This unit describes the skills and knowledge required to ensure secure file encryption is selected, implemented and monitored on a computer network or local environment.  It applies to individuals working as information and communications technology (ICT) professionals who may select, implement and monitor a secure encryption environment in any size enterprise.

Unit details

Study level:
Vocational and further education (TAFE)
Unit code:


Assessment tasks will be designed to reinforce and extend knowledge and skill competence within set and controlled parameters in accordance with each competency unit's learning outcomes and performance criteria requirements, including the setting of project and work based practical application tasks designed to provide evidence of competence outcomes, within periodic and scheduled timelines. Students will be expected to demonstrate the following required skills: - analyse enterprise data security requirements; - create or review existing security plan to determine the appropriate encryption methods; - rank and document appropriate encryption methods; - implement encryption systems and inform users of any impacts, and; - monitor and document encryption issues and compromises, and notify appropriate person.Students will also be expected to demonstrate the following knowledge: - explain certificate related infrastructure (certificate authorities, registration authorities, repository services); - summarise common asymmetric key algorithms and their usage; - explain common symmetric key algorithms and their usage; - explain encryption strength; - summarise various encryption types, including public key, secret key, hash key; - summarise the functions and features of: access control permissions; digital signatures; symmetric encryption, asymmetric encryption and one-way encryption, and; timestamps; - explain one-way message digests, such as message digest algorithm 5 (MD5) and secure hash algorithm (SHA); - explain public key infrastructure (PKI), pretty good privacy (PGP) and GNU Privacy Guard (GnuPG); - outline replay security; - outline possible sources of security threats, including eavesdropping, data interception, data corruption, data falsification and authentication issues; - explain transmission control protocol or internet protocol (TCP/IP) protocols and applications; - summarise security problems and challenges that arise from organisational issues, and; - outline wired equivalent privacy (WEP), Wi-Fi protected access (WPA) and Wi-Fi protected access 2 (WPA2).

Where to next?

VU takes care to ensure the accuracy of this unit information, but reserves the right to change or withdraw courses offered at any time. Please check that unit information is current with the Student Contact Centre.