ICT development office ICT research, planning and training dept. Network development and administration dept. System development and operation dept. President.

Slides:



Advertisements
Similar presentations
Hiltronics Computers Getting Your Website Up! Frank Hill President/CEO Hiltronics Computers.
Advertisements

Position Opening Page 1 Job Classification: Network Server Administrator Opening Date: June 27, 2014 Location: Dobson Office Closing Date: July 7, 2014Grade:
Group Presentation Design and Implementation of a company- wide networking & communication technologies strategy 9 th December 2003 Prepared By: …………
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Network Printing. Printer sharing Saves money by only needing one printer Increases efficiency of managing resources.
Chapter 6: Configuring Security. Group Policy and LGPO Setting Options Software Installation not available with LGPOs Remote Installation Services Scripts.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 8 Introduction to Printers in a Windows Server 2008 Network.
IT:Network:Apps.  Security Options  Group Policy  AppLocker  ACL.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Strategies in Linux Platforms and.
Duties of a system administrator. A system administrator's responsibilities typically include:
Security of Communication & IT systems Bucharest, 21 st September 2004 Stephen McGibbon Chief Technology Officer, Eastern Europe, Russia & CIS Senior Director,
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
User Services. Services Desktop Support Technical Support Help Desk User Services Customer Relationship Management.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Ch 11 Managing System Reliability and Availability 1.
Module 1: Installing Windows XP Professional. Overview Manually Installing Windows XP Professional Automating a Windows XP Professional Installation Using.
Laptop Survival and Management Help Desk Services Pat Valiquette Mark Miller Campus tools – Fall 2006.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Cyber Patriot Training
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
Term 2, 2011 Week 3. CONTENTS The physical design of a network Network diagrams People who develop and support networks Developing a network Supporting.
Using Microsoft Network Access Protection to test Dr.Web anti-virus software The workstations successfully checked by NAP can be used in a corporate network.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
Introducing… …taking desktop computing to the cloud making business effortless!
Local Area Networks (LAN) are small networks, with a short distance for the cables to run, typically a room, a floor, or a building. - LANs are limited.
Career Opportunities in Information Technology There are four main categories of IT jobs, grouped by the main focus of the job: Sales and support Software.
THE CVR NETWORK. The CVR Local Area Network (LAN)  The purpose of the network is to enhance productivity, provide users with access to resources, and.
Networks. A network is formed when a group of computers are connected together. Computers in a Local Area Network (LAN) are fairly close together, generally.
PC MANAGER MEETING January 23, Agenda  Next Meeting  Training  Windows Policy  Main Topic: Windows AV Service Review.
ICT Standards and Guidelines The Structure of the Project Akram Najjar CNSI – Senior Consultant Director of InfoConsult.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Auditing Information Systems (AIS)
Supporting Services in Schools ICT Service Level Agreement Howard Lazarus - ICT Support Manager Martin Morgans - Datacentre Manager.
NETWORK ADMINISTRATOR. EXAMPLES OF SOME COMPUTING RELATED CAREERS Multimedia Artist / Graphics Artist Information System Manager Computer Scientist Network.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Get rid of troubles with Dr.Web CureNET! (Quick Start) If your house is on fire, you call for a fire brigade. When malware ravages through your network,
1 Adding Secure and Collaboration to Your Business with SCOoffice Server 4.1.
Network Administration Internship By: Isaac Johnson II.
Project Scenario # 3 Daniel Gomez. I am the Information Systems Security Manager at Western Technical College. A virus has penetrated the network firewall.
Planning an Installation and d Upgrade. Learning Objectives  To learn how to plan an upgrade and installation.
Chapter 2 Securing Network Server and User Workstations.
General rules 1. Rule: 2. Rule: 3. Rule: 10. Rule: Ask questions ……………………. 11. Rule: I do not know your skill. If I tell you things you know, please stop.
Introduction to Systems Security (January 12, 2015) © Abdou Illia – Spring 2015.
April 28, A shared commitment to provide the most effective education to all students so they live successful lives. In order to accomplish the.
Internet safety By Suman Nazir
ELECTRONIC DOCUMENT SHARING AND MANAGEMENT BY: EDWARD DISI JUSTIN HEIN BROM ESPY Senior Design 1.
MICROSOFT TESTS /291/293 Fairfax County Adult Education Courses 1477/1478/1479.
Created by Alexis Ford Research done by Rebecca Tanner Ford 1.
Establishment of Engineering Data Management System in India based on Teamcenter Computer Division, BARC 27 Feb, 2015.
April 23, A shared commitment to provide the most effective education to all students so they live successful lives. We envision using technology.
«My future profession»
Performing Risk Analysis and Testing: Outsource or In-house
IC3 GS3 Standard COMPUTING FUNDAMENTALS Module
A Network Operating System
Unit 2 Computer Systems HND in Computing and Systems Development
Unit 27: Network Operating Systems
Professional Network Services
Introduction to Systems Security
Home Security in the Age of Broadband
Technology Department Annual Update
Microsoft Virtual Academy
3PL Software Solutions | Global Shipping Software
Presentation transcript:

ICT development office ICT research, planning and training dept. Network development and administration dept. System development and operation dept. President Maintenance and support division Junior engineer Senior engineer Director

ICT research, planning and training dept. Objective To develop the ICT policy of the University (ICT master plan) To formulate short, middle and long term ICT strategies To introduce ICT technologies to the University To deliver training of ICT (on job/informal)

ICT research, planning and training dept. Current task To research the ICT master plan of other universities To assess ICT problems and requirements of the University To catch up what is better to replace computer system To check effectual ICT technologies to the University To plan hiring senior IT engineers to deliver training

Network development and administration dept. Objective To develop and administrate the campus area network (CAN) To insure secured, fast and reliable data exchange To solve problems of the network connectivity To bring the network security policy to the University

Network development and administration dept. Current task To configure network, file and mail server To clear up the CAN structure and settings To install broad-band internet connection To attach stand alone computers to the CAN To drive end users using firewall, anti-virus and security update

System development and operation dept. Objective To develop and operate computer systems for the University To manage data and databases for commonly using To solve problems of each system utility To guide making full use of computer systems

System development and operation dept. Current task To define the system development rules To clear up current duties, workflow and data To make high-traffic website of the University To perform inspection to receive the online credit register system To procure end user needed application software

Maintenance and support division Objective To maintain faulty ICT equipments of the end users To keep track of all ICT equipments in the University To deliver periodical prevention from malwares To support end user computing practically

Maintenance and support division Current task To make the form to ask maintenance and support To enable remote maintenance and support To gather ICT trouble shooting tools To write down how to trouble shoot To list up all ICT equipments in the University To distribute manual of security update