Documente Academic
Documente Profesional
Documente Cultură
Course Introduction
This course is an overview of the IT Network, its main categories and
functions, and how it relates to Globe.
Course Objectives
Explain the basic concept of Information Technology
Enumerate the IT categories
Explain function of the IT Categories
Familiarize with Globe IT
Contents
LESSON #
1
TOPIC
Introduction
Infrastructure
Application
Security
LESSON 1:
Introduction
What is IT?
LESSON 2:
Infrastructure
Infrastructure Application
Security
What is IT Infrastructure?
It refers to the composite hardware, software, network resources and services
required for the existence, operation and management of an enterprise IT
environment.
Components
2.1 Hardware
2.2 Software
> Software is a general term for the various kinds of programs used to
operate computers and related devices
2.3 Network
LESSON 3:
Application
Infrastructure Application
3.1 Development/ Configuration
3.1.1 Web/Desktop/Mobile development
3.1.2 Product configuration
3.1.3 Analytic
Security
LESSON 4:
Security
Infrastructure Application
Security
What is IT Security?
also known as Computer security or cybersecurity
Components
4.1 Hardware
4.2 Software
4.3 Policies
Infrastructure Application
Security
4.1 Hardware
4.1.1Firewall
A firewall is a system designed to prevent unauthorized access to or from a
private network
Types of Firewall
Hardware firewalls
Software firewalls
Infrastructure Application
Security
4.1 Hardware
4.1.2 Security Appliance
A security appliance is any form of server appliance that is designed to
protect computer networks from unwanted traffic
Active devices
Passive devices
Preventative devices
Infrastructure Application
Security
4.2 Software
4.2.1 Antivirus
Antivirus (or anti-virus) software is used to safeguard a computer from malware,
including viruses, computer worms, and Trojan horses
4.2.2 SSO Single sign-on
is a property of access control of multiple related, but independent software systems
4.2.3 Log Management
comprises an approach to dealing with large volumes of computer-generated log
messages (also known as audit records, audit trails, event-logs, etc.).
Infrastructure Application
Security
4.2 Software
4.2.4 Configuration Management
is an Information Technology Infrastructure Library version 2 and an IT Service
Management process that tracks all of the individual Configuration Items in an IT
system which may be as simple as a single server, or as complex as the entire IT
department
Infrastructure Application
Security
4.3 Policies
The IT Security Policy is a living document that is continually updated to adapt
with evolving business and IT requirements. Institutions such as the International
Organization of Standardization (ISO) and the U.S. National Institute of Standards
and Technology (NIST) have published standards and best practices for security
policy formation
Thank you!