it learning session presentation

20
IT Learning Session

Upload: claudine-alcedo-custodio

Post on 21-Feb-2016

213 views

Category:

Documents


0 download

DESCRIPTION

IT Presentation

TRANSCRIPT

Page 1: IT Learning Session Presentation

IT Learning Session

Page 2: IT Learning Session Presentation

Course Introduction➢This course is an overview of the IT Network, its main categories and functions, and how it relates to Globe.

Page 3: IT Learning Session Presentation

➢Explain the basic concept of Information Technology➢Enumerate the IT categories➢Explain function of the IT Categories➢Familiarize with Globe IT

Course Objectives

Page 4: IT Learning Session Presentation

ContentsLESSON # TOPIC

1 Introduction2 Infrastructure3 Application4 Security

Page 5: IT Learning Session Presentation

LESSON 1:Introduction

Page 6: IT Learning Session Presentation

What is IT?

Page 7: IT Learning Session Presentation
Page 8: IT Learning Session Presentation

LESSON 2:

Infrastructure

Page 9: IT Learning Session Presentation

Infrastructure Application Security

What is IT Infrastructure?It refers to the composite hardware, software, network resources and services required for the existence, operation and management of an enterprise IT environment.

Components2.1 Hardware

2.2 Software

2.3 Network

> In information technology, hardware is the physical aspect of computers, telecommunications, and other devices

> Software is a general term for the various kinds of programs used to operate computers and related devices

> In information technology, a network is a series of points or nodes interconnected by communication paths.

Page 10: IT Learning Session Presentation

LESSON 3:Application

Page 11: IT Learning Session Presentation

Infrastructure Application Security

3.1 Development/ Configuration3.1.1 Web/Desktop/Mobile development3.1.2 Product configuration3.1.3 Analytic

3.2 Database Management

3.2.1 Database Fundamentals3.2.2 Advance DBA3.2.3 Database Resiliency

Page 12: IT Learning Session Presentation

LESSON 4:Security

Page 13: IT Learning Session Presentation

Infrastructure Application Security

What is IT Security?also known as Computer security or cybersecurity

Components4.1 Hardware

4.2 Software

4.3 Policies

Firewall, Security Appliances

Antivirus, SSO, Log management, Configuration management

Page 14: IT Learning Session Presentation

Infrastructure Application Security

4.1 Hardware4.1.1Firewall

A firewall is a system designed to prevent unauthorized access to or from a private network

Hardware firewalls

Types of Firewall

Software firewalls

Page 15: IT Learning Session Presentation

Infrastructure Application Security

4.1 Hardware4.1.2 Security Appliance

A security appliance is any form of server appliance that is designed to protect computer networks from unwanted traffic

Types of Security Appliance

• Active devices 

• Passive devices 

• Preventative devices 

• Unified Threat Management (UTM)

Page 16: IT Learning Session Presentation

Infrastructure Application Security

4.2 Software4.2.1 Antivirus

Antivirus (or anti-virus) software is used to safeguard a computer from malware, including viruses, computer worms, and Trojan horses

4.2.2 SSO Single sign-on 

is a property of access control of multiple related, but independent software systems

4.2.3 Log Management

comprises an approach to dealing with large volumes of computer-generated log messages (also known as audit records, audit trails, event-logs, etc.).

Page 17: IT Learning Session Presentation

Infrastructure Application Security

4.2 Software4.2.4 Configuration Management

is an Information Technology Infrastructure Library version 2 and an IT Service Management process that tracks all of the individual Configuration Items in an IT system which may be as simple as a single server, or as complex as the entire IT department

Page 18: IT Learning Session Presentation

Infrastructure Application Security

4.3 PoliciesThe IT Security Policy is a living document that is continually updated to adapt with evolving business and IT requirements. Institutions such as the International Organization of Standardization (ISO) and the U.S. National Institute of Standards and Technology (NIST) have published standards and best practices for security policy formation

Page 19: IT Learning Session Presentation

Thank you!

Page 20: IT Learning Session Presentation