The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!
From the Wiki University
What evidence can you provide to prove your understanding of each of the following citeria?
Manage enterprise security parameters
|
|
Determine and evaluate parameters that affect enterprise security to establish benchmark Completed |
Evidence:
|
Review security classification and data management policies and procedures for relevance, and update if required Completed |
Evidence:
|
Plan and coordinate an effective enterprise continuity of operations (COOP) program and organisational structure for critical business continuity Completed |
Evidence:
|
Develop a plan to address factors to manage the risks of the enterprise Completed |
Evidence:
|
Integrate and evaluate risk management concepts into operational activities with related contingency planning activities, using an enterprise COOP performance measurement program Completed |
Evidence:
|
Evaluate and assess security incidents to establish an effective incident management program for the enterprise Completed |
Evidence:
|
Manage the coordination between related security teams for effective incident management processes and procedures Completed |
Evidence:
|
Manage networks and telecommunications security
|
|
Develop a network security and telecommunications program in line with enterprise policy and security goals Completed |
Evidence:
|
Manage the necessary resources to integrate network security and telecommunications program activities with technical support, security administration and incident response activities in a secure network Completed |
Evidence:
|
Establish effective communications protocols between the network security and telecommunications team and related security teams to manage the risks Completed |
Evidence:
|
Establish a performance measurement program to evaluate the security effectiveness of the integrated network security and telecommunications network Completed |
Evidence:
|
Ensure enterprise compliance with applicable networkbased documents, and that network-based audits and management reviews are conducted to implement process improvement Completed |
Evidence:
|
Implement and document enhancements
|
|
Implement appropriate changes and improvement actions as required, and evaluate effectiveness of enhancements Completed |
Evidence:
|
Produce and table documentation for audit tracking Completed |
Evidence:
|