Beruflich Dokumente
Kultur Dokumente
2013
COURSE NAME
CODE NAME
KSK 601
LEVEL
3 SEMESTER 6
CREDIT UNIT
4.0
CONTACT HOUR
FACE TO FACE
5.0 HOURS/WEEK
COURSE TYPE
VOCATIONAL
PREREQUISITE
CORE REQUISITE
COURSE OUTCOMES
Last Edited
10 - 13 Nov 2013
Module Page
1/15
Document Page
Edition December
2013
COURSE DESCRIPTION
This module Legal and Security Issues Management (Part 2) using standard operating procedures, computer security policy, security
inspection checklist, computer network layout plan, installation manual, hardware installation tools, company security procedure, updates
schedule, manufacturer & vendor support, firmware & software versions, manufacturer technical guidelines, product manual, installation
manual, storage media, security updates, computer network security policy, computer network activity diagnostic tools, computer network
threats prevention procedures, computer network intrusion prevention procedures, system documentation, contingency procedures document,
work schedule, contingency checklist & writing tools, checklist, contingency action plan and report so that company security policies
determined, established & inspected, critical security policies requirements determined, computer security software, security equipment
installed & recorded, software & equipment update determined, software update acquired, installed & recorded, network threats determined &
identified, network threats prevention carried out, network intrusion determined & diagnosed, network intrusion prevention carried out, type of
solution determined, contingency action plan executed & contingency report produced, action plan instruction obtained, action plan checklist
produced & executed, problem/issues contained to appropriate levels and contingency action applied & documented in accordance with
company policies, standard operating procedures and manufacturer updates guidelines.
10 - 13 Nov 2013
Module Page
2/15
Document Page
Edition December
PROGRAM
COURSE NAME
CODE NAME
KSK 601
CONTENT STANDARD
1. IMPLEMENT COMPUTER
NETWORK POLICY
LEARNING STANDARD
1.1 Determine company security policy
2013
PERFORMANCE CRITERIA
1.1.1
1.1.2
1.1.3
10 - 13 Nov 2013
Module Page
3/15
Edition December
CONTENT STANDARD
LEARNING STANDARD
2013
PERFORMANCE CRITERIA
1.3.2 Respond security violation occurrence
1.3.3 Apply security policy inspection checklist
10 - 13 Nov 2013
Module Page
4/15
Document Page
Edition December
PROGRAM
COURSE NAME
CODE NAME
KSK 601
CONTENT STANDARD
2. EVALUATE SECURITY
SOFTWARE AND
EQUIPMENT
LEARNING STANDARD
2.1 Determine critical security policies
requirements
10 - 13 Nov 2013
Module Page
5/15
2013
PERFORMANCE CRITERIA
2.1.1
2.1.2
2.1.3
2.1.4
2.2.1
2.2.2
2.2.3
2.3.1
Document Page
Edition December
CONTENT STANDARD
LEARNING STANDARD
2013
PERFORMANCE CRITERIA
2.3.2
2.3.3
2.3.4
2.3.5
2.4.1
2.4.2
Write report
10 - 13 Nov 2013
Module Page
6/15
Document Page
Edition December
PROGRAM
COURSE NAME
CODE NAME
KSK 601
CONTENT STANDARD
3. UPDATE COMPUTER
NETWORK SECURITY
LEARNING STANDARD
3.1 Determine software and equipment
update
2013
PERFORMANCE CRITERIA
3.1.1 Identify security
requirements
firmware
and
software
updates
Last Edited
10 - 13 Nov 2013
Module Page
7/15
Document Page
Edition December
CONTENT STANDARD
LEARNING STANDARD
2013
PERFORMANCE CRITERIA
3.2.5 Store obtained security updates
Last Edited
10 - 13 Nov 2013
Module Page
8/15
Document Page
Edition December
PROGRAM
COURSE NAME
CODE NAME
KSK 601
CONTENT STANDARD
4. DIAGNOSE COMPUTER
NETWORK THREATS
LEARNING STANDARD
4.1 Determine network threats
10 - 13 Nov 2013
Module Page
9/15
2013
PERFORMANCE CRITERIA
4.1.1
4.1.2
4.1.3
4.1.4
4.2.1
4.2.2
4.2.3
4.2.4
4.2.5
4.3.1
Document Page
Edition December
CONTENT STANDARD
LEARNING STANDARD
prevention
2013
PERFORMANCE CRITERIA
4.3.2
4.3.3
Execute computer
procedures
network
threats
prevention
10 - 13 Nov 2013
Module Page
10/15
Document Page
10
Edition December
PROGRAM
COURSE NAME
CODE NAME
KSK 601
CONTENT STANDARD
5. IMPLEMENT COMPUTER
NETWORK INTRUSIONS
LEARNING STANDARD
5.1 Determine network intrusion
Last Edited
10 - 13 Nov 2013
Module Page
11/15
2013
PERFORMANCE CRITERIA
5.1.1
5.1.2
5.1.3
5.2.1
5.2.2
5.2.3
5.2.4
5.3.1
5.3.2
11
Edition December
CONTENT STANDARD
LEARNING STANDARD
2013
PERFORMANCE CRITERIA
5.3.3
Execute computer
procedures
network
intrusion
5.3.4
prevention
10 - 13 Nov 2013
Module Page
12/15
Document Page
12
Edition December
PROGRAM
COURSE NAME
CODE NAME
KSK 601
CONTENT STANDARD
6
CARRY OUT
CONTINGENCY
MEASURES
LEARNING STANDARD
6.1 Determine type of solution
2013
PERFORMANCE CRITERIA
6.1.1
6.1.2
6.1.3
Implement solution
6.2.1
6.2.2
6.2.3
6.3.1
6.3.2
Write report
10 - 13 Nov 2013
Module Page
13/15
Document Page
13
Edition December
PROGRAM
COURSE NAME
CODE NAME
KSK 601
CONTENT STANDARD
7
IMPLEMENT
CONTINGENCY
MEASURES
LEARNING STANDARD
7.1 Obtain action plan instruction
Last Edited
10 - 13 Nov 2013
Module Page
14/15
2013
PERFORMANCE CRITERIA
7.1.1
7.1.2
7.2.1
7.2.2
7.2.3
7.3.1
7.3.2
7.3.3
Document Page
14
Edition December
7.4 Contain
problems/issues
appropriate levels
7.3.4
7.4.1
7.4.2
7.5.1
7.5.2
7.6.1
7.6.2
2013
to
Last Edited
10 - 13 Nov 2013
Module Page
15/15
Document Page
15