Certificate IV of Information Technology Networking

Student Version

Section A – Program/Course details
Qualification code:ICT40418Qualification title:Certificate IV of Information Technology Networking
Unit code:
Unit title:
Manage network and Data Integrity
Install, configure and Test network Security
Build security into virtual private networks
Department name:BDIT, Computer and Information TechnologyCRN number:Enter CRN number
Section B – Assessment task details
Assessment number:2 of 2Semester/Year:1 /2021
Due date:Session 16Duration of assessment:4 Sessions
Assessment methodProject and ObservationAssessment task results☒Ungraded result
☐Other: Click here to enter text.
Section C – Instructions to students
Task instructions:
Your Project will be given to you on the first day of your commencement. You are required to complete your project on time. Once completed you are required to upload your document to the Assessment folder on Brightspace. In order to be competent you will need to satisfy your project requirements.
Section D – Conditions for assessment
Conditions: Student to complete and attach Assessment Submission Cover Sheet to the completed Assessment Task.
• Project to be completed individually unless otherwise noted
• Your project must be uploaded and submitted to BrightSpace.
• All files should be zipped (.zip) and named appropriately. E.g. “yourname_NameOfAssessment”.
• Submit all your files when appropriate and in a timely manner in accordance with your schedule
Equipment/resources students must supply:Equipment/resources to be provided by the RTO:
Students attending remote learning must have access to:
Internet connection
Web browsers
Word processor
Computer, VMware Workstation Pro, Windows Server 2016, Windows Client, Anti Virus. Packet Tracer Application.
Section E – Marking Sheet – Student Answer Sheet
Unit code:ICTNWK403
Unit title:Manage network and Data Integrity
Install, configure and Test network Security
Build security into virtual private networks

Error: Reference source not foundObservation task

Skills to be observed during this task to the required standard1. Date:2. Date:3. Date:Comment

1.Learner has demonstrated a secure file and resource access
2.Learner has demonstrated authentication of user accounts control to ensure secure data integrity
3.Learner has demonstrated the implement and configuration of an antivirus or anti-malware solution
4.Learner demonstrated the assessment and implementation of best practice to harden server and network
5.Learner demonstrated the implementation of a system to protect data from environmental threat
6.Learner has demonstrated a backup solution they have implemented
7.Learner has demonstrated the restore the data from a backup
8.Learner has demonstrated the implement a real time backup and data sync solution
9.Learner has demonstrated the implementation of network performance monitoring tools to monitor network and reporting,
10.Learner was able to explain and determine the environment al threats to data.
11.Learner has demonstrated and conducted function and performance tests to modify and debug countermeasures
12.Learner has demonstrated the review logs and audit reports to identify and record security incidents, intrusions and attempts
13.Learner has demonstrated out spot checks and audits to ensure that procedures are not being bypassed

Assessment Submission Cover Sheet (VET)

Student declaration
By submitting this assessment task and signing the below, I acknowledge and agree that: This completed assessment task is my own work. I understand the serious nature of plagiarism and I am aware of the penalties that exist for breaching this. I have kept a copy of this assessment task. The assessor may provide a copy of this assessment task to another member of the Institute for validation and/or benchmarking purposes.
Student ID:
Student name:
Submission or observation date:
Student signature For electronic submissions: By typing your name in the student signature field, you are accepting the above declaration.
Assessment Results and Feedback to Student
Assessment Task Result:SatisfactoryNot Satisfactory
Assessor’s Feedback:

Resubmission allowed:Yes ☐No ☐Resubmission due date:
Assessor name:
Assessor signature:
Date assessed:

Supporting document

Insert title of supporting document.

Unit code:ICTNWK403
Unit title:Manage network and Data Integrity
Install, configure and Test network Security
Build security into virtual private networks

Project – Protect data / Install and configure network security


You are the network administrator for a small aged-care not for profit organisation. As the new Security Manager, you are tasked with Modify and creating policies, implementing technologies to mitigate risk, and analysing the processes and systems in place to make them more secure.

The firm has 20 desktop and 20 laptop computers (in total). The head of the firm uses 1 laptop and 1 desktop. Rest of the laptops are shared by other staff for client visits. There is 1 reception desktop, each staff member has their own desktop. Firm uses local email and file server. There are 7 more new laptops that are used by clients when visiting office. They also have one Terminal server that hosts an aged-care software called Carelink+. The organisation has other two offices located 30-80 km apart. Users connect to terminal server that sits in the main office. Their web is hosted with cloud access.

Based on an assessment performed by an external auditor, the following were identified as the top 3 threats:

  • Viruses and malicious code inside the network.
  • Business Continuity Planning, Disaster Recovery.
  • No Site to site VPN and a VPN server to access the terminal server.
  • Security Policies are not updated since 2015.
  • There is no asset management system in place.

Based on this assessment, the primary issue now concerning the CEO is the development of a distributed and manageable antivirus system for servers, workstations, email filtering and a VPN service. Though Anti-Virus and Disaster Recovery exist to some extent, but no update and testing has been done in some time, no centralized management has taken place, and no policies exist to govern the correct or expected use and implementation of this type of application. The company has been inundated with viruses over the last 2 years, and no one has been able to centrally coordinate a means of controlling the problem.

The company’s security program is in its infancy. No policies exist yet, and no corporate security awareness program has been created. No real processes exist to manage the antivirus system that is in place. Very few controls are in place. When the systems administration team has time, they check to make sure the client definition file updates are pushed out to Desktop clients, and the server-level antivirus software is never checked. No alerts are sent to anyone when a virus is detected.

Further to the security program their security policy Is not been update last 5 years, Still they are using folder mapping from file server with access to every single user, Password change policy is not in place, Windows update goes on anytime since its set to automatic update and hold users to wait while working. Old DC drives are still working and all the computers has got admin permission to install application.

As a network administrator, your task is to:

You are given 6 months to implement your security system. You need to do precise planning and let management know how you will tackle new proposed solution. No company information security policies exist at the moment. With relation to the antivirus system, a total corporate antivirus policy will have to be defined and written. Standards for products to be installed, as well as procedures for the installation, will have to be documented as well. Finally, guidelines for virus detection and “common-sense security” related to viruses and antivirus software will be outlined as part of the corporate security awareness program.

Tasks A: Documentation

Your Document must address the following points listed below in professional level standard. References should be given at the end of the document as per Holmesglen standard.

  1. Identify and report the Current security in place.
  2. Identify the current Network, Software and Hardware and systemThreats and Vulnerabilities to address. (e.g. hardware are kept in server room and server room are not locked)
  3. Report the Security Threats, Vulnerabilities (almost the same as point 2).
  4. Review the companies’ security policy (provide feedback on “Information-Security-Policy for Assessment 2.pdf”).
  5. Prepare a Risk assessment based on the identified Threats and Vulnerabilities (how risky it is from the threats and vulnerabilities in point 2).
  6. Prepare the recommendation to the client to address the security issues based on asset security requirement.
  7. Design an assets recording system using Microsoft Excel (document = system hardware requirement, CPU, hard-disk, RAM).
  8. Audit the system and software using audit tools and techniques (Microsoft auditing tools…etc. run auditing tool on our virtual machine – run on client machines).
  9. Prepare an assets report based on current devices and Audit the system hardware and software for features and capabilities (extension from point 7).
  10. Identify and list the Environmental Threats to Data (e.g. power issue, natural disaster, physical access to our resources).
  11. Research on Three AV and select one based on customer requirement (compare three anti-virus product…etc. bit defender, Norton, Kaspersky).
  12. Research the appropriate backup model& media for client need (right backup types, and media types = USB, cloud backup, optical drive).
  13. Implement an inventory control mechanism with the audited information (provide checklist of who access resource, who given permission and the signature => from point 8)
  14. Identify available network and system monitoring tools (Winsolar… so on and so forth).
  15. Create functional and Performance test cases to verify security requirements (once this has been implemented, checking backups…backups are configured to run 9:00pm on a daily basis… you can include permission types test case if possible).
  16. Document the current system settings.
  17. Document possible breaches newly discovered with recommendations (documents other source of attacks… etc. zero-day-attack, social engineering, video camera …etc.).

Part B (Implementation)

In this part you have to implement the findings from your Part A documentation. To do the implementation you must use virtual machines using domain controllers and Active Directory.

Once the system is implemented you are going to build a packet Tracer (PT) network to simulate the site to site VPN between Branches. In addition to PT design you also need to implement a VPN server for users to connect securely to do remote desktop in to terminal server.

Implementation on Virtual Machine:

  1. Configure GPOs to protect files and resources
    1. Display warning message before user loges in.
    2. Enforce password policy (after 3 failed logons lock user).
  2. Create and Configure user with different account permission to shared Folders (Read only, Read and Write permissions to a folder).
  3. Install and test antivirus software on all appropriate systems (install and test recommended anti-virus on both servers and clients).
  4. Close all the unused ports and open https port outbound for Myob ATO reporting at the domain level in Firewall (open new firewall rules => 443 is enabled => http ports must always be opened).
  5. Build Cloud backup for data security from environmental threat (sign up to google backup => install this backup).
  6. Implement and demonstrate backup solution to do daily backup on company data (normal back before cloud backup).
  7. Restore the backup date to check test the business continuity (How to know my backup is the right backup… check backup by restoring again by deleting the files => this is the testing phase of backup).
  8. Sync the cloud backup to every 5 min with real time.
  9. Implement a network performance monitoring tool from your research finding in par A and prepare a report on performance (download and install PRPG => configure it with all notifications => notification requires email service however).
  10. Install and Configure VPN service on Terminal Server (install VPN services).
  11. Test the systems for performance and Functions.
  12. Review the logs to find minimum 5 the incidents and intrusion attempts using event viewer.
  13. Monitor logon events to the domain
  14. Carry out minimum three spot checks /

Part C (Packet Tracer Implementation) – Site to Site VPN – Go to session 15 for this

In this part you are going to demonstrate the branch connectivity with head office using packet tracer simulator. To do this create a network with minimum three routers and do the routing of your own choice of routing protocol. Once the routing is configured you have to configure VPN between branches and head office using site to site VPN.

  1. Configure Security on the Router / Switch and networking devices using Putty console
  2. Make sure the sites are reachable
  3. Configure IKE and IPsec
  4. Configure Site-to-Site VON using pre-shared key
  5. Replace pre-shared key with digital certificate.
  6. Document the configuration and save the file securely
  7. Monitor and manage the security breach to see the security attempts
  8. Enable debug to do the continues monitoring on routers for VPN connections

Your solution must clearly meet the needs of the organisation and you must understand and be able to demonstrate in front of your teacher.

Order Now
No Fields Found.
Universal Assignment (May 27, 2023) Certificate IV of Information Technology Networking. Retrieved from https://universalassignment.com/certificate-iv-of-information-technology-networking/.
"Certificate IV of Information Technology Networking." Universal Assignment - May 27, 2023, https://universalassignment.com/certificate-iv-of-information-technology-networking/
Universal Assignment June 17, 2022 Certificate IV of Information Technology Networking., viewed May 27, 2023,<https://universalassignment.com/certificate-iv-of-information-technology-networking/>
Universal Assignment - Certificate IV of Information Technology Networking. [Internet]. [Accessed May 27, 2023]. Available from: https://universalassignment.com/certificate-iv-of-information-technology-networking/
"Certificate IV of Information Technology Networking." Universal Assignment - Accessed May 27, 2023. https://universalassignment.com/certificate-iv-of-information-technology-networking/
"Certificate IV of Information Technology Networking." Universal Assignment [Online]. Available: https://universalassignment.com/certificate-iv-of-information-technology-networking/. [Accessed: May 27, 2023]

Please note along with our service, we will provide you with the following deliverables:

Please do not hesitate to put forward any queries regarding the service provision.

We look forward to having you on board with us.

Get 90%* Discount on Assignment Help

Most Frequent Questions & Answers

Universal Assignment Services is the best place to get help in your all kind of assignment help. We have 172+ experts available, who can help you to get HD+ grades. We also provide Free Plag report, Free Revisions,Best Price in the industry guaranteed.

We provide all kinds of assignmednt help, Report writing, Essay Writing, Dissertations, Thesis writing, Research Proposal, Research Report, Home work help, Question Answers help, Case studies, mathematical and Statistical tasks, Website development, Android application, Resume/CV writing, SOP(Statement of Purpose) Writing, Blog/Article, Poster making and so on.

We are available round the clock, 24X7, 365 days. You can appach us to our Whatsapp number +1 (613)778 8542 or email to info@universalassignment.com . We provide Free revision policy, if you need and revisions to be done on the task, we will do the same for you as soon as possible.

We provide services mainly to all major institutes and Universities in Australia, Canada, China, Malaysia, India, South Africa, New Zealand, Singapore, the United Arab Emirates, the United Kingdom, and the United States.

We provide lucrative discounts from 28% to 70% as per the wordcount, Technicality, Deadline and the number of your previous assignments done with us.

After your assignment request our team will check and update you the best suitable service for you alongwith the charges for the task. After confirmation and payment team will start the work and provide the task as per the deadline.

Yes, we will provide Plagirism free task and a free turnitin report along with the task without any extra cost.

No, if the main requirement is same, you don’t have to pay any additional amount. But it there is a additional requirement, then you have to pay the balance amount in order to get the revised solution.

The Fees are as minimum as $10 per page(1 page=250 words) and in case of a big task, we provide huge discounts.

We accept all the major Credit and Debit Cards for the payment. We do accept Paypal also.

Popular Assignments

MQBS7030 Final Assessment Data Analysis and Report

ASSIGNMENT TASK: For this assignment, you need to refer to “Fringe” dataset. Fringe is concerned with the factors that contribute to the fringe benefits of employees. The dataset includes a range of different variables, which allows for a range of different tests to be performed. You should note that our

Read More »

MIS770 Foundation Skills in Business Analysis

MIS770 Foundation Skills in Business Analysis Department of Information Systems and Business Analytics Deakin Business School Faculty of Business and Law, DeakinUniversity Assignment Two Analysis of Click Sales Data Particulars Assurance of Learning This assignment assesses the following Graduate Learning Outcomes and related Unit Learning Outcomes: Graduate Learning Outcome (GLO)

Read More »

ITECH7407 – Real Time Analytics

Assessment Task – Data Analytics Assignment Overview For this assessment task, you will work in a group to analyse a selected data set, and provide recommendations to the leadership of the company based on your findings. Timelines and Expectations Percentage Value of Task: 25% Due: Week 11, Sunday 5pm Minimum

Read More »

BSB123 Data Analysis

BSB123 Data Analysis Research Report Assessment Semester 1, 2021 Due Date: 11:59 30th May The data for the Assignment can be found in the file Research Report Assessment (2021-01).xlsx on Blackboard The Problem FringeTech is an information technology / electrical engineering company that employs thousands of people Australia wide. Recently

Read More »

Final Analysis Assignment Help

Refer to the attached excel file, answer the questions below. Use graph if required. The file that can be accessed through the link below contains data on 100 employees in a particular occupation. Suppose that interest centres on investigating the factors that explain salary differences. The data set contains the following

Read More »

VETS6103 Data Analysis Assignment

Factors influencing milk production in Australian dairy cattle Assignment overview: This assignment involves analysing a dataset, interpreting results, and drawing conclusions based on the analyses. The dataset can be found in the file “practical_assignment_2021.xls” which is on Canvas under the Assignments folder. It is a group task worth 50% of

Read More »


ECON 1030 – BUSINESS STATISTICS 1: Individual Assignment   Instructions: This is an individual assignment with a total of 40 marks. The allocation of marks is as follows: Statistical Analysis     (including excel) 32 Professional Report 8              Total 40 The response to the assignment must be provided in the form

Read More »

Assessment 3: Public Health Data Analysis

Assessment 3: Public Health Data Analysis Weighting: 30 % Details of task: This assignment involves the presentation and interpretation of descriptive statistics and statistical test results. On completion of this assessment task, you will be able to: Word limit: This assessment is 2,500 word equivalent with a focus on calculations

Read More »

Log Book Entry 2: Association and Regression

Submission deadline: 11:59pm, 7th December, 2021. All analytics tasks must be completed using R, and should be reproducible from the R code, which must be submitted as an appendix. This log book entry will focus on using association and regression to examine the relationships between multiple variables. Using the ames_train

Read More »

Assignment 2 (Individual): Data Analysis Project

Assignment 2 (Individual): Data Analysis Project (50%): The retail bank that you work for recently ran a telephone marketing campaign to encourage customers to subscribe to a term deposit. Data was obtained from the marketing campaign, internal systems relating to the characteristics of the customer as well as whether or

Read More »

BI7138: Biodiversity Informatics

Biodiversity Informatics Assessment 1 Biodiversity Informatics Assessment 1 The Red Kite (Milvus milvus) is a scavenging raptor found throughout Europe and native to Britain. Red Kites were once common throughout Britain. During the last century their populations were reduced to just a handful of birds in the Welsh valleys by

Read More »

MGMT Course Assignment Fall 2021

Contents Contents General Information. 2 Rules. 2 Outside sources. 3 Scenario. 3 What you need to do. 4 Part 1 – Exploratory data analysis. 4 Table 1. 4 Part 2 – Training and testing set (sample) 4 Table 2. 5 Part 3 – Simple linear regression. 8 Table 3. 8

Read More »

CM 4223– Company Strategic Planning

SWOT Analysis Project Report Guidelines   Introduction/Overview/Background This section is an introduction of your company. Discuss things such as company history, background, leadership team, and location. Ensure that you mention who you are and what you do. If there are global operations, highlight this as well. Mention any goods and/or

Read More »

Surveying (48320) Final Assignment – Major Project

Surveying (48320)  AUTUMN 2023 Final Assignment – Major Project Weight: 40% Due date: 02/06/2023 Student Name:     ________________   Student Number: ______________ Submission Date: ______________________ Submission Component and Marks Awarded Marks   PLAN:     Find Scale of plan and explain 4   9 Bearing and Distances of three lines 3

Read More »

IAP607BM Independent Critical Analysis Project

ASSESSMENT 2 BRIEF Subject Code and Title IAP607BM Independent Critical Analysis Project Assessment Group Presentation of Preliminary Findings Individual/Group Group Length 10-minute presentation and 10-minute Q&A (+/- 10%) Learning Outcomes This assessment addresses the following Subject Learning Outcomes:   Critically review and synthesise the literature as it applies to the

Read More »

SEO PLAN Assignment Help

SEO PLAN Review the SEO slides, SEO videos, and other SEO resources (word files, examples, templates) before doing the assignment.  Choose a “client”, a small to a medium size company, that does not rank too high on search engines. Follow the step by step process described below and create an

Read More »

CET333 Product Development ePortfolio


Read More »

ETF2100/5900 Introductory Econometrics Assignment 2

ETF2100/5900 Introductory Econometrics Assignment 2 — A Case Study on the Birth-weight of Baby Important notes: Notation used in the assignment needs to be typed correctly and properly. Incorrect (or inconsistent) notations are treated as wrong answers. We are interested in studying whether a mother’s smoking affects the birthweight of

Read More »

HA1011 Applied Quantitative Methods Group Assignment

   HOLMES INSTITUTE   FACULTY OF HIGHER EDUCATION Assessment Details and Submission Guidelines Trimester T1 2022 Unit Code HA1011 Unit Title Applied Quantitative Methods Assessment Type Assessment 2 Assessment Title Group Assignment (Min of 2 and maximum of 4 members in a group. Please check the group self-enrollment guide in

Read More »

Practical Assessment 2 Data Wrangling

Practical Assessment 2 Data Wrangling Assessment type: Written report (PDF document) using R Markdown Due date: 26th May 2022, 5 pm Melbourne time Weighting: 30% Word limit: Maximum 25 pages Feedback mode: Feedback will be provided using Canvas marking tool and general text comments. Group assessment You will work on

Read More »

Using aggregation functions for data analysis

Using aggregation functions for data analysis Total Marks 100, Weighting 20% The provided zip file contains the data file [RedWine.txt] and the R code [AggWaFit718.R] to use with the following tasks, include these in your R working directory. You can use the R script [template.R] to organise your code. Clarification

Read More »

EC2509 – Econometrics B

EC2509 – Econometrics B This EC2509 problem set must be handed in via Turnitin by Wednesday 23th February 2022, 23.59 Please submit your answer as a single PDF document. The document should contain the results as well as your written answer to the questions, and an appendix with your full

Read More »

Research Report: Assignment 2

Due Date/Time: 3:00pm (AWST), Friday May 13th, 2022 Marks: This assignment will be marked out of 100 and is worth 40% of your final grade for PSEM. Topic Overview: In this assignment, you will be analysing and interpreting the results of research seeking to investigate whether using diagnostic labels to

Read More »

PSEM: Research Report Data Analysis

PSEM: Research Report Data Analysis The next two weeks of content are essential for your second assessment. You will be analysing and reporting the data collected for your research report assessment (worth 40% of your grade for PSEM). At the end of these two weeks, you should be in a

Read More »

Wage Gaps Major Project

As part of your assessment, you will submit a written project worth 40% of your  final mark. This document sets out the main aspects of this project.  The aim of the project is to integrate the learning from the entire module in the service of  conducting your own exploration of

Read More »

Can't Find Your Assignment?

Open chat
Free Assistance
Universal Assignment
Hello 👋
How can we help you?