Sunteți pe pagina 1din 20

IT Learning Session

Course Introduction
This course is an overview of the IT Network, its main categories and
functions, and how it relates to Globe.

Course Objectives
Explain the basic concept of Information Technology
Enumerate the IT categories
Explain function of the IT Categories
Familiarize with Globe IT

Contents
LESSON #
1

TOPIC
Introduction

Infrastructure

Application

Security

LESSON 1:

Introduction

What is IT?

LESSON 2:

Infrastructure

Infrastructure Application

Security

What is IT Infrastructure?
It refers to the composite hardware, software, network resources and services
required for the existence, operation and management of an enterprise IT
environment.

Components
2.1 Hardware

> In information technology, hardware is the physical aspect of computers,


telecommunications, and other devices

2.2 Software

> Software is a general term for the various kinds of programs used to
operate computers and related devices

2.3 Network

> In information technology, a network is a series of points or nodes interconnected


by communication paths.

LESSON 3:

Application

Infrastructure Application
3.1 Development/ Configuration
3.1.1 Web/Desktop/Mobile development
3.1.2 Product configuration
3.1.3 Analytic

3.2 Database Management


3.2.1 Database Fundamentals
3.2.2 Advance DBA
3.2.3 Database Resiliency

Security

LESSON 4:

Security

Infrastructure Application

Security

What is IT Security?
also known as Computer security or cybersecurity

Components
4.1 Hardware

Firewall, Security Appliances

4.2 Software

Antivirus, SSO, Log management, Configuration management

4.3 Policies

Infrastructure Application

Security

4.1 Hardware
4.1.1Firewall
A firewall is a system designed to prevent unauthorized access to or from a
private network
Types of Firewall
Hardware firewalls
Software firewalls

Infrastructure Application

Security

4.1 Hardware
4.1.2 Security Appliance
A security appliance is any form of server appliance that is designed to
protect computer networks from unwanted traffic

Types of Security Appliance

Active devices

Passive devices

Preventative devices

Unified Threat Management (UTM)

Infrastructure Application

Security

4.2 Software
4.2.1 Antivirus
Antivirus (or anti-virus) software is used to safeguard a computer from malware,
including viruses, computer worms, and Trojan horses
4.2.2 SSO Single sign-on
is a property of access control of multiple related, but independent software systems
4.2.3 Log Management
comprises an approach to dealing with large volumes of computer-generated log
messages (also known as audit records, audit trails, event-logs, etc.).

Infrastructure Application

Security

4.2 Software
4.2.4 Configuration Management
is an Information Technology Infrastructure Library version 2 and an IT Service
Management process that tracks all of the individual Configuration Items in an IT
system which may be as simple as a single server, or as complex as the entire IT
department

Infrastructure Application

Security

4.3 Policies
The IT Security Policy is a living document that is continually updated to adapt
with evolving business and IT requirements. Institutions such as the International
Organization of Standardization (ISO) and the U.S. National Institute of Standards
and Technology (NIST) have published standards and best practices for security
policy formation

Thank you!

S-ar putea să vă placă și