Presentation is loading. Please wait.

Presentation is loading. Please wait.

 With the increase of B2C, B2B,G2C, websites, e- commerce, e-governance, VPN (Virtual Private Networks) and other Internet and telecom-based applications.

Similar presentations


Presentation on theme: " With the increase of B2C, B2B,G2C, websites, e- commerce, e-governance, VPN (Virtual Private Networks) and other Internet and telecom-based applications."— Presentation transcript:

1

2  With the increase of B2C, B2B,G2C, websites, e- commerce, e-governance, VPN (Virtual Private Networks) and other Internet and telecom-based applications like remote servicing, the demand for people with good knowledge of computer network management on various platforms is expected to peak in the next couple of are in high demand.  Generally there are several types of positions exist in networking, each with different average salaries and long-term potential, and one should possess a clear understanding of these.

3  The basic job titles one sees for computer networking and networking-related positions include  Network Administrator  Network (Service) Technician  Network security  Network Manager

4  The Network Administrator  Working from the concept upwards, involving configure and manage LANs (Local Area Networks), WANs (Wide Area Networks) and VPNs (Virtual Private Networks). Including analyzing, installing and configuring the company’s network even from a remote location.  Monitoring network performance, troubleshooting problems and maintaining network security has to be done on a daily basis. Must be Familiarity with the specific systems being used by a company: Windows Network, Novell, Unix, Linux and others.  Security and virus-protection schemes, system diagnostic utilities and experience with routers and Switch  According to HOBO COMPUTING, NETWORK ADMINISTRATOR "Candidate will be responsible for analysis, installation and configuration of company networks. Daily activities include monitoring network performance, troubleshooting problems and maintaining network security. Other activities include assisting customers with operating systems and network adapters, configuring routers, switches, and firewalls, and evaluating third-party tools.“

5  A Network Technician  Focus on the setup, troubleshooting, and repair of specific hardware and software products. Service Technicians in particular often must travel to remote customer sites to perform "field" upgrades and support the customers.  Specialize in evaluating third-party products and integrating new software technologies into an existing network environment or to build a new environment.

6  Network Security In today’s network trend many organizations move their offline transactions online and vast quantities of vital and sensitive data travels through networks, the need for developing e-security systems to safeguard the networks and databases from extensive cracking has emerged as the number one IT concern globally.

7  In fact  300 new viruses released everyday and widespread hacking (82,000 recorded cases, according to a Carnegie Mellon University study) because of that, IS spend and tightened access to their systems and core applications.  They are looking for people who can administer their enterprise network security safely and securely as a strategic priority.  You must be as familiar with system programming and administration as with security configuration and firewalls.  This also includes knowledge of advanced TCP/IP, security fundamentals, security implementation, router security and attack routes.

8  Managers, supervise the work of administrators, engineers, technicians, and/or programmers. Network / Information Systems Managers also focus on longer- range planning and strategy considerations, in some stage they will be focusing on tasks such as troubleshooting, monitoring, LAN performance, adding or deleting users, adding new servers.

9  What have to be prepare Knowledge of computer hardware is the foundation for a career in computer networking.  The basics of operating systems, microprocessors, peripheral devices, computer architecture, installing various software, configuring PCs, preventive maintenance and troubleshooting.  Microsoft network, Unix from SCO, Solaris from Sun Microsystems, Netware from Novell, etc.  It can be further connected to the Internet through internetworking devices such as Routers and Switches.  Vendor certifications like Microsoft’s MCSE or Cisco’s CCNA or CCNP or CCIE, or Novel’s CNE or Sun Microsystems’ Sun Solaris Administrator at the higher end, are increasingly sought by recruiters.

10  Some of the popular International Certifications available for LAN/WAN Administration are MCSE, UNIX Admin, LINUX Admin, CNE, etc., whereas for WAN Administration you need CCNA, CCNP, CCDA, CCDP, CCIE.

11  HOUSE KEEPING

12  Network Hacking  Ping  The IP address gives the Internet address. The numerical address like does not reveal much. You can use PING to convert the address into a domain name in WINDOWS: The Domain Name Service (DNS) protocol reveals the matching domain name. PING stands for “Packet Internet Groper”  Ping uses ICMP (Internet Control Messaging Protocol) to determine whether the target host is reachable or not. Ping sends out ICMP Echo packets to the target host, if the target host is alive it would respond back with ICMP Echo reply packets.  Tracert:  Tracert is another interesting tool available to find more interesting information about a remote host. Uses ICMP. Tracert helps you to find out some information about the systems involved in sending data (packets) from source to destination.

13  Nmap  Recently evolved into the 4.x series.  Nmap (Network Mapper) is a free open source utility for network explorat or security auditing. -Rapidly scan large networks -Nmap uses raw IP packets to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and others

14  Nessus Remote Security Scanner  Nessus is the worlds most popular vulnerability scanner used in over 75,000 organizations world-wide. Many of the worlds largest organizations are realizing significant cost savings by using Nessus to audit business-critical enterprise devices and applications.  Recently went closed source, but is still essentially free. Works with a client- server framework

15  Yersinia  Yersinia is a network tool designed to take advantage of some weakeness in different Layer 2 protocols.  It pretends to be a solid framework for analyzing and testing the deployed networks and systems.  Network protocol available Spanning Tree Protocol (STP), Cisco Discovery Protocol (CDP), Dynamic Trunking Protocol (DTP), Dynamic Host Configuration Protocol (DHCP), Inter-Switch Link Protocol (ISL), VLAN Trunking Protocol (VTP).

16  Eraser  Eraser is an advanced security tool (for Windows), which allows you to completely remove sensitive data from your hard drive by overwriting it several GNU General Public License.  An excellent tool for keeping your data really safe, if you’ve deleted it..make sure it’s really goneGet Eraser Here -  10. PuTTY  PuTTY is a free implementation of Telnet and SSH for Win32 and Unix platforms, Get PuTTY Here. -

17  IT Audit COBIT Framework Reputable and solid IT security certifications are: CompTIA's Security+ (vendor-neutral, entry-level), MCSE: Security, MCSA: Security (Microsoft plus Security), Certified Information Systems Security Professional (CISSP) (vendor-neutral IT security management), Certified Information System Auditor (CISA) (vendor-neutral IT Security auditing) and Cisco Certified Security Professional (CCSP) (Cisco plus security). CompTIA's Security+ (vendor-neutral, entry-level), MCSE: Security, MCSA: Security (Microsoft plus Security), Certified Information Systems Security Professional (CISSP) (vendor-neutral IT security management), Certified Information System Auditor (CISA) (vendor-neutral IT Security auditing) and Cisco Certified Security Professional (CCSP) (Cisco plus security).

18  IP telephony is the technologies that use the Internet Protocol's packet-switched connections to exchange voice, fax, video and other forms of information that have traditionally been carried over the dedicated circuit-switched connections of the public switched telephone network (PSTN). VoIP refers to a way to carry phone calls over an IP data network, whether on the Internet or your own internal network. A primary attraction of VoIP is its ability to help reduce expenses because telephone calls travel over the data network rather than the phone company's network.

19 Cisco Launches New Voice Certification  Cisco IP Telephony Design Specialist  Cisco IP Telephony Express Specialist  Cisco Certified Voice Professional (CCVP)

20  Design Installation ◦ Drawing  Backbone  Repeater ◦ Installation  Indoor  Outdoor

21  b (1-11 Mbps)  a/g (54 Mbps)  n (600 Mbps)   Wimax ?????? The IEEE standard is now over 2,500 pages long, and new amendments are being developed all the time (Complex..) we sit on the edge of ac, which will allow devices to leverage superior modulation, multiple radios, and bonded channels to share a maximum of 6.9 Gbps! Wireless LAN Demand is high for IT professionals with wireless networking skills. Career opportunities exist for professionals to get involved in designing, deploying and supporting wireless network infrastructure. Cisco survey, 65 percent of IT managers expected to add dedicated wireless networking job roles

22 Certified Wireless Network Administrator (CWNA) Certified Wireless Network Professional (CWNP) CISCO Wireless LAN Certification  Microsoft Windows Network Certifications  Microsoft MCSE Microsoft MCSE Server Microsoft's Windows MCSA Microsoft's Windows MCSA Microsoft's Windows MCSA  Microsoft Certified Architect Program MCSE / MCSA Specializations Microsoft Certified Architect Program MCSE / MCSA Specializations

23 Network Administrator Senior Network Administrator Junior Network Administrator NAMA SERTIFIKAT Dasar (BASIC) Menengah (INTERMEDIATE) Lanjut (ADVANCED) TINGKAT CLUSTER


Download ppt " With the increase of B2C, B2B,G2C, websites, e- commerce, e-governance, VPN (Virtual Private Networks) and other Internet and telecom-based applications."

Similar presentations


Ads by Google