Course Title: Install, configure and test network security
Part A: Course Overview
Program: C4378 Certificate IV in Information Technology Networking
Course Title: Install, configure and test network security
Portfolio: SEH Portfolio Office
Nominal Hours: 50
Regardless of the mode of delivery, represent a guide to the relative teaching time and student effort required to successfully achieve a particular competency/module. This may include not only scheduled classes or workplace visits but also the amount of effort required to undertake, evaluate and complete all assessment requirements, including any non-classroom activities.Terms
Course Code |
Campus |
Career |
School |
Learning Mode |
Teaching Period(s) |
COSC6197C |
City Campus |
TAFE |
155T Vocational Health and Sciences |
Distance / Correspondence or Face-to-Face or Internet or Workplace |
Term1 2016, Term2 2016 |
COSC6197C |
City Campus |
TAFE |
174T School of VE Engineering, Health & Science |
Distance / Correspondence or Face-to-Face or Internet or Workplace |
Term1 2017, Term2 2017, Term1 2018, Term2 2018, Term1 2019, Term2 2019 |
Course Contact: Alex Buono
Course Contact Phone: +61 3 9925 4475
Course Contact Email: alex.buono@rmit.edu.au
Course Description
This unit describes the performance outcomes, skills and knowledge required to install, configure and test network security in an ICT network.
Pre-requisite Courses and Assumed Knowledge and Capabilities
Nil
National Competency Codes and Titles
National Element Code & Title: |
ICTNWK406 Install, configure and test network security |
Elements: |
1. Assess network security threats and vulnerabilities to identify risk 2. Implement countermeasures for identified vulnerabilities and threats 3. Test and verify functionality and performance of security system implemented 4. Provide systems for monitoring and maintaining security |
Learning Outcomes
Activities in this course aim to enhance your knowledge required to Install, configure and test network security in an ICT network such as the use of VPN’s and firewalls.
Overview of Assessment
Assessment occurs throughout the program and includes learning and assessment activities conducted in the classroom, online and in the workplace giving you the opportunity to practice and be assessed on what you are learning in a work context. You must demonstrate an understanding of all elements of a particular competency to be deemed competent. Assessment methods have been designed to measure achievement of each competency in a flexible manner over a range of assessment tasks.
Assessment will incorporate a variety of methods including technical requirements, documentation, in class exercises, quizzes, practical problem solving exercises and presentations. Participants are advised that they are likely to be asked to personally demonstrate their assessment work to their teacher to ensure that the relevant competency standards are being met.
Assessment in this course will involve the following activities
Task 1. Assignment: You are required to assess and identify security threats, vulnerabilities and risks, determine appropriate countermeasure for threats
This task relates to Elements 1, & 2
Task 2. Assignment: You are required to implement security and monitoring to a live system based on the assessment brief.
This task relates to Elements 1, 2 & 4
Task 3. Assignment. You will be required to verify and modify the functionality of an implemented security system.
This task relates to Elements 2 & 3
Task 4. Assignment. You will be required to implement secure data transmission, test, monitor, log and update security systems.
This task relates to Elements 2, 3 & 4
Task 5. Assignment: You will be required, as part of an integrated assignment, create a database for auditing purposes.
This task relates to Element 1
If you have a long term medical condition and/or disability it may be possible to negotiate to vary aspects of the learning or assessment methods. You can contact the program coordinator or the Disability Liaison Unit if you would like to find out more.