Download - IT Learning Session Presentation
IT Learning Session
Course Introduction➢This course is an overview of the IT Network, its main categories and functions, and how it relates to Globe.
➢Explain the basic concept of Information Technology➢Enumerate the IT categories➢Explain function of the IT Categories➢Familiarize with Globe IT
Course Objectives
ContentsLESSON # TOPIC
1 Introduction2 Infrastructure3 Application4 Security
LESSON 1:Introduction
What is IT?
LESSON 2:
Infrastructure
Infrastructure Application Security
What is IT Infrastructure?It refers to the composite hardware, software, network resources and services required for the existence, operation and management of an enterprise IT environment.
Components2.1 Hardware
2.2 Software
2.3 Network
> In information technology, hardware is the physical aspect of computers, telecommunications, and other devices
> Software is a general term for the various kinds of programs used to operate computers and related devices
> In information technology, a network is a series of points or nodes interconnected by communication paths.
LESSON 3:Application
Infrastructure Application Security
3.1 Development/ Configuration3.1.1 Web/Desktop/Mobile development3.1.2 Product configuration3.1.3 Analytic
3.2 Database Management
3.2.1 Database Fundamentals3.2.2 Advance DBA3.2.3 Database Resiliency
LESSON 4:Security
Infrastructure Application Security
What is IT Security?also known as Computer security or cybersecurity
Components4.1 Hardware
4.2 Software
4.3 Policies
Firewall, Security Appliances
Antivirus, SSO, Log management, Configuration management
Infrastructure Application Security
4.1 Hardware4.1.1Firewall
A firewall is a system designed to prevent unauthorized access to or from a private network
Hardware firewalls
Types of Firewall
Software firewalls
Infrastructure Application Security
4.1 Hardware4.1.2 Security Appliance
A security appliance is any form of server appliance that is designed to protect computer networks from unwanted traffic
Types of Security Appliance
• Active devices
• Passive devices
• Preventative devices
• Unified Threat Management (UTM)
Infrastructure Application Security
4.2 Software4.2.1 Antivirus
Antivirus (or anti-virus) software is used to safeguard a computer from malware, including viruses, computer worms, and Trojan horses
4.2.2 SSO Single sign-on
is a property of access control of multiple related, but independent software systems
4.2.3 Log Management
comprises an approach to dealing with large volumes of computer-generated log messages (also known as audit records, audit trails, event-logs, etc.).
Infrastructure Application Security
4.2 Software4.2.4 Configuration Management
is an Information Technology Infrastructure Library version 2 and an IT Service Management process that tracks all of the individual Configuration Items in an IT system which may be as simple as a single server, or as complex as the entire IT department
Infrastructure Application Security
4.3 PoliciesThe IT Security Policy is a living document that is continually updated to adapt with evolving business and IT requirements. Institutions such as the International Organization of Standardization (ISO) and the U.S. National Institute of Standards and Technology (NIST) have published standards and best practices for security policy formation
Thank you!