5691 computer network career

23

Upload: universitas-bina-darma-palembang

Post on 19-Jul-2015

56 views

Category:

Engineering


0 download

TRANSCRIPT

Page 1: 5691 computer network career
Page 2: 5691 computer network career

In today business trend, many enterprises shifting the way to do a business by increasing of B2C, B2B,G2C, websites, e-commerce, e-governance, VPN (Virtual Private Networks) and other Internet and telecom-based applications like remote servicing.

With this condition the demand for people with good knowledge of computer network management including security on various platforms is expected to peak in the next couple of year.

Generally there are several types of positions exist in networking, each with different average salaries and long-term potential, and one should possess a clear understanding of these.

Page 3: 5691 computer network career

The basic job titles one sees for computer networking and networking-related positions include

Network Administrator

Network (Service) Technician

Network security

Network Manager

Page 4: 5691 computer network career

The Network Administrator

Working from the concept upwards, involving configure and manage LANs (Local Area Networks), WANs (Wide Area Networks) and VPNs (Virtual Private Networks). Including analyzing, installing and configuring the company’s network even from a remote location.

Monitoring network performance, troubleshooting problems and maintaining network security has to be done on a daily basis. Must be Familiarity with the specific systems being used by a company: Windows Network, Novell, Unix, Linux and others.

Security and virus-protection schemes, system diagnostic utilities and experience with routers and Switch

According to HOBO COMPUTING, NETWORK ADMINISTRATOR "Candidate will be responsible for analysis, installation and configuration of company networks. Daily activities include monitoring network performance, troubleshooting problems and maintaining network security. Other activities include assisting customers with operating systems and network adapters, configuring routers, switches, and firewalls, and evaluating third-party tools.“

Page 5: 5691 computer network career

A Network Technician Focus on the setup, troubleshooting, and

repair of specific hardware and software products. Service Technicians in particular often must travel to remote customer sites to perform "field" upgrades and support the customers.

Specialize in evaluating third-party products and integrating new software technologies into an existing network environment or to build a new environment.

Page 6: 5691 computer network career

Network SecurityIn today’s network trend many organizations move their offline transactions online and vast quantities of vital and sensitive data travels through networks, the need for developing e-security systems to safeguard the networks and databases from extensive cracking has emerged as the number one IT concern globally.

Page 7: 5691 computer network career

According to Kaspersky Lab, in 2013 detecting 315,000 new malicious files every day. Compare to 200,000 in 2012 Kaspersky Lab’s products repelled an average of 4,659,920 attacks on users every day when they were online

Most popular2 vulnerable applications exploited by cybercriminals

90.52% of all detected attempts to exploit vulnerabilities targeted Oracle Java. These vulnerabilities are exploited in drive-by attacks conducted via the Internet, and new Java exploits are now present in lots of exploit packs

Security issue around mobiles rise in 2013. Most malicious mobile apps principally aimed to steal money, and subsequently personal data. Android is still the main target, attracting a whopping 98.05% of known malware

Because of that Information System spend and tightened access to their systems and core applications.

They are looking for people who can administer their enterprise network security safely and securely as a strategic priority.

You must be as familiar with system programming and administration as with security configuration and firewalls.

This also includes knowledge of advanced TCP/IP, security fundamentals, security implementation, router security and attack routes.

The statistics are based on data obtained and processed using Kaspersky Security Network (KSN)

Page 8: 5691 computer network career

Managers, supervise the work of administrators, engineers, technicians, and/or programmers. Network / Information Systems Managers also focus on longer-range planning and strategy considerations, in some stage they will be focusing on tasks such as troubleshooting, monitoring, LAN performance, adding or deleting users, adding new servers.

Page 9: 5691 computer network career

What have to be prepare

Knowledge of computer hardware is the foundation for a career in computer networking.

The basics of operating systems, microprocessors, peripheral devices, computer architecture, installing various software, configuring PCs, preventive maintenance and troubleshooting.

Microsoft network, Unix from SCO, Solaris from Sun Microsystems, Netware from Novell, etc.

It can be further connected to the Internet through internetworking devices such as Routers and Switches.

Vendor certifications like Microsoft’s MCSE or Cisco’s CCNA or CCNP or CCIE, or Novel’s CNE or Sun Microsystems’ Sun Solaris Administrator at the higher end, are increasingly sought by recruiters.

Page 10: 5691 computer network career

Some of the popular International Certifications available for LAN/WAN Administration are MCSE, UNIX Admin, LINUX Admin, CNE, etc., whereas for WAN Administration you need CCNA, CCNP, CCDA, CCDP, CCIE.

Page 11: 5691 computer network career

HOUSE KEEPING

Page 12: 5691 computer network career

Network Hacking Ping The IP address gives the Internet address. The numerical

address like 212.214.172.81 does not reveal much. You can use PING to convert the address into a domain name in WINDOWS: The Domain Name Service (DNS) protocol reveals the matching domain name. PING stands for “Packet Internet Groper”

Ping uses ICMP (Internet Control Messaging Protocol) to determine whether the target host is reachable or not. Ping sends out ICMP Echo packets to the target host, if the target host is alive it would respond back with ICMPEcho reply packets.

Tracert: Tracert is another interesting tool available to find more

interesting information about a remote host. Uses ICMP.Tracert helps you to find out some information about the systems involved in sending data (packets) from source to destination.

Page 13: 5691 computer network career

Nmap Recently evolved into the 4.x series. Nmap (Network Mapper) is a free open source

utility for network exploration or security auditing.

-Rapidly scan large networks -Nmap uses raw IP packets to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OSversions) they are running, what type of packet filters/firewalls are in use,and others

Page 14: 5691 computer network career

Nessus Remote Security Scanner

Nessus is the worlds most popular vulnerability scanner used in over 75,000organizations world-wide. Many of the worlds largest organizations arerealizing significant cost savings by using Nessusto audit business-critical enterprise devices and applications.

Recently went closed source, but is still essentially free. Works with a client-server framework

Page 15: 5691 computer network career

Yersinia

Yersinia is a network tool designed to take advantage of some weakeness indifferent Layer 2 protocols.

It pretends to be a solid framework for analyzingand testing the deployed networks and systems.

Network protocol availableSpanning Tree Protocol (STP), Cisco Discovery

Protocol (CDP), Dynamic Trunking Protocol (DTP), Dynamic Host ConfigurationProtocol (DHCP), Inter-SwitchLink Protocol (ISL), VLAN Trunking Protocol (VTP).

Page 16: 5691 computer network career

Eraser

Eraser is an advanced security tool (for Windows), which allows you

to

completely remove sensitive data from your hard drive by

overwriting it several

GNU General Public License.

An excellent tool for keeping your data really safe, if you’ve deleted

it..make

sure it’s really goneGet Eraser Here -

http://www.heidi.ie/eraser/download.ph

10. PuTTY

PuTTY is a free implementation of Telnet and SSH for Win32 and

Unix platforms,

Get PuTTY Here. -

http://www.chiark.greenend.org.uk/~sgtatham/putty/

Page 17: 5691 computer network career

IT Audit

COBIT FrameworkReputable and solid IT security certifications are:

CompTIA's Security+ (vendor-neutral, entry-level), MCSE: Security, MCSA: Security (Microsoft plus Security), Certified Information Systems Security Professional (CISSP) (vendor-neutral IT security management), Certified Information System Auditor (CISA) (vendor-neutral IT Security auditing) and Cisco Certified Security Professional (CCSP) (Cisco plus security).

Page 18: 5691 computer network career

IP telephony is the technologies that use the Internet Protocol's packet-switched connections to exchange voice, fax, video and other forms of information that have traditionally been carried over the dedicated circuit-switched connections of the public switched telephone network (PSTN).

VoIP refers to a way to carry phone calls over an IP data network, whether on the Internet or your own internal network.

A primary attraction of VoIP is its ability to help reduce expenses because telephone calls travel over the data network rather than the phone company's network.

Page 19: 5691 computer network career

Increased VoIP Security The hype over government to government or business to business

surveillance of communications has brought to light many of the vulnerabilities of VoIP security. The correct security measures should be in placed, it is not difficult for anyone – government or criminal – to eavesdrop on VoIP calls.

There are many known techniques for doing so – encrypting data, private networks, and SRTP (Secure Real Time Protocol), are just a few. Many US army bases switched over to VoIP systems in 2013.

VoIP Peering One innovation that will make VoIP more secure is the growth of VoIP

Peering in 2014. VoIP peering allows direct IP-to-IP connections. By providing a direct connection between providers, the call route is reduced to its most direct route, and the opportunity for a security failure is significantly reduced.

Cloud Telephony Another trend is the rise of cloud telephony. Cloud telephony is the

virtualization of telephony infrastructure. Cloud telephony providers are able to offer their services very

inexpensively for less than $1 per channel per month. The biggest market for cloud telephony is Small and Medium sized Businesses (SMBs), because they do not warrant the attention, pricing, and specialized communication services of large carriers.

Page 20: 5691 computer network career

Cisco Launches New Voice Certification Cisco IP Telephony Design Specialist Cisco IP Telephony Express Specialist Cisco Certified Voice Professional (CCVP)

Page 21: 5691 computer network career

Design Installation◦ Drawing

Backbone

Repeater

◦ Installation Indoor

Outdoor

Page 22: 5691 computer network career

First WLAN Standard introduced in 1997 called 802.11 802.11 b (1-11 Mbps) 802.11 a/g (54 Mbps) 802.11 n (600 Mbps) 802.16 Wimax ??????

The IEEE 802.11 standard is now over 2,500 pages long, and new amendments are being developed all the time (Complex..)

The newest generation of Wi-Fi signaling in popular use, 802.11acutilizes dual band wireless technology, supporting simultaneous connections on both the 2.4 GHz and 5 GHz Wi-Fi bands. 802.11ac offers backward compatibility to 802.11b/g/n and bandwidth rated up to 1300 Mbps on the 5 GHz band plus up to 450 Mbps on 2.4 GHz.

Wireless LAN Demand is high for IT professionals with wireless networking skills.

Career opportunities exist for professionals to get involved in designing, deploying and supporting wireless network infrastructure.

Cisco survey, 65 percent of IT managers expected to add dedicated wireless networking job roles

Page 23: 5691 computer network career

Certified Wireless Network Administrator (CWNA)Certified Wireless Network Professional (CWNP)

CISCO Wireless LAN Certification

Microsoft Windows Network Certifications

Microsoft MCSE Microsoft MCSE Server Microsoft's Windows MCSAMicrosoft's Windows MCSA

Microsoft Certified Architect ProgramMCSE / MCSA Specializations