Course Title: Monitor and administer network security
Part A: Course Overview
Program: C4293 Certificate IV in Information Technology (Networking)
Course Title: Monitor and administer network security
Portfolio: SEH Portfolio Office
Nominal Hours: 30
Regardless of the mode of delivery, represent a guide to the relative teaching time and student effort required to successfully achieve a particular competency/module. This may include not only scheduled classes or workplace visits but also the amount of effort required to undertake, evaluate and complete all assessment requirements, including any non-classroom activities.Course Code |
Campus |
Career |
School |
Learning Mode |
Teaching Period(s) |
COSC5436C |
City Campus |
TAFE |
155T Vocational Health and Sciences |
Distance / Correspondence or Face-to-Face or Internet or Workplace |
Term1 2012 |
Course Contact: Geoff Moss
Course Contact Phone: +61 3 9925 4852
Course Contact Email: geoff.moss@rmit.edu.au
Course Description
This unit defines the competency required to monitor and administer security functions on a network according to organisational policies.
Pre-requisite Courses and Assumed Knowledge and Capabilities
The following unit is a prerequisite for this competency:
• ICAS3032A - Provide network systems administration
National Competency Codes and Titles
National Element Code & Title: |
ICAS4124B Monitor and administer network security |
Elements: |
1. Ensure user accounts are controlled 1.1Review organisation's network and security policy to ensure up-todate knowledge and understanding of policies 2. Secure file and resource access 2.1Review inbuilt security and access features of the operating system and document areas for concern 3. Monitor threats to the system 3.1Investigate the current security of the network, including physical aspects, utilising appropriate third-party testing software where applicable |
Learning Outcomes
Overview of Assessment
Critical aspects for assessment and evidence required to demonstrate competency in this unit.
Assessment must confirm an understanding of the organisation’s network security and access policies. Assessment must confirm knowledge of the security features available in the operating environment and the ability to monitor and administer security functions on the network. This may include use of third-party diagnostic tools.
Assessment occurs throughout the program and includes learning and assessment activities conducted in the classroom, online and in the workplace giving you the opportunity to practice and be assessed on what you are learning in a work context. You must demonstrate an understanding of all elements of a particular competency to be deemed competent. Assessment methods have been designed to measure achievement of each competency in a flexible manner over a range of assessment tasks.
Assessment will incorporate a variety of methods including technical requirements, documentation, workplace activities, in class exercises, quizzes, practical problem solving exercises and presentations. Participants are advised that they are likely to be asked to personally demonstrate their assessment work to their teacher to ensure that the relevant competency standards are being met.
If you have a long term medical condition and/or disability it may be possible to negotiate to vary aspects of the learning or assessment methods. You can contact the program coordinator or the Disability Liaison Unit if you would like to find out more.