The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!
From the Wiki University
What evidence can you provide to prove your understanding of each of the following citeria?
Prepare to develop a network applications infrastructure.
|
|
OHS processes and procedures for a given work area are identified, obtained and understood. Completed |
Evidence:
|
Established OHS risk control measures and procedures are followed in preparation for the work. Completed |
Evidence:
|
The extent of network application infrastructure to be developed is determined from network performance specifications and in consultation with relevant persons. Completed |
Evidence:
|
Activities are planned to meet scheduled time lines in consultation with others involved in the work. Completed |
Evidence:
|
Appropriate development tools and software are selected based on specified requirements and performance standard. Completed |
Evidence:
|
Strategies are implemented to ensure network development is carried out efficiently. Completed |
Evidence:
|
Install, configure and manage applications infrastructure components.
|
|
OHS risk control measures and procedures for carrying out the work are followed. Completed |
Evidence:
|
Knowledge and complexities of network applications infrastructure are applied to developing the network. Completed |
Evidence:
|
Network applications infrastructure components in current use and installed and configured in compliance with industry standards and variants as specified for the network. (See Note 1) Completed |
Evidence:
|
Management components of the network applications infrastructure are configured in compliance with current industry practices and requirements specified for the network. Completed |
Evidence:
|
Security components of network the network applications infrastructure are created in compliance with current industry practices and requirements specified for the network. (See Note 2) Completed |
Evidence:
|
Network malfunctions are identified and rectified using logical techniques and drawing knowledge of complex network infrastructure. Completed |
Evidence:
|
Network is monitored and solutions are developed to optimise network performance and reliability in accordance with established procedures. Completed |
Evidence:
|
Security events are analysed and actions taken in accordance with established policy. Completed |
Evidence:
|
Approaches to issues/problems are analysed to provide most effective solutions. Completed |
Evidence:
|
Quality of work is monitored against personal performance agreement and/or established organisational or professional standards. Completed |
Evidence:
|
Report network administration activities
|
|
Written justification is produced for network services development activities and appropriate person/s notified in accordance with established procedures. Completed |
Evidence:
|
Network applications infrastructure development records are maintained in accordance with established procedures. Completed |
Evidence:
|
Notes.1. Examples of network applications infrastructure components may include Windows Deployment services, KMS servers, virtualisation, remote access services, Internet Information Server (IIS), streaming media services, Microsoft Share Point. |
|
Completed |
Evidence:
|
Examples of security components may include KMS servers, certificate configurations, authorisation policies, Group Policy, SSL security. |
|
Completed |
Evidence:
|