NTISthis.com

Evidence Guide: ICTNWK509 - Design and implement a security perimeter for ICT networks

Student: __________________________________________________

Signature: _________________________________________________

Tips for gathering evidence to demonstrate your skills

The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!

From the Wiki University

 

ICTNWK509 - Design and implement a security perimeter for ICT networks

What evidence can you provide to prove your understanding of each of the following citeria?

Plan and design firewall solution

  1. Determine level and nature of security needed to meet enterprise requirements
  2. Identify security threats
  3. Research available perimeter security options
  4. Design security perimeter to meet identified enterprise requirements
Determine level and nature of security needed to meet enterprise requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Identify security threats

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Research available perimeter security options

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Design security perimeter to meet identified enterprise requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure perimeter to secure network

  1. Deploy perimeter devices according to design
  2. Configure perimeter topology
  3. Configure basic functionality of devices to allow access
  4. Configure advanced functions
Deploy perimeter devices according to design

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure perimeter topology

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure basic functionality of devices to allow access

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure advanced functions

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Plan, design and configure network devices to provide secure fallover and redundancy

  1. Back up device configuration
  2. Design and configure perimeter to enable continuity of service during upgrade of devices
  3. Design and configure perimeter to enable continuity of service in the event of device failure
Back up device configuration

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Design and configure perimeter to enable continuity of service during upgrade of devices

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Design and configure perimeter to enable continuity of service in the event of device failure

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Plan, design and configure a VPN solution

  1. Configure perimeter for site-to-site virtual private networks (VPNs)
  2. Configure perimeter as a remote access VPN server
  3. Configure perimeter to allow VPN tunnel forwarding
  4. Diagnose and resolve VPN connectivity issues
Configure perimeter for site-to-site virtual private networks (VPNs)

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure perimeter as a remote access VPN server

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure perimeter to allow VPN tunnel forwarding

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Diagnose and resolve VPN connectivity issues

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Test and verify design performance

  1. Test functionality of basic features
  2. Test functionality of advanced features
  3. Perform penetration testing to verify that the perimeter meets security requirements
  4. Monitor perimeter device performance
  5. Monitor security breaches
  6. Document test results and report to appropriate person
Test functionality of basic features

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Test functionality of advanced features

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Perform penetration testing to verify that the perimeter meets security requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Monitor perimeter device performance

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Monitor security breaches

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Document test results and report to appropriate person

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessed

Teacher: ___________________________________ Date: _________

Signature: ________________________________________________

Comments:

 

 

 

 

 

 

 

 

Instructions to Assessors

Evidence Guide

ELEMENT

PERFORMANCE CRITERIA

Elements describe the essential outcomes.

Performance criteria describe the performance needed to demonstrate achievement of the element.

1. Plan and design firewall solution

1.1 Determine level and nature of security needed to meet enterprise requirements

1.2 Identify security threats

1.3 Research available perimeter security options

1.4 Design security perimeter to meet identified enterprise requirements

2. Configure perimeter to secure network

2.1 Deploy perimeter devices according to design

2.2 Configure perimeter topology

2.3 Configure basic functionality of devices to allow access

2.4 Configure advanced functions

3. Plan, design and configure network devices to provide secure fallover and redundancy

3.1 Back up device configuration

3.2 Design and configure perimeter to enable continuity of service during upgrade of devices

3.3 Design and configure perimeter to enable continuity of service in the event of device failure

4. Plan, design and configure a VPN solution

4.1 Configure perimeter for site-to-site virtual private networks (VPNs)

4.2 Configure perimeter as a remote access VPN server

4.3 Configure perimeter to allow VPN tunnel forwarding

4.4 Diagnose and resolve VPN connectivity issues

5. Test and verify design performance

5.1 Test functionality of basic features

5.2 Test functionality of advanced features

5.3 Perform penetration testing to verify that the perimeter meets security requirements

5.4 Monitor perimeter device performance

5.5 Monitor security breaches

5.6 Document test results and report to appropriate person

Required Skills and Knowledge

ELEMENT

PERFORMANCE CRITERIA

Elements describe the essential outcomes.

Performance criteria describe the performance needed to demonstrate achievement of the element.

1. Plan and design firewall solution

1.1 Determine level and nature of security needed to meet enterprise requirements

1.2 Identify security threats

1.3 Research available perimeter security options

1.4 Design security perimeter to meet identified enterprise requirements

2. Configure perimeter to secure network

2.1 Deploy perimeter devices according to design

2.2 Configure perimeter topology

2.3 Configure basic functionality of devices to allow access

2.4 Configure advanced functions

3. Plan, design and configure network devices to provide secure fallover and redundancy

3.1 Back up device configuration

3.2 Design and configure perimeter to enable continuity of service during upgrade of devices

3.3 Design and configure perimeter to enable continuity of service in the event of device failure

4. Plan, design and configure a VPN solution

4.1 Configure perimeter for site-to-site virtual private networks (VPNs)

4.2 Configure perimeter as a remote access VPN server

4.3 Configure perimeter to allow VPN tunnel forwarding

4.4 Diagnose and resolve VPN connectivity issues

5. Test and verify design performance

5.1 Test functionality of basic features

5.2 Test functionality of advanced features

5.3 Perform penetration testing to verify that the perimeter meets security requirements

5.4 Monitor perimeter device performance

5.5 Monitor security breaches

5.6 Document test results and report to appropriate person

Evidence of the ability to:

identify threats to perimeter security

develop design for a secure perimeter

deploy perimeter to meet security requirements

design and configure advanced features of perimeter devices to provide additional services

design and configure an integrated VPN solution

conduct exhaustive testing of perimeter.

Note: If a specific volume or frequency is not stated, then evidence must be provided at least once.

To complete the unit requirements safely and effectively, the individual must:

identify and describe emerging security issues and the need for security policies

describe the security perimeter issues related to networks, including:

auditing and penetration testing techniques

capabilities of software and hardware perimeter solutions

logging analysis techniques

organisational network infrastructure

security technologies according to perimeter design

weaknesses of installed perimeter design.