Design & Implement Virtualized Cyber Security Infrastructure:

.docx

School

Australian College of Business and Technology, Colombo *

*We aren’t endorsed by this school

Course

ICT

Subject

Information Systems

Date

Jun 12, 2024

Type

docx

Pages

35

Uploaded by CommodoreFireFox42

Report
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
ICT60220 Advanced Diploma of Information Technology Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations Copyright 2023 Australian College of Business Intelligence All rights reserved Version: 23.0 Date Modified: July 2023 No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise without the prior written permission of the Australian College of Business Intelligence. Disclaimer: The Australian College of Business Intelligence does not invite reliance upon, nor accept responsibility for, the information it provides. The Australian College of Business Intelligence makes every effort to provide a high-quality service. However, neither the Australian College of Business Intelligence, nor the providers of data, gives any guarantees, undertakings or warranties concerning the accuracy, completeness or up-to-date nature of the information provided. Users should confirm information from another source if it is of sufficient importance for them to do so. Student Assessment Guide: ICTCYS612 Version: v23.0 Page 2 of 35 Developed by: ACBI Approved by: DoS Issued: July 2021 Review: July 2023
ICT60220 Advanced Diploma of Information Technology Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations Content s 1. Assessment Information ...................................................................................................... 4 A. Purpose of assessment ........................................................................................................................ 4 B. What you are required to do ............................................................................................................... 4 C. Competencies being assessed ............................................................................................................. 4 D. Important resources for completing this assessment ......................................................................... 5 E. A note on plagiarism and referencing .................................................................................................. 6 F. A note on questions with role plays ..................................................................................................... 6 G. Instructions for completing this assessment ....................................................................................... 6 2. Assessment Coversheet ....................................................................................................... 8 3. Assessment Questions ......................................................................................................... 9 A. Task A - Demonstrate knowledge of virtualized cyber security infrastructure .................................... 9 B. Task B - Plan infrastructure ............................................................................................................... 14 C. Task C - Implement infrastructure ..................................................................................................... 18 D. Task D - Test infrastructure ............................................................................................................... 18 4. Student Self Checklist ........................................................................................................ 20 Student Assessment Guide: ICTCYS612 Version: v23.0 Page 3 of 35 Developed by: ACBI Approved by: DoS Issued: July 2021 Review: July 2023
ICT60220 Advanced Diploma of Information Technology Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations 1. Assessment Information A. Purpose of assessment This assessment will develop your skills and knowledge required to research, design, implement and test virtualised cyber security infrastructure in a small to medium sized organisation. B. What you are required to do For this assessment, you are required to complete 4 tasks: Task A – Demonstrate knowledge of virtualized cyber security infrastructure Task B – Plan infrastructure Task C – Implement infrastructure Task D – Test infrastructure All tasks of this assessment require you to use the provided case study information relating to the fictional company Bains & Co. C. Competencies being assessed Elements To achieve competency in this unit you must demonstrate your ability to: 1. Prepare to design infrastructure 2. Design and plan infrastructure 3. Implement infrastructure 4. Test infrastructure Performance Evidence Evidence of the ability to: Student Assessment Guide: ICTCYS612 Version: v23.0 Page 4 of 35 Developed by: ACBI Approved by: DoS Issued: July 2021 Review: July 2023
ICT60220 Advanced Diploma of Information Technology Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations Design and implement cyber security infrastructure and review results against organisational needs on at least two different occasions Knowledge Evidence You must demonstrate knowledge of: Features and implementation methodologies of cyber security Cyber security infrastructure features including: o Application security o Business continuity planning o Disaster recovery planning o Operational security (OPSEC) o Threat vectors Organisational business processes and applicable cyber security requirements design and implementation Organisational procedures applicable to designing and implementing cybersecurity infrastructure, including: o Documenting established requirements, risks and work performed o Establishing requirements and features of cyber security infrastructure o Establishing maintenance and alert processes o Testing methods and procedures Security risks, and tolerance of risk in an organisation Industry standard cyber security providers Industry standards and regulations applicable to implementing cyber security infrastructure in an organisation Organisation, infrastructure and cyber security requirements. For further information on the competencies of this unit, please refer to: https://training.gov.au/Training/Details/ICTCYS612 D. Important resources for completing this assessment To complete this assessment, please refer to the following resources provided on Moodle: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations learner guide ICTCYS612 Observation checklist ICTCYS612 Marking Guide ICTCYS612 Case study folder Additional student assessment information Student Assessment Guide: ICTCYS612 Version: v23.0 Page 5 of 35 Developed by: ACBI Approved by: DoS Issued: July 2021 Review: July 2023
ICT60220 Advanced Diploma of Information Technology Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations E. A note on plagiarism and referencing Plagiarism is a form of theft where the work, ideas, inventions etc. of other people are presented as your own. When quoting or paraphrasing from a source such as the Internet, the source must be recognised. If you are quoting a source, make sure to acknowledge this by including “quotation marks” around the relevant words/sentences or ideas. Note the source at the point at which it is included within your assessment, such as by using a citation. Then list the full details of the source in a ‘references’ section at the end of your assessment. All sources used for your assessment should be detailed in a ‘references’ section. It is advisable to never copy another person’s work. F. A note on questions with role plays Task B, Question B7 involves a role play. For this question, as outlined below, you will be assessed on your ability to role play being an IT manager at WESEC, a company specialized in providing secretarial services for corporate organisations. This question requires you to lead a meeting and take notes on what is discussed. Please note: You will also need to attend separate meetings organised by other students whereby you role play being other people. This allows other students in your unit to also role play being the Senior Human Resources Manager. G. Instructions for completing this assessment Answer the questions below using the spaces provided: Answer all parts of each question Use your own words and give examples wherever possible The quality of your answer is more important than how long it is Enter your answers in this document You may use various sources of information to inform your answers, including your resources provided by ACBI, books, and online sources. You must acknowledge and cite your sources. Student Assessment Guide: ICTCYS612 Version: v23.0 Page 6 of 35 Developed by: ACBI Approved by: DoS Issued: July 2021 Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help