Advanced Diploma of Network Security

DS-AV-09/13 CSR– ICANWK602A V1.0
RTO Provider Code: 91151
CRICOS Provider Code: 02668F Page 1
of 4

ASSESSMENT RECORD / FEEDBACK SHEET
Course: ICA60211 Advanced Diploma of Network Security
Name: Student ID:
Unit Name and Code: ICANWK602A Plan, configure and test advanced server based
security
Assessment Task Number and Title: Case Study & Report
Date Due: Trainer’s Name:
 All assessments must be in a neat and readable format.
 Students are required to retain a duplicate of any assignment submitted, both written &
disk copy.
 Please refer to the Student Handbook for the Assessment Policy.
 Plagiarism is an academic misconduct and is unacceptable to Pacific College of
Technology.
I certify that the work submitted is my own. I have acknowledged material taken
from websites, textbooks and articles.
Student’s Signature: Date Submitted:
Feedback
To be completed by Trainer
Competent Not yet competent to be reassessed
Signed (Trainer/Assessor) Date:
Feedback provided by the trainer Date:
Please retain this as proof of submission

Unit name: Plan, configure and test advanced server based security Assignment No: Case Study
Received By: Date:

DS-AV-09/13 CSR– ICANWK602A V1.0
RTO Provider Code: 91151
CRICOS Provider Code: 02668F Page 2
of 4

Course : ICA60211 Advanced Diploma of Network Security
Unit Code and Name : ICANWK602A Plan, configure and test advanced server based security
Trainer/Assessor
Assessment item
:
: Case Study & Report
Due date : Week 4 (Extension upon trainer’s approval only)

Context and Purpose of the assessment:
This assessment will assess your skills and knowledge in the area of ‘Plan, configure and test
advanced server based security
’ unit. This assessment activity deals with the following elements
of performance and critical aspects of evidence:

Task Element Performance Criteria
1-4 1, 2, 3, 4 1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 2.1, 2.2,
2.3, 2.4, 3.1, 3.2, 3.3, 3.4, 3.5,3.6,3.7,
3.8, 4.1, 4.2, 4.3, 4.4, 4.5, 4.6

o The assessment tasks for the unit assume that you will work in the Information Technology
industry. Case Study and Report used in this assessment reflect a workplace scenario.
o The student must have access to a Computer, Printer and Microsoft Office Suite Applications for
doing the assessment for this unit.
o If you are not sure about any aspect of this assessment, please ask for clarification from your
assessor. If the assessment is not satisfactory, the trainer will allow one more attempt to the
assessment item.
o The responses to assessment questions should be in your own words and examples from
workplace should be used wherever possible.

DS-AV-09/13 CSR– ICANWK602A V1.0
RTO Provider Code: 91151
CRICOS Provider Code: 02668F Page 3
of 4
This unit applies to planning, designing, implementing, maintaining, monitoring and troubleshooting
advanced security on network servers.
Case Study
NJVC
builds and manages IT systems for the United States Department of Defense, national
intelligence organizations, and other customers whose IT needs have soared in the midst of a
budget-wilting recession. NJVC recently evaluated Windows Server 2012 to get an early look at
the IP Address Management feature. By using it, NJVC has demonstrated a 20 percent reduction
in IP address management tasks and identified potential savings of hundreds of thousands of
dollars in third-party IP management solutions. More efficient IP address management directly
affects the service provider’s ability to respond quickly and competitively to customer needs.
Automated IP address management also enhances customer network security. NJVC plans to
upgrade hundreds of its own servers and customer servers under its management to Windows
Server 2012 to take advantage of the many new capabilities.
The details of case study can be found in
Pacific College Management System (PCMS)
resources.
Assessment Activities: Report – Complete the following four (4) tasks in your own words. You
are required to prepare and submit a minimum of 2000 words detailed report explaining that
identifies that you are competent in implement advanced server security using secure
authentication and network services on a network server.
Task 1 Plan advanced network-server security according to business needs

Please ensure to cover these points in your answers and tick the checkbox Checklist
1.1 Consult with client and key stakeholders to identify security requirements in an
advanced network server environment
1.2 Analyse and review existing client security documentation and predict network service
vulnerabilities
1.3 Research network authentication and network service configuration options and
implications to produce network security solutions
1.4 Ensure features and capabilities of network service security options meet the business
needs
1.5 Produce or update server security design documentation to include new solutions
1.6 Obtain sign-off for the security design from the appropriate person

DS-AV-09/13 CSR– ICANWK602A V1.0
RTO Provider Code: 91151
CRICOS Provider Code: 02668F Page 4
of 4
Task 2 Prepare for network-server security implementation

Please ensure to cover these points in your answers and tick the checkbox Checklist
2.1 Prepare for work in line with site-specific safety requirements and enterprise OHS
processes and procedures
2.2 Identify safety hazards and implement risk control measures in consultation with
appropriate personnel
2.3 Consult appropriate person to ensure the task is coordinated effectively with others
involved at the worksite
2.4 Back up server before implementing configuration changes

Task 3 Configure the advanced network-server security according to design

Please ensure to cover these points in your answers and tick the checkbox Checklist
3.1 Configure update services to provide automatic updates to ensure maximum security and
reliability
3.2 Configure network authentication, authorisation and accounting services to log and
prevent unauthorised access to the server
3.3 Configure basic service security and access control lists to limit access to authorised
users, groups or networks
3.4 Implement encryption as required by the design
3.5 Configure advanced network service security options for services and remote access
3.6 Configure the operating system or third-party firewall to filter traffic in line with security
requirements
3.7 Ensure security of server logs and log servers are appropriately implemented for system
integrity
3.8 Implement backup and recovery methods to enable restoration capability in the event of a
disaster

Task 4 Monitor and test network-server security

Please ensure to cover these points in your answers and tick the checkbox Checklist
4.1 Test server to assess the effectiveness of network service security according to agreed
design plan
4.2 Monitor server logs, network traffic and open ports to detect possible intrusions
4.3 Monitor important files to detect unauthorised modifications
4.4 Investigate and verify alleged violations of server or data security and privacy breaches
4.5 Recover from, report and document security breaches according to security policies and
procedures
4.6 Evaluate monitored results and reports to implement and test improvement actions
required to maintain the required level of network service security