| | | | | | | | | | | |
| | | | | | | | | | | ASSESSMENT TASK # | ASSESSMENT TASK NAME | DATE DUE | WEIGHT | LINKS TO INTENDED LEARNING OUTCOMES | ASSESSMENT TASK 1: | Practical Demonstration 1 | Week 8 | 20 % | LO1, LO2, LO3 | ASSESSMENT TASK 2: | Report 1 | Week 9 | 20 % | LO1, LO2, LO4 | ASSESSMENT TASK 3: | Practical Test 2 | Week 13 | 20 % | LO1, LO3, LO4 | ASSESSMENT TASK 4: | Examination | Exam Period | 40 % | LO1, LO2, LO3, LO4 |
| | | | | | | | | | | | | | | | Assessment Task 1: Practical Demonstration 1 | TASK DESCRIPTION: | A practical demonstration of competency in network reconnaissance and penetration testing, held in an ICT Networks Laboratory during each student's regularly-scheduled tutorial. Students are given multiple tasks to complete relating to network reconnaissance and penetration testing, as covered during the preceding tutorials.
| TASK LENGTH: | | DUE DATE: | Week 8 | WEIGHT: | 20 % | | CRITERION # | CRITERION | MEASURES INTENDED LEARNING OUTCOME | | | | 1 | Detect connected devices by scanning a network | LO2 | 2 | Penetrate systems using approved techniques | LO3 | 3 | Explain ethical hacking and penetration testing techniques utilised | LO1 |
|
| | Assessment Task 2: Report 1 | TASK DESCRIPTION: |
Students are required to develop a fictitious business, based on a series of parameters that are uniquely generated for each student. They then produce a plan, formatted as a proposal to that business, to conduct a vulnerability assessment of the business's ICT infrastructure. This report must include a timeline for the plan, a set of recommendations for what is in and out of scope, and any risks that the business needs to be aware of. The student must justify the recommendations and the plan must be consistent with the business's size and infrastructure footprint.
| TASK LENGTH: | | DUE DATE: | Week 9 | WEIGHT: | 20 % | | CRITERION # | CRITERION | MEASURES INTENDED LEARNING OUTCOME | | | | 1 | Quality and scope of vulnerability assessment plan matches the business's infrastructure | LO1, LO2, LO4 | 2 | Identify and explain relevant cybersecurity, privacy and legal issues within the plan. | LO1 | 3 |
Evaluate cyber threats and risks to business ICT infrastructure | LO2 |
|
| | Assessment Task 3: Practical Test 2 |
| |
|
| |
| |