This unit describes the skills and knowledge required to design, develop, install and maintain authentication processes to reduce the vulnerability of the system.
It applies to individuals working as middle managers such as information security managers, network engineers or security analysts, who are responsible for implementing and monitoring the organisational security management system.

Unit details

Study level:
Vocational and further education (TAFE)
Unit code:
ICTNWK503

Assessment

Assessment tasks will be designed to reinforce and extend knowledge and skill competence within set and controlled parameters in accordance with each unit's learning outcomes and performance criteria requirements, including the setting of work based practical application tasks designed to provide evidence of competence outcomes, within periodic and scheduled timelines. Students will be expected to demonstrate the following required skills: -design and deploy authentications solutions to the business technology environment and business needs -configure authentication software or tools -monitor and test authentication process after implementation -ensure authentication solutions are current. Students will also be expected to demonstrate the following knowledge: -summarise the problems and challenges dealing with organisational authentication issues, including resource accounting through authentication -discuss common virtual private network (VPN) issues, including: -quality of service (QoS) considerations -bandwidth -dynamic security environment -function and operation of VPN concepts -outline authentication adaptors -summarise biometric authentication adaptors -summarise digital certificates, such as VeriSign, X.509, and SSL -explain the function and operation of authentication controls including: -passwords -personal identification numbers (PINs) -smart cards -biometric devices -other authentication protocols -outline network authentication services, such as Kerberos and NT LAN Manager (NTLM) -summarise the features of common password protocols, such as: -challenge handshake authentication protocol (CHAP) -challenge phrases -password authentication protocol (PAP) -remote authentication dial-in user service (RADIUS) authentication -describe the principles of security tokens

Where to next?

VU takes care to ensure the accuracy of this unit information, but reserves the right to change or withdraw courses offered at any time. Please check that unit information is current with the Student Contact Centre.