Release: 1. ICTNWK607 Design and implement wireless network security



Similar documents
Release: 1. ICANWK607A Design and implement wireless network security

BSBSMB412 Introduce cloud computing into business operations

BSBSMB412 Introduce cloud computing into business operations

ICANWK406A Install, configure and test network security

Release: 1. ICTWEB406 Create website testing procedures

BSBMKG609 Develop a marketing plan

FNSPIM505 Use medical knowledge in the management of personal injury claims

ICTWEB502 Create dynamic web pages

Release: 1. ICTSAS601 Implement change management processes

Release: 1. ICTTEN603 Undertake network traffic management

ICA60211 Advanced Diploma of Network Security

Release: 1. BSBMKG519 Plan and implement business-to-business marketing

BSBSMB305 Comply with regulatory, taxation and insurance requirements for the micro business

ICTICT423 Select cloud storage strategies

ICTICT103 Use, communicate and search securely on the internet

Release: 1. ICTSAD505 Develop technical requirements for business solutions

ICTICT812 Develop a business intelligence framework

ICANWK610A Design and build integrated VoIP networks

How To Be A Successful It Manager

Release: 1. ICTPRG502 Manage a project using software management tools

Release: 1. ICANWK502A Implement secure encryption technologies

ICTWEB302 Build simple websites using commercial programs

RPL Candidate Self-Evaluation

ICTWEB512 Administer business websites and servers

BSBSMB308 Improve energy efficiency in micro or small business operations

Release: 1. ICASAS407A Conduct pre-installation audit for software installation

University of Central Florida Class Specification Administrative and Professional. Information Security Officer

SFS SYS 6 (SQA Unit Code - H4GK 04) Plan the installation of electronic security systems

Release: 1. ICTPRG503 Debug and monitor applications

ICANWK504A Design and implement an integrated server solution

ICTTEN4051A Install configuration programs on PC based customer equipment

Bachelor of Information Technology (Network Security)

1 Purpose Scope Roles and Responsibilities Physical & Environmental Security Access Control to the Network...

ESKISP Conduct security testing, under supervision

T141 Computer Systems Technician MTCU Code Program Learning Outcomes

Release: 1. ICASAS206A Detect and protect from spam and destructive software

EA-ISP-012-Network Management Policy

Information security controls. Briefing for clients on Experian information security controls

ICTICT403 Apply software development methodologies

Release: 1. BSBMKG508 Plan direct marketing activities

Release: 1. ICPPRN493 Set up and monitor in-line printing operations

NOS for Network Support (903)

Release: 3. HLTADM002 Manage Telehealth technology

ICASAS420A Provide first-level remote help-desk support

ICANWK616A Manage security, privacy and compliance of cloud service deployment

Information Technology Cluster

ICAICT704A Direct ICT in a supply chain

External Supplier Control Requirements

PCI Solution for Retail: Addressing Compliance and Security Best Practices

Blacklisting Procedure

ESKISP Direct security testing

CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---

Release: 1. CPPSEC4015A Maintain networked security system

Supplier Security Assessment Questionnaire

ICAB5238B Build a highly secure firewall

Appendix A-2 Generic Job Titles for respective categories

ICTTEN2209A Build and maintain a secure network

ICANWK613A Develop plans to manage structured troubleshooting process of enterprise networks

OSU INSTITUTE OF TECHNOLOGY POLICY & PROCEDURES

Course 20688A: Managing and Maintaining Windows 8

Design and Implementation Guide. Apple iphone Compatibility

Security Requirements for Wireless Local Area Networks

Release: 1. ICADBS601A Build a data warehouse

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction

Release: 1. ICAICT604A Identify and implement business innovation

Release: 1. BSBWHS508 Manage WHS hazards associated with plant

JOB DESCRIPTION CONTRACTUAL POSITION

A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model

ICTTEN5204A Produce technical solutions from business specifications

Information and Communication Technology. Firewall Policy

Best Practices For Department Server and Enterprise System Checklist

INFORMATION TECHNOLOGY

Potential Security Vulnerabilities of a Wireless Network. Implementation in a Military Healthcare Environment. Jason Meyer. East Carolina University

ICADBS402A Complete database backup and restore

ICANWK402A Install and configure virtual machines for sustainable ICT

Merthyr Tydfil County Borough Council. Information Security Policy

INFORMATION TECHNOLOGY SECURITY STANDARDS

K-Series Guide: Guide to digitising your document and business processing. February 2014 LATEST EDITION

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

Best Practices for Outdoor Wireless Security

ICANWK401A Install and manage a server

UMHLABUYALINGANA MUNICIPALITY FIREWALL MANAGEMENT POLICY

ICASAS505A Review and update disaster recovery and contingency plans

Why Migrate to the Cisco Unified Wireless Network?

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Transcription:

Release: 1 ICTNWK607 Design and implement wireless network security

ICTNWK607 Design and implement wireless network security Modification History Release Release 1 Comments This version first released with ICT Information and Communications Technology Training Package Version 1.0. Application This unit describes the skills and knowledge required to mitigate security threats to a wireless local area network (WLAN) by implementing security standards and policies. It applies to individuals with advanced information and communications technology (ICT) skills who are working as wireless help desk support technicians, wireless network support specialists and wireless network engineers. No licensing, legislative or certification requirements apply to this unit at the time of publication. Unit Sector Networking Approved Page 2 of 6

Elements and Performance Criteria ELEMENT Elements describe the essential outcomes. 1. Plan to implement wireless network security 2. Design, implement and test guest access services 3. Design, implement and test the security of wireless client devices 4. Design, implement and test the integration of wireless network with organisational network admission control systems 5. Evaluate and plan secure wireless connectivity services PERFORMANCE CRITERIA Performance criteria describe the performance needed to demonstrate achievement of the element. 1.1 Research and evaluate organisational and regulatory security policies that have been used to benchmark acceptable network security standards 1.2 Assess customer requirements and needs against regulatory security compliance and work health and safety (WHS) considerations 1.3 Produce a plan with security solution documentation for future growth and security needs 2.1 Analyse and select the appropriate architecture for guest access services 2.2 Produce a map and set up guest access accounts 2.3 Configure WLAN controller authorisation 2.4 Configure the anchor and internal controllers 2.5 Troubleshoot guest access issues 3.1 Design and configure authentication of clients and management frame protection on clients and controllers 3.2 Configure access control servers for integration with wireless network 3.3 Configure client- and server-side digital certificate services 3.4 Troubleshoot secure wireless connectivity services 4.1 Analyse network admission control architectures to assess the feasibility of network integration 4.2 Analyse the high-level authentication process flow to ensure compatible integration 4.3 Configure and test the wireless controller for admission control 4.4 Troubleshoot integration issues of network with access control 5.1 Configure the intrusion detection system (IDS) to monitor the network activities for malicious activities or policy violations 5.2 Analyse the report produced by the IDS to review Approved Page 3 of 6

ELEMENT 6. Manage the requirements to integrate the WLAN with advanced security platforms PERFORMANCE CRITERIA threat-mitigation strategies 5.3 Update security solution plan to mitigate wireless vulnerabilities to ensure network integrity 6.1 Evaluate end-to-end security solutions and assess how they integrate with the planned wireless solutions 6.2 Analyse the firewall configuration requirements of WLANs to ensure compliance with organisational policies 6.3 Configure and test the WLAN controllers for wired and wireless intrusion prevention and detection system (IPDS) security protection Approved Page 4 of 6

Foundation Skills This section describes language, literacy, numeracy and employment skills incorporated in the performance criteria that are required for competent performance. Skill Performance Criteria Description Reading 1.1, 1.2, 5.2, 6.2 Recognises and interprets complex technical information to determine hardware requirements Writing 1.3, 2.2, 5.3 Develops a broad range of material including plans, maps and other documentation for a specific audience, using clear and detailed language to convey explicit information, requirements and recommendations Numeracy 4.2, 4.3, 5.2, 6.3 Interprets numerical data and undertakes measurements to evaluate performance and interoperability of network Navigate the world of work Get the work done 1.1, 1.2, 6.2 Understands own legal rights and responsibilities, and considers implications of these when planning and undertaking work 1.2, 2.1, 2.2-2.5, 3.1-3.4, 4.1-4.4, 5.1, 6.1-6.3 Demonstrates a sophisticated understanding of principles, concepts, language and practices associated with the digital world and uses these to troubleshoot and understand the uses and potential of new technology Uses a broad range of strategies to store, access and organise virtual information, recognising that design choices will influence what information is retrieved and how it may be interpreted and used Is acutely aware of the importance of understanding, monitoring and controlling access to digitally stored and transmitted information Uses a mix of intuitive and formal processes to identify key information and issues, evaluate alternative strategies, anticipate consequences and consider implementation issues and contingencies Uses nuanced understanding of context to adapt configuration procedures to requirements of network, troubleshoot and debug WLAN issues and modify work depending on operational contingencies, risk situations and environments Monitors outcomes of decisions, considering results from a range of perspectives and identifying key concepts and principles that may be adaptable to future situations Approved Page 5 of 6

Unit Mapping Information Code and title current version Code and title previous version Comments Equivalence status ICTNWK607 Design and implement wireless network security ICANWK607A Design and implement wireless network security Updated to meet Standards for Training Packages. Equivalent unit Links Companion volumes available from the IBSA website: http://www.ibsa.org.au/companion_volumes - http://www.ibsa.org.au/companion_volumes Approved Page 6 of 6