Course Title: Design and implement a security perimeter for ICT networks
Part B: Course Detail
Teaching Period: Term2 2020
Course Code: COSC7379C
Course Title: Design and implement a security perimeter for ICT networks
School: 174T School of VE Engineering, Health & Science
Campus: City Campus
Program: C5394 - Diploma of Information Technology Networking
Course Contact: Program Manager
Course Contact Phone: +61 3 9925 4468
Course Contact Email: mark.tasman@rmit.edu.au
Name and Contact Details of All Other Relevant Staff
Nominal Hours: 60
Regardless of the mode of delivery, represent a guide to the relative teaching time and student effort required to successfully achieve a particular competency/module. This may include not only scheduled classes or workplace visits but also the amount of effort required to undertake, evaluate and complete all assessment requirements, including any non-classroom activities.
Pre-requisites and Co-requisites
NIL
Course Description
This unit describes the skills and knowledge required to build a high performance, high security, failure resistant security perimeter, for an enterprise information and communications technology (ICT) network. It applies to individuals with excellent ICT expertise who are working as middle managers, including information security managers, network engineers, network technicians and security analysts.
National Codes, Titles, Elements and Performance Criteria
National Element Code & Title: |
ICTNWK509 Design and implement a security perimeter for ICT networks |
Element: |
1. Plan and design firewall solution |
Performance Criteria: |
1.1 Determine level and nature of security needed to meet enterprise requirements 1.2 Identify security threats 1.3 Research available perimeter security options 1.4 Design security perimeter to meet identified enterprise requirements |
Element: |
2. Configure perimeter to secure network |
Performance Criteria: |
2.1 Deploy perimeter devices according to design 2.2 Configure perimeter topology 2.3 Configure basic functionality of devices to allow access 2.4 Configure advanced functions |
Element: |
3. Plan, design and configure network devices to provide secure fallover and redundancy |
Performance Criteria: |
3.1 Back up device configuration 3.2 Design and configure perimeter to enable continuity of service during upgrade of devices 3.3 Design and configure perimeter to enable continuity of service in the event of device failure |
Element: |
4. Plan, design and configure a VPN solution |
Performance Criteria: |
4.1 Configure perimeter for site-to-site virtual private networks (VPNs) 4.2 Configure perimeter as a remote access VPN server 4.3 Configure perimeter to allow VPN tunnel forwarding 4.4 Diagnose and resolve VPN connectivity issues |
Element: |
5. Test and verify design performance |
Performance Criteria: |
5.1 Test functionality of basic features 5.2 Test functionality of advanced features 5.3 Perform penetration testing to verify that the perimeter meets security requirements 5.4 Monitor perimeter device performance 5.5 Monitor security breaches 5.6 Document test results and report to appropriate person |
Learning Outcomes
Refer to elements
Details of Learning Activities
Delivery mode- includes internet,Online delivery via CANVAS - Collaborate Ultra and workplace simulated environments.
Students are required to read the prescribed content in chapters from the Cisco Netacad website and any additional information provided on the RMIT Canvas.
The learning activities include
• Case studies
• Weekly online quiz/tests.
• Collaborative classroom activities
• Peer interaction
• Simulations
• Accessing information on-line
Teaching Schedule
Wk |
Topics |
Assessment Tasks |
1 |
Network Security Threats – at the Perimeter |
Early Assessment Task |
2 |
Network Security Policies + Issues |
|
3 |
NetworkinfrastructureFailover – HSRP, Etherchannel & Physical Redundancy measures |
|
4 |
Network Perimeter Device Access Router |
|
5 |
Network Perimeter Device Access Switch |
|
7 |
WAN - PPP – Authentication Routing Authentication |
|
8 |
ACL & Zone Based Firewall |
Assessment Task 1 - Practical Assessment |
------ |
------- MID-SEMESTER BREAK ------- |
31 August - 6 September No Classes* |
9 |
DMZ |
|
10 |
VPN site to site |
|
11 |
VPN remote site (VMWARE) |
Assessment Task 2- IT Project |
12 |
Intrusion Detection System (IDS) Intrusion Prevention System (IPS) |
|
13 |
Penetrative Testing Vulnerability Scanning ((Issues)) |
|
14 |
Test Reporting & Action Plan |
Assessment Task 3Knowledge Test |
15 |
Project Interview |
|
16 |
IT Security Trouble-Shooting |
IT Project Submission |
17 |
Assessment Re-Submissions |
|
18 |
Assessment Re-Submissions |
Learning Resources
Prescribed Texts
References
Other Resources
All resources are supplied in CANVAS and via the CISCO Netacad internet site.
Overview of Assessment
The assessment is conducted in both theoretical and practical aspects of the course according to the performance criteria set in the National Training Package. Assessment may incorporate a variety of methods including written/oral activities and demonstration of practical skills to the relevant industry standards. Participants are advised that they are likely to be asked to personally demonstrate their assessment activities to their teacher/assessor. Feedback will be provided throughout the course. To successfully complete this course you will be required to demonstrate competency in each assessment task detailed under Assessment Tasks:
Assessment 1 Practical Assessment - Project
Assessment 2 Knowledge Assessment
These tasks assesses the following Course Learning Outcomes (CLOs):
Assessment Mapping Matrix
Elements/Performance Criteria Covered |
Assessment 1 |
Assessment 2 |
1.1 |
x |
x |
1.2 |
x |
x |
1.3 |
x |
x |
1.4 |
x |
|
2.1 |
x |
|
2.2 |
x |
|
2.3 |
x |
|
2.4 |
x |
|
3.1 |
x |
|
3.2 |
x |
|
3.3 |
x |
|
4.1 |
x |
|
4.2 |
x |
|
4.3 |
x |
|
4.4 |
x |
|
5.1 |
x |
|
5.2 |
x |
|
5.3 |
x |
|
5.4 |
x |
|
5.5 |
x |
|
5.6 |
x |
|
To be deemed competent you must demonstrate an understanding of all aspects required of the competency.Assessment methods have been designed to measure your achievement of each competency in a flexible manner over multiple tasks
Assessment Tasks
Assessment 1 Practical Assessment - Project
Assessment 2 Knowledge Assessment
Assessment Matrix
Elements/Performance Criteria Covered |
Assessment 1 |
Assessment 2 |
1.1 |
x |
x |
1.2 |
x |
x |
1.3 |
x |
x |
1.4 |
x |
|
2.1 |
x |
|
2.2 |
x |
|
2.3 |
x |
|
2.4 |
x |
|
3.1 |
x |
|
3.2 |
x |
|
3.3 |
x |
|
4.1 |
x |
|
4.2 |
x |
|
4.3 |
x |
|
4.4 |
x |
|
5.1 |
x |
|
5.2 |
x |
|
5.3 |
x |
|
5.4 |
x |
|
5.5 |
x |
|
5.6 |
x |
|
Other Information
Credit Transfer and/or Recognition of Prior Learning (RPL):
You may be eligible for credit towards courses in your program if you have already met the learning/competency outcomes through previous learning and/or industry experience. To be eligible for credit towards a course, you must demonstrate that you have already completed learning and/or gained industry experience that is:
- Relevant
- Current
- Satisfies the learning/competency outcomes of the course
Please refer to http://www.rmit.edu.au/students/enrolment/credit to find more information about credit transfer and RPL.
Study and learning Support:
Study and Learning Centre (SLC) provides free learning and academic development advice to you.
Services offered by SLC to support your numeracy and literacy skills are:
assignment writing, thesis writing and study skills advice
maths and science developmental support and advice
English language development
Please Refer http://www.rmit.edu.au/studyandlearningcentre to find more information about Study and learning Support
Equitable Learning Services (ELS):
If you are suffering from long-term medical condition or disability, you should contact Equitable Learning Services (ELS) to seek advice and support to complete your studies.
Please refer to https://www.rmit.edu.au/students/support-and-facilities/student-support/equitable-learning-services to find more information about services offered by Equitable Learning Services (ELS).
Late submission:
If you require an Extension of Submittable Work (assignments, reports or project work etc.) for 7 calendar days or less (from the original due date) and have valid reasons, you must complete and lodge an Application for Extension of Submittable Work (7 Calendar Days or less) form and lodge it with the Senior Educator/ Program Manager.
The application must be lodged no later than one working day before the official due date. You will be notified within no more than 2 working days of the date of lodgement as to whether the extension has been granted.
If you seek an Extension of Submittable Work for more than 7 calendar days (from the original due date) must lodge an Application for Special Consideration form under the provisions of the Special Consideration Policy, preferably prior to, but no later than 2 working days after the official due date.
Submittable Work (assignments, reports or project work etc.) submitted late without approval of an extension will not be accepted or marked.
Special consideration:
Please Refer http://www.rmit.edu.au/students/specialconsideration to find more information about special consideration
Course Overview: Access Course Overview