Course Title: Install, configure and test network security
Part B: Course Detail
Teaching Period: Term1 2016
Course Code: COSC6197C
Course Title: Install, configure and test network security
School: 155T Vocational Health and Sciences
Campus: City Campus
Program: C4378 - Certificate IV in Information Technology Networking
Course Contact: Alex Buono
Course Contact Phone: +61 3 9925 4475
Course Contact Email: alex.buono@rmit.edu.au
Name and Contact Details of All Other Relevant Staff
Trevor Stone
Ph: 9925 4545
Email: trevor.stone@rmit.edu.au
Nominal Hours: 50
Regardless of the mode of delivery, represent a guide to the relative teaching time and student effort required to successfully achieve a particular competency/module. This may include not only scheduled classes or workplace visits but also the amount of effort required to undertake, evaluate and complete all assessment requirements, including any non-classroom activities.
Pre-requisites and Co-requisites
Nil
Course Description
This unit describes the performance outcomes, skills and knowledge required to install, configure and test network security in an ICT network.
National Codes, Titles, Elements and Performance Criteria
National Element Code & Title: |
ICTNWK406 Install, configure and test network security |
Element: |
1. Assess network security threats and vulnerabilities to identify risk |
Performance Criteria: |
1.1 Assess and report on current system security, according to required asset security level 1.2 Determine additional network, software, hardware and system security threats and vulnerabilities 1.3 Use identified threats and vulnerability information to identify security risks 1.4 Make recommendations to management to address security deficiencies, according to current and future commercial and business requirements |
Element: |
2. Implement countermeasures for identified vulnerabilities and threats |
Performance Criteria: |
2.1 Implement required level of perimeter security based on current and future business needs 2.2 Assess and implement best practice server and network hardening techniques and measures 2.3 Implement secure authentication and user account controls 2.4 Secure data integrity and transmission |
Element: |
3. Test and verify functionality and performance of security system implemented |
Performance Criteria: |
3.1 Design test items to verify key function and performance measures against criteria 3.2 Conduct function and performance tests recording results 3.3 Modify and debug security system as necessary 3.4 Develop documentation on current system settings and file for future reference |
Element: |
4. Provide systems for monitoring and maintaining security |
Performance Criteria: |
4.1 Monitor current network security, including physical aspects, using appropriate third party testing software where applicable 4.2 Review logs and audit reports to identify and record security incidents, intrusions or attempts 4.3 Carry out spot checks and audits to ensure that procedures are not being bypassed 4.4 Document newly discovered security threats, vulnerabilities and risks in a report for presentation to appropriate person to gain approval for changes to be made |
Learning Outcomes
Activities in this course aim to enhance your knowledge required to Install, configure and test network security in an ICT network such as the use of VPN’s and firewalls.
Details of Learning Activities
Activities in this course are aimed at enhancing your understanding and knowledge installing anti-virus software, implementing a backup solution, reviewing and updating assets and security policies.
Teaching Schedule
This course will be co-delivered with the following course: ICTNWK403 Manage network and data integrity as there is common material found in both courses and they compliment each other.
8th Feb | 1 | Modern Security Threats |
|
|
15th Feb | 2 | Anti-Virus and Anti Spyware software | ||
22nd Feb | 3 | Assets | ||
29th Feb | 4 | Data Redundancy and Backups, Environmental Threats | Assignment 1 Due | |
7th March | 5 | System Monitoring | ||
14th March | 6 | Network Monitoring | ||
21st March | 7 | |||
Semester Break | ||||
28th March | 7 | Assignment 2 Due | ||
4th April | 8 | Security Policies | ||
11th April | 9 | VPN Technology | ||
18th April | 10 | Securing Netorking Devices | Assignment 3 Due | |
25th April | 11 |
|
||
2nd May | 12 | Firewall, Logs | Integrated Project (Stage 3 Due) | |
9th May | 13 | Client/Server VPN | ||
16th May | 14 | Testing | Assignment 4 Due | |
23rd May | 15 | Testing | ||
30th May | Assessment weeks |
Learning Resources
Prescribed Texts
References
Other Resources
All materials required for this course will be provided to you in class
Overview of Assessment
Assessment occurs throughout the program and includes learning and assessment activities conducted in the classroom, online and in the workplace giving you the opportunity to practice and be assessed on what you are learning in a work context. You must demonstrate an understanding of all elements of a particular competency to be deemed competent. Assessment methods have been designed to measure achievement of each competency in a flexible manner over a range of assessment tasks.
Assessment will incorporate a variety of methods including technical requirements, documentation, in class exercises, quizzes, practical problem solving exercises and presentations. Participants are advised that they are likely to be asked to personally demonstrate their assessment work to their teacher to ensure that the relevant competency standards are being met.
Assessment in this course will involve the following activities
Task 1. Assignment: You are required to assess and identify security threats, vulnerabilities and risks, determine appropriate countermeasure for threats
This task relates to Elements 1, & 2
Task 2. Assignment: You are required to implement security and monitoring to a live system based on the assessment brief.
This task relates to Elements 1, 2 & 4
Task 3. Assignment. You will be required to verify and modify the functionality of an implemented security system.
This task relates to Elements 2 & 3
Task 4. Assignment. You will be required to implement secure data transmission, test, monitor, log and update security systems.
This task relates to Elements 2, 3 & 4
Task 5. Assignment: You will be required, as part of an integrated assignment, create a database for auditing purposes.
This task relates to Element 1
If you have a long term medical condition and/or disability it may be possible to negotiate to vary aspects of the learning or assessment methods. You can contact the program coordinator or the Disability Liaison Unit if you would like to find out more.
Assessment Tasks
1. Assignment 1
This assessment will involve a co-assessment of two (2) courses, viz.:
ICTNWK406A Install, Configure and Test Network Security
ICTNWK403A Manage network and date integrity
2. Assignment 2
This assessment will involve a co-assessment of two (2) courses, viz.:
ICTNWK406A Install, Configure and Test Network Security
ICTNWK403A Manage network and date integrity
3. Assignment 3
This assessment will involve a co-assessment of two (2) courses, viz.:
ICTNWK406A Install, Configure and Test Network Security
ICTNWK403A Manage network and date integrity
4. Assignment 4
This assessment will involve a co-assessment of two (2) courses, viz.:
ICTNWK406A Install, Configure and Test Network Security
ICTNWK403A Manage network and date integrity
5. Integrated Project: Airport
This assessment will involve a co-assessment of six (6) courses, viz.:
ICTICT401 Determine and confirm client business requirements
ICTNWK404 Install, operate and troubleshoot a small enterprise branch network
ICTPMG401 Support small scale IT projects
ICTTEN513 Install, configure and test a local area network switch
ICTNWK403 Manage network and date integrity
ICTNWK406 Install, configure and test network security
You must be competent in all elements to successfully complete the course
You are permitted to have a maximum of 2 resubmissions for this course, however each individual assessment may only be resubmitted once.
All resubmissions must be completed and submitted no more than 7 days after your work has been graded.
Assessment Matrix
1.1 | x | x | |||
1.2 | x | x | |||
1.3 | x | x | |||
1.4 | x | x | |||
2.1 | x | x | x | x |
|
2.2 | x | x | x | x | |
2.3 | x | x | |||
2.4 | x | ||||
3.1 | x | x | |||
3.2 | x | x | x | ||
3.3 | x | x | x | ||
3.4 | x | x | |||
4.1 | x | ||||
4.2 | x | ||||
4.3 | x | ||||
4.4 | x | x | x |
Other Information
Access to an internet connected computer outside of class times – Internet connected computers are available in the School of Vocational Health and Sciences labs on levels 4, 6 or 8 of building 51, 81 Victoria Street, Melbourne.
Further lab access can be found in the student lab on level 3 (ground floor) of Building 8, in Swanston Street, Melbourne; as well as RMIT Libraries.
Plagiarism
RMIT has a strict policy on plagiarism. Please refer to the RMIT website for more information on this policy. http://www1.rmit.edu.au/browse;ID=sg4yfqzod48g1
Late work
Late work that is submitted without an application for an extension will not be corrected.
Extension of Time for submission of assessable work
A student may apply for an extension of up to 7 days from the original date. They must lodge the application form (available on the web: http://www1.rmit.edu.au/students/assessment/extension) at least the day before the due date. The application is lodged with the School Admin Office on Level 6, Building 51. Students requiring longer extensions must apply for Special consideration.
Special consideration Policy (Late Submission)
Students requiring longer extensions must apply for Special consideration. Form available online at: http://www1.rmit.edu.au/students/specialconsideration/online.
For missed assessments such as exams and tests, you (and your doctor, if you are ill) must fill out a special consideration form. This form must be lodged at the HUB or online with supporting evidence (e.g. medical certificate) prior to, or within 48 hours of the scheduled time of the exam or test.
If you miss an assessment task due to unavoidable circumstances you need to follow the procedure of special consideration and apply within the allowed time frame.
If you have any questions about this assessment process, feel free to email me on:alex.buono@rmit.edu.au
Course Overview: Access Course Overview