ICTTEN8195B Evaluate and apply network security



Similar documents
ICTTEN4215A Install and configure internet protocol TV in a service provider network

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling

Release: 1. ICANWK502A Implement secure encryption technologies

ICTTEN5204A Produce technical solutions from business specifications

ICTTEN2209A Build and maintain a secure network

ICANWK613A Develop plans to manage structured troubleshooting process of enterprise networks

ICANWK406A Install, configure and test network security

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

NETWORK ADMINISTRATION AND SECURITY

ICTTEN6043A Undertake network traffic management

(d-5273) CCIE Security v3.0 Written Exam Topics

ICTNPL5071A Develop planning strategies for core network design

Computer Networks CS321

ICTTEN4051A Install configuration programs on PC based customer equipment

Release 1. ICAICT814A Develop cloud computing strategies for a business

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

ICAB5238B Build a highly secure firewall

ICANWK414A Create a common gateway interface script

ICTTEN5168A Design and implement an enterprise voice over internet protocol and a unified communications network

How To Manage A Network Safely

ICANWK616A Manage security, privacy and compliance of cloud service deployment

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Transport and Network Layer

ICADBS504A Integrate database with a website

ICANWK610A Design and build integrated VoIP networks

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

How To Pass A Credit Course At Florida State College At Jacksonville

10CS64: COMPUTER NETWORKS - II

SSVP SIP School VoIP Professional Certification

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Review: Lecture 1 - Internet History

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Chapter 4: Networking and the Internet

CompTIA Exam N CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ]

ICANWK401A Install and manage a server

Introduction to Computer Security

Advanced Higher Computing. Computer Networks. Homework Sheets

Chapter 9. IP Secure

EXAM questions for the course TTM Information Security May Part 1

Network System Design Lesson Objectives

Release: 1. ICTPMG4152A Manage the delivery of network infrastructure

Raritan Valley Community College Academic Course Outline. CISY Advanced Computer Networking

Virtual Private Networks

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

ICASAS505A Review and update disaster recovery and contingency plans

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

Post-Class Quiz: Telecommunication & Network Security Domain

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

ICANWK501A Plan, implement and test enterprise communication solutions

Chapter 5. Data Communication And Internet Technology

The OSI and TCP/IP Models. Lesson 2

Chapter 32 Internet Security

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

EDA Training Programs. Catalog of Course Descriptions

ICANWK402A Install and configure virtual machines for sustainable ICT

Chapter 10. Network Security

IP Security. Ola Flygt Växjö University, Sweden

Release: 1. ICAWEB414A Design simple web page layouts

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006

Data Communication Networks and Converged Networks

Gerardo L. Ahuatzin Sánchez Desarrollo de un esquema de traducción de direcciones IPv6-IPv4-IPv6. Anexo A. RFC s

ICAWEB502A Create dynamic web pages

Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities

Zarządzanie sieciami telekomunikacyjnymi

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Computer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill

SSVVP SIP School VVoIP Professional Certification

Hands on VoIP. Content. Tel +44 (0) Introduction

Cryptography and network security CNET4523

Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

CCNA Security 1.1 Instructional Resource

Introduction to Computer Security

Bachelor of Information Technology (Network Security)

ICANWK504A Design and implement an integrated server solution

IPV6 vs. SSL comparing Apples with Oranges

Release: 1. ICASAS206A Detect and protect from spam and destructive software

Release: 1. ICADBS601A Build a data warehouse

Chapter 8. Network Security

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Networking Technology Online Course Outline

The Internet. Internet Technologies and Applications

;. ' ;. - ' Computer Networking. ^4 Top-Down Approach. James F. Kurose. Keith W. Ross. Polytechnic University, Brooklyn PEARSON.

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Security WILEY. Wireless Mobile Internet. Second Edition. Man Young Rhee. Endowed Chair Professor, Kyung Hee University

ICAWEB424A Evaluate and select a web hosting service

Lesson 1 Quiz Certification Partners, LLC. All Rights Reserved. Version 2.0

Networking 4 Voice and Video over IP (VVoIP)

Network Access Security. Lesson 10

Transcription:

ICTTEN8195B Evaluate and apply network security Release 1

ICTTEN8195B Evaluate and apply network security Modification History Release Release 2 Comments This version first released with ICT10 Integrated Telecommunications Training Package Version 3.0. References to other units updated. Outcomes deemed equivalent. Release 1 This version first released with ICT10 Integrated Telecommunications Training Package Version 1.0. Unit Descriptor This unit describes the performance outcomes, skills and knowledge required to analyse the security features of an internet protocol (IP) based telecommunications network. This applies to IT networking and telecommunications networking topologies. Application of the Unit Telecommunication engineers apply the skills and knowledge in this unit to analyse and report on the security of an ICT network, particularly Internet security. They are responsible for the evaluation of security of ICT networks using converging switching and transmission technologies in local area networks (LAN) and wide area networks (WAN), broadband networks, internet protocol TV (IPTV) and virtual networks. Licensing/Regulatory Information No licensing, legislative, regulatory or certification requirements apply to this unit at the time of endorsement but users should confirm requirements with the relevant federal, state or territory authority. Approved Page 2 of 11

Pre-Requisites Not applicable. Employability Skills Information This unit contains employability skills. Elements and Performance Criteria Pre-Content Element Elements describe the essential outcomes of a unit of competency. Performance Criteria Performance criteria describe the performance needed to demonstrate achievement of the element. Where bold italicised text is used, further information is detailed in the required skills and knowledge section and the range statement. Assessment of performance is to be consistent with the evidence guide. Approved Page 3 of 11

Elements and Performance Criteria 1. Analyse the operation of the Internet 2. Analyse internetwork protocols 3. Research and report internetwork operations 4. Analyse features and types of network security 1.1 Evaluate the interrelationship of IP to open systems interconnect (OSI) seven layer model and the impact on network topologies and network elements 1.2 Assess media access control (MAC) and IP addressing and their application in security 1.3 Report on transmission control protocol/internet protocol (TCP/IP) operations and the use of transport protocols for transmitting data over the network 1.4 Examine the various types of routing protocols and implication on security 1.5 Analyse forms of label switching as applied to data packets 1.6 Use software to simulate the least cost algorithms 2.1 Compare connection-oriented and connection-less networks in internetworking applications 2.2 Research the design parameters used in networks 2.3 Produce a report on IP multi-casting protocols and systems including IP frame fields of the data frames 3.1 Analyse protocol considerations of voice over internet protocol (VoIP) 3.2 Research the protocols G723.1, G729 and G729A standards and evaluate their application in internetworking 3.3 Determine the format of JPEG and GIF files as applied to still pictures 3.4 Determine the format of MPEG-2 and H.32x series multimedia protocols for motion pictures 3.5 Evaluate the features of different of multi-service protocols and of different email system protocols in networking operations 3.6 Produce a report on the features the different web-based protocols used in internetworking operations 4.1 Analyse procedures and processes used for security attacks and use of protection mechanisms 4.2 Research conventional encryption algorithms and determine possible locations of encryption devices 4.3 Produce a report on conventional encryption key distribution problems and how message authentication and verification is achieved Approved Page 4 of 11

4.4 Research one-way hashing and secure hashing functions 4.5 Produce a report on digital signature standard (DSS) principles including public key cryptography algorithms for network security 5. Research features of public key authentication and email network security protocols 6. Research features of web, network management and system security 7. Document evaluation report 5.1 Research public key authentication using Kerberos 5.2 Analyse how electronic mail security is achieved using pretty good privacy (PGP) 5.3 Research and report on IPSec protocol security 5.4 Produce a report on encapsulating security payload (ESP) including Internet key management processes 6.1 Analyse how web threats and attacks occur in an IP network and determine system intruders and threats 6.2 Research the operation of transaction protocols 6.3 Evaluate the processes used for selection and protection of system passwords 6.4 Evaluate system threats and methods used to counter act the threats 6.5 Produce a report on anti-virus protection strategies, including firewall design principles, types and configurations 7.1 Present a final report to include research and evaluation of network security management principles and the application to the network in the workplace with enhancement recommendations Approved Page 5 of 11

Required Skills and Knowledge This section describes the skills and knowledge required for this unit. Required skills analytical skills to evaluate a range of complex technical data communication skills to work effectively within a group and present information information technology skills to use: software for desktop research statistical data word processing software literacy skills to prepare reports given a specific format and read and interpret technical standards planning and organisational skills to manage own work in specific time frames research skills to gather and record data from measurements technical skills to: operate test equipment use telecommunications management networks. Required knowledge administrative network management systems algorithms cryptography encapsulation encryption enterprise solutions firewalls network topologies operations network management systems organisational policy and procedures protocols routing theory system threats transaction protocols workplace and industry environment. Approved Page 6 of 11

Evidence Guide The evidence guide provides advice on assessment and must be read in conjunction with the performance criteria, required skills and knowledge, range statement and the Assessment Guidelines for the Training Package. Overview of assessment Critical aspects for assessment and evidence required to demonstrate competency in this unit Context of and specific resources for assessment Method of assessment Evidence of the ability to: analyse the operation of the Internet implement Internet technology select Internetwork protocols research and report various internetwork operations analyse features and types of network security methods and their weaknesses analyse features of various cryptography systems research and report the features of public key authentication and email network security protocols research and report the features of web, network management and system security. Assessment must ensure: a telecommunications operations site with a mentor or supervisor appropriately experienced in relevant telecommunications technology and infrastructure networked computers and relevant software. A range of assessment methods should be used to assess practical skills and knowledge. The following examples are appropriate for this unit: Guidance information for assessment oral or written questioning to assess required knowledge direct observation of the candidate carrying out relevant security checks within a networked communication system review of reports completed by the candidate for different security breached scenarios. Holistic assessment with other units relevant to the industry sector, workplaces and job role is recommended, for example: ICTPMG8143B Manage a telecommunications project Approved Page 7 of 11

ICTPMG8149B Evaluate and use telecommunications management networks. Aboriginal people and other people from a non-english speaking background may have second language issues. Access must be provided to appropriate learning and assessment support when required. Assessment processes and techniques must be culturally appropriate, and appropriate to the oral communication skill level, and language and literacy capacity of the candidate and the work being performed. In all cases where practical assessment is used it will be combined with targeted questioning to assess required knowledge. Questioning techniques should not require language, literacy and numeracy skills beyond those required in this unit of competency. Where applicable, physical resources should include equipment modified for people with special needs. Approved Page 8 of 11

Range Statement The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included. Network elements may Transport protocols may Routing protocols may Label switching may Least cost algorithms may Design parameters may Frame fields may bridges gateways routers servers switches. Ethernet point-to-point protocol (PPP) synchronous data link control (SDLC) synchronous optical network (SONET). adaptive enhanced interior gateway routing protocol (EIGRP) fixed flooding interior gateway routing protocol (IGRP) open shortest path first (OSPF) random routing information protocol (RIP). cell switching routers (CSR) IP tag. Bellman-Ford's Dijkstra's. datagram lifetime error and flow control techniques fragmentation reassembly routing. datagram format internet control message protocol (ICMP) IPv6 header and addressing protocol data unit (PDU). Multi-service protocols border gateway protocol (BGP) OSPF Approved Page 9 of 11

may resource reservation protocol (RSVP) real time control protocol (RTCP) real time protocol (RTP). Email system protocols may Web-based protocols may Encryption algorithms may Hashing functions may Public key cryptography algorithms may data transparency: ASCII binary EBCDIC radix64 coding Unicode multipurpose mail extensions (MIME) simple mail transfer protocol (SMTP). common gateway interface (CGI) file transfer protocol (FTP) hyper-text mark-up language protocol (HTML) hyper-text transfer protocol (HTTP) Java applets and application programmers interface (API). Blowfish Data Encryption Standard (DES) Feistel Cipher International Data Encryption Algorithm (IDEA). hash message authentication checksum (HMAC) Secure HAsh (SHA-1). Dieffie-Hellman key exchange Rivest Shamir Adleman (RSA). IPSec may authentication header internet protocol (IP) security transport and tunnel modes of operation. Key management processes may Transaction protocols may System threats may internet security association and key management protocol (ISAKMP) Oakley key determination protocol (OKDP). secure electronic transaction (SECT) simple network management protocol (SNMP) SNMPv1 (community facility and proxies) SNMPv3 (message processing and the user security model) secure socket layer (SSL). logic bombs trap doors Trojans Approved Page 10 of 11

viruses worms. Unit Sector(s) Telecommunications - Telecommunications networks engineering Approved Page 11 of 11