Vi ste ovdje
Overview/Description
Poorly written systems or applications can allow an attacker to exploit coding errors and thus interrupt the orderly processes of the system or application. This course discusses methods to increase the security of operating system and application development and thwart attacker attempts to manipulate source code. It also covers application and database development models such as the SDLC and how choosing the right model supports security. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security...
Overview/Description
Access to a company's resources through unauthorized means is the number one goal of most attackers. The security professional must understand the proper countermeasures in order to stop attacks on e-mail systems, over the network, and on the PBX. This course discusses the transport mechanisms, structures, and security measures used to ensure availability, confidentiality, integrity, and authentication over both public and private networks. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security...
Overview/Description
This course provides IT professionals with a working definition of cloud computing, explores the technological precursors of today's cloud as well as the current technologies the cloud is dependant on. Also covered are the benefits and drawbacks of cloud computing for the IT department and business as a whole. It then explores in more detail the different types of services that have become available in the cloud with examples of key pioneers in those areas.
Target Audience
This course is intended for IT professionals including managers, engineers, and technical staff...
Overview/Description
This course takes a closer look at the main enabling technologies and core components that allow clouds to function. While the cloud is not necessarily dependant on virtualization, it's widely accepted that any competitive cloud will utilize it. Infrastructural and network connectivity considerations of the modern datacenter are greatly influenced by the requirements of the cloud. Datacenter infrastructure and components must be designed to address security, scalability, disaster recovery, and redundant high-speed connectivity needed to provide a successful cloud service...
Overview/Description
Most organizations, regardless of size, will need a network in order for its users and resources to interconnect. A LAN is the simplest and most common network type used to provide communication over a small area. Understanding how to install LANs and the technologies that make them functional will enable you to choose and implement the right type of network for your organization. This course describes how to install and configure common network devices, such as routers and switches, and how to work with wireless technologies in order to create a functional wireless...
Overview/Description
Troubleshooting skills are required by everyone who has responsibility for a network. The complexities of modern enterprise networks means that there is a vast array of devices, software, and infrastructure components that have the potential for failure - therefore causing a loss of connectivity on the network. This course describes the different networking problems and issues that can arise, as well as how they can be addressed. This course prepares the learner for the CompTIA Network+ 2012 certification exam N10-005. Network+ is sometimes referred to as N+ or Net+....
Overview/Description
Managing, monitoring, and troubleshooting are the routine tasks performed on every network regardless of its size. Proper management and monitoring of a network can forestall many problems that commonly occur in a network environment as well as make troubleshooting problems that do arise that much easier. However, even in the best designed and managed networks, problems will arise. Knowing the proper troubleshooting methodology and being familiar with the many tools available to troubleshoot network issues â both hardware and software âwill make the task of finding...
Overview/Description
The choice of network media depends on a number of factors. Speed and bandwidth requirements and budgets are probably the two main considerations, although the site itself can play a part. In new construction, for example, it may make sense to install the more expensive fiber optic media rather than incurring the cost of an upgrade down the road. Upgrades to older sites can be expensive and may not even be possible in some cases. This course describes the different available network media, including twisted pair cable, coaxial cable, fiber optic cable, and wireless media...
Overview/Description
There are a number of technologies involved in the delivery of Internet and network services. WAN technologies, such as DSL, provide local area networks with access to remote networks and the Internet, while LAN technologies give access to local computers and resources as well as a gateway to the WAN. This course describes the various WAN technologies in use today. Also covered are some of the properties of LANs such as the different topologies that can be used and Ethernet components. This course prepares the learner for the CompTIA Network+ 2012 certification exam N10-...
Overview/Description
A networkâs security is only as strong as the security of its individual systems. Before connecting individual computers to the network, you need to ensure that the computers are secured using proper security mechanisms. This level of security will help you overcome any potential issues that might occur otherwise. Unsecured systems can result in compromised data and, ultimately, lost revenue. Identifying the appropriate steps and measures you can implement to protect your systems and keeping your resources and revenue safe from potential attacks is a key aspect of...