Plan, configure and test advanced server based security

Formats and tools

Unit Description
Reconstruct the unit from the xml and display it as an HTML page.
Assessment Tool
an assessor resource that builds a framework for writing an assessment tool
Assessment Template
generate a spreadsheet for marking this unit in a classroom environment. Put student names in the top row and check them off as they demonstrate competenece for each of the unit's elements and performance criteria.
Assessment Matrix
a slightly different format than the assessment template. A spreadsheet with unit names, elements and performance criteria in separate columns. Put assessment names in column headings to track which performance criteria each one covers. Good for ensuring that you've covered every one of the performance criteria with your assessment instrument (all assessement tools together).
Wiki Markup
mark up the unit in a wiki markup codes, ready to copy and paste into a wiki page. The output will work in most wikis but is designed to work particularly well as a Wikiversity learning project.
Evidence Guide
create an evidence guide for workplace assessment and RPL applicants
Competency Mapping Template
Unit of Competency Mapping – Information for Teachers/Assessors – Information for Learners. A template for developing assessments for a unit, which will help you to create valid, fair and reliable assessments for the unit, ready to give to trainers and students
Observation Checklist
create an observation checklist for workplace assessment and RPL applicants. This is similar to the evidence guide above, but a little shorter and friendlier on your printer. You will also need to create a seperate Assessor Marking Guide for guidelines on gathering evidence and a list of key points for each activity observed using the unit's range statement, required skills and evidence required (see the unit's html page for details)

Self Assessment Survey
A form for students to assess thier current skill levels against each of the unit's performance criteria. Cut and paste into a web document or print and distribute in hard copy.
Moodle Outcomes
Create a csv file of the unit's performance criteria to import into a moodle course as outcomes, ready to associate with each of your assignments. Here's a quick 'how to' for importing these into moodle 2.x
Registered Training Organisations
Trying to find someone to train or assess you? This link lists all the RTOs that are currently registered to deliver ICANWK602A, 'Plan, configure and test advanced server based security'.
Google Links
links to google searches, with filtering in place to maximise the usefulness of the returned results
Reference books for 'Plan, configure and test advanced server based security' on This online store has a huge range of books, pretty reasonable prices, free delivery in Australia *and* they give a small commission to for every purchase, so go nuts :)

Elements and Performance Criteria

1. Plan advanced network-server security according to business needs

1.1 Consult with client and key stakeholders to identify security requirements in an advanced network server environment

1.2 Analyse and review existing client security documentation and predict network service vulnerabilities

1.3 Research network authentication and network service configuration options and implications to produce network security solutions

1.4 Ensure features and capabilities of network service security options meet the business needs

1.5 Produce or update server security design documentation to include new solutions

1.6 Obtain sign-off for the security design from the appropriate person

2. Prepare for network-server security implementation

2.1 Prepare for work in line with site-specific safety requirements and enterprise OHS processes and procedures

2.2 Identify safety hazards and implement risk control measures in consultation with appropriate personnel

2.3 Consult appropriate person to ensure the task is coordinated effectively with others involved at the worksite

2.4 Back up server before implementing configuration changes

3. Configure the advanced network-server security according to design

3.1 Configure update services to provide automatic updates to ensure maximum security and reliability

3.2 Configure network authentication, authorisation and accounting services to log and prevent unauthorised access to the server

3.3 Configure basic service security and access control lists to limit access to authorised users, groups or networks

3.4 Implement encryption as required by the design

3.5 Configure advanced network service security options for services and remote access

3.6 Configure the operating system or third-party firewall to filter traffic in line with security requirements

3.7 Ensure security of server logs and log servers are appropriately implemented for system integrity

3.8 Implement backup and recovery methods to enable restoration capability in the event of a disaster

4. Monitor and test network-server security

4.1 Test server to assess the effectiveness of network service security according to agreed design plan

4.2 Monitor server logs, network traffic and open ports to detect possible intrusions

4.3 Monitor important files to detect unauthorised modifications

4.4 Investigate and verify alleged violations of server or data security and privacy breaches

4.5 Recover from, report and document security breaches according to security policies and procedures

4.6 Evaluate monitored results and reports to implement and test improvement actions required to maintain the required level of network service security