it learning session presentation
DESCRIPTION
IT PresentationTRANSCRIPT
![Page 1: IT Learning Session Presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062811/5695d5401a28ab9b02a4a00d/html5/thumbnails/1.jpg)
IT Learning Session
![Page 2: IT Learning Session Presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062811/5695d5401a28ab9b02a4a00d/html5/thumbnails/2.jpg)
Course Introduction➢This course is an overview of the IT Network, its main categories and functions, and how it relates to Globe.
![Page 3: IT Learning Session Presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062811/5695d5401a28ab9b02a4a00d/html5/thumbnails/3.jpg)
➢Explain the basic concept of Information Technology➢Enumerate the IT categories➢Explain function of the IT Categories➢Familiarize with Globe IT
Course Objectives
![Page 4: IT Learning Session Presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062811/5695d5401a28ab9b02a4a00d/html5/thumbnails/4.jpg)
ContentsLESSON # TOPIC
1 Introduction2 Infrastructure3 Application4 Security
![Page 5: IT Learning Session Presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062811/5695d5401a28ab9b02a4a00d/html5/thumbnails/5.jpg)
LESSON 1:Introduction
![Page 6: IT Learning Session Presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062811/5695d5401a28ab9b02a4a00d/html5/thumbnails/6.jpg)
What is IT?
![Page 7: IT Learning Session Presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062811/5695d5401a28ab9b02a4a00d/html5/thumbnails/7.jpg)
![Page 8: IT Learning Session Presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062811/5695d5401a28ab9b02a4a00d/html5/thumbnails/8.jpg)
LESSON 2:
Infrastructure
![Page 9: IT Learning Session Presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062811/5695d5401a28ab9b02a4a00d/html5/thumbnails/9.jpg)
Infrastructure Application Security
What is IT Infrastructure?It refers to the composite hardware, software, network resources and services required for the existence, operation and management of an enterprise IT environment.
Components2.1 Hardware
2.2 Software
2.3 Network
> In information technology, hardware is the physical aspect of computers, telecommunications, and other devices
> Software is a general term for the various kinds of programs used to operate computers and related devices
> In information technology, a network is a series of points or nodes interconnected by communication paths.
![Page 10: IT Learning Session Presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062811/5695d5401a28ab9b02a4a00d/html5/thumbnails/10.jpg)
LESSON 3:Application
![Page 11: IT Learning Session Presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062811/5695d5401a28ab9b02a4a00d/html5/thumbnails/11.jpg)
Infrastructure Application Security
3.1 Development/ Configuration3.1.1 Web/Desktop/Mobile development3.1.2 Product configuration3.1.3 Analytic
3.2 Database Management
3.2.1 Database Fundamentals3.2.2 Advance DBA3.2.3 Database Resiliency
![Page 12: IT Learning Session Presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062811/5695d5401a28ab9b02a4a00d/html5/thumbnails/12.jpg)
LESSON 4:Security
![Page 13: IT Learning Session Presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062811/5695d5401a28ab9b02a4a00d/html5/thumbnails/13.jpg)
Infrastructure Application Security
What is IT Security?also known as Computer security or cybersecurity
Components4.1 Hardware
4.2 Software
4.3 Policies
Firewall, Security Appliances
Antivirus, SSO, Log management, Configuration management
![Page 14: IT Learning Session Presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062811/5695d5401a28ab9b02a4a00d/html5/thumbnails/14.jpg)
Infrastructure Application Security
4.1 Hardware4.1.1Firewall
A firewall is a system designed to prevent unauthorized access to or from a private network
Hardware firewalls
Types of Firewall
Software firewalls
![Page 15: IT Learning Session Presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062811/5695d5401a28ab9b02a4a00d/html5/thumbnails/15.jpg)
Infrastructure Application Security
4.1 Hardware4.1.2 Security Appliance
A security appliance is any form of server appliance that is designed to protect computer networks from unwanted traffic
Types of Security Appliance
• Active devices
• Passive devices
• Preventative devices
• Unified Threat Management (UTM)
![Page 16: IT Learning Session Presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062811/5695d5401a28ab9b02a4a00d/html5/thumbnails/16.jpg)
Infrastructure Application Security
4.2 Software4.2.1 Antivirus
Antivirus (or anti-virus) software is used to safeguard a computer from malware, including viruses, computer worms, and Trojan horses
4.2.2 SSO Single sign-on
is a property of access control of multiple related, but independent software systems
4.2.3 Log Management
comprises an approach to dealing with large volumes of computer-generated log messages (also known as audit records, audit trails, event-logs, etc.).
![Page 17: IT Learning Session Presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062811/5695d5401a28ab9b02a4a00d/html5/thumbnails/17.jpg)
Infrastructure Application Security
4.2 Software4.2.4 Configuration Management
is an Information Technology Infrastructure Library version 2 and an IT Service Management process that tracks all of the individual Configuration Items in an IT system which may be as simple as a single server, or as complex as the entire IT department
![Page 18: IT Learning Session Presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062811/5695d5401a28ab9b02a4a00d/html5/thumbnails/18.jpg)
Infrastructure Application Security
4.3 PoliciesThe IT Security Policy is a living document that is continually updated to adapt with evolving business and IT requirements. Institutions such as the International Organization of Standardization (ISO) and the U.S. National Institute of Standards and Technology (NIST) have published standards and best practices for security policy formation
![Page 19: IT Learning Session Presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062811/5695d5401a28ab9b02a4a00d/html5/thumbnails/19.jpg)
Thank you!
![Page 20: IT Learning Session Presentation](https://reader036.vdocuments.mx/reader036/viewer/2022062811/5695d5401a28ab9b02a4a00d/html5/thumbnails/20.jpg)