrusion detection systems

authentication issues

recognise and describe the differences between common networks, including:

local area network (LAN)

wireless local area network (WLAN)

wide area networks (WAN)

identify and describe organisational issues surrounding:

security cryptography

screened subnets

virus detection software.