The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!
From the Wiki University
What evidence can you provide to prove your understanding of each of the following citeria?
Implement security plan
|
|
Implement countermeasures and treat security risks. Completed |
Evidence:
|
Follow and meet timeframes and budgetary requirements. Completed |
Evidence:
|
Comply with legal, government and organisational policy requirements. Completed |
Evidence:
|
Document and monitor residual risks. Completed |
Evidence:
|
Monitor the risk environment
|
|
Determine and document strategies to monitor the risk environment. Completed |
Evidence:
|
Monitor security risks, types and sources of threats to detect changing circumstances that may alter risk management priorities. Completed |
Evidence:
|
Conduct monitoring on a regular basis. Completed |
Evidence:
|
Monitor organisational changes to identify circumstances where re-examination of the security environment becomes necessary. Completed |
Evidence:
|
Document and act upon results of monitoring. Completed |
Evidence:
|
Evaluate security plan
|
|
Monitor risk treatments to gauge extent and effectiveness of implementation. Completed |
Evidence:
|
Evaluate treatments against the objectives of the security plan. Completed |
Evidence:
|
Obtain feedback from stakeholders on the adequacy and need for current security measures affecting their work area. Completed |
Evidence:
|
Identify and address weaknesses in the security plan. Completed |
Evidence:
|
Review the plan on an ongoing basis, to detect exceptional incidents, breaches, and changes in circumstances. Completed |
Evidence:
|
Update the plan to reflect current circumstances. Completed |
Evidence:
|
Implement security plan
|
|
Implement countermeasures and treat security risks. Completed |
Evidence:
|
Follow and meet timeframes and budgetary requirements. Completed |
Evidence:
|
Comply with legal, government and organisational policy requirements. Completed |
Evidence:
|
Document and monitor residual risks. Completed |
Evidence:
|
Monitor the risk environment
|
|
Determine and document strategies to monitor the risk environment. Completed |
Evidence:
|
Monitor security risks, types and sources of threats to detect changing circumstances that may alter risk management priorities. Completed |
Evidence:
|
Conduct monitoring on a regular basis. Completed |
Evidence:
|
Monitor organisational changes to identify circumstances where re-examination of the security environment becomes necessary. Completed |
Evidence:
|
Document and act upon results of monitoring. Completed |
Evidence:
|
Evaluate security plan
|
|
Monitor risk treatments to gauge extent and effectiveness of implementation. Completed |
Evidence:
|
Evaluate treatments against the objectives of the security plan. Completed |
Evidence:
|
Obtain feedback from stakeholders on the adequacy and need for current security measures affecting their work area. Completed |
Evidence:
|
Identify and address weaknesses in the security plan. Completed |
Evidence:
|
Review the plan on an ongoing basis, to detect exceptional incidents, breaches, and changes in circumstances. Completed |
Evidence:
|
Update the plan to reflect current circumstances. Completed |
Evidence:
|