Vi ste ovdje
Overview/Description
To explain non-cellular wireless technology
Target Audience
Technical professionals; IT and business managers who need to learn about emerging broadband wireless technologies; students studying or researching broadband wireless communications and technologies
Prerequisites
An understanding of the basic concepts of cellular, mobile, and fixed wireless technology and the fundamental principles underpinning their operation
Expected Duration (hours)
2.5
Lesson ObjectivesNon-Cellular Wireless Technology
compare the standards and solutions in place for wireless LANs.
recognize...
Overview/Description
This course explores some of the key risk areas when it comes to security and cloud computing. Although some of the fears in regards to security in the cloud are exaggerated, there are specific areas to be aware and cautious about. The key is knowing your IT infrastructure and needs, as well as carefully assessing the cloud provider offering and security measures. The course introduces control assessment frameworks and models that can be used in assessing your risk in going to the cloud and evaluating the cloud provider's security offering. Along with the top identified...
Overview/Description
The history of telephony begins with the public switched telephone network (PSTN), which is the worldwide circuit-switched telephone network made up of public and private networks. Voice over IP (VoIP) is the latest telephone technology which is able to provide advanced services to both consumers and businesses, at a reduced cost. This course covers the history and operation of the PSTN and VoIP, and compares the two technologies. Basic signaling technologies used in the PSTN are also described. In addition, this course explores the expansion of VoIP in both the immediate...
Overview/Description
To recognize the applications of RFID technology, how it operates, the function of the EPCglobal Network, and determine how to implement RFID in an organization based on business and deployment issues
Target Audience
Managers, analysts and consultants who want a primer on how to evaluate, prototype and deploy RFID into their existing business systems; managers and people making business decisions regarding implementation of RFID technology
Prerequisites
A high-level appreciation of IT concepts, and an understanding of business concepts such as ROI, budgeting, and cost...
Overview/Description
To recognize how RFID technology can be used in various industries and analyze RFID applications management programs
Target Audience
Managers, analysts and consultants who want a primer on how to evaluate, prototype and deploy RFID into their existing business systems; managers and people making business decisions regarding implementation of RFID technology
Prerequisites
A high-level appreciation of IT concepts, and an understanding of business concepts such as ROI, budgeting, and cost benefit analysis.
Expected Duration (hours)
2.4
Lesson ObjectivesRFID Applications...
Overview/Description
To identify the methods by which data is collected and distributed for network management and the form that those messages take
Target Audience
Network managers, administrators, and technical support personnel who require an insight into the protocols most widely used in network management
Prerequisites
A good foundation in the principles and concepts of networks and computers; familiarity with Internetworking technologies
Expected Duration (hours)
2.3
Lesson ObjectivesSNMP, MIBs, and RMON
identify the key network management components and models.
identify the goals of...
Overview/Description
A social networking service is an online service used to build networks of people often with a common interest or goal. The networks reflect networks of people in the real world. Typically each user has a representation in the form of a profile, and the service allows interaction in the form of messaging, and typically some way to share events, activities, and content, possibly in the form of digital photos, videos or web links. The big international social network providers are Facebook for personal social networking, Twitter, which is described as a micro-blogging...
Overview/Description
In the fast paced business world of today, secure and reliable communication within your corporation and with outside networks is mandatory. This course covers various aspects of secure digital communications including authentication, data integrity, transport formats and transmission methods. This course teaches the learner about network topology schemes and application and transport layer security protocols such as S/MIME and SSL. It shows how to optimize network level security to protect against DoS attacks using IP addressing techniques and SMTP, ICMP and...
Overview/Description
In the fast paced business world of today, secure and reliable communication within your corporation and with outside networks is mandatory. This course covers such topics as authentication and data integrity with a focus on wireless communications and new messaging and exchange technologies. This course teaches the learner how to optimize security standards, policies and procedures for LAN, WAN and WLAN enterprise environment IT infrastructures. The course explains network vulnerabilities, VPNs, the IEEE 802 security standards, IDS solutions and best practices for...
Overview/Description
With more and more business success relying on secure and guaranteed access to data, having plans and policies in place to manage risks and recover from disasters is pivotal. This course provides the learner with the knowledge to provide data redundancy and handling incidents and risks. This course teaches the learner how to identify the threats and vulnerabilities that can put information systems at risk and how to optimize a risk assessment and management system to protect resources. It covers risk limitation and mitigation and the security incident handling process....