Detect and protect from spam and destructive software (Superseded)
Note: ICTSAS206 is superseded by ICTSAS214
This unit is an accredited training resource consistent with the Nationally Recognised Training requirements for Vocational Education and Training (VET) and is ideal for Registered Training Organisations (RTOs) in Australia. It consists of Learning Resource Material (instructional theory), an Assessment Workbook, and information about assessment mapping to the Performance Criteria, Knowledge Evidence, and Performance Evidence requirements of this accredited unit.
Our ICTSAS206 training product is available for purchase as a hardcopy (printed) book in both Learner Guide and Trainer/Assessor Guide variants. This unit is available for enrolment and online training/assessment via Catapult LMS (Learning Management System). NOTE: If you are a training provider, please do your own validation, in accordance with your Training and Assessment Strategy (TAS).
$17.00 inc GST
Unit information about the ICTSAS206 training material in this resource
ICTSAS206 information from training.gov.au.
This unit describes the skills and knowledge required to reduce the risk of a computer’s operation being affected by spam or destructive software.
It applies to technical support individuals who, while working under a level of supervision, have responsibility to exercise the discretion required to protect and secure equipment and software in a small or large office environment.
Unit mapping information
This unit supersedes ICASAS206A Detect and protect from spam and destructive software
Licensing, legislative, regulatory or certification requirements
No licensing, legislative, regulatory or certification requirements apply to this unit at the time of publication.
This unit contains foundation skills
Unit sector or competency field
Systems administration and support
Prerequisite, co-requisite or interdependent assessment of units
Gather evidence to demonstrate consistent performance in conditions that are safe and replicate the workplace. Noise levels, production flow, interruptions and time variances must be typical of those experienced in the systems administration and support field of work and include access to:
sites with a representative range of computer hardware, application software and operating systems
current antivirus and anti-spam software
technical records, vendor documentation, enterprise procedures and guidelines
Assessors must satisfy NVR/AQTF assessor requirements.