I finally got some time to sit down and go through the Security JTA. Here
are some thoughts and notes, in Content Area order. I originally wrote here
"Apologies for the size of this missive - I'm going to have to print it off
and go through it all again, myself." - but in the interests of everyone's
sanity, and to make followup discussion easier, I'm going to split this
into a series of emails:

General comments
Specific Content Areas
Additional Content Areas and Tasks

Because I've chopped up a large email, some of the ones that follow might
seem to terminate somewhat abruptly, and some will be quite short. Sorry
about that. . .

First, some general comments:

There's a wide variation in the level of detail in the Content Areas, as
you'd expect. There's a lot of low-level detail in some, and none in
others. The JTA system doesn't seem to allow for refinement of Tasks in the
way that, say, a wiki might - so how are we going to refine these?

There is some duplication of content, e.g. a Content Area on "Validating
Firewall Configuration", one on "Network Vulnerability Scanning", and one
on just Nessus. All of these could be consolidated into "Security Testing"
or perhaps separate "Network Security Verification" and "Host Security
Verification" Areas. There are quite a few areas where things need to be
refactored.

Some tasks are written in terms like "understand such-and-such".
Unfortunately, there is no way of directly determining whether someone
understands something or not - you can't unscrew the top of their head and
look for the understanding inside. Instead, you have to indirectly assess
their level of understanding by whether or not they can accomplish certain
tasks (which is why these things are called tasks), And since LPI doesn't
conduct a practical exam (by comparison with, e.g. trade schools or even
RHCE), we have to come up with questions about the tasks. I've added
comments about a couple of the "Understand" tasks to show how they might be
re-written. See https://www.lpi.org/en/examdev/jta/instructions.html for
another take on what I'm on about here.

In my opinion - and this is just opinion - some of the Content Areas relate
to software subsystems, patches or components that are not in common use
and are unlikely to form part of the tasks performed on a regular basis by
the typical LPIC-3 candidate. I get this feeling about RSBAC, LSM and - to
some extent - about Kerberos. On the other hand, we seem to be missing
entire subsystems which I know people *are* tasked with setting up and
managing on a day-to-day basis, e.g. VPN's, FTP, dial-in and dial-out, etc.
I'll follow up with those in the last email of this series.

Best,

--- Les Bell, RHCE, CISSP
[http://www.lesbell.com.au]


_______________________________________________
lpi-examdev mailing list
[EMAIL PROTECTED]
http://list.lpi.org/mailman/listinfo/lpi-examdev

Reply via email to