Course Title: Install, configure and test network security

Part B: Course Detail

Teaching Period: Term1 2019

Course Code: COSC6197C

Course Title: Install, configure and test network security

School: 174T School of VE Engineering, Health & Science

Campus: City Campus

Program: C4378 - Certificate IV in Information Technology Networking

Course Contact: Alex Buono

Course Contact Phone: +61 3 9925 4475

Course Contact Email: alex.buono@rmit.edu.au


Name and Contact Details of All Other Relevant Staff

Eddie Vanda School of Vocational Engineering, Health and Science (SVEHS) Program Manager Tel: (03) 9925 4456 Fax: (03) 9925 4189 Email eddie.vanda@rmit.edu.au 

Nominal Hours: 50

Regardless of the mode of delivery, represent a guide to the relative teaching time and student effort required to successfully achieve a particular competency/module. This may include not only scheduled classes or workplace visits but also the amount of effort required to undertake, evaluate and complete all assessment requirements, including any non-classroom activities.

Pre-requisites and Co-requisites

Nil

Course Description

This unit describes the performance outcomes, skills and knowledge required to install, configure and test network security in an ICT network.


National Codes, Titles, Elements and Performance Criteria

National Element Code & Title:

ICTNWK406 Install, configure and test network security

Element:

1. Assess network security threats and vulnerabilities to identify risk

Performance Criteria:

1.1 Assess and report on current system security, according to required asset security level

1.2 Determine additional network, software, hardware and system security threats and vulnerabilities

1.3 Use identified threats and vulnerability information to identify security risks

1.4 Make recommendations to management to address security deficiencies, according to current and future commercial and business requirements

Element:

2. Implement countermeasures for identified vulnerabilities and threats

Performance Criteria:

2.1 Implement required level of perimeter security based on current and future business needs

2.2 Assess and implement best practice server and network hardening techniques and measures

2.3 Implement secure authentication and user account controls

2.4 Secure data integrity and transmission

Element:

3. Test and verify functionality and performance of security system implemented

Performance Criteria:

3.1 Design test items to verify key function and performance measures against criteria

3.2 Conduct function and performance tests recording results

3.3 Modify and debug security system as necessary

3.4 Develop documentation on current system settings and file for future reference

Element:

4. Provide systems for monitoring and maintaining security

Performance Criteria:

4.1 Monitor current network security, including physical aspects, using appropriate third party testing software where applicable

4.2 Review logs and audit reports to identify and record security incidents, intrusions or attempts

4.3 Carry out spot checks and audits to ensure that procedures are not being bypassed

4.4 Document newly discovered security threats, vulnerabilities and risks in a report for presentation to appropriate person to gain approval for changes to be made


Learning Outcomes


Activities in this course aim to enhance your knowledge required to Install, configure and test network security in an ICT network such as the use of VPN’s and firewalls.


Details of Learning Activities

Activities in this course are aimed at enhancing your understanding and knowledge installing anti-virus software, implementing a backup solution, reviewing and updating assets and security policies.


Teaching Schedule

This course will be co-delivered with the following course:  ICTNWK403 Manage network and data integrity as there is common material found in both courses and they compliment each other.

 

Week

Topics Delivered

Elements/Performance  criteria

1

Modern Security Threats

Assignment 1 released (Due Week 4)

1.2 - 1.4

2.1, 2.2

2

Anti-Virus and Anti Spyware software

1.2 - 1.4

2.1, 2.2

3.3

3

Assets

 

4

Data Redundancy and Backups

Environmental Threats

 

5

System Monitoring

User Access

Assignment 2 released (Due Week 8)

4.2 - 4.4

6

Network Monitoring

Best Practice

2.2

4.1

7

File Access

2.3

8

Assignment work

 

9

Security Policies

Assignment 3 released (Due Week 12)

1.1

10

VPN Technology

2.4

11

Securing Networking Devices

2.2

12

 Assignment 3

 

13

Firewall, Logs

Assignment 4 released (Due Week 16)

4.1 - 4.4

14

Setup Client/Server VPN

2.4

15

Testing

3.1 - 3.4

16

Completion and Submission of Assignment 4

 

17

Review of Assignment 4

 

18

Course Review and Feedback

 

 

*Please note this timeline is subject to change.

 


Learning Resources

Prescribed Texts


References


Other Resources

None


Overview of Assessment

Assessment occurs throughout the program and includes learning and assessment activities conducted in the classroom, online and in the workplace giving you the opportunity to practice and be assessed on what you are learning in a work context. You must demonstrate an understanding of all elements of a particular competency to be deemed competent. Assessment methods have been designed to measure achievement of each competency in a flexible manner over a range of assessment tasks.

Assessment will incorporate a variety of methods including technical requirements, documentation, in class exercises, quizzes, practical problem solving exercises and presentations. Participants are advised that they are likely to be asked to personally demonstrate their assessment work to their teacher to ensure that the relevant competency standards are being met.

Assessment in this course will involve the following activities
Task 1. Assignment: You are required to assess and identify security threats, vulnerabilities and risks, determine appropriate countermeasure for threats
This task relates to Elements 1, & 2

Task 2. Assignment: You are required to implement security and monitoring to a live system based on the assessment brief.
This task relates to Elements 1, 2 & 4

Task 3. Assignment. You will be required to verify and modify the functionality of an implemented security system.
This task relates to Elements 2 & 3

Task 4. Assignment. You will be required to implement secure data transmission, test, monitor, log and update security systems.
This task relates to Elements 2, 3 & 4

Task 5. Assignment: You will be required, as part of an integrated assignment, create a database for auditing purposes.
This task relates to Element 1

If you have a long term medical condition and/or disability it may be possible to negotiate to vary aspects of the learning or assessment methods. You can contact the program coordinator or the Disability Liaison Unit if you would like to find out more.


Assessment Tasks

1. Assignment 1

This assessment will involve a co-assessment of two (2) courses, viz.:

ICTNWK406A Install, Configure and Test Network Security

ICTNWK403A Manage network and date integrity

2. Assignment 2

This assessment will involve a co-assessment of two (2) courses, viz.:

ICTNWK406A Install, Configure and Test Network Security

ICTNWK403A Manage network and date integrity

3. Assignment 3

This assessment will involve a co-assessment of two (2) courses, viz.:

ICTNWK406A Install, Configure and Test Network Security

ICTNWK403A Manage network and date integrity

4. Assignment 4

This assessment will involve a co-assessment of two (2) courses, viz.:

ICTNWK406A Install, Configure and Test Network Security

ICTNWK403A Manage network and date integrity

 

You are permitted to have a maximum of 1 resubmission per assessment for this course, however each individual assessment may only be resubmitted once.

All resubmissions must be completed and submitted no more than 7 days after your work has been graded.


Assessment Matrix

Students must pass each of the following assessment tasks to demonstrate competent.

 

Assessment

Task 1

Assignment 1

Task 2

Assignment 2

Task 3

Assignment 3

Task 4

Assignment 4


These tasks assesses the following Course Learning Outcomes (CLOs):

 

Element

Task 1

Task 2

Task 3

Task 4

1.1

x

     

1.2

x

     

1.3

x

     

1.4

x

     

2.1

x

x

 

x

2.2

 

x

x

x

2.3

     

x

2.4

     

x

3.1

   

x

x

3.2

 

x

x

x

3.3

 

x

x

x

3.4

   

x

x

4.1

 

x

   

4.2

     

x

4.3

     

x

4.4

 

x

x

x

Other Information

Credit Transfer and/or Recognition of Prior Learning (RPL):
You may be eligible for credit towards courses in your program if you have already met the learning/competency outcomes through previous learning and/or industry experience. To be eligible for credit towards a course, you must demonstrate that you have already completed learning and/or gained industry experience that is:

  • Relevant
  • Current
  • Satisfies the learning/competency outcomes of the course

Please refer to http://www.rmit.edu.au/students/enrolment/credit to find more information about credit transfer and RPL

Study and learning Support:

Study and Learning Centre (SLC) provides free learning and academic development advice to you. 
Services offered by SLC to support your numeracy and literacy skills are: 

  • assignment writing, thesis writing and study skills advice 
  • maths and science developmental support and advice 
  • English language development 

Please Refer http://www.rmit.edu.au/studyandlearningcentre to find more information about Study and learning Support 

Equitable Learning Services (ELS):

If you are suffering from long-term medical condition or disability, you should contact Equitable Learning Services (ELS) to seek advice and support to complete your studies.
Please refer to https://www.rmit.edu.au/students/support-and-facilities/student-support/equitable-learning-services to find more information about services offered by Equitable Learning Services (ELS).

Late submission: 

If you require an Extension of Submittable Work (assignments, reports or project work etc.) for 7 calendar days or less (from the original due date) and have valid reasons, you must complete and lodge an Application for Extension of Submittable Work (7 Calendar Days or less) form and lodge it with the Senior Educator/ Program Manager. 
The application must be lodged no later than one working day before the official due date. You will be notified within no more than 2 working days of the date of lodgment as to whether the extension has been granted. 
If you seek an Extension of Submittable Work for more than 7 calendar days (from the original due date) must lodge an Application for Special Consideration form under the provisions of the Special Consideration Policy, preferably prior to, but no later than 2 working days after the official due date. 

Submittable Work (assignments, reports or project work etc.) submitted late without approval of an extension will not be accepted or marked. 


Special consideration: 

Please Refer http://www.rmit.edu.au/students/specialconsideration to find more information about special consideration 

Plagiarism: 

Plagiarism is a form of cheating and it is very serious academic offence that may lead to expulsion from the University. 

Please Refer: www.rmit.edu.au/academicintegrity to find more information about plagiarism. 

Other Information: 

All email communications will be sent to your RMIT email address and you must regularly check your RMIT emails.

Course Overview: Access Course Overview