Course Title: Manage network and data integrity

Part A: Course Overview

Program: C4378 Certificate IV in Information Technology Networking

Course Title: Manage network and data integrity

Portfolio: SEH Portfolio Office

Nominal Hours: 40

Regardless of the mode of delivery, represent a guide to the relative teaching time and student effort required to successfully achieve a particular competency/module. This may include not only scheduled classes or workplace visits but also the amount of effort required to undertake, evaluate and complete all assessment requirements, including any non-classroom activities.

Course Code

Campus

Career

School

Learning Mode

Teaching Period(s)

COSC6194C

City Campus

TAFE

155T Vocational Health and Sciences

Distance / Correspondence or Face-to-Face or Internet or Workplace

Term1 2016,
Term2 2016

COSC6194C

City Campus

TAFE

174T School of VE Engineering, Health & Science

Distance / Correspondence or Face-to-Face or Internet or Workplace

Term1 2017

Course Contact: Alex Buono

Course Contact Phone: +61 3 9925 4475

Course Contact Email: alex.buono@rmit.edu.au



Course Description

This unit describes the performance outcomes, skills and knowledge required to implement and manage security functions throughout a network.

Pre-requisite Courses and Assumed Knowledge and Capabilities

Nil



National Competency Codes and Titles

National Element Code & Title:

ICTNWK403 Manage network and data integrity

Elements:

1. Ensure compliance with company network and security policies

2. Conduct audit on system assets

3. Implement an antivirus solution

4. Implement systems to protect assets from threats

5. Develop a backup solution

6. Monitor network performance


Learning Outcomes

Activities in this course aim to enhance your knowledge required to implement and manage security functions throughout a network. The Internet will be used as a learning tool and a resource for students to seek and locate relevant information.


Overview of Assessment

Assessment occurs throughout the program and includes learning and assessment activities conducted in the classroom, online and in the workplace giving you the opportunity to practice and be assessed on what you are learning in a work context. You must demonstrate an understanding of all elements of a particular competency to be deemed competent. Assessment methods have been designed to measure achievement of each competency in a flexible manner over a range of assessment tasks.

Assessment will incorporate a variety of methods including technical requirements, documentation, workplace activities, in class exercises, quizzes, practical problem solving exercises and presentations. Participants are advised that they are likely to be asked to personally demonstrate their assessment work to their teacher to ensure that the relevant competency standards are being met.

Assessment in this course will involve the following activities:

Task 1. Assignment: You are required to conduct an audit on current systems, research appropriate anti-virus solutions and environmental threats
This task relates to Elements 2, 3, & 4

Task 2. Assignment: You are required to implement secure file/folder access, monitoring systems, and investigate and create a backup system
This task relates to Elements 1, 3, 4, 5, 6

Task 3. Assignment. You will be required to review a security policy.
This task relates to Elements 2, 3 & 5

Task 4. Assignment. You will be required to implement secure data transmission, monitor, and log security systems.
This task relates to Elements 1 & 6

Task 5. Assignment: You will be required, as part of an integrated assignment, create a database for auditing purposes.

If you have a long term medical condition and/or disability it may be possible to negotiate to vary aspects of the learning or assessment methods. You can contact the program coordinator or the Disability Liaison Unit if you would like to find out more.