Course Title: Install, configure and test network security

Part B: Course Detail

Teaching Period: Term2 2012

Course Code: COSC6096C

Course Title: Install, configure and test network security

School: 155T Vocational Health and Sciences

Campus: City Campus

Program: C4299 - Certificate IV in Information Technology Networking

Course Contact: Geoff Moss

Course Contact Phone: +61 3 9925 4852

Course Contact Email: geoff.moss@rmit.edu.au


Name and Contact Details of All Other Relevant Staff

Teacher: Alex Buono
Phone: 9925 4475
Email: alex.buono@rmit.edu.au
Office: 51.07.01

Nominal Hours: 50

Regardless of the mode of delivery, represent a guide to the relative teaching time and student effort required to successfully achieve a particular competency/module. This may include not only scheduled classes or workplace visits but also the amount of effort required to undertake, evaluate and complete all assessment requirements, including any non-classroom activities.

Pre-requisites and Co-requisites

Nil

Course Description

This unit describes the performance outcomes, skills and knowledge required to install, configure and test network security in an ICT network.


National Codes, Titles, Elements and Performance Criteria

National Element Code & Title:

ICANWK406A Install, configure and test network security

Element:

Assess network security threats and vulnerabilities to identify risk

Performance Criteria:

Assess and report on current system security in line with required asset security level
Determine additional network, software, hardware and system security threats and vulnerabilities
Use identified threats and vulnerability information to identify security risks
Make recommendations to management to address security deficiencies in line with current and future commercial and business requirements

Element:

Implement countermeasures for identified vulnerabilities and threats

Performance Criteria:

Implement required level of perimeter security based on current and future business needs
Assess and implement best practice server and network hardening techniques and measures
Implement secure authentication and user account controls
Secure data integrity and transmission

Element:

Provide systems for monitoring and maintaining security

Performance Criteria:

Monitor current network security, including physical aspects, utilising appropriate third-party testing software where applicable
Review logs and audit reports to identify and record security incidents, intrusions or attempts
Carry out spot checks and audits to ensure that procedures are not being bypassed
Document newly discovered security threats, vulnerabilities and risks in a report for presentation to appropriate person to gain approval for changes to be made

Element:

Test and verify functionality and performance of security system implemented

Performance Criteria:

Design test items to verify key function and performance measures against criteria
Conduct function and performance tests recording results
Modify and debug security system as necessary
Develop documentation on current system settings and file for future reference


Learning Outcomes


Activities in this course aim to enhance your knowledge required to Install, configure and test network security in an ICT network such as the use of VPN’s and firewalls.


Details of Learning Activities

This unit describes the performance outcomes, skills and knowledge required to install, configure and test network security in an information and communications technology (ICT) network.


Teaching Schedule

WeeksTopic
1 Introduction
2 Security Threats and Vulnerabilities
3 Hardware and Software security
4 Hardening Techniques
Testing


Learning Resources

Prescribed Texts


References


Other Resources


Overview of Assessment

Assessment occurs throughout the program and includes learning and assessment activities conducted in the classroom, online and in the workplace giving you the opportunity to practice and be assessed on what you are learning in a work context. You must demonstrate an understanding of all elements of a particular competency to be deemed competent. Assessment methods have been designed to measure achievement of each competency in a flexible manner over a range of assessment tasks.

Assessment will incorporate a variety of methods including technical requirements, documentation, workplace activities, in class exercises, quizzes, practical problem solving exercises and presentations. Participants are advised that they are likely to be asked to personally demonstrate their assessment work to their teacher to ensure that the relevant competency standards are being met.

If you have a long term medical condition and/or disability it may be possible to negotiate to vary aspects of the learning or assessment methods. You can contact the program coordinator or the Disability Liaison Unit if you would like to find out more.


Assessment Tasks

Case Study
Students will be required to complete a report incorporating the following areas:
• Assess and report of current security
• Identify network, hardware and software security threats
• Make recommendations based upon security threats according to business requirements.
• Design test items to verify security of system
• Record function and performance when testing
• Document current system settings
• Record any threats, vulnerabilities into the system

Skills Based Assessments:
These assessments can be done either at RMIT or at the workplace, providing appropriate equipment is available.
Students must demonstrate they are competent in each of the following areas in order to complete the course satisfactorily.

Skills required to be demonstrated:
• Implement perimeter security such as firewalls and user access
• Firewall configuration, OS patching, application management, authorisation
• VPN, SSH
• Conducting testing to verify security, modify if required
• Review logs to identify unauthorised access
• Monitor network security


Assessment Matrix

ElementAssignmentPractical TasksIn Class/Work ObservationIn Class Testing
1.1 x      
1.2 x      
1.3 x      
1.4 x x x x
2.1   x x x
2.2   x x x
2.3   x x x
2.4   x x x
3.1 x x x x
3.2   x x x
3.3 x x x x
3.4 x x x x
4.1   x x x
4.2 x x x x
4.3   x x x
4.4 x x x x

Course Overview: Access Course Overview