Course Title: Manage network and data integrity
Part B: Course Detail
Teaching Period: Term1 2014
Course Code: COSC6091C
Course Title: Manage network and data integrity
School: 155T Vocational Health and Sciences
Campus: City Campus
Program: C4299 - Certificate IV in Information Technology Networking
Course Contact: Geoff Moss
Course Contact Phone: +61 3 9925 4852
Course Contact Email: geoff.moss@rmit.edu.au
Name and Contact Details of All Other Relevant Staff
Alex Buono
Ph: 99254475
Email: alex.buono@rmit.edu.au
Nominal Hours: 40
Regardless of the mode of delivery, represent a guide to the relative teaching time and student effort required to successfully achieve a particular competency/module. This may include not only scheduled classes or workplace visits but also the amount of effort required to undertake, evaluate and complete all assessment requirements, including any non-classroom activities.
Pre-requisites and Co-requisites
Nil
Course Description
This unit describes the performance outcomes, skills and knowledge required to implement and manage security functions throughout a network.
National Codes, Titles, Elements and Performance Criteria
National Element Code & Title: |
ICANWK403A Manage network and data integrity |
Element: |
Conduct audit on system assets |
Performance Criteria: |
1.1 Review company security policies 1.2 Audit and record security access 1.3 Ensure user accounts are controlled 1.4 Ensure secure file and resource access |
Element: |
Ensure compliance with company network and security policies |
Performance Criteria: |
2.1 Use appropriate tools and techniques to conduct audit on system hardware and software assets 2.2 Develop a system to record assets 2.3 Use system to develop reports on assets for management |
Element: |
Implement an antivirus Solution |
Performance Criteria: |
3.1 Research appropriate antivirus and anti-malware solutions 3.2 Implement antivirus or anti-malware solution 3.3 Test antivirus and anti-malware solution functionality |
Element: |
Implement systems to protect assets from threats |
Performance Criteria: |
4.1 Determine environmental threats to data 4.2 Document systems to protect from environmental threat 4.3 Implement system to protect data from environmental threat |
Element: |
Monitor Network Performance |
Performance Criteria: |
6.1 Determine available network performance monitoring tools 6.2 Implement network performance monitoring tools to monitor network 6.3 Produce report on network performance |
Learning Outcomes
Activities in this course aim to enhance your knowledge required to implement and manage security functions throughout a network. The Internet will be used as a learning tool and a resource for students to seek and locate relevant information.
Details of Learning Activities
Activities in this course are aimed at enhancing your understanding and knowledge installing anti-virus software, implementing a backup solution, reviewing and updating assets and security policies.
Teaching Schedule
1 | Introduction Security Policies Environmental Threats |
Report | |
2 | Asset Recording Anti-Virus |
Report Install an Anti-Virus |
|
3 | Backup Solutions Network performance |
Backup solutions Report |
Learning Resources
Prescribed Texts
References
Other Resources
Overview of Assessment
Assessment occurs throughout the program and includes learning and assessment activities conducted in the classroom, online and in the workplace giving you the opportunity to practice and be assessed on what you are learning in a work context. You must demonstrate an understanding of all elements of a particular competency to be deemed competent. Assessment methods have been designed to measure achievement of each competency in a flexible manner over a range of assessment tasks.
Assessment will incorporate a variety of methods including technical requirements, documentation, workplace activities, in class exercises, quizzes, practical problem solving exercises and presentations. Participants are advised that they are likely to be asked to personally demonstrate their assessment work to their teacher to ensure that the relevant competency standards are being met.
If you have a long term medical condition and/or disability it may be possible to negotiate to vary aspects of the learning or assessment methods. You can contact the program coordinator or the Disability Liaison Unit if you would like to find out more.
Assessment Tasks
Report
You will be required to write a report that looks at the following areas:
• Look at different aspects of a company’s security policies
• Conduct an audit on a systems hardware and software assets
• Develop a system to record the assets
• Research different anti-virus products and make a recommendation
• Determine environmental threats to data
• Document, develop and implement a system to protect data from environmental threats
• Research various backup solutions and make a recommendation
• Network performance
Skills Based Assessments:
These assessments can be done either at RMIT or at the workplace, providing appropriate equipment is available.
Students must demonstrate they are competent in each of the following areas in order to complete the course satisfactorily.
Skills required to be demonstrated:
• Use appropriate tools to conduct an audit on a system
• Install and test an antivirus
• Implement a backup solution
• Use back to restore a system/data
• Use a sync solution such as folder sync
• Monitor network performance using appropriate tools such as wireshark
Assessment Matrix
1.1 | x | |||
1.4 | x | |||
1.3 | x | |||
1.4 | x | |||
2.1 | x | x | x | x |
2.2 | x | |||
2.3 | x | |||
3.1 | x | |||
3.2 | x | x | x | x |
3.3 | x | x | x | x |
4.1 | x | x | x | x |
4.2 | x | |||
4.3 | x | x | x | x |
5.1 | x | |||
5.2 | x | |||
5.3 | x | x | x | x |
5.4 | x | x | x | x |
5.5 | x | x | x | x |
5.6 | x | x | x | x |
6.1 | x | x | x | x |
6.2 | x | x | x | x |
6.3 | x |
Course Overview: Access Course Overview