Certificate IV of Information Technology Networking

Student Version

Section A – Program/Course details
Qualification code:ICT40418Qualification title:Certificate IV of Information Technology Networking
Unit code:
ICTNWK403
ICTNWK421
ICTNWK416
Unit title:
Manage network and Data Integrity
Install, configure and Test network Security
Build security into virtual private networks
Department name:BDIT, Computer and Information TechnologyCRN number:Enter CRN number
Section B – Assessment task details
Assessment number:2 of 2Semester/Year:1 /2021
Due date:Session 16Duration of assessment:4 Sessions
Assessment methodProject and ObservationAssessment task results☒Ungraded result
☐Other: Click here to enter text.
Section C – Instructions to students
Task instructions:
Your Project will be given to you on the first day of your commencement. You are required to complete your project on time. Once completed you are required to upload your document to the Assessment folder on Brightspace. In order to be competent you will need to satisfy your project requirements.
Section D – Conditions for assessment
Conditions: Student to complete and attach Assessment Submission Cover Sheet to the completed Assessment Task.
• Project to be completed individually unless otherwise noted
• Your project must be uploaded and submitted to BrightSpace.
• All files should be zipped (.zip) and named appropriately. E.g. “yourname_NameOfAssessment”.
• Submit all your files when appropriate and in a timely manner in accordance with your schedule
Equipment/resources students must supply:Equipment/resources to be provided by the RTO:
Students attending remote learning must have access to:
Computer
Internet connection
Web browsers
Word processor
Computer, VMware Workstation Pro, Windows Server 2016, Windows Client, Anti Virus. Packet Tracer Application.
Section E – Marking Sheet – Student Answer Sheet
Unit code:ICTNWK403
ICTNWK421
ICTNWK416
Unit title:Manage network and Data Integrity
Install, configure and Test network Security
Build security into virtual private networks
































































































Error: Reference source not foundObservation task

Skills to be observed during this task to the required standard1. Date:2. Date:3. Date:Comment



SatisfactorySatisfactorySatisfactory
YesNoYesNoYesNo
1.Learner has demonstrated a secure file and resource access
2.Learner has demonstrated authentication of user accounts control to ensure secure data integrity
3.Learner has demonstrated the implement and configuration of an antivirus or anti-malware solution
4.Learner demonstrated the assessment and implementation of best practice to harden server and network
5.Learner demonstrated the implementation of a system to protect data from environmental threat
6.Learner has demonstrated a backup solution they have implemented
7.Learner has demonstrated the restore the data from a backup
8.Learner has demonstrated the implement a real time backup and data sync solution
9.Learner has demonstrated the implementation of network performance monitoring tools to monitor network and reporting,
10.Learner was able to explain and determine the environment al threats to data.
11.Learner has demonstrated and conducted function and performance tests to modify and debug countermeasures
12.Learner has demonstrated the review logs and audit reports to identify and record security incidents, intrusions and attempts
13.Learner has demonstrated out spot checks and audits to ensure that procedures are not being bypassed

Assessment Submission Cover Sheet (VET)

Student declaration
By submitting this assessment task and signing the below, I acknowledge and agree that: This completed assessment task is my own work. I understand the serious nature of plagiarism and I am aware of the penalties that exist for breaching this. I have kept a copy of this assessment task. The assessor may provide a copy of this assessment task to another member of the Institute for validation and/or benchmarking purposes.
Student ID:
Student name:
Submission or observation date:
Student signature For electronic submissions: By typing your name in the student signature field, you are accepting the above declaration.
Assessment Results and Feedback to Student
Assessment Task Result:SatisfactoryNot Satisfactory
Assessor’s Feedback:

Resubmission allowed:Yes ☐No ☐Resubmission due date:
Assessor name:
Assessor signature:
Date assessed:

Supporting document

Insert title of supporting document.

Unit code:ICTNWK403
ICTNWK421
ICTNWK416
Unit title:Manage network and Data Integrity
Install, configure and Test network Security
Build security into virtual private networks

Project – Protect data / Install and configure network security

Scenario:

You are the network administrator for a small aged-care not for profit organisation. As the new Security Manager, you are tasked with Modify and creating policies, implementing technologies to mitigate risk, and analysing the processes and systems in place to make them more secure.

The firm has 20 desktop and 20 laptop computers (in total). The head of the firm uses 1 laptop and 1 desktop. Rest of the laptops are shared by other staff for client visits. There is 1 reception desktop, each staff member has their own desktop. Firm uses local email and file server. There are 7 more new laptops that are used by clients when visiting office. They also have one Terminal server that hosts an aged-care software called Carelink+. The organisation has other two offices located 30-80 km apart. Users connect to terminal server that sits in the main office. Their web is hosted with cloud access.

Based on an assessment performed by an external auditor, the following were identified as the top 3 threats:

  • Viruses and malicious code inside the network.
  • Business Continuity Planning, Disaster Recovery.
  • No Site to site VPN and a VPN server to access the terminal server.
  • Security Policies are not updated since 2015.
  • There is no asset management system in place.

Based on this assessment, the primary issue now concerning the CEO is the development of a distributed and manageable antivirus system for servers, workstations, email filtering and a VPN service. Though Anti-Virus and Disaster Recovery exist to some extent, but no update and testing has been done in some time, no centralized management has taken place, and no policies exist to govern the correct or expected use and implementation of this type of application. The company has been inundated with viruses over the last 2 years, and no one has been able to centrally coordinate a means of controlling the problem.

The company’s security program is in its infancy. No policies exist yet, and no corporate security awareness program has been created. No real processes exist to manage the antivirus system that is in place. Very few controls are in place. When the systems administration team has time, they check to make sure the client definition file updates are pushed out to Desktop clients, and the server-level antivirus software is never checked. No alerts are sent to anyone when a virus is detected.

Further to the security program their security policy Is not been update last 5 years, Still they are using folder mapping from file server with access to every single user, Password change policy is not in place, Windows update goes on anytime since its set to automatic update and hold users to wait while working. Old DC drives are still working and all the computers has got admin permission to install application.

As a network administrator, your task is to:

You are given 6 months to implement your security system. You need to do precise planning and let management know how you will tackle new proposed solution. No company information security policies exist at the moment. With relation to the antivirus system, a total corporate antivirus policy will have to be defined and written. Standards for products to be installed, as well as procedures for the installation, will have to be documented as well. Finally, guidelines for virus detection and “common-sense security” related to viruses and antivirus software will be outlined as part of the corporate security awareness program.

Tasks A: Documentation

Your Document must address the following points listed below in professional level standard. References should be given at the end of the document as per Holmesglen standard.

  1. Identify and report the Current security in place.
  2. Identify the current Network, Software and Hardware and systemThreats and Vulnerabilities to address. (e.g. hardware are kept in server room and server room are not locked)
  3. Report the Security Threats, Vulnerabilities (almost the same as point 2).
  4. Review the companies’ security policy (provide feedback on “Information-Security-Policy for Assessment 2.pdf”).
  5. Prepare a Risk assessment based on the identified Threats and Vulnerabilities (how risky it is from the threats and vulnerabilities in point 2).
  6. Prepare the recommendation to the client to address the security issues based on asset security requirement.
  7. Design an assets recording system using Microsoft Excel (document = system hardware requirement, CPU, hard-disk, RAM).
  8. Audit the system and software using audit tools and techniques (Microsoft auditing tools…etc. run auditing tool on our virtual machine – run on client machines).
  9. Prepare an assets report based on current devices and Audit the system hardware and software for features and capabilities (extension from point 7).
  10. Identify and list the Environmental Threats to Data (e.g. power issue, natural disaster, physical access to our resources).
  11. Research on Three AV and select one based on customer requirement (compare three anti-virus product…etc. bit defender, Norton, Kaspersky).
  12. Research the appropriate backup model& media for client need (right backup types, and media types = USB, cloud backup, optical drive).
  13. Implement an inventory control mechanism with the audited information (provide checklist of who access resource, who given permission and the signature => from point 8)
  14. Identify available network and system monitoring tools (Winsolar… so on and so forth).
  15. Create functional and Performance test cases to verify security requirements (once this has been implemented, checking backups…backups are configured to run 9:00pm on a daily basis… you can include permission types test case if possible).
  16. Document the current system settings.
  17. Document possible breaches newly discovered with recommendations (documents other source of attacks… etc. zero-day-attack, social engineering, video camera …etc.).

Part B (Implementation)

In this part you have to implement the findings from your Part A documentation. To do the implementation you must use virtual machines using domain controllers and Active Directory.

Once the system is implemented you are going to build a packet Tracer (PT) network to simulate the site to site VPN between Branches. In addition to PT design you also need to implement a VPN server for users to connect securely to do remote desktop in to terminal server.

Implementation on Virtual Machine:

  1. Configure GPOs to protect files and resources
    1. Display warning message before user loges in.
    2. Enforce password policy (after 3 failed logons lock user).
  2. Create and Configure user with different account permission to shared Folders (Read only, Read and Write permissions to a folder).
  3. Install and test antivirus software on all appropriate systems (install and test recommended anti-virus on both servers and clients).
  4. Close all the unused ports and open https port outbound for Myob ATO reporting at the domain level in Firewall (open new firewall rules => 443 is enabled => http ports must always be opened).
  5. Build Cloud backup for data security from environmental threat (sign up to google backup => install this backup).
  6. Implement and demonstrate backup solution to do daily backup on company data (normal back before cloud backup).
  7. Restore the backup date to check test the business continuity (How to know my backup is the right backup… check backup by restoring again by deleting the files => this is the testing phase of backup).
  8. Sync the cloud backup to every 5 min with real time.
  9. Implement a network performance monitoring tool from your research finding in par A and prepare a report on performance (download and install PRPG => configure it with all notifications => notification requires email service however).
  10. Install and Configure VPN service on Terminal Server (install VPN services).
  11. Test the systems for performance and Functions.
  12. Review the logs to find minimum 5 the incidents and intrusion attempts using event viewer.
  13. Monitor logon events to the domain
  14. Carry out minimum three spot checks /

Part C (Packet Tracer Implementation) – Site to Site VPN – Go to session 15 for this

In this part you are going to demonstrate the branch connectivity with head office using packet tracer simulator. To do this create a network with minimum three routers and do the routing of your own choice of routing protocol. Once the routing is configured you have to configure VPN between branches and head office using site to site VPN.

  1. Configure Security on the Router / Switch and networking devices using Putty console
  2. Make sure the sites are reachable
  3. Configure IKE and IPsec
  4. Configure Site-to-Site VON using pre-shared key
  5. Replace pre-shared key with digital certificate.
  6. Document the configuration and save the file securely
  7. Monitor and manage the security breach to see the security attempts
  8. Enable debug to do the continues monitoring on routers for VPN connections

Your solution must clearly meet the needs of the organisation and you must understand and be able to demonstrate in front of your teacher.

Order Now
No Fields Found.
Universal Assignment (February 14, 2026) Certificate IV of Information Technology Networking. Retrieved from https://universalassignment.com/certificate-iv-of-information-technology-networking/.
"Certificate IV of Information Technology Networking." Universal Assignment - February 14, 2026, https://universalassignment.com/certificate-iv-of-information-technology-networking/
Universal Assignment June 17, 2022 Certificate IV of Information Technology Networking., viewed February 14, 2026,<https://universalassignment.com/certificate-iv-of-information-technology-networking/>
Universal Assignment - Certificate IV of Information Technology Networking. [Internet]. [Accessed February 14, 2026]. Available from: https://universalassignment.com/certificate-iv-of-information-technology-networking/
"Certificate IV of Information Technology Networking." Universal Assignment - Accessed February 14, 2026. https://universalassignment.com/certificate-iv-of-information-technology-networking/
"Certificate IV of Information Technology Networking." Universal Assignment [Online]. Available: https://universalassignment.com/certificate-iv-of-information-technology-networking/. [Accessed: February 14, 2026]

Please note along with our service, we will provide you with the following deliverables:

Please do not hesitate to put forward any queries regarding the service provision.

We look forward to having you on board with us.

Most Frequent Questions & Answers

Universal Assignment Services is the best place to get help in your all kind of assignment help. We have 172+ experts available, who can help you to get HD+ grades. We also provide Free Plag report, Free Revisions,Best Price in the industry guaranteed.

We provide all kinds of assignmednt help, Report writing, Essay Writing, Dissertations, Thesis writing, Research Proposal, Research Report, Home work help, Question Answers help, Case studies, mathematical and Statistical tasks, Website development, Android application, Resume/CV writing, SOP(Statement of Purpose) Writing, Blog/Article, Poster making and so on.

We are available round the clock, 24X7, 365 days. You can appach us to our Whatsapp number +1 (613)778 8542 or email to info@universalassignment.com . We provide Free revision policy, if you need and revisions to be done on the task, we will do the same for you as soon as possible.

We provide services mainly to all major institutes and Universities in Australia, Canada, China, Malaysia, India, South Africa, New Zealand, Singapore, the United Arab Emirates, the United Kingdom, and the United States.

We provide lucrative discounts from 28% to 70% as per the wordcount, Technicality, Deadline and the number of your previous assignments done with us.

After your assignment request our team will check and update you the best suitable service for you alongwith the charges for the task. After confirmation and payment team will start the work and provide the task as per the deadline.

Yes, we will provide Plagirism free task and a free turnitin report along with the task without any extra cost.

No, if the main requirement is same, you don’t have to pay any additional amount. But it there is a additional requirement, then you have to pay the balance amount in order to get the revised solution.

The Fees are as minimum as $10 per page(1 page=250 words) and in case of a big task, we provide huge discounts.

We accept all the major Credit and Debit Cards for the payment. We do accept Paypal also.

Popular Assignments

Assignment SHSM024 RESEARCH DESIGN & DATA REPORT

ANSWER FORM ETHICS: (approx. 300 words in total) 10 OBTAINING CONSENT: Describe the process that the researchers would have to implement to obtain consent for a pregnant woman to participate in the study. OBTAINING ETHICAL APPROVAL: Describe two other areas of the study procedures (not including ‘obtaining consent’) that a

Read More »

Assignment Brief Sheet

Assignment Brief Sheet1Module Tutor:Dr Dennis PeppleModule NameStudy Skills and Personal Development PlanningModule CodeCBU401Title of Coursework:Assessment 1: Written Assignment (1500 words)Weight: 50%Title of Coursework:Assessment 2: Reflective (PDP) Report (1500 words)Weight: 50%Feedback detailsThe university policy is that you will receive prompt feedback on your work within 2 weeks of the submission date.

Read More »

Assignment Faculty of Business, Computing and Digital Industries

Module Handbook Faculty of Business, Computing and Digital Industries School of Business (On-campus) E-Business and E-Marketing Module. 2025-26 Contents Module Introduction Module Leader Welcome Hello A very warm welcome to the E-Business and E-Marketing module. I hope that you find this Module Handbook helpful in supporting your studies and that

Read More »

Assignment Brief BMM6422: Business and Management Strategies

Assignment Brief BMM6422: Business and Management StrategiesComponent numberAssignment 1Assignment typeReportLearning outcomes for this assessment(Please see module Handbook for all learning outcomes)Upon completion of this module students should be able to:1 Evaluate the benefits to organisations of strategic planning within the business environment.2 Employ specific techniques, methods and models used in

Read More »

ASSIGNMENT Business and Management Strategy

Module Handbook Faculty of Business, Computing and Digital Industries School of Business (On-campus) Business and Management Strategy BMM6422 2025-26 Contents Module Introduction Module Leader Welcome Welcome to Business and Management Strategy Hello I hope that you find this Module Handbook helpful in supporting your studies and that it provides you

Read More »

BMM6302 Entrepreneurship and Creativity 

Assignment Brief – Cohort 06 BMM6302 Entrepreneurship and Creativity  Component number Assignment 2 Assignment type 02 Dragon’s Den Presentation (Live Presentation) Learning outcomes for this assessment (Please see module Handbook for all learning outcomes) Compare and contrast a variety of strategic models to develop and critically evaluate business start-up ideas.

Read More »

BMM6302 Entrepreneurship and Creativity 

Assignment Brief – Cohort 07 BMM6302 Entrepreneurship and Creativity  Component number Assignment 1 Assignment type 01 Business Idea (Video Presentation – Panopto) Learning outcomes for this assessment (Please see module Handbook for all learning outcomes) Compare and contrast a variety of strategic models to develop and critically evaluate business start-up

Read More »

LCRM301 Researching Criminology

LCRM301 Researching CriminologyTopic: Introduction to theoryand the research processand undertaking acriminological literaturereviewAcknowledgement ofcountryPART ONE: Preparingcriminological research(Weeks 1-5)In the first part of the unit, we focus on preparing criminologicalresearch and decision-making processes. This includes deciding onthe topic you want to focus on, the kinds of methods to use and thetypes of

Read More »

LCRM301 Researching criminology

LCRM301 Researching criminologyWorksheet 1This worksheet will be disseminated to students in Week 3 and will assist them in the planning and development of the second assessment task: literature review. PART 1: Refining your topicThe topic I am interested in is: I am interested in this topic because: This is an

Read More »

LCRM301 Researching Criminology

LCRM301 Researching CriminologyTopic: Planningcriminological research andformulating effectiveresearch questionsAcknowledgement ofcountryLecture structure Example?How do police perceptions of their own organization influence their views of the public,specifically their trust of people in the areas they patrol?How do women with insecure migration status experience and seek help for family violenceand what are their experiences

Read More »

ASSESSMENT NO.2 – COURT APPLICATION FACT PATTERN

FACULTY OF LAW AND BUSINESSThomas More Law SchoolLAWS201: CIVIL PROCEDURE & ADRSEMESTER TWO, 2025 – NATIONAL –ASSESSMENT NO.2 – COURT APPLICATION FACT PATTERN(AND THE FACT PATTERN FOR THE PLEADINGS WORKSHOP IN WEEK 5)BackgroundRachel Richardson is a printer by trade although she currently works in art design fora fashion magazine based

Read More »

Assessment 2: Court Application

02/09/2025, 20:3430 Points PossibleAssessment 2: Court ApplicationAssessment 2: Court ApplicationDetailsAssessment task 2: Court Application (worth 30% of the final total mark for this unit)Add commentA simulated court application will be run in weeks 6 and 7 of semester on selected topics from the first five weeks of the unit. Your

Read More »

APPENDIX B: ASSESSMENT TASK 2 – COURT APPLICATION

APPENDIX B: ASSESSMENT TASK 2 – COURT APPLICATION (30% OF FINAL MARK)General informationThis Assessment task is worth 30 marks of your final mark.The task is either making (Applicant) or opposing (Respondent) an application before theSupreme Court in your respective state based on a fact scenario, which will be uploaded on

Read More »

Assessment task Assessment 1 – ASSIGNMENT

Assessment Task 1 (30% of the final mark)This Week30 Points PossibleIn ProgressNEXT UP: Submit assignmentUnlimited Attempts Allowed11/08/2025Attempt 1 Add commentDetails Assessment task Assessment 1 – ASSIGNMENTPurpose To give students the opportunity to produce a well-written piece of formal analysis on a topic inland law. Graduate capabilities GC1,3,7-11 are covered by

Read More »

Assessment Brief- Assessment 3- Map-Reduce Programming Challenge

Assessment Brief- Assessment 3- Map-Reduce Programming Challenge Unit Code/Description ICT313 Big Data for Software DevelopmentCourse/Subject Bachelor of Information TechnologySemester S1 – 2025Unit Learning OutcomesAddressedULO3: Critically assess and implement advanced data pre-processing andanalytics strategies in a software development context, focusing on tasks like datacleansing, transformation, and feature selection.ULO4: Design, develop, and

Read More »

Assessment 2 Infographic and Reflection

Assessment 2 Infographic and Reflection Part 1 Infographic and Part 2 Reflection using the Gibbs CycleThis assessment is worth 35% of your final grade (Infographic 18% + Reflection 17%). Assessment InstructionsPart 1: InfographicCreate an A3 size infographic (portrait layout).Submit as a .pdfTOPIC:Create your infographic as a poster (A3 paper size)

Read More »

CHCCSM013 Facilitate and review case management

ContentsAbout this document 4Student details section 4The community services work environment 5Workplace hours 6Responsibilities 6Evidence collection 7Section 1: Determine response for case management 9Section 2: Conduct case management meetings and develop case management plan 18Section 3: Monitor and review case work activities and processes 24Section 4: Supervisor report 28 About

Read More »

BMM6302 Entrepreneurship and Creativity Assignment help

Assignment Brief – Cohort 07 BMM6302 Entrepreneurship and Creativity  Component number Assignment 1 Assignment type 01 Business Idea (Video Presentation – Panopto) Learning outcomes for this assessment (Please see module Handbook for all learning outcomes) Compare and contrast a variety of strategic models to develop and critically evaluate business start-up

Read More »

BMM6582: eBusiness and eMarketing 02 Analytical Review Assignment Help

Assignment Brief BMM6582: eBusiness and eMarketing Component number Assignment 2 Assignment type 02 Analytical Review Learning outcomes for this assessment (Please see module Handbook for all learning outcomes) Compare, contrast, and analyse approaches used to evaluate a company’s current positioning in the traditional and electronic marketplaces. Appraise various options for

Read More »

BMM6582: eBusiness and eMarketing Assignment 2 Assignment Help

Assignment Brief BMM6582: eBusiness and eMarketing Component number Assignment 2 Assignment type 02 Analytical Review Learning outcomes for this assessment (Please see module Handbook for all learning outcomes) Compare, contrast, and analyse approaches used to evaluate a company’s current positioning in the traditional and electronic marketplaces. Appraise various options for

Read More »

BMM6582: eBusiness and eMarketing Assignment Help

Assignment Brief BMM6582: eBusiness and eMarketing Component number Assignment 1 Assignment type 01 Video presentation (Panopto) Learning outcomes for this assessment (Please see module Handbook for all learning outcomes) Compare, contrast, and analyse approaches used to evaluate a company’s current positioning in the traditional and electronic marketplaces. Appraise various options

Read More »

Business and Management Strategy Assignment Help

Business and Management Strategy: Assignment Guidelines and Suggested Structure (3,000 Words) 1. Introduction (approx. 250–300 words) 2. Industry Analysis and Competitive Environment (400–450 words) 3. Competition and Customer Requirements (550–600 words) 4. Resources and Strategy Implementation (500–550 words) 5. Strategic Capabilities & Sustainable Advantage (400–450 words) 6. Development of Resources

Read More »

BMM6452 – Professional Learning Through Work Assignment Help

Assignment Brief  BMM6452 – Professional Learning Through Work Assignment type  Final Assessment (Assessment 3)-To be Negotiated Learning outcomes   (Please see module Handbook for all learning outcomes)  By the end of this module, the student should be able to:  Demonstrate enhanced graduate employability skills, knowledge, behaviours and attitudes developed through working

Read More »

CSE2/4DBF (2025) – Assignment 1

CSE2/4DBF (2025) – Assignment 1 Page 1/3 CSE2/4DBF 2025Assignment 1 (20%)Due date: this week AIMS AND OBJECTIVES:✓ to represent a problem description given in natural language as an (Enhanced) EntityRelationship modelThis is an individual Assignment. You are not permitted to work as a group when writingthis assignment. The use of

Read More »

Can I Pay Someone to Do My Assignment? A Complete Student Guide

If you’re a student juggling multiple deadlines, exams, part-time work, or personal responsibilities, you may have found yourself asking: can I pay someone to do my assignment? You’re not alone. This is one of the most searched academic questions today, especially among university and college students worldwide. In this blog,

Read More »

Project Development and Analysis in Emerging Technologies

Assessment Brief- Assessment 2 Unit Code/Description ICT305 – Topics in IT Course/Subject BIT Semester 2024- S1 Unit Learning Outcomes Addressed ULO 1, 2, and 3. Assessment Objective The primary objective of this assessment is to provide students with hands-on experience in designing, implementing, and analysing a project in one of

Read More »

EDUC1006 Interdisciplinary Studies: Crossing the line

ASSESSMENT 2: Report Summary Title Assessment 2 Type Report Due Date Thursday 17 April, 11.59 pm (end of Week 6) Length 1500 words or equivalent Weighting 50% Academic Integrity The use of GenAI is allowed but limited for this assessment task. Submission Word document or PDF submitted to Turnitin Unit

Read More »

Writing in Community Development

Assessment Overview Overview Length or Duration Worth Due This essay should demonstrate a coherent argument, which is backed up by evidence from relevant journal articles, books and websites. You are expected to make two direct quotations only; and the rest should be paraphrases. You should also list at least eight sources.   If you are unsure of

Read More »

Can't Find Your Assignment?