TAFE Part B: Course Detail: Blank Template

advertisement
TAFE Part B: Course Detail:
Teaching Period 0705 (First Half 2007)
RMIT Course
Code
COSC5754C
RMIT Course
Title
Develop System Infrastructure Design Plan
RMIT Course Id 035244
School
650T - Business TAFE
Campus
AUSCY - City Campus
Program Code
C5148
Program Title
Diploma of Information Technology
Name And
Contact Details
Of All Other
Relevant Staff
Munir A Saeed
Course Contact Phone:
Course Contact Email:
Nominal Hours
30 hours
Pre-Requisites
And CoRequisites
Pre-requisites
Install and Configure a Network
Install Network Hardware to a Network
ICAITI097B
ICAITS029B
COSC5675C
COSC5107C
Co-requisites:
Manage network security
ICAITS123B
ISYS7060C
Course
Description
99251610
munir.saeed@rmit.edu.au
This course addresses the conceptual issues of designing a network and following the
procedures for hardware and software selection in the light of client’s requirements, the
industry practices and the availability of the technology in the market. This unit is codelivered with Manage Network Security competency.
National/Module ICAITAD044B
Code
National/Module Develop System Infrastructure Design Plan
Title
Elements
1 Specify
architecture
requirements
Performance Criteria
1.
The critical principles, functions and framework for the system to operate across the
enterprise or business units are identified taking into consideration the project
deliverables, acceptance criteria and current IT blueprint
2.
The functions are organised into layers, or wrappings and components to meet business
systems requirements
3.
The processing environment, the hardware, network and system software required to
Page 1 of 8
support the operational environments are identified
2 Specify
hardware and
software
3 Conduct walk
through and
compare/contrast
expected
performance
criteria against
vendor proposed
offerings
Learning
Activities
4.
Systems topology model, templates and standards are refined to guide development
5.
The project guidelines, standards, models, acceptance criteria and general framework are
utilised to develop the architecture requirements
1.
Various products and vendors are evaluated against architecture requirements to determine
the best IT solution
2.
Current and future capacity requirements are estimated and evaluated against client’s
future requirements
3.
Requirements for upgrade or change are identified through analysis of software versions
and interoperability status of existing systems and applications
1.
Requirements model is compared against technical specifications and acceptance criteria
Requirements model is benchmarked against current industry standards and/ or IT
blueprint for performance, interoperability and expected future organisational needs
2.
3.
Recommendations for improvement are documented and referred to appropriate technical
specialists
Students will study Network Design and Security Implementation skills and theory in laboratory
sessions, tutorials, and practical sessions through prescribed exercises and assessment work.
These concepts will also be explored through the investigation of appropriate real world and
simulated environments.
Teaching
Schedule
Weekly Schedule - Semester 1, 2007
Co delivered as Course: Network Design and Security
Week
beginning and
topic covered
Week 1
12th Feb
Course
Introduction
Week 2
19th Feb
Researching
client
requirements
Week 3
26th Feb
Architecture
design
requirements
and Vendor
evaluation
Theory
(2 hour)
Practical
(2 hours)
Assessment and
Tutorial tasks
Course Introduction and
overview
No practical
What is a network
What is security
OSI and TCP/IP Models
Fundamentals of N/W
security Chapter1-4
Organisational
analysis
Documentation of
network and security
plan
Top Down Network
Design Chapter
1,2,14
Hand out case study
containing eight
written (8) tasks
Design a secure
network for
Melbourne Online
training company
scenario.
Design Issues
Designing a network
Identification, selection
and evaluation of
hardware/software
vendors
Fundamentals of N/W
security Chapter 2,3,18
Researching
Hardware and
security requirements
for scenario with
teacher
Top Down Network
Design Chapter 3,4
Virtual ICT Project
Project requirement
Interviews
Page 2 of 8
Top Down Network
Design Chapter 4, 5
Week 4
5th March
Introduction
to Cisco
routers
Introduction to Cisco
Router programming
Task 1 due
Documentation of
client network and
security requirements
Wireless design and
security overview
Cisco Router
programming
Fundamentals of N/W
security Chapter 20
Protocol selection
Task 2 due
Documentation of
client hardware and
software
requirements.
Introduction to Cisco
routers
Cisco CCNA 2
Companion Guide
Chapters 2,3,5,6
Week 5
Top Down Network
Design Chapter 7
CCNA 2 Chapter 6
th
12 March
Wireless
Included in
documentation
network vendor
hardware and
software
recommendations
For Virtual ICT
Project
Week 6
19th March
Risk
assessment
and auditing
Risk assessment
Identify & establish the
security perimeter
Audit trails
Fundamentals of N/W
security Chapter7, 8
IP addressing
Week 7
Top Down Network
26th March
Design Chapter 6
IP Addressing
Week 8
2nd –April
Subnetting
IP Addressing
subnetting
Implementing
security controls
Developing ACLs
CCNA 2 Chapter 11
Implementing
security controls
Implementing ACLs
Task 3 due
Documentation of
risk assessment for
client
Practical Task 4
IP addressing
exercises
Implementation of
ACLs
demonstration
5 - 11 April - Mid-Semester Student Vacation (Easter Break)
Week 8
2nd –April
Subnetting
Week 9
IP Addressing
subnetting
Installation of Linux
Practical Task 4
IP addressing
exercises
Review Linux Server
Implementation of
ACLs
demonstration
Task 5 due
Page 3 of 8
16th April
Linux
Week 10
23rd April
Authenticatio
n and
Encryption
Server
Fundamentals of N/W
security Chapter 15
Authentication methods
Encryption methods
User controls
Identify security
advantages /
disadvantages
Linux Server
Fundamentals of N/W
security Chapter 12
Security + Chapter 11
Linux Server
Policies and Disaster
recovery
Task 6 due
Documentation of
selection criteria for
authentication and
encryption methods
Fundamentals of N/W
security Chapter 6, 8, 9
Task 7
Information security best
practices
Week 11
th
30 April
Best Practice
and policies
Practical
demonstration of
Linux
Security technologies
Firewalls
VLANs
Week 12
VPNs
7th May
IDS
Security
technologies
Fundamentals of N/W
security Chapter11, 13
Placement of firewalls in
network
Week 13
14th May
Firewall evaluation and
selection
Fundamentals of N/W
security Chapter 10
Review MS Server
2003
Identify security
advantages /
disadvantages
Task 8 due
Documentation of
security and audit
policies for client
Fundamentals of
N/W security Chapter
17
Administering
TCP/IP
DHCP
Windows Server
2003
Chapter 8
Virtual ICT Project
Identification and
documentation of
project server
requirements
Routing
Windows Server
2003
Chapter 11
Firewalls
Week 14
Documentation of
suggested IP
addressing scheme
and topology model
Using templates to
complete
Installation
DNS / WINS
Task 9 due
Document firewall
Page 4 of 8
21st May
Documentation
documentation to
business requirements
Top Down Network
Design Chapter 14
IP Security and
Remote Access
recommendations for
client network
Windows 2003
Server Chapter 9,11
Installation of
authentication
methods
Installation of
encryption methods
and certificates
Virtual ICT Project
Project server
installation and
configuration
Windows Server
2003 Chapter 5
Deliver final copy of
assignment in required
template format
Week 15
28th May
Practical assessment
Windows 2003
Implementing
firewall security
controls
Network Design and
Security documentation,
including resubmits
Practical Task 2
Installation Retest
Week 16
Practical Task 10
4th June
(if required)
Week 17
11th June
Final competency written examination
(In class)
RMIT grading purposes only
Week 18
Course review and feedback
Task11 due
Individual work
journals
th
18 June
Prescribed Text No Prescribe text for this course
Access to an internet connected computer outside of class times – Internet connected computers
are available in the faculty of Business labs on level 3 of building 108, 259 Bourke Street
Melbourne.
References
Fundamentals of Network Security: Maiwald E., McGrawHill Technology Education.
ISBN 0-0722-3093-2
Top Down Network Design, 2nd ed.: Oppenheimer P., Ciscopress. ISBN 9-781587051524
Security+ Guide to Network Security Fundamentals, 2nd ed.: Ciampa M., Thomson
Course Technology. ISBN 0-619-21566-6
Page 5 of 8
Guide to Designing and Implementing Local and Wide Area Networks: Palmer
M.and Sinclar R, Thomson Course Technology. ISBN 0-619-12122-x
CCNA 1 & 2 Cisco Companion Guide 3rd ed. Revised: Ciscopress. ISBN 1-58713-150-1
Hands-On Microsoft Windows Server 2003 Administration: DiNicolo D. Thomson
Course Technology. ISBN 0-619-18611-9
Assessment
Tasks
This course is taught in conjunction with Class Number 1526, ISYS7060C – Manage
Network Security (National Code ICAIS123B) and the list of Assessment Tasks covers
both courses.
Task 1
Due week starting 5/3/2007
Develop System Infrastructure Design Plan
Documentation of client network and security requirements
Due week starting 12/3/2007 Develop System Infrastructure Design Plan
Documentation of client hardware and software requirements
Task 2
Task 3
Due week starting 26/3/2007
Manage network security
Documentation of risk assessment for client
Task 4
Develop System Infrastructure Design Plan
Implementing ACLs on Cisco routers
Due week starting 2/4/2007
Practical demonstration task
Due week starting 9/4/2007
Manage network security
Documentation of suggested IP addressing scheme and topology model based on client
requirements
Task 5
Manage network security
Documentation the selection criteria for authentication and encryption methods
Task 6
Due week starting 30/4/2007
Task 7
Due week starting 30/4/2007
Practical demonstration task
Manage network security
Linux
Manage network security
Documentation security and audit policies for client
Task 8
Due week starting 7/5/2007
Manage network security
Documentation of firewall recommendations for client
Task 9
Due week starting 21/5/2006
Task 10
Due week starting 28/5/2007
Practical demonstration task
Manage network security
Windows 2003 Security
Develop System Infrastructure Design Plan
Manage network security
Presentation of individual work journals (Collation of the semesters written tasks in
required format)
Task 11
Due week starting 4/6/2007
Optional Final examination
Marking scheme
Each of the 8 written tasks will be assessed on a scale of 0 (NYC) to 2 (covers all the
Page 6 of 8
requirements of the task displaying a high level of understanding), giving the students a
mark out of 16.
A mark of 1 or more out of 2, indicates competency achieved (CA) for each task.
Written Task 5
Written Task 6
Task 7
Linux Practical
Written Task 8
Written Task 9
Task 10
Windows Practical
Written Task 11
Final Exam
(Optional)
AMS Final Marks
Maxi
mum
Marks
Written Task 1
Written Task 2
Written Task 3
Task 4
ACL Practical
Task
The 3 practical demonstrations will be assessed on a scale of 0 up to 15, giving each
student a total possible practical mark of 34.
2
2
2
2
2
15
2
=100
2
2
15
4
50
Exam
The final exam is optional if a student wishes to gain an AMS grade of more than 50.
(CA)
The final theory exam will contain 2 sections, which will cover a competency each and
their associated elements in individual sections.
The exam will be a mark out of 50 for each competency. This will be added to the
semester mark out of 50 to give the student the final AMS mark out of 100 for each
competency.
Assessment
Matrix
A student must demonstrate an understanding of all elements of a particular competency
to be deemed competent. Assessment methods have been designed to measure
achievement of each competency in a flexible manner over a range of assessment tasks.
Assessment will incorporate a variety of methods including technical requirements
documentation, homework and in class exercises, written tests, practical problem
solving exercises and practical tests. Students are advised that they are likely to be asked
to personally demonstrate their assessment work to their teacher to ensure that the
relevant competency standards are being met.
For a student based at the RMIT BUSINESS campus in Melbourne, Australia in
Semester 1, 2007 the assessment will be:
For a student based at the RMIT BUSINESS campus in Melbourne, Australia in
Semester 1, 2007 the assessments will be:
Page 7 of 8
Element 1.1
Element 1.2 - 3
Element 1.4
Element 1.5
Element 2.1 - .2
Element 2.3
Element 3.1 - .2
Element 3.3
Other
Information













Final
Exam
(Optional)
l)
Task 11
Task 4
Practical
Task 2
Task 1
ICAITAD044B
Develop system infrastructure design plan







Note: All email communication will be sent to your RMIT email address.
Essential resources
Access to an internet connected computer outside of class times – Internet connected
computers are available in the faculty of Business labs on level 3 of building 108, 239
Bourke Street Melbourne.
Homework
The students will be required to undertake research and assessment practice outside of
regular class times. Homework exercises are provided to the students to facilitate their
learning in a self-paced manner and form part of the overall achievement of the
competencies in this course. Students are reminded that they are expected to conduct an
equal amount of time outside of class, research and furthering their understanding of the
concepts being taught, as they do in class to be deemed competent in this course.
Grading
Competency Achieved (CA) or Not Yet Competent (NYC) result will awarded for these
competency assessment tasks.
Competent (CA)
(AMS mark 50)
Satisfactorily complete, present all documentation required AND
Successfully complete the 3 practical tasks
To gain an AMS mark > 50
Gain competency (CA) in all the above tasks AND
Sit and pass the optional final theory exam for a mark out of 50, which is added to the
semester task mark for a final mark out of 100, or 50 (if CA but fail the exam),
whichever is greater
The final theory exam will be graded only if the student has received CA for each (and
all) the preceding assessment tasks relating to that competency.
If a student is unable to gain competency during the semester class time and class
practical tests, competency maybe gained by passing the final theory exam to
demonstrate competency in all the elements that you fail to achieve the desired level of
competency in previously submitted assessment tasks.
BUT you will only gain an AMS mark of 50, i.e. competent.
Page 8 of 8
Download