Certificate IV of Information Technology Networking

Student Version

Section A – Program/Course details
Qualification code:ICT40418Qualification title:Certificate IV of Information Technology Networking
Unit code:
ICTNWK403
ICTNWK421
ICTNWK416
Unit title:
Manage network and Data Integrity
Install, configure and Test network Security
Build security into virtual private networks
Department name:BDIT, Computer and Information TechnologyCRN number:Enter CRN number
Section B – Assessment task details
Assessment number:2 of 2Semester/Year:1 /2021
Due date:Session 16Duration of assessment:4 Sessions
Assessment methodProject and ObservationAssessment task results☒Ungraded result
☐Other: Click here to enter text.
Section C – Instructions to students
Task instructions:
Your Project will be given to you on the first day of your commencement. You are required to complete your project on time. Once completed you are required to upload your document to the Assessment folder on Brightspace. In order to be competent you will need to satisfy your project requirements.
Section D – Conditions for assessment
Conditions: Student to complete and attach Assessment Submission Cover Sheet to the completed Assessment Task.
• Project to be completed individually unless otherwise noted
• Your project must be uploaded and submitted to BrightSpace.
• All files should be zipped (.zip) and named appropriately. E.g. “yourname_NameOfAssessment”.
• Submit all your files when appropriate and in a timely manner in accordance with your schedule
Equipment/resources students must supply:Equipment/resources to be provided by the RTO:
Students attending remote learning must have access to:
Computer
Internet connection
Web browsers
Word processor
Computer, VMware Workstation Pro, Windows Server 2016, Windows Client, Anti Virus. Packet Tracer Application.
Section E – Marking Sheet – Student Answer Sheet
Unit code:ICTNWK403
ICTNWK421
ICTNWK416
Unit title:Manage network and Data Integrity
Install, configure and Test network Security
Build security into virtual private networks
































































































Error: Reference source not foundObservation task

Skills to be observed during this task to the required standard1. Date:2. Date:3. Date:Comment



SatisfactorySatisfactorySatisfactory
YesNoYesNoYesNo
1.Learner has demonstrated a secure file and resource access
2.Learner has demonstrated authentication of user accounts control to ensure secure data integrity
3.Learner has demonstrated the implement and configuration of an antivirus or anti-malware solution
4.Learner demonstrated the assessment and implementation of best practice to harden server and network
5.Learner demonstrated the implementation of a system to protect data from environmental threat
6.Learner has demonstrated a backup solution they have implemented
7.Learner has demonstrated the restore the data from a backup
8.Learner has demonstrated the implement a real time backup and data sync solution
9.Learner has demonstrated the implementation of network performance monitoring tools to monitor network and reporting,
10.Learner was able to explain and determine the environment al threats to data.
11.Learner has demonstrated and conducted function and performance tests to modify and debug countermeasures
12.Learner has demonstrated the review logs and audit reports to identify and record security incidents, intrusions and attempts
13.Learner has demonstrated out spot checks and audits to ensure that procedures are not being bypassed

Assessment Submission Cover Sheet (VET)

Student declaration
By submitting this assessment task and signing the below, I acknowledge and agree that: This completed assessment task is my own work. I understand the serious nature of plagiarism and I am aware of the penalties that exist for breaching this. I have kept a copy of this assessment task. The assessor may provide a copy of this assessment task to another member of the Institute for validation and/or benchmarking purposes.
Student ID:
Student name:
Submission or observation date:
Student signature For electronic submissions: By typing your name in the student signature field, you are accepting the above declaration.
Assessment Results and Feedback to Student
Assessment Task Result:SatisfactoryNot Satisfactory
Assessor’s Feedback:

Resubmission allowed:Yes ☐No ☐Resubmission due date:
Assessor name:
Assessor signature:
Date assessed:

Supporting document

Insert title of supporting document.

Unit code:ICTNWK403
ICTNWK421
ICTNWK416
Unit title:Manage network and Data Integrity
Install, configure and Test network Security
Build security into virtual private networks

Project – Protect data / Install and configure network security

Scenario:

You are the network administrator for a small aged-care not for profit organisation. As the new Security Manager, you are tasked with Modify and creating policies, implementing technologies to mitigate risk, and analysing the processes and systems in place to make them more secure.

The firm has 20 desktop and 20 laptop computers (in total). The head of the firm uses 1 laptop and 1 desktop. Rest of the laptops are shared by other staff for client visits. There is 1 reception desktop, each staff member has their own desktop. Firm uses local email and file server. There are 7 more new laptops that are used by clients when visiting office. They also have one Terminal server that hosts an aged-care software called Carelink+. The organisation has other two offices located 30-80 km apart. Users connect to terminal server that sits in the main office. Their web is hosted with cloud access.

Based on an assessment performed by an external auditor, the following were identified as the top 3 threats:

  • Viruses and malicious code inside the network.
  • Business Continuity Planning, Disaster Recovery.
  • No Site to site VPN and a VPN server to access the terminal server.
  • Security Policies are not updated since 2015.
  • There is no asset management system in place.

Based on this assessment, the primary issue now concerning the CEO is the development of a distributed and manageable antivirus system for servers, workstations, email filtering and a VPN service. Though Anti-Virus and Disaster Recovery exist to some extent, but no update and testing has been done in some time, no centralized management has taken place, and no policies exist to govern the correct or expected use and implementation of this type of application. The company has been inundated with viruses over the last 2 years, and no one has been able to centrally coordinate a means of controlling the problem.

The company’s security program is in its infancy. No policies exist yet, and no corporate security awareness program has been created. No real processes exist to manage the antivirus system that is in place. Very few controls are in place. When the systems administration team has time, they check to make sure the client definition file updates are pushed out to Desktop clients, and the server-level antivirus software is never checked. No alerts are sent to anyone when a virus is detected.

Further to the security program their security policy Is not been update last 5 years, Still they are using folder mapping from file server with access to every single user, Password change policy is not in place, Windows update goes on anytime since its set to automatic update and hold users to wait while working. Old DC drives are still working and all the computers has got admin permission to install application.

As a network administrator, your task is to:

You are given 6 months to implement your security system. You need to do precise planning and let management know how you will tackle new proposed solution. No company information security policies exist at the moment. With relation to the antivirus system, a total corporate antivirus policy will have to be defined and written. Standards for products to be installed, as well as procedures for the installation, will have to be documented as well. Finally, guidelines for virus detection and “common-sense security” related to viruses and antivirus software will be outlined as part of the corporate security awareness program.

Tasks A: Documentation

Your Document must address the following points listed below in professional level standard. References should be given at the end of the document as per Holmesglen standard.

  1. Identify and report the Current security in place.
  2. Identify the current Network, Software and Hardware and systemThreats and Vulnerabilities to address. (e.g. hardware are kept in server room and server room are not locked)
  3. Report the Security Threats, Vulnerabilities (almost the same as point 2).
  4. Review the companies’ security policy (provide feedback on “Information-Security-Policy for Assessment 2.pdf”).
  5. Prepare a Risk assessment based on the identified Threats and Vulnerabilities (how risky it is from the threats and vulnerabilities in point 2).
  6. Prepare the recommendation to the client to address the security issues based on asset security requirement.
  7. Design an assets recording system using Microsoft Excel (document = system hardware requirement, CPU, hard-disk, RAM).
  8. Audit the system and software using audit tools and techniques (Microsoft auditing tools…etc. run auditing tool on our virtual machine – run on client machines).
  9. Prepare an assets report based on current devices and Audit the system hardware and software for features and capabilities (extension from point 7).
  10. Identify and list the Environmental Threats to Data (e.g. power issue, natural disaster, physical access to our resources).
  11. Research on Three AV and select one based on customer requirement (compare three anti-virus product…etc. bit defender, Norton, Kaspersky).
  12. Research the appropriate backup model& media for client need (right backup types, and media types = USB, cloud backup, optical drive).
  13. Implement an inventory control mechanism with the audited information (provide checklist of who access resource, who given permission and the signature => from point 8)
  14. Identify available network and system monitoring tools (Winsolar… so on and so forth).
  15. Create functional and Performance test cases to verify security requirements (once this has been implemented, checking backups…backups are configured to run 9:00pm on a daily basis… you can include permission types test case if possible).
  16. Document the current system settings.
  17. Document possible breaches newly discovered with recommendations (documents other source of attacks… etc. zero-day-attack, social engineering, video camera …etc.).

Part B (Implementation)

In this part you have to implement the findings from your Part A documentation. To do the implementation you must use virtual machines using domain controllers and Active Directory.

Once the system is implemented you are going to build a packet Tracer (PT) network to simulate the site to site VPN between Branches. In addition to PT design you also need to implement a VPN server for users to connect securely to do remote desktop in to terminal server.

Implementation on Virtual Machine:

  1. Configure GPOs to protect files and resources
    1. Display warning message before user loges in.
    2. Enforce password policy (after 3 failed logons lock user).
  2. Create and Configure user with different account permission to shared Folders (Read only, Read and Write permissions to a folder).
  3. Install and test antivirus software on all appropriate systems (install and test recommended anti-virus on both servers and clients).
  4. Close all the unused ports and open https port outbound for Myob ATO reporting at the domain level in Firewall (open new firewall rules => 443 is enabled => http ports must always be opened).
  5. Build Cloud backup for data security from environmental threat (sign up to google backup => install this backup).
  6. Implement and demonstrate backup solution to do daily backup on company data (normal back before cloud backup).
  7. Restore the backup date to check test the business continuity (How to know my backup is the right backup… check backup by restoring again by deleting the files => this is the testing phase of backup).
  8. Sync the cloud backup to every 5 min with real time.
  9. Implement a network performance monitoring tool from your research finding in par A and prepare a report on performance (download and install PRPG => configure it with all notifications => notification requires email service however).
  10. Install and Configure VPN service on Terminal Server (install VPN services).
  11. Test the systems for performance and Functions.
  12. Review the logs to find minimum 5 the incidents and intrusion attempts using event viewer.
  13. Monitor logon events to the domain
  14. Carry out minimum three spot checks /

Part C (Packet Tracer Implementation) – Site to Site VPN – Go to session 15 for this

In this part you are going to demonstrate the branch connectivity with head office using packet tracer simulator. To do this create a network with minimum three routers and do the routing of your own choice of routing protocol. Once the routing is configured you have to configure VPN between branches and head office using site to site VPN.

  1. Configure Security on the Router / Switch and networking devices using Putty console
  2. Make sure the sites are reachable
  3. Configure IKE and IPsec
  4. Configure Site-to-Site VON using pre-shared key
  5. Replace pre-shared key with digital certificate.
  6. Document the configuration and save the file securely
  7. Monitor and manage the security breach to see the security attempts
  8. Enable debug to do the continues monitoring on routers for VPN connections

Your solution must clearly meet the needs of the organisation and you must understand and be able to demonstrate in front of your teacher.

Order Now
No Fields Found.
Universal Assignment (February 1, 2023) Certificate IV of Information Technology Networking. Retrieved from https://universalassignment.com/certificate-iv-of-information-technology-networking/.
"Certificate IV of Information Technology Networking." Universal Assignment - February 1, 2023, https://universalassignment.com/certificate-iv-of-information-technology-networking/
Universal Assignment June 17, 2022 Certificate IV of Information Technology Networking., viewed February 1, 2023,<https://universalassignment.com/certificate-iv-of-information-technology-networking/>
Universal Assignment - Certificate IV of Information Technology Networking. [Internet]. [Accessed February 1, 2023]. Available from: https://universalassignment.com/certificate-iv-of-information-technology-networking/
"Certificate IV of Information Technology Networking." Universal Assignment - Accessed February 1, 2023. https://universalassignment.com/certificate-iv-of-information-technology-networking/
"Certificate IV of Information Technology Networking." Universal Assignment [Online]. Available: https://universalassignment.com/certificate-iv-of-information-technology-networking/. [Accessed: February 1, 2023]

Please note along with our service, we will provide you with the following deliverables:

Please do not hesitate to put forward any queries regarding the service provision.

We look forward to having you on board with us.

Get 90%* Discount on Assignment Help

Most Frequent Questions & Answers

Universal Assignment Services is the best place to get help in your all kind of assignment help. We have 172+ experts available, who can help you to get HD+ grades. We also provide Free Plag report, Free Revisions,Best Price in the industry guaranteed.

We provide all kinds of assignmednt help, Report writing, Essay Writing, Dissertations, Thesis writing, Research Proposal, Research Report, Home work help, Question Answers help, Case studies, mathematical and Statistical tasks, Website development, Android application, Resume/CV writing, SOP(Statement of Purpose) Writing, Blog/Article, Poster making and so on.

We are available round the clock, 24X7, 365 days. You can appach us to our Whatsapp number +1 (613)778 8542 or email to info@universalassignment.com . We provide Free revision policy, if you need and revisions to be done on the task, we will do the same for you as soon as possible.

We provide services mainly to all major institutes and Universities in Australia, Canada, China, Malaysia, India, South Africa, New Zealand, Singapore, the United Arab Emirates, the United Kingdom, and the United States.

We provide lucrative discounts from 28% to 70% as per the wordcount, Technicality, Deadline and the number of your previous assignments done with us.

After your assignment request our team will check and update you the best suitable service for you alongwith the charges for the task. After confirmation and payment team will start the work and provide the task as per the deadline.

Yes, we will provide Plagirism free task and a free turnitin report along with the task without any extra cost.

No, if the main requirement is same, you don’t have to pay any additional amount. But it there is a additional requirement, then you have to pay the balance amount in order to get the revised solution.

The Fees are as minimum as $10 per page(1 page=250 words) and in case of a big task, we provide huge discounts.

We accept all the major Credit and Debit Cards for the payment. We do accept Paypal also.

Popular Assignments

Question 10 – REPORTS

Complete the table below, by listing three types of financial reports that are produced in your workplace. Type of Report Content of Report Frequently of Report                  

Read More »

Question 9 – BUSINESS RECORDS

Work through the following table and indicate whether each record should be kept or destroyed. Detail the reason for your answer and how long the record should be kept (for example, legislation requirement – retain for five years). Record Keep – Yes or No Reasons Suppliers Invoices     Employee

Read More »

Question 6 – BUSINESS ACTIVITY STATEMENT

Using the following information, complete the Business Activity Statement, you may need to refer to the ATO website to help you complete. Download and complete the Business Activity Statement (BAS). It can be found separately on the course page.

Read More »

Question No 5 – BREAKEVEN ANALYSIS & MOVING

AVERAGE Activity 5.1 – Break-even Answers A. B.   Manage 8 Buildings Manage 10 Buildings Manage 15 Buildings Manage 20 Buildings Manage 25 Buildings Income           Less Variable Costs           Less Fixed Costs           Total Cost    

Read More »

Question 3 – Depreciation

You are the Licensee-In-Charge of Hope & Murphy Real Estate and wish to purchase computers for your new office in the CBD. Using the information below: Office fit out                      $120,000 Assets effective Life          4 years Purchase Date                  1st July STRAIGHT-LINE METHOD CALCULATION Years 1 to 4 – JOURNAL ENTRIES DEPRECIATION                                               

Read More »

Question 1 – PROFIT & LOSS AND BALANCE SHEET

Please note: Editing has been restricted in this document. From the information provided below, complete the following table: Account Name Classification Profit & Loss or Balance Sheet Amount Pay Superannuation Expense Profit & Loss $117,325 Pay Mobile Phone     $7,500 Pay Office Rent     $65,000 Land & Buildings

Read More »

Case Study – WORLDUCATION

Worlducation is a social startup that manufactures tablet computers for primary school students. They not only focus on the hardware, but they also have a competitive team creating software, content and activities to better engage and educate the students. Worlducation aims to change the way children learn at school by

Read More »

BSBOPS505 Manage Organisational Customer Service

BSBOPS505 MANAGE ORGANISATIONAL CUSTOMER SERVICE STUDENTASSESSMENT TASKS QIBA Pty Ltd | CRICOS Provider Code: 01515J | RTO Code: 5304 | ABN: 35 071 667 108  Student Assessment TasksBSBOPS505 Manage Organisational Customer Service     BSBOPS505 Contents Introduction  4 Assessment Task 1: Knowledge questions  5 Assessment Task 1: Checklist 9 Assessment Task 2:

Read More »

BSBOPS505 MANAGE ORGANISATIONAL CUSTOMER SERVICE

BSBOPS505 MANAGE ORGANISATIONAL CUSTOMER SERVICE STUDENT VERSION PROJECT PORTFOLIO Contents Student declaration. 3 Section 1: Establish customer service requirements. 4 Section 2: Deliver quality customer service. 9 Section 3: Monitor and assess customer service. 13 STUDENT PROJECT PORTFOLIO COVER SHEET Student declaration This declaration must be completed in full by

Read More »

GBL Final Take Home Exam

The Trans-Pacific Partnership (TPP) was meant to be a ground-breaking new agreement by placing 12 economies under a common set of economic norms and regulations. After the US withdrew from the TPP, the remaining 11 signatories continued talks and which led to the Comprehensive and Progressive Agreement for Trans Pacific

Read More »

PORTFOLIO ASSESSMENT 3

You will be creating a Portfolio record specifically focused on mental health assessments and pharmacological interventions. This is designed to assist in the development of theoretical and clinical skills in mental health, with a direct connection to your clinical practice as a registered student nurse. The evidence record provides you with the opportunity to showcase your learning

Read More »

NRSG375 Clinical Leadership

Assessment Task 3: Written assignment (45%) Discuss and analyse in more detail 2 of the discussion posts that you submitted for assessment task (AT) 2 and use contemporary literature for support. For the 2 posts that you choose, you are to discuss and analyse professional leadership in nursing in further

Read More »

Portfolio record specifically focused on mental health assessments

PORTFOLIO ASSESSMENT 3 You will be creating a Portfolio record specifically focused on mental health assessments and pharmacological interventions. This is designed to assist in the development of theoretical and clinical skills in mental health, with a direct connection to your clinical practice as a registered student nurse. The evidence record provides you with the opportunity to

Read More »

The aetiology of mrs simpsons pain Assignment Help

Length: 1800 words Group Assessment: No Submission method options: EASTS (online) TASK back to top This assessment task requires you to analyse the case study provided below.  In the case study,  a patient is experiencing a range of health challenges. You are required to read the case study carefully and complete the following

Read More »

The Dangers of a Single Story Assignment Help

Narrative Essay Instructions Chimamanda Ngozi Adichie’s TED Talk titled “The Dangers of a Single Story” recounts instances where one perspective can lead to assumptions, conclusions, and/or decisions that may incomplete or lead to misunderstandings (e.g., think about the story of Fide or how Adichie’s roommate was shocked to learn how

Read More »

LAW1101 21F – Fundamentals of Law

LAW1101 21F – Fundamentals of Law Assignment 1:  Legislative interpretation Due date: Wednesday, November 10, 2021 at 3:00pm Instructions: You are to read two excerpts from legislation and then answer questions about each of them.  The questions are weighted differently and the marks for each question are included.  There are

Read More »

A Work Based Quality Improvement Project

Project Title: Impact of educational intervention on nurses knowledge of hand hygiene in aged care setting: A Work Based Quality Improvement Project Executive Summary: (100- 150 words) Background: Hand hygiene is one of the most important strategies for preventing infections in healthcare settings and healthcare-associated infections, which affect hundreds of

Read More »

Community Health and Development

Part A :  Assessment event 3(a) details Assessment Task 3(a): Apply a problem-solving approach to a social issue in your local community by using the Community Health and Development (2017b) 10-point process. Word count: 2000 Weighting: 35% It is recommended that you: Criteria Fail <17.5 Pass 18- Credit 20 – 22 Distinction 23– 25 High Distinction 

Read More »

RE-AWAKENING HEALTH SYSTEMS

In this assignment, you are asked to pick ONE of the following case studies and answer a series of questions about the particular health situation that is described. In each case study, you are asked to examine the significance of the issue for Australia, explore the condition from a very broad policy

Read More »

FINAL EXAM – SPRING SESSION Building Law

FINAL EXAM – SPRING SESSION 2021 School of Law EXAM INSTRUCTIONS Read all the information below and follow any instructions carefully before proceeding. Clearly indicate which question you are answering.   UNIT NAME: Building Law UNIT NUMBER: 200292 NUMBER OF QUESTIONS: 4 VALUE OF QUESTIONS: Question 1 (10 marks) Question

Read More »

MGMT8055 Brief Case Writeup Bauing Construction Holding Group

Why do you think Bauing Indonesia was so successful? Suggestions government, cost, and competitive Main proof-points The first factor behind this decision was increasing competition in the building and decoration industry in China. In 2016, most public companies in this industry in China experienced decreasing gross margins due to increased

Read More »

MGMT8055 Case Writeup Xiaomi

After recognising numerous global opportunities, Xiaomi in Beijing charted its overseas market strategy in 2013. However, opportunities came with challenges, and during the internationalization process, Xiaomi encountered many problems. After three years of hard work, Xiaomi had gained more experience than profits. Compared with Xiaomi’s domestic success, Xiaomi’s internationalization strategy

Read More »

LNG11120 Developing Intercultural Competence in the Workplace

Edinburgh Napier University Academic Year 2021-22 Trimester 1 Assessment Brief 1.  Module number   LNG11120 2.  Module title   Developing Intercultural Competence in the Workplace 3.  Module leader   4.  Assessment Coursework 1: Group report – an ‘intercultural training’ plan (see Section 10 below for more details) 5.  Weighting  

Read More »

Knowledge, Individual, and Society

Essay 1 Assignment To be submitted via Turnitin on LMS. Assignment: Write a 1,200 word (not including references or footnotes) essay answering ONE of the following questions: 1) What is the Gettier problem and can we solve it? Address this question by carefully explaining and evaluating 1-2 responses to the

Read More »

9014 NPD New Product Design

Summary In the 2000-word written report, students are required to develop some specific aspects of the initial three phases of a new product (service or idea) development process. Students are expected to apply the relevant design thinking tools and ideas in this assessment. Referencing is Australian Harvard (AGPS) and outlined

Read More »

Can't Find Your Assignment?

Open chat
1
Free Assistance
Universal Assignment
Hello 👋
How can we help you?