Design & Implement Virtualized Cyber Security Infrastructure:
.docx
keyboard_arrow_up
School
Australian College of Business and Technology, Colombo *
*We aren’t endorsed by this school
Course
ICT
Subject
Information Systems
Date
Jun 12, 2024
Type
docx
Pages
35
Uploaded by CommodoreFireFox42
Student
Assessment Guide:
ICTCYS612 Design and implement virtualized
cyber security infrastructure for organizations
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
Copyright 2023
Australian College of Business Intelligence
All rights reserved
Version: 23.0
Date Modified: July 2023
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means,
electronic, mechanical, photocopying, recording or otherwise without the prior written permission of the Australian College of
Business Intelligence.
Disclaimer:
The Australian College of Business Intelligence does not invite reliance upon, nor accept responsibility for, the information it
provides. The Australian College of Business Intelligence makes every effort to provide a high-quality service. However, neither
the Australian College of Business Intelligence, nor the providers of data, gives any guarantees, undertakings or warranties
concerning the accuracy, completeness or up-to-date nature of the information provided. Users should confirm information
from another source if it is of sufficient importance for them to do so.
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 2 of 35
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
Content
s
1. Assessment Information
......................................................................................................
4
A. Purpose of assessment
........................................................................................................................
4
B. What you are required to do
...............................................................................................................
4
C. Competencies being assessed
.............................................................................................................
4
D. Important resources for completing this assessment
.........................................................................
5
E. A note on plagiarism and referencing
..................................................................................................
6
F. A note on questions with role plays
.....................................................................................................
6
G. Instructions for completing this assessment
.......................................................................................
6
2. Assessment Coversheet
.......................................................................................................
8
3. Assessment Questions
.........................................................................................................
9
A. Task A - Demonstrate knowledge of virtualized cyber security infrastructure
....................................
9
B. Task B -
Plan infrastructure ...............................................................................................................
14
C. Task C - Implement infrastructure
.....................................................................................................
18
D. Task D - Test infrastructure
...............................................................................................................
18
4. Student Self Checklist
........................................................................................................
20
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 3 of 35
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
1. Assessment Information
A. Purpose of assessment
This assessment will develop your skills and knowledge required to research, design, implement and test
virtualised cyber security infrastructure in a small to medium sized organisation.
B. What you are required to do
For this assessment, you are required to complete 4 tasks:
Task A – Demonstrate knowledge of virtualized cyber security infrastructure
Task B – Plan infrastructure
Task C – Implement infrastructure
Task D – Test infrastructure
All tasks of this assessment require you to use the provided case study information relating to the
fictional company Bains & Co.
C. Competencies being assessed
Elements
To achieve competency in this unit you must demonstrate your ability to:
1.
Prepare to design infrastructure
2.
Design and plan infrastructure
3.
Implement infrastructure
4.
Test
infrastructure
Performance Evidence
Evidence of the ability to:
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 4 of 35
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
Design and implement cyber security infrastructure and review results against organisational
needs
on
at
least
two
different
occasions
Knowledge Evidence
You must demonstrate knowledge of:
Features and implementation methodologies of cyber security
Cyber security infrastructure features including:
o
Application security
o
Business continuity planning
o
Disaster recovery planning
o
Operational security (OPSEC)
o
Threat vectors
Organisational business processes and applicable cyber security requirements design and
implementation
Organisational procedures applicable to designing and implementing cybersecurity
infrastructure, including:
o
Documenting established requirements, risks and work performed
o
Establishing requirements and features of cyber security infrastructure
o
Establishing maintenance and alert processes
o
Testing methods and procedures
Security risks, and tolerance of risk in an organisation
Industry standard cyber security providers
Industry standards and regulations applicable to implementing cyber security infrastructure in
an organisation
Organisation, infrastructure and cyber security requirements.
For further information on the competencies of this unit, please refer to:
https://training.gov.au/Training/Details/ICTCYS612
D. Important resources for completing this
assessment
To complete this assessment, please refer to the following resources provided on Moodle:
ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
learner guide
ICTCYS612 Observation checklist
ICTCYS612 Marking Guide
ICTCYS612 Case study folder
Additional student assessment information
Student Assessment Guide: ICTCYS612
Version: v23.0
Page 5 of 35
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
ICT60220 Advanced Diploma of Information Technology
Student Assessment Guide: ICTCYS612 Design and implement virtualized cyber security infrastructure for organizations
E. A note on plagiarism and referencing
Plagiarism is a form of theft where the work, ideas, inventions etc. of other people are presented as your
own.
When quoting or paraphrasing from a source such as the Internet, the source must be recognised. If you
are quoting a source, make sure to acknowledge this by including “quotation marks” around the
relevant words/sentences or ideas. Note the source at the point at which it is included within your
assessment, such as by using a citation. Then list the full details of the source in a ‘references’ section at
the end of your assessment. All sources used for your assessment should be detailed in a ‘references’ section. It is advisable to never
copy
another
person’s
work.
F. A note on questions with role plays
Task B, Question B7 involves a role play. For this question, as outlined below, you will be assessed on
your ability to role play being an IT manager at WESEC, a company specialized in providing secretarial
services for corporate organisations. This question requires you to lead a meeting and take notes on
what is discussed. Please note: You will also need to attend separate meetings organised by other students whereby you
role play being other people. This allows other students in your unit to also role play being the Senior
Human Resources Manager. G. Instructions for completing this assessment
Answer the questions below using the spaces provided:
Answer all parts of each question
Use your own words and give examples wherever possible
The quality of your answer is more important than how long it is
Enter your answers in this document
You may use various sources of information to inform your answers, including your resources provided
by ACBI, books, and online sources. You must acknowledge and cite your sources. Student Assessment Guide: ICTCYS612
Version: v23.0
Page 6 of 35
Developed by: ACBI
Approved by: DoS
Issued: July 2021
Review: July 2023
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help