230 likes | 260 Views
Learn about the various job titles and skills required in computer networking, including network administration, network security, and network management. Explore the growing demand for professionals in this field and the importance of network security in today's digital age.
E N D
Preface • With the increase of B2C, B2B,G2C, websites, e-commerce, e-governance, VPN (Virtual Private Networks) and other Internet and telecom-based applications like remote servicing, the demand for people with good knowledge of computer network management on various platforms is expected to peak in the next couple of are in high demand. • Generally there are several types of positions exist in networking, each with different average salaries and long-term potential, and one should possess a clear understanding of these.
Basic Job • The basic job titles one sees for computer networking and networking-related positions include • Network Administrator • Network (Service) Technician • Network security • Network Manager
The Network Administrator • Working from the concept upwards, involving configure and manage LANs (Local Area Networks), WANs (Wide Area Networks) and VPNs (Virtual Private Networks). Including analyzing, installing and configuring the company’s network even from a remote location. • Monitoring network performance, troubleshooting problems and maintaining network security has to be done on a daily basis. Must be Familiarity with the specific systems being used by a company: Windows Network, Novell, Unix, Linux and others. • Security and virus-protection schemes, system diagnostic utilities and experience with routers and Switch • According to HOBO COMPUTING, NETWORK ADMINISTRATOR "Candidate will be responsible for analysis, installation and configuration of company networks. Daily activities include monitoring network performance, troubleshooting problems and maintaining network security. Other activities include assisting customers with operating systems and network adapters, configuring routers, switches, and firewalls, and evaluating third-party tools.“
A Network Technician • Focus on the setup, troubleshooting, and repair of specific hardware and software products. Service Technicians in particular often must travel to remote customer sites to perform "field" upgrades and support the customers. • Specialize in evaluating third-party products and integrating new software technologies into an existing network environment or to build a new environment.
Network SecurityIn today’s network trend many organizations move their offline transactions online and vast quantities of vital and sensitive data travels through networks, the need for developing e-security systems to safeguard the networks and databases from extensive cracking has emerged as the number one IT concern globally.
Network Security cont • In fact • 300 new viruses released everyday and widespread hacking (82,000 recorded cases, according to a Carnegie Mellon University study) because of that, IS spend and tightened access to their systems and core applications. • They are looking for people who can administer their enterprise network security safely and securely as a strategic priority. • You must be as familiar with system programming and administration as with security configuration and firewalls. • This also includes knowledge of advanced TCP/IP, security fundamentals, security implementation, router security and attack routes.
Managers, supervise the work of administrators, engineers, technicians, and/or programmers. Network / Information Systems Managers also focus on longer-range planning and strategy considerations, in some stage they will be focusing on tasks such as troubleshooting, monitoring, LAN performance, adding or deleting users, adding new servers.
SO…… • What have to be prepareKnowledge of computer hardware is the foundation for a career in computer networking. • The basics of operating systems, microprocessors, peripheral devices, computer architecture, installing various software, configuring PCs, preventive maintenance and troubleshooting. • Microsoft network, Unix from SCO, Solaris from Sun Microsystems, Netware from Novell, etc. • It can be further connected to the Internet through internetworking devices such as Routers and Switches. • Vendor certifications like Microsoft’s MCSE or Cisco’s CCNA or CCNP or CCIE, or Novel’s CNE or Sun Microsystems’ Sun Solaris Administrator at the higher end, are increasingly sought by recruiters.
Some of the popular International Certifications available for LAN/WAN Administration are MCSE, UNIX Admin, LINUX Admin, CNE, etc., whereas for WAN Administration you need CCNA, CCNP, CCDA, CCDP, CCIE.
Network Security • Network Hacking • Ping • The IP address gives the Internet address. The numerical address like 212.214.172.81 does not reveal much. You can use PING to convert the address into a domain name in WINDOWS: The Domain Name Service (DNS) protocol reveals the matching domain name. PING stands for “Packet Internet Groper” • Ping uses ICMP (Internet Control Messaging Protocol) to determine whether the target host is reachable or not. Ping sends out ICMP Echo packets to the target host, if the target host is alive it would respond back with ICMPEcho reply packets. • Tracert: • Tracert is another interesting tool available to find more interesting information about a remote host. Uses ICMP.Tracert helps you to find out some information about the systems involved in sending data (packets) from source to destination.
Nmap • Recently evolved into the 4.x series. • Nmap (Network Mapper) is a free open source utility for network explorat or security auditing. -Rapidly scan large networks -Nmapuses raw IP packets to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OSversions) they are running, what type of packet filters/firewalls are in use,and others
NessusRemote Security Scanner • Nessus is the worlds most popular vulnerability scanner used in over 75,000organizations world-wide. Many of the worlds largest organizations arerealizing significant cost savings by using Nessus to audit business-critical enterprise devices and applications. • Recently went closed source, but is still essentially free. Works with a client-server framework
Yersinia • Yersinia is a network tool designed to take advantage of some weakeness indifferent Layer 2 protocols. • It pretends to be a solid framework for analyzingand testing the deployed networks and systems. • Network protocol availableSpanning Tree Protocol (STP), Cisco DiscoveryProtocol (CDP), Dynamic Trunking Protocol (DTP), Dynamic Host ConfigurationProtocol (DHCP), Inter-SwitchLink Protocol (ISL), VLAN Trunking Protocol (VTP).
Eraser • Eraser is an advanced security tool (for Windows), which allows you tocompletely remove sensitive data from your hard drive by overwriting it severalGNU General Public License. • An excellent tool for keeping your data really safe, if you’ve deleted it..makesure it’s really goneGetEraser Here - http://www.heidi.ie/eraser/download.ph • 10. PuTTY • PuTTY is a free implementation of Telnet and SSH for Win32 and Unix platforms,Get PuTTYHere. - http://www.chiark.greenend.org.uk/~sgtatham/putty/
IT Audit COBIT Framework Reputable and solid IT security certifications are: CompTIA's Security+ (vendor-neutral, entry-level), MCSE: Security, MCSA: Security (Microsoft plus Security), Certified Information Systems Security Professional (CISSP) (vendor-neutral IT security management), Certified Information System Auditor (CISA) (vendor-neutral IT Security auditing) and Cisco Certified Security Professional (CCSP) (Cisco plus security).
IP Telephony • IP telephony is the technologies that use the Internet Protocol's packet-switched connections to exchange voice, fax, video and other forms of information that have traditionally been carried over the dedicated circuit-switched connections of the public switched telephone network (PSTN). VoIPrefers to a way to carry phone calls over an IP data network, whether on the Internet or your own internal network. A primary attraction of VoIP is its ability to help reduce expenses because telephone calls travel over the data network rather than the phone company's network.
Certification Cisco Launches New Voice Certification • Cisco IP Telephony Design Specialist • Cisco IP Telephony Express Specialist • Cisco Certified Voice Professional (CCVP)
Cabling • Design Installation • Drawing • Backbone • Repeater • Installation • Indoor • Outdoor
Network Wireless Lan • 802.11 b (1-11 Mbps) • 802.11 a/g (54 Mbps) • 802.11 n (600 Mbps) • 802.16 Wimax ?????? The IEEE 802.11 standard is now over 2,500 pages long, and new amendments are being developed all the time (Complex..) we sit on the edge of 802.11ac, which will allow devices to leverage superior modulation, multiple radios, and bonded channels to share a maximum of 6.9 Gbps! Wireless LAN Demand is high for IT professionals with wireless networking skills. Career opportunities exist for professionals to get involved in designing, deploying and supporting wireless network infrastructure. Cisco survey, 65 percent of IT managers expected to add dedicated wireless networking job roles
International Vendor certification Certified Wireless Network Administrator (CWNA) Certified Wireless Network Professional (CWNP) CISCO Wireless LAN Certification • Microsoft Windows Network Certifications • Microsoft MCSE Microsoft MCSE Server Microsoft's Windows MCSA Microsoft's Windows MCSA • Microsoft Certified Architect Program MCSE / MCSA Specializations
LSP TELEMATIKA TINGKAT CLUSTER NAMA SERTIFIKAT Dasar (BASIC) Junior Network Administrator Menengah (INTERMEDIATE) Network Administrator Lanjut (ADVANCED) Senior Network Administrator