The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!
From the Wiki University
What evidence can you provide to prove your understanding of each of the following citeria?
Protect assets from security threats
|
|
Secure assets, control, monitor and check access to ensure security. Completed |
Evidence:
|
Investigate suspicious activity and seek expert advice as required. Completed |
Evidence:
|
Implement access restrictions
|
|
Restrict access to authorised personnel and identify potential threats. Completed |
Evidence:
|
Identify breaches, take action to deal with the breach and report to appropriate personnel. Completed |
Evidence:
|
Advise third parties of security requirements
|
|
Confirm needs, expectations, attitudes, and current level of knowledge of third parties and advise them of organisation's security requirements. Completed |
Evidence:
|
Identify and manage risks related to possible confrontations. Completed |
Evidence:
|
Provide current and prompt advice that meets the needs of the parties. Completed |
Evidence:
|
Obtain feedback to determine the party's level of understanding and clarify requirements if needed. Completed |
Evidence:
|
Minimise security risk
|
|
Identify changes in circumstances, report to appropriate personnel and complete documentation. Completed |
Evidence:
|
Take action to reduce the likelihood of breaches reoccurring. Completed |
Evidence:
|
Protect assets from security threats
|
|
Secure assets, control, monitor and check access to ensure security. Completed |
Evidence:
|
Investigate suspicious activity and seek expert advice as required. Completed |
Evidence:
|
Implement access restrictions
|
|
Restrict access to authorised personnel and identify potential threats. Completed |
Evidence:
|
Identify breaches, take action to deal with the breach and report to appropriate personnel. Completed |
Evidence:
|
Advise third parties of security requirements
|
|
Confirm needs, expectations, attitudes, and current level of knowledge of third parties and advise them of organisation's security requirements. Completed |
Evidence:
|
Identify and manage risks related to possible confrontations. Completed |
Evidence:
|
Provide current and prompt advice that meets the needs of the parties. Completed |
Evidence:
|
Obtain feedback to determine the party's level of understanding and clarify requirements if needed. Completed |
Evidence:
|
Minimise security risk
|
|
Identify changes in circumstances, report to appropriate personnel and complete documentation. Completed |
Evidence:
|
Take action to reduce the likelihood of breaches reoccurring. Completed |
Evidence:
|