SlideShare a Scribd company logo
MTEVT/ HPE PROJECT 
FIRST YEAR 
LEARNING PORTFOLIO 
Module title: MONITOR A NETWORK 
EFFECTIVELY 
Module code: BTE303 
Name: 
ID Number: 
Date:
Marking scheme portfolio for module BTE303 
Document LO Max. score 
Description of network layers, data encapsulation, header information 1 20 
Data traffic in the local area network 1 20 
Total marks LO1 1 40 
Description of common network and host attacks 2 15 
Description how to detect attacks on a network 2 15 
Total marks LO2 2 30 
Computer viruses, worms, Trojans 3 15 
Quiz 3 15 
Total marks LO3 3 30 
Overall Result 100 
Minimum pass mark for portfolio is ≥ 65 (out of 100 marks) 
A score < 65 will be a FAIL
Checklist for portfolio for BTE303 Monitor a network effectively 
LO Date Final result 
per LO 
Comments Signature 
assessor 
LO1 Explaining 
the basics of 
TCP/IP 
networking 
Total mark for 
LO1 out of 40 
marks: 
LO2 Using 
intrusion detection 
in a network 
system 
Total mark for 
LO2 out of 30 
marks: 
LO3 Monitoring 
viruses and other 
threats in a 
network 
Total mark for 
LO3 out of 30 
marks: 
Overall result portfolio 
Name student: ID: 
Portfolio Mark: ________ out of 100 marks 
Competent / Not yet competent (competent if all document are present and meet the 
minimum standard and score ≥ 65, not yet competent if score <65 ) 
Date: 
Name Assessor: 
Signature Assessor:
BTE303.1 Explaining the basics of 
TCP/IP networking 
Name: 
ID Number: 
Date:
Description of network layers, data 
encapsulation, header information 
Date:
Data traffic in the local area 
network 
Date:
BTE303.2 Using intrusion detection 
in a network system 
Name: 
ID Number: 
Date:
Description of common network 
and host attacks 
Date:
Description how to detect attacks 
on a network 
Date:
BTE303.3 Monitoring viruses and 
other threats in a network 
Name: 
ID Number: 
Date:
Computer viruses, worms, Trojans 
Date:
Quiz. 
Date:
Assessor’s Report for Quiz
Assessor’s report for quiz 
Name: 
ID: 
Date: 
LO: 
First result for the quiz: (≥ 80% ------ Competent 
< 80% ------ Not yet competent 
Verbal questioning 
Comments after verbal questioning wrong answers: 
Final result for quiz: (maximum score = 15 
Name Assessor: 
Date: 
Signature Assessor:

More Related Content

Similar to Bte033 monitor a network effectively portfolio outline

Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Tương Hoàng
 
Overview of SMB, NetBIOS and other network attacks
Overview of SMB, NetBIOS and other network attacksOverview of SMB, NetBIOS and other network attacks
Overview of SMB, NetBIOS and other network attacks
David Sweigert
 
Botnets' networks
Botnets' networksBotnets' networks
Botnets' networks
Bederna Zsolt
 
An Efficient Framework for Detection & Classification of IoT BotNet.pptx
An Efficient Framework for Detection & Classification of IoT BotNet.pptxAn Efficient Framework for Detection & Classification of IoT BotNet.pptx
An Efficient Framework for Detection & Classification of IoT BotNet.pptx
Sandeep Maurya
 
22MCA14_AIT_DPM_M1.pptx
22MCA14_AIT_DPM_M1.pptx22MCA14_AIT_DPM_M1.pptx
22MCA14_AIT_DPM_M1.pptx
DrDattatreyaMankame
 
Security threats analysis in bluetooth enabled mobile devices
Security threats analysis in bluetooth enabled mobile devicesSecurity threats analysis in bluetooth enabled mobile devices
Security threats analysis in bluetooth enabled mobile devices
IJNSA Journal
 
CIS246
CIS246CIS246
CIS246
alpha46808
 
Firewall Essentials
Firewall EssentialsFirewall Essentials
Firewall Essentials
Sylvain Maret
 
IRJET- The Hidden Virus Propagation Search Engine Attack
IRJET- The  Hidden Virus  Propagation Search Engine AttackIRJET- The  Hidden Virus  Propagation Search Engine Attack
IRJET- The Hidden Virus Propagation Search Engine Attack
IRJET Journal
 
Cryptography Project by Aelsayed & Kyasser.pdf
Cryptography Project by Aelsayed & Kyasser.pdfCryptography Project by Aelsayed & Kyasser.pdf
Cryptography Project by Aelsayed & Kyasser.pdf
ahmeddeath6
 
CompTIA Security+ Objectives
CompTIA Security+ ObjectivesCompTIA Security+ Objectives
CompTIA Security+ Objectives
sombat nirund
 
hacker culture
hacker culturehacker culture
hacker culture
Amy McMullin
 
DoS attacks detection in MQTT networks
DoS attacks detection in MQTT networksDoS attacks detection in MQTT networks
DoS attacks detection in MQTT networks
nooriasukmaningtyas
 
Cryptographic Protocol is and isn't like LEGO.
Cryptographic Protocol is and isn't like LEGO.Cryptographic Protocol is and isn't like LEGO.
Cryptographic Protocol is and isn't like LEGO.
Shin'ichiro Matsuo
 
Cerita
CeritaCerita
Netdefender
NetdefenderNetdefender
Netdefender
krishna Maddikara
 
Pg. 03Question Three Assignment 3Deadline Thurs.docx
Pg. 03Question Three Assignment 3Deadline Thurs.docxPg. 03Question Three Assignment 3Deadline Thurs.docx
Pg. 03Question Three Assignment 3Deadline Thurs.docx
karlhennesey
 
Net Defender
Net DefenderNet Defender
Net Defender
krishna maddikara
 
FP 303 COMPUTER NETWORK PAPER FINAL Q
FP 303 COMPUTER NETWORK PAPER FINAL QFP 303 COMPUTER NETWORK PAPER FINAL Q
FP 303 COMPUTER NETWORK PAPER FINAL Q
Syahriha Ruslan
 
firewalls.ppt
firewalls.pptfirewalls.ppt
firewalls.ppt
Raj Kumar
 

Similar to Bte033 monitor a network effectively portfolio outline (20)

Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
 
Overview of SMB, NetBIOS and other network attacks
Overview of SMB, NetBIOS and other network attacksOverview of SMB, NetBIOS and other network attacks
Overview of SMB, NetBIOS and other network attacks
 
Botnets' networks
Botnets' networksBotnets' networks
Botnets' networks
 
An Efficient Framework for Detection & Classification of IoT BotNet.pptx
An Efficient Framework for Detection & Classification of IoT BotNet.pptxAn Efficient Framework for Detection & Classification of IoT BotNet.pptx
An Efficient Framework for Detection & Classification of IoT BotNet.pptx
 
22MCA14_AIT_DPM_M1.pptx
22MCA14_AIT_DPM_M1.pptx22MCA14_AIT_DPM_M1.pptx
22MCA14_AIT_DPM_M1.pptx
 
Security threats analysis in bluetooth enabled mobile devices
Security threats analysis in bluetooth enabled mobile devicesSecurity threats analysis in bluetooth enabled mobile devices
Security threats analysis in bluetooth enabled mobile devices
 
CIS246
CIS246CIS246
CIS246
 
Firewall Essentials
Firewall EssentialsFirewall Essentials
Firewall Essentials
 
IRJET- The Hidden Virus Propagation Search Engine Attack
IRJET- The  Hidden Virus  Propagation Search Engine AttackIRJET- The  Hidden Virus  Propagation Search Engine Attack
IRJET- The Hidden Virus Propagation Search Engine Attack
 
Cryptography Project by Aelsayed & Kyasser.pdf
Cryptography Project by Aelsayed & Kyasser.pdfCryptography Project by Aelsayed & Kyasser.pdf
Cryptography Project by Aelsayed & Kyasser.pdf
 
CompTIA Security+ Objectives
CompTIA Security+ ObjectivesCompTIA Security+ Objectives
CompTIA Security+ Objectives
 
hacker culture
hacker culturehacker culture
hacker culture
 
DoS attacks detection in MQTT networks
DoS attacks detection in MQTT networksDoS attacks detection in MQTT networks
DoS attacks detection in MQTT networks
 
Cryptographic Protocol is and isn't like LEGO.
Cryptographic Protocol is and isn't like LEGO.Cryptographic Protocol is and isn't like LEGO.
Cryptographic Protocol is and isn't like LEGO.
 
Cerita
CeritaCerita
Cerita
 
Netdefender
NetdefenderNetdefender
Netdefender
 
Pg. 03Question Three Assignment 3Deadline Thurs.docx
Pg. 03Question Three Assignment 3Deadline Thurs.docxPg. 03Question Three Assignment 3Deadline Thurs.docx
Pg. 03Question Three Assignment 3Deadline Thurs.docx
 
Net Defender
Net DefenderNet Defender
Net Defender
 
FP 303 COMPUTER NETWORK PAPER FINAL Q
FP 303 COMPUTER NETWORK PAPER FINAL QFP 303 COMPUTER NETWORK PAPER FINAL Q
FP 303 COMPUTER NETWORK PAPER FINAL Q
 
firewalls.ppt
firewalls.pptfirewalls.ppt
firewalls.ppt
 

Bte033 monitor a network effectively portfolio outline

  • 1. MTEVT/ HPE PROJECT FIRST YEAR LEARNING PORTFOLIO Module title: MONITOR A NETWORK EFFECTIVELY Module code: BTE303 Name: ID Number: Date:
  • 2. Marking scheme portfolio for module BTE303 Document LO Max. score Description of network layers, data encapsulation, header information 1 20 Data traffic in the local area network 1 20 Total marks LO1 1 40 Description of common network and host attacks 2 15 Description how to detect attacks on a network 2 15 Total marks LO2 2 30 Computer viruses, worms, Trojans 3 15 Quiz 3 15 Total marks LO3 3 30 Overall Result 100 Minimum pass mark for portfolio is ≥ 65 (out of 100 marks) A score < 65 will be a FAIL
  • 3. Checklist for portfolio for BTE303 Monitor a network effectively LO Date Final result per LO Comments Signature assessor LO1 Explaining the basics of TCP/IP networking Total mark for LO1 out of 40 marks: LO2 Using intrusion detection in a network system Total mark for LO2 out of 30 marks: LO3 Monitoring viruses and other threats in a network Total mark for LO3 out of 30 marks: Overall result portfolio Name student: ID: Portfolio Mark: ________ out of 100 marks Competent / Not yet competent (competent if all document are present and meet the minimum standard and score ≥ 65, not yet competent if score <65 ) Date: Name Assessor: Signature Assessor:
  • 4. BTE303.1 Explaining the basics of TCP/IP networking Name: ID Number: Date:
  • 5. Description of network layers, data encapsulation, header information Date:
  • 6. Data traffic in the local area network Date:
  • 7. BTE303.2 Using intrusion detection in a network system Name: ID Number: Date:
  • 8. Description of common network and host attacks Date:
  • 9. Description how to detect attacks on a network Date:
  • 10. BTE303.3 Monitoring viruses and other threats in a network Name: ID Number: Date:
  • 11. Computer viruses, worms, Trojans Date:
  • 14. Assessor’s report for quiz Name: ID: Date: LO: First result for the quiz: (≥ 80% ------ Competent < 80% ------ Not yet competent Verbal questioning Comments after verbal questioning wrong answers: Final result for quiz: (maximum score = 15 Name Assessor: Date: Signature Assessor: