The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!
From the Wiki University
What evidence can you provide to prove your understanding of each of the following citeria?
Analyse operation of the internet
|
|
Evaluate the interrelationship of IP to open systems interconnect (OSI) seven layer model and the impact on network topologies and network elements Completed |
Evidence:
|
Assess media access control (MAC) and IP addressing, and their application in security Completed |
Evidence:
|
Report on transmission control protocol/internet protocol (TCP/IP) operations and use of transport protocols for transmitting data over the network Completed |
Evidence:
|
Examine various types of routing protocols and the implications on security Completed |
Evidence:
|
Analyse forms of label switching as applied to data packets Completed |
Evidence:
|
Use software to simulate least-cost algorithms Completed |
Evidence:
|
Analyse internetwork protocols
|
|
Compare connection-oriented and connection-less networks in internetworking applications Completed |
Evidence:
|
Research design parameters used in networks Completed |
Evidence:
|
Produce a report on IP multi-casting protocols and systems, including IP frame fields of data frames Completed |
Evidence:
|
Research and report internetwork operations
|
|
Analyse protocol considerations of voice over internet protocol (VoIP) Completed |
Evidence:
|
Research protocols G723.1, G729 and G729A standards and evaluate their application in internetworking Completed |
Evidence:
|
Determine the format of JPEG and GIF files as applied to still pictures Completed |
Evidence:
|
Determine the format of MPEG-2 and H.32x series multimedia protocols for motion pictures Completed |
Evidence:
|
Evaluate features of different of multi-service protocols and of different email system protocols in networking operations Completed |
Evidence:
|
Produce a report on features different web-based protocols used in internetworking operations Completed |
Evidence:
|
Analyse features and types of network security
|
|
Analyse procedures and processes used for security attacks and use of protection mechanisms Completed |
Evidence:
|
Research conventional encryption algorithms and determine possible locations of encryption devices Completed |
Evidence:
|
Produce a report on conventional encryption key distribution problems and how message authentication and verification is achieved Completed |
Evidence:
|
Research one-way hashing and secure hashing functions Completed |
Evidence:
|
Produce a report on digital signature standard (DSS) principles, including public key cryptography algorithms for network security Completed |
Evidence:
|
Research features of public key authentication and email network security protocols
|
|
Research public key authentication using Kerberos Completed |
Evidence:
|
Analyse how electronic mail security is achieved using pretty good privacy (PGP) Completed |
Evidence:
|
Research and report on internet protocol security (IPSec) Completed |
Evidence:
|
Produce a report on encapsulating security payload (ESP), including internet key management processes Completed |
Evidence:
|
Research features of web, network management and system security
|
|
Analyse how web threats and attacks occur in an IP network and determine system intruders and threats Completed |
Evidence:
|
Research operation of transaction protocols Completed |
Evidence:
|
Evaluate processes used for selection and protection of system passwords Completed |
Evidence:
|
Evaluate system threats and methods used to counteract the threats Completed |
Evidence:
|
Produce a report on anti-virus protection strategies, including firewall design principles, types and configurations Completed |
Evidence:
|
Document evaluation report
|
|
Present a final report to include research and evaluation of network security management principles and network application in the workplace with enhancement recommendations Completed |
Evidence:
|