ICTNWK406-Guide.docx - Information Technology ICTNWK406 Install configure and test network security Learner Guide Contents Assess network security

ICTNWK406-Guide.docx - Information Technology ICTNWK406...

This preview shows page 1 - 6 out of 84 pages.

Information Technology ICTNWK406 Install, configure and test network security Learner Guide
Image of page 1
Contents Assess network security threats and vulnerabilities to identify risk .......... 10 Assess and report on current system security, according to required asset security level ................................................................................ 10 Determine additional network, software, hardware and system security threats and vulnerabilities ...................................................................... 14 Use identified threats and vulnerability information to identify security risks ........................................................................................................ 19 Make recommendations to management to address security deficiencies, according to current and future commercial and business requirements .......................................................................................... 26 Implement countermeasures for identified vulnerabilities and threats ..... 34 Implement required level of perimeter security based on current and future business needs ............................................................................ 34 Assess and implement best practice server and network hardening techniques and measures ...................................................................... 38 Implement secure authentication and user account controls ................ 44 Secure data integrity and transmission .................................................. 47 Test and verify functionality and performance of security system implemented ............................................................................................. 55 Design test items to verify key function and performance measures against criteria ....................................................................................... 55 Conduct function and performance tests recording results .................... 68 Modify and debug security system as necessary ................................... 69 Develop documentation on current system settings and file for future reference ................................................................................................ 70 Provide systems for monitoring and maintaining security ........................ 75 Monitor current network security, including physical aspects, using appropriate third party testing software where applicable .................... 75 Review logs and audit reports to identify and record security incidents, intrusions or attempts ............................................................................ 83 Carry out spot checks and audits to ensure that procedures are not being bypassed ...................................................................................... 85 Document newly discovered security threats, vulnerabilities and risks in a report for presentation to appropriate person to gain approval for changes to be made ............................................................................... 87
Image of page 2
Image of page 3
About ICTNWK406 Install, configure and test network security Application This unit describes the skills and knowledge required to install, configure and test network security in an information and communications technology (ICT) network. It applies to individuals working as ICT professionals who install, configure and test secure networks of any size. No licensing, legislative or certification requirements apply to this unit at the time of publication. Unit Sector Networking
Image of page 4
Elements Performance Criteria Elements describe the essential outcomes Performance criteria describe the performance needed to demonstrate achievement of the element. 1. Assess network security threats and vulnerabilities to identify risk 1.1 Assess and report on current system security, according to required asset security level 1.2 Determine additional network, software, hardware and system security threats and vulnerabilities 1.3 Use identified threats and vulnerability information to identify security risks 1.4 Make recommendations to management to address security deficiencies, according to current and future commercial and business requirements 2. Implement countermeasu res for identified vulnerabilities and threats 2.1 Implement required level of perimeter security based on
Image of page 5
Image of page 6

You've reached the end of your free preview.

Want to read all 84 pages?

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern

Stuck? We have tutors online 24/7 who can help you get unstuck.
A+ icon
Ask Expert Tutors You can ask You can ask You can ask (will expire )
Answers in as fast as 15 minutes
A+ icon
Ask Expert Tutors