it learning session presentation

Post on 21-Feb-2016

213 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

DESCRIPTION

IT Presentation

TRANSCRIPT

IT Learning Session

Course Introduction➢This course is an overview of the IT Network, its main categories and functions, and how it relates to Globe.

➢Explain the basic concept of Information Technology➢Enumerate the IT categories➢Explain function of the IT Categories➢Familiarize with Globe IT

Course Objectives

ContentsLESSON # TOPIC

1 Introduction2 Infrastructure3 Application4 Security

LESSON 1:Introduction

What is IT?

LESSON 2:

Infrastructure

Infrastructure Application Security

What is IT Infrastructure?It refers to the composite hardware, software, network resources and services required for the existence, operation and management of an enterprise IT environment.

Components2.1 Hardware

2.2 Software

2.3 Network

> In information technology, hardware is the physical aspect of computers, telecommunications, and other devices

> Software is a general term for the various kinds of programs used to operate computers and related devices

> In information technology, a network is a series of points or nodes interconnected by communication paths.

LESSON 3:Application

Infrastructure Application Security

3.1 Development/ Configuration3.1.1 Web/Desktop/Mobile development3.1.2 Product configuration3.1.3 Analytic

3.2 Database Management

3.2.1 Database Fundamentals3.2.2 Advance DBA3.2.3 Database Resiliency

LESSON 4:Security

Infrastructure Application Security

What is IT Security?also known as Computer security or cybersecurity

Components4.1 Hardware

4.2 Software

4.3 Policies

Firewall, Security Appliances

Antivirus, SSO, Log management, Configuration management

Infrastructure Application Security

4.1 Hardware4.1.1Firewall

A firewall is a system designed to prevent unauthorized access to or from a private network

Hardware firewalls

Types of Firewall

Software firewalls

Infrastructure Application Security

4.1 Hardware4.1.2 Security Appliance

A security appliance is any form of server appliance that is designed to protect computer networks from unwanted traffic

Types of Security Appliance

• Active devices 

• Passive devices 

• Preventative devices 

• Unified Threat Management (UTM)

Infrastructure Application Security

4.2 Software4.2.1 Antivirus

Antivirus (or anti-virus) software is used to safeguard a computer from malware, including viruses, computer worms, and Trojan horses

4.2.2 SSO Single sign-on 

is a property of access control of multiple related, but independent software systems

4.2.3 Log Management

comprises an approach to dealing with large volumes of computer-generated log messages (also known as audit records, audit trails, event-logs, etc.).

Infrastructure Application Security

4.2 Software4.2.4 Configuration Management

is an Information Technology Infrastructure Library version 2 and an IT Service Management process that tracks all of the individual Configuration Items in an IT system which may be as simple as a single server, or as complex as the entire IT department

Infrastructure Application Security

4.3 PoliciesThe IT Security Policy is a living document that is continually updated to adapt with evolving business and IT requirements. Institutions such as the International Organization of Standardization (ISO) and the U.S. National Institute of Standards and Technology (NIST) have published standards and best practices for security policy formation

Thank you!

top related