Course Title: Manage network and data integrity

Part B: Course Detail

Teaching Period: Term1 2016

Course Code: COSC6194C

Course Title: Manage network and data integrity

School: 155T Vocational Health and Sciences

Campus: City Campus

Program: C4378 - Certificate IV in Information Technology Networking

Course Contact: Alex Buono

Course Contact Phone: +61 3 9925 4475

Course Contact Email: alex.buono@rmit.edu.au


Name and Contact Details of All Other Relevant Staff

Trevor Stone

Ph: 9925 4545

Email: trevor.stone@rmit.edu.au

Nominal Hours: 40

Regardless of the mode of delivery, represent a guide to the relative teaching time and student effort required to successfully achieve a particular competency/module. This may include not only scheduled classes or workplace visits but also the amount of effort required to undertake, evaluate and complete all assessment requirements, including any non-classroom activities.

Pre-requisites and Co-requisites

Nil

Course Description

This unit describes the performance outcomes, skills and knowledge required to implement and manage security functions throughout a network.


National Codes, Titles, Elements and Performance Criteria

National Element Code & Title:

ICTNWK403 Manage network and data integrity

Element:

1. Ensure compliance with company network and security policies

Performance Criteria:

1.1 Review company security policies

1.2 Audit and record security access

1.3 Ensure user accounts are controlled

1.4 Ensure secure file and resource access

Element:

2. Conduct audit on system assets

Performance Criteria:

2.1 Use appropriate tools and techniques to conduct audit on system hardware and software assets

2.2 Develop a system to record assets

2.3 Use system to develop reports on assets for management

Element:

3. Implement an antivirus solution

Performance Criteria:

3.1 Research appropriate antivirus and anti-malware solutions

3.2 Implement antivirus or anti-malware solution

3.3 Test antivirus and anti-malware solution functionality

Element:

4. Implement systems to protect assets from threats

Performance Criteria:

4.1 Determine environmental threats to data

4.2 Document systems to protect from environmental threat

4.3 Implement system to protect data from environmental threat

Element:

5. Develop a backup solution

Performance Criteria:

5.1 Determine appropriate backup type to meet systems needs

5.2 Investigate current backup media options

5.3 Implement a backup solution

5.4 Demonstrate functionality of backup solution

5.5 Demonstrate restore of data from backup media

5.6 Implement a real time backup and data sync solution

Element:

6. Monitor network performance

Performance Criteria:

6.1 Determine available network performance monitoring tools

6.2 Implement network performance monitoring tools to monitor network

6.3 Produce report on network performance


Learning Outcomes


Activities in this course aim to enhance your knowledge required to implement and manage security functions throughout a network. The Internet will be used as a learning tool and a resource for students to seek and locate relevant information.


Details of Learning Activities

Activities in this course are aimed at enhancing your understanding and knowledge installing anti-virus software, implementing a backup solution, reviewing and updating assets and security policies.


Teaching Schedule

This course will be co-delivered with the following course: ICANWK406A Install, Configure and Test Network Security as there is common material found in both courses and they compliment each other.

 

Date WeekTopicLab WorkAssessment
6-Jul1Modern Security Threats 

 

13-Jul2Anti-Virus and Anti Spyware software  
20-Jul3Assets  
27-Jul4Data Redundancy and Backups, Environmental Threats Assignment 1 Due
3-Aug5System Monitoring  
10-Aug6Network Monitoring  
17-Aug7   
Semester Break
24-Aug8  Assignment 2 Due
7-Sep9Security Policies  
14-Sep10VPN Technology  
21-Sep11Securing Netorking Devices Assignment 3 Due
28-Sep12  

 

5-Oct13Firewall, Logs Integrated Project (Stage 3 Due)
12-Oct14Client/Server VPN  
19-Oct15Testing Assignment 4 Due
26-Oct16   


Learning Resources

Prescribed Texts


References


Other Resources

All materials required for this course will be provided to you in class


Overview of Assessment

Assessment occurs throughout the program and includes learning and assessment activities conducted in the classroom, online and in the workplace giving you the opportunity to practice and be assessed on what you are learning in a work context. You must demonstrate an understanding of all elements of a particular competency to be deemed competent. Assessment methods have been designed to measure achievement of each competency in a flexible manner over a range of assessment tasks.

Assessment will incorporate a variety of methods including technical requirements, documentation, workplace activities, in class exercises, quizzes, practical problem solving exercises and presentations. Participants are advised that they are likely to be asked to personally demonstrate their assessment work to their teacher to ensure that the relevant competency standards are being met.

Assessment in this course will involve the following activities:

Task 1. Assignment: You are required to conduct an audit on current systems, research appropriate anti-virus solutions and environmental threats
This task relates to Elements 2, 3, & 4

Task 2. Assignment: You are required to implement secure file/folder access, monitoring systems, and investigate and create a backup system
This task relates to Elements 1, 3, 4, 5, 6

Task 3. Assignment. You will be required to review a security policy.
This task relates to Elements 2, 3 & 5

Task 4. Assignment. You will be required to implement secure data transmission, monitor, and log security systems.
This task relates to Elements 1 & 6

Task 5. Assignment: You will be required, as part of an integrated assignment, create a database for auditing purposes.

If you have a long term medical condition and/or disability it may be possible to negotiate to vary aspects of the learning or assessment methods. You can contact the program coordinator or the Disability Liaison Unit if you would like to find out more.


Assessment Tasks

1. Assignment 1
This assessment will involve a co-assessment of two (2) courses, viz.:

ICTNWK406A Install, Configure and Test Network Security
ICTNWK403A Manage network and date integrity

2. Assignment 2
This assessment will involve a co-assessment of two (2) courses, viz.:

ICTNWK406A Install, Configure and Test Network Security
ICTNWK403A Manage network and date integrity

3. Assignment 3
This assessment will involve a co-assessment of two (2) courses, viz.:

ICTNWK406A Install, Configure and Test Network Security
ICTNWK403A Manage network and date integrity

4. Assignment 4
This assessment will involve a co-assessment of two (2) courses, viz.:

ICTNWK406A Install, Configure and Test Network Security
ICTNWK403A Manage network and date integrity

2. Integrated Project: Airport
This assessment will involve a co-assessment of six (6) courses, viz.:

ICTICT401 Determine and confirm client business requirements
ICTNWK404 Install, operate and troubleshoot a small enterprise branch network
ICTPMG401 Support small scale IT projects
ICTTEN513 Install, configure and test a local area network switch
ICTNWK403 Manage network and date integrity
ICTNWK406 Install, configure and test network security
 

You must be competent in all elements to successfully complete the course

You are permitted to have a maximum of 2 resubmissions for this course, however each individual assessment may only be resubmitted once.

All resubmissions must be completed and submitted no more than 7 days after your work has been graded.


Assessment Matrix

ElementAssignment 1Assignment 2Assignment 3Assignment 4Integrated Project
1.1  x  
1.2   x 
1.3   x 
1.4 x   
2.1x   

x

2.2x   x
2.3x   x
3.1x    
3.2 x   
3.3 x   
4.1x    
4.2x    
4.3 x   
5.1 xx  
5.2 x   
5.3 x   
5.4 x   
5.5 x   
5.6 xx  
6.1 x x 
6.2 x x 
6.3 x x

 

Other Information

Access to an internet connected computer outside of class times – Internet connected computers are available in the School of Vocational Health and Sciences labs on levels 4, 6 or 8 of building 51, 81 Victoria Street, Melbourne.
Further lab access can be found in the student lab on level 3 (ground floor) of Building 8, in Swanston Street, Melbourne; as well as RMIT Libraries.

Plagiarism
RMIT has a strict policy on plagiarism. Please refer to the RMIT website for more information on this policy. http://www1.rmit.edu.au/browse;ID=sg4yfqzod48g1

Late work
Late work that is submitted without an application for an extension will not be corrected.

Extension of Time for submission of assessable work
A student may apply for an extension of up to 7 days from the original date. They must lodge the application form (available on the web: http://www1.rmit.edu.au/students/assessment/extension) at least the day before the due date. The application is lodged with the School Admin Office on Level 6, Building 51. Students requiring longer extensions must apply for Special consideration.

Special consideration Policy (Late Submission)
Students requiring longer extensions must apply for Special consideration. Form available online at: http://www1.rmit.edu.au/students/specialconsideration/online.
For missed assessments such as exams and tests, you (and your doctor, if you are ill) must fill out a special consideration form. This form must be lodged at the HUB or online with supporting evidence (e.g. medical certificate) prior to, or within 48 hours of the scheduled time of the exam or test.

If you miss an assessment task due to unavoidable circumstances you need to follow the procedure of special consideration and apply within the allowed time frame.

If you have any questions about this assessment process, feel free to email me on:alex.buono@rmit.edu.au

Course Overview: Access Course Overview