NTISthis.com

Evidence Guide: ICTNWK601 - Design and implement a security system

Student: __________________________________________________

Signature: _________________________________________________

Tips for gathering evidence to demonstrate your skills

The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!

From the Wiki University

 

ICTNWK601 - Design and implement a security system

What evidence can you provide to prove your understanding of each of the following citeria?

Assess the security threats facing network Infrastructure

  1. Evaluate mitigation methods for network attacks and different types of malware
  2. Propose a methodical concept of defending network architecture
Evaluate mitigation methods for network attacks and different types of malware

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Propose a methodical concept of defending network architecture

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Secure edge devices (routers)

  1. Secure network routers using software tools
  2. Secure administration access to routers using the router operating system (OS)
  3. Secure router OS and its configuration file(s)
Secure network routers using software tools

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Secure administration access to routers using the router operating system (OS)

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Secure router OS and its configuration file(s)

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Implement authentication, authorisation and accounting (AAA) and secure access control system (ACS)

  1. Evaluate and implement the functions and importance of authentication, authorisation and accounting
  2. Configure the router using AAA
  3. Analyse and compare the features of Terminal Access Controller Access-Control System Plus(TACACS+) and Remote Authentication Dial In User Service (RADIUS) AAA protocols for securing the network
Evaluate and implement the functions and importance of authentication, authorisation and accounting

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure the router using AAA

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Analyse and compare the features of Terminal Access Controller Access-Control System Plus(TACACS+) and Remote Authentication Dial In User Service (RADIUS) AAA protocols for securing the network

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Mitigate threats to routers and networks using access control lists (ACLs)

  1. Assess the functionality of access control lists and document the caveats to be considered when building them
  2. Configure and verify IP ACLs to mitigate threats and to prevent internet protocol (IP) address spoofing using tools
Assess the functionality of access control lists and document the caveats to be considered when building them

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure and verify IP ACLs to mitigate threats and to prevent internet protocol (IP) address spoofing using tools

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Implement secure network management and reporting

  1. Configure secure shell (SSH) on routers to enable secure management
  2. Configure routers to send log messages to a log server with tools
Configure secure shell (SSH) on routers to enable secure management

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure routers to send log messages to a log server with tools

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Mitigate common layer 2 attacks

  1. Document how to prevent layer 2 attacks by configuring basic switch security and features
  2. Configure switch to prevent layer 2 attacks
Document how to prevent layer 2 attacks by configuring basic switch security and features

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure switch to prevent layer 2 attacks

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Implement the router OS firewall-feature set

  1. Evaluate and compare the operational strategies and weaknesses of the different firewall technologies
  2. Implement zone-based firewall to strategically secure group of interfaces
Evaluate and compare the operational strategies and weaknesses of the different firewall technologies

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Implement zone-based firewall to strategically secure group of interfaces

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Implement the intrusion detection and prevention system (IDPS) feature set in the router OS using secure device manager (SDM)

  1. Evaluate and compare network based versus host based IDPS to identify malicious activity, log information, attempt to block/stop activity, and report activity
  2. Determine IDPS technologies, attack responses and monitoring options
  3. Configure the router OS IDPS operations using secure device manager to monitor network and system activities for malicious activity
Evaluate and compare network based versus host based IDPS to identify malicious activity, log information, attempt to block/stop activity, and report activity

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Determine IDPS technologies, attack responses and monitoring options

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure the router OS IDPS operations using secure device manager to monitor network and system activities for malicious activity

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Implement site-to-site virtual private networks (VPNs) using SDM

  1. Assess the different methods used in cryptography
  2. Evaluate internet key exchange (IKE) protocol functionality and phases to support authentication and define the binding blocks of IPSec and the security functions it provides
  3. Configure and verify an IPSec site-to-site VPN with pre-shared key (PSK) authentication to provide a secure channel between the two parties
Assess the different methods used in cryptography

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Evaluate internet key exchange (IKE) protocol functionality and phases to support authentication and define the binding blocks of IPSec and the security functions it provides

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure and verify an IPSec site-to-site VPN with pre-shared key (PSK) authentication to provide a secure channel between the two parties

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessed

Teacher: ___________________________________ Date: _________

Signature: ________________________________________________

Comments:

 

 

 

 

 

 

 

 

Instructions to Assessors

Evidence Guide

ELEMENT

PERFORMANCE CRITERIA

Elements describe the essential outcomes.

Performance criteria describe the performance needed to demonstrate achievement of the element.

1. Assess the security threats facing network Infrastructure

1.1 Evaluate mitigation methods for network attacks and different types of malware

1.2 Propose a methodical concept of defending network architecture

2. Secure edge devices (routers)

2.1 Secure network routers using software tools

2.2 Secure administration access to routers using the router operating system (OS)

2.3 Secure router OS and its configuration file(s)

3. Implement authentication, authorisation and accounting (AAA) and secure access control system (ACS)

3.1 Evaluate and implement the functions and importance of authentication, authorisation and accounting

3.2 Configure the router using AAA

3.3 Analyse and compare the features of Terminal Access Controller Access-Control System Plus(TACACS+) and Remote Authentication Dial In User Service (RADIUS) AAA protocols for securing the network

4. Mitigate threats to routers and networks using access control lists (ACLs)

4.1 Assess the functionality of access control lists and document the caveats to be considered when building them

4.2 Configure and verify IP ACLs to mitigate threats and to prevent internet protocol (IP) address spoofing using tools

5. Implement secure network management and reporting

5.1 Configure secure shell (SSH) on routers to enable secure management

5.2 Configure routers to send log messages to a log server with tools

6. Mitigate common layer 2 attacks

6.1 Document how to prevent layer 2 attacks by configuring basic switch security and features

6.2 Configure switch to prevent layer 2 attacks

7. Implement the router OS firewall-feature set

7.1 Evaluate and compare the operational strategies and weaknesses of the different firewall technologies

7.2 Implement zone-based firewall to strategically secure group of interfaces

8. Implement the intrusion detection and prevention system (IDPS) feature set in the router OS using secure device manager (SDM)

8.1 Evaluate and compare network based versus host based IDPS to identify malicious activity, log information, attempt to block/stop activity, and report activity

8.2 Determine IDPS technologies, attack responses and monitoring options

8.3 Configure the router OS IDPS operations using secure device manager to monitor network and system activities for malicious activity

9. Implement site-to-site virtual private networks (VPNs) using SDM

9.1 Assess the different methods used in cryptography

9.2 Evaluate internet key exchange (IKE) protocol functionality and phases to support authentication and define the binding blocks of IPSec and the security functions it provides

9.3 Configure and verify an IPSec site-to-site VPN with pre-shared key (PSK) authentication to provide a secure channel between the two parties

Required Skills and Knowledge

ELEMENT

PERFORMANCE CRITERIA

Elements describe the essential outcomes.

Performance criteria describe the performance needed to demonstrate achievement of the element.

1. Assess the security threats facing network Infrastructure

1.1 Evaluate mitigation methods for network attacks and different types of malware

1.2 Propose a methodical concept of defending network architecture

2. Secure edge devices (routers)

2.1 Secure network routers using software tools

2.2 Secure administration access to routers using the router operating system (OS)

2.3 Secure router OS and its configuration file(s)

3. Implement authentication, authorisation and accounting (AAA) and secure access control system (ACS)

3.1 Evaluate and implement the functions and importance of authentication, authorisation and accounting

3.2 Configure the router using AAA

3.3 Analyse and compare the features of Terminal Access Controller Access-Control System Plus(TACACS+) and Remote Authentication Dial In User Service (RADIUS) AAA protocols for securing the network

4. Mitigate threats to routers and networks using access control lists (ACLs)

4.1 Assess the functionality of access control lists and document the caveats to be considered when building them

4.2 Configure and verify IP ACLs to mitigate threats and to prevent internet protocol (IP) address spoofing using tools

5. Implement secure network management and reporting

5.1 Configure secure shell (SSH) on routers to enable secure management

5.2 Configure routers to send log messages to a log server with tools

6. Mitigate common layer 2 attacks

6.1 Document how to prevent layer 2 attacks by configuring basic switch security and features

6.2 Configure switch to prevent layer 2 attacks

7. Implement the router OS firewall-feature set

7.1 Evaluate and compare the operational strategies and weaknesses of the different firewall technologies

7.2 Implement zone-based firewall to strategically secure group of interfaces

8. Implement the intrusion detection and prevention system (IDPS) feature set in the router OS using secure device manager (SDM)

8.1 Evaluate and compare network based versus host based IDPS to identify malicious activity, log information, attempt to block/stop activity, and report activity

8.2 Determine IDPS technologies, attack responses and monitoring options

8.3 Configure the router OS IDPS operations using secure device manager to monitor network and system activities for malicious activity

9. Implement site-to-site virtual private networks (VPNs) using SDM

9.1 Assess the different methods used in cryptography

9.2 Evaluate internet key exchange (IKE) protocol functionality and phases to support authentication and define the binding blocks of IPSec and the security functions it provides

9.3 Configure and verify an IPSec site-to-site VPN with pre-shared key (PSK) authentication to provide a secure channel between the two parties

Evidence of the ability to:

evaluate network security system threats and requirements

mitigate attacks and configure firewalls

design and implement network security systems

implement a virtual private network (VPN) using security device management tool.

Note: If a specific volume or frequency is not stated, then evidence must be provided at least once.

To complete the unit requirements safely and effectively, the individual must:

summarise access control lists, configuration and troubleshooting

outline authentication protocols

explain encryption techniques

explain intrusion detection system (IDS) and intrusion prevention system (IPS)

clarify internet protocol (IP) and networking models

explain current wireless regulations, standards and certifications

describe local area network (LAN) or wide area network (WAN) implementations

summarise malicious attacks and prevention techniques

outline network management tools

explain network security prevention methods

explain procedures to configure, verify and troubleshoot:

switch with virtual local area networks (VLANs) and inter-switching communications

router

outline procedures to set up virtual private networks (VPNs)

explain routing protocols

explain threat and attack mitigation techniques

outline the use of command line interface to configure and test network elements

describe the common features of Terminal Access Controller Access-Control System Plus(TACACS+) and Remote Authentication Dial In User Service (RADIUS) authentication, authorisation and accounting (AAA) protocols.