SlideShare a Scribd company logo
1 of 12
Network
devices II.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of Expertise Industry Certifications
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
– Firewalls.
– Network attached storage (NAS).
– Other devices.
PACE-IT
Page 4
Network devices II.
Page 5
– The firewall.
» It can be built into routers or be its own device.
» It functions at multiple layers of the OSI model.
• Specifically at layers 2, 3, 4, and 7.
» It is used to prevent or mitigate security threats.
» It blocks packets from entering or leaving the network.
• Via stateless inspection: the firewall will examine
every packet against a set of rules. Once the packet
matches a rule, the rule is enforced, and the specified
action is taken.
• Via stateful inspection: the firewall will only examine
the state of the connection between networks.
Specifically, when a connection is made from an
internal network to an external network, the firewall will
not examine any packets returning from the external
connection. As a general rule, external connections are
not allowed to be initiated with the internal network.
» It is the first line of defense in protecting the internal
network from outside threats.
• Consider it the police force of the network.
Network devices II.
Page 6
Network devices II.
Page 7
– The NAS.
» One solution to the data storage needs of the modern world.
• It is a specifically designed pool of storage.
» NAS is usually deployed as a network appliance.
• A network appliance is a device that is purchased and
deployed with a preconfigured operating system and software.
It is designed to perform a specific function and to do that
function very well.
• Network appliances limit the amount of configuration that the
user is allowed to perform.
» NAS offers several storage solution benefits.
• NAS is often designed and deployed with performance in
mind (with some form of RAID striping and multiple
connections to the network, thus increasing the possible
throughput).
• NAS is often designed with high availability in mind (with
some form of RAID mirroring and redundant systems in case
of equipment failure).
• NAS is always designed and deployed with high storage
capacity in mind. The size of the NAS is usually only limited
by the budget of the purchaser.
Network devices II.
Page 8
Network devices II.
Page 9
– Voice over IP (VoIP) phones.
» Use the network and Internet to provide telephone service.
» Offer more than just normal telephone functions.
• They can automatically log VoIP traffic, they are often
programmed with time clock applications, and they are often
programmed with simple browsers.
» VoIP can reduce the cost of operating telephones.
• Reduced long distance costs.
• Reduced cost of reconfiguration and ease of management of
the system.
– Internet appliances.
» A category of purpose built devices that are designed to
connect to a network and offer simple communication.
• An example would be a device that measures the amount of
material in a tank and, when it reaches a certain level, it will
send a message to reorder the necessary supply.
» They are usually designed to simplify a process or procedure.
Network devices II.
Page 10
Network devices II.
They can be built into routers or purpose built. They function at multiple
levels of the OSI model in an effort to mitigate and protect the network from
security threats. They control the flow of traffic into and out of networks.
Topic
Firewalls.
Summary
A mass storage solution for the modern network. NAS is often deployed
with high performance and/or high availability in mind. This is achieved
through the use of RAID and other redundancy built into them. They tend to
be a type of network appliance that is built to achieve a specific purpose.
The size of the storage solution is only limited by the budget for it.
Network attached storage.
VoIP phones offer telephone service over the network and Internet. VoIP
can offer more than just telephone service (logging, time card functions,
and the inclusion of a simple browser are common). VoIP can be used to
reduce the normal cost of telephony. Internet appliances are purpose built
devices that are designed to connect to networks and offer simple
communication.
Other devices.
Page 11
THANK YOU!
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

More Related Content

What's hot

What's hot (20)

PACE-IT: The Importance of Network Segmentation
PACE-IT: The Importance of Network SegmentationPACE-IT: The Importance of Network Segmentation
PACE-IT: The Importance of Network Segmentation
 
PACE-IT: Supporting Configuration Management (part 1)
PACE-IT: Supporting Configuration Management (part 1)PACE-IT: Supporting Configuration Management (part 1)
PACE-IT: Supporting Configuration Management (part 1)
 
PACE-IT: Basic Cloud Concepts - N10 006
PACE-IT: Basic Cloud Concepts - N10 006 PACE-IT: Basic Cloud Concepts - N10 006
PACE-IT: Basic Cloud Concepts - N10 006
 
Pace it troubleshooting-common_network_issues_bf
Pace it troubleshooting-common_network_issues_bfPace it troubleshooting-common_network_issues_bf
Pace it troubleshooting-common_network_issues_bf
 
PACE-IT: Supporting Configuration Management (part 2)
PACE-IT: Supporting Configuration Management (part 2)PACE-IT: Supporting Configuration Management (part 2)
PACE-IT: Supporting Configuration Management (part 2)
 
PACE-IT: Firewall Basics
PACE-IT: Firewall BasicsPACE-IT: Firewall Basics
PACE-IT: Firewall Basics
 
PACE-IT: Common Threats (part 1)
PACE-IT: Common Threats (part 1)PACE-IT: Common Threats (part 1)
PACE-IT: Common Threats (part 1)
 
PACE-IT, Security+1.1: Introduction to Network Devices (part 3)
PACE-IT, Security+1.1: Introduction to Network Devices (part 3)PACE-IT, Security+1.1: Introduction to Network Devices (part 3)
PACE-IT, Security+1.1: Introduction to Network Devices (part 3)
 
PACE-IT: Wireless LAN Infrastructure (part 2)
PACE-IT: Wireless LAN Infrastructure (part 2)PACE-IT: Wireless LAN Infrastructure (part 2)
PACE-IT: Wireless LAN Infrastructure (part 2)
 
PACE-IT: Physical Network Security Control
PACE-IT: Physical Network Security ControlPACE-IT: Physical Network Security Control
PACE-IT: Physical Network Security Control
 
PACE-IT: Network Hardening Techniques (part 2)
PACE-IT: Network Hardening Techniques (part 2)PACE-IT: Network Hardening Techniques (part 2)
PACE-IT: Network Hardening Techniques (part 2)
 
PACE-IT: Common WAN Components and Issues
PACE-IT: Common WAN Components and IssuesPACE-IT: Common WAN Components and Issues
PACE-IT: Common WAN Components and Issues
 
PACE-IT: Common Network Vulnerabilities
PACE-IT: Common Network VulnerabilitiesPACE-IT: Common Network Vulnerabilities
PACE-IT: Common Network Vulnerabilities
 
PACE-IT: Network Monitoring (part 1) - N10 006
PACE-IT: Network Monitoring (part 1) - N10 006 PACE-IT: Network Monitoring (part 1) - N10 006
PACE-IT: Network Monitoring (part 1) - N10 006
 
PACE-IT, Security+1.4: Common Network Protocols (part 3)
PACE-IT, Security+1.4: Common Network Protocols (part 3)PACE-IT, Security+1.4: Common Network Protocols (part 3)
PACE-IT, Security+1.4: Common Network Protocols (part 3)
 
PACE-IT: Wireless LAN Infrastructure (part 1)
PACE-IT: Wireless LAN Infrastructure (part 1)PACE-IT: Wireless LAN Infrastructure (part 1)
PACE-IT: Wireless LAN Infrastructure (part 1)
 
PACE-IT: Troubleshooting Wireless Networks (part 1)
PACE-IT: Troubleshooting Wireless Networks (part 1)PACE-IT: Troubleshooting Wireless Networks (part 1)
PACE-IT: Troubleshooting Wireless Networks (part 1)
 
PACE-IT: Cable Management
PACE-IT: Cable ManagementPACE-IT: Cable Management
PACE-IT: Cable Management
 
PACE-IT: Applying Patches and Upgrades
PACE-IT: Applying Patches and UpgradesPACE-IT: Applying Patches and Upgrades
PACE-IT: Applying Patches and Upgrades
 
PACE-IT: Troubleshooting Wireless Networks (part 2)
PACE-IT: Troubleshooting Wireless Networks (part 2)PACE-IT: Troubleshooting Wireless Networks (part 2)
PACE-IT: Troubleshooting Wireless Networks (part 2)
 

Viewers also liked

Greg Sarangoulis - Hashtag Philanthropy and You
Greg Sarangoulis - Hashtag Philanthropy and YouGreg Sarangoulis - Hashtag Philanthropy and You
Greg Sarangoulis - Hashtag Philanthropy and YouGreg Sarangoulis
 
Flex 4 Deep Dive
Flex 4 Deep DiveFlex 4 Deep Dive
Flex 4 Deep DiveEffective
 
Capitulo3 agua de mar
Capitulo3 agua de marCapitulo3 agua de mar
Capitulo3 agua de marsaat perez
 
Microfinance for Water & Sanitation: Cambodian Case Study
Microfinance for Water & Sanitation: Cambodian Case Study Microfinance for Water & Sanitation: Cambodian Case Study
Microfinance for Water & Sanitation: Cambodian Case Study International WaterCentre
 
Maternidad en la niñez
Maternidad en la niñezMaternidad en la niñez
Maternidad en la niñezOscar Gallegos
 
Rekruttering med Sociale medier IT-forum Århus
Rekruttering med Sociale medier IT-forum ÅrhusRekruttering med Sociale medier IT-forum Århus
Rekruttering med Sociale medier IT-forum ÅrhusEva Jonassen
 
에버노트를 가볍게 시작하는 7개의 아이디어
에버노트를 가볍게 시작하는 7개의 아이디어에버노트를 가볍게 시작하는 7개의 아이디어
에버노트를 가볍게 시작하는 7개의 아이디어minkyu seo
 
BURTON_SeaKayaker_issue145_17
BURTON_SeaKayaker_issue145_17BURTON_SeaKayaker_issue145_17
BURTON_SeaKayaker_issue145_17Bill Burton
 
Horse SA Educational Property Walk
Horse SA Educational Property Walk Horse SA Educational Property Walk
Horse SA Educational Property Walk Horse SA
 
50+: dwaze vragen & hardnekkige misverstanden
50+: dwaze vragen & hardnekkige misverstanden50+: dwaze vragen & hardnekkige misverstanden
50+: dwaze vragen & hardnekkige misverstandenSanoma
 
Comunicacion juan
Comunicacion juanComunicacion juan
Comunicacion juanJose Majano
 
Protection and management of copyright and related rights
Protection and management of copyright and related rightsProtection and management of copyright and related rights
Protection and management of copyright and related rightsDr. Supatchara Distabanjong
 
Sustainable development as contemporary issue in management
Sustainable development as contemporary issue in managementSustainable development as contemporary issue in management
Sustainable development as contemporary issue in managementbinit shrestha
 

Viewers also liked (19)

Greg Sarangoulis - Hashtag Philanthropy and You
Greg Sarangoulis - Hashtag Philanthropy and YouGreg Sarangoulis - Hashtag Philanthropy and You
Greg Sarangoulis - Hashtag Philanthropy and You
 
Flex 4 Deep Dive
Flex 4 Deep DiveFlex 4 Deep Dive
Flex 4 Deep Dive
 
Proposal
ProposalProposal
Proposal
 
Fpr pd12 a
Fpr pd12 aFpr pd12 a
Fpr pd12 a
 
Capitulo3 agua de mar
Capitulo3 agua de marCapitulo3 agua de mar
Capitulo3 agua de mar
 
Microfinance for Water & Sanitation: Cambodian Case Study
Microfinance for Water & Sanitation: Cambodian Case Study Microfinance for Water & Sanitation: Cambodian Case Study
Microfinance for Water & Sanitation: Cambodian Case Study
 
Maternidad en la niñez
Maternidad en la niñezMaternidad en la niñez
Maternidad en la niñez
 
Rekruttering med Sociale medier IT-forum Århus
Rekruttering med Sociale medier IT-forum ÅrhusRekruttering med Sociale medier IT-forum Århus
Rekruttering med Sociale medier IT-forum Århus
 
에버노트를 가볍게 시작하는 7개의 아이디어
에버노트를 가볍게 시작하는 7개의 아이디어에버노트를 가볍게 시작하는 7개의 아이디어
에버노트를 가볍게 시작하는 7개의 아이디어
 
BURTON_SeaKayaker_issue145_17
BURTON_SeaKayaker_issue145_17BURTON_SeaKayaker_issue145_17
BURTON_SeaKayaker_issue145_17
 
Horse SA Educational Property Walk
Horse SA Educational Property Walk Horse SA Educational Property Walk
Horse SA Educational Property Walk
 
Unit 5 DB and IP
Unit 5 DB and IPUnit 5 DB and IP
Unit 5 DB and IP
 
DetailJJP
DetailJJPDetailJJP
DetailJJP
 
50+: dwaze vragen & hardnekkige misverstanden
50+: dwaze vragen & hardnekkige misverstanden50+: dwaze vragen & hardnekkige misverstanden
50+: dwaze vragen & hardnekkige misverstanden
 
Comunicacion juan
Comunicacion juanComunicacion juan
Comunicacion juan
 
Proyecto Mujeres
Proyecto MujeresProyecto Mujeres
Proyecto Mujeres
 
Protection and management of copyright and related rights
Protection and management of copyright and related rightsProtection and management of copyright and related rights
Protection and management of copyright and related rights
 
Sustainable development as contemporary issue in management
Sustainable development as contemporary issue in managementSustainable development as contemporary issue in management
Sustainable development as contemporary issue in management
 
Primary vlan
Primary vlanPrimary vlan
Primary vlan
 

Similar to Pace IT - Network Devices (part 2)

PACE-IT, Security+1.3: Secure Network Design Elements and Components
PACE-IT, Security+1.3: Secure Network Design Elements and ComponentsPACE-IT, Security+1.3: Secure Network Design Elements and Components
PACE-IT, Security+1.3: Secure Network Design Elements and ComponentsPace IT at Edmonds Community College
 
· How to Build a Secure NetworkThe local county health departmen.docx
· How to Build a Secure NetworkThe local county health departmen.docx· How to Build a Secure NetworkThe local county health departmen.docx
· How to Build a Secure NetworkThe local county health departmen.docxoswald1horne84988
 
Application Of An Operating System Security
Application Of An Operating System SecurityApplication Of An Operating System Security
Application Of An Operating System SecurityAmber Wheeler
 
Ebook Guide To Data Centers
Ebook Guide To Data CentersEbook Guide To Data Centers
Ebook Guide To Data Centersrobgross144
 
Choosing A Secondary Storage
Choosing A Secondary StorageChoosing A Secondary Storage
Choosing A Secondary StorageJessica Tanner
 
Advanced computer network
Advanced computer networkAdvanced computer network
Advanced computer networkTrinity Dwarka
 
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdfComputer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdfBoney Maundu Slim
 

Similar to Pace IT - Network Devices (part 2) (20)

PACE-IT, Security+1.3: Secure Network Design Elements and Components
PACE-IT, Security+1.3: Secure Network Design Elements and ComponentsPACE-IT, Security+1.3: Secure Network Design Elements and Components
PACE-IT, Security+1.3: Secure Network Design Elements and Components
 
Pace IT - Client Networking (Part 3)
Pace IT - Client Networking (Part 3)Pace IT - Client Networking (Part 3)
Pace IT - Client Networking (Part 3)
 
PACE-IT: Introduction_to Network Devices (part 2) - N10 006
PACE-IT: Introduction_to Network Devices (part 2) - N10 006 PACE-IT: Introduction_to Network Devices (part 2) - N10 006
PACE-IT: Introduction_to Network Devices (part 2) - N10 006
 
PACE-IT: Network Infrastructure Implementations - N10 006
PACE-IT: Network Infrastructure Implementations - N10 006 PACE-IT: Network Infrastructure Implementations - N10 006
PACE-IT: Network Infrastructure Implementations - N10 006
 
Pace IT - Setting Up a SOHO Network
Pace IT - Setting Up a SOHO NetworkPace IT - Setting Up a SOHO Network
Pace IT - Setting Up a SOHO Network
 
PACE-IT: Implementing a Basic Network - N10 006
PACE-IT: Implementing a Basic Network - N10 006 PACE-IT: Implementing a Basic Network - N10 006
PACE-IT: Implementing a Basic Network - N10 006
 
· How to Build a Secure NetworkThe local county health departmen.docx
· How to Build a Secure NetworkThe local county health departmen.docx· How to Build a Secure NetworkThe local county health departmen.docx
· How to Build a Secure NetworkThe local county health departmen.docx
 
Application Of An Operating System Security
Application Of An Operating System SecurityApplication Of An Operating System Security
Application Of An Operating System Security
 
PACE-IT: Networking Services and Applications (part 2) - N10 006
PACE-IT: Networking Services and Applications (part 2) - N10 006PACE-IT: Networking Services and Applications (part 2) - N10 006
PACE-IT: Networking Services and Applications (part 2) - N10 006
 
PACE-IT: Storage Area Networks - N10 006
PACE-IT: Storage Area Networks - N10 006PACE-IT: Storage Area Networks - N10 006
PACE-IT: Storage Area Networks - N10 006
 
K011117277
K011117277K011117277
K011117277
 
Week2
Week2Week2
Week2
 
Pace IT - Troubleshooting Wireless Networks
Pace IT - Troubleshooting Wireless NetworksPace IT - Troubleshooting Wireless Networks
Pace IT - Troubleshooting Wireless Networks
 
Black_Box_Cabling_Guide.pdf
Black_Box_Cabling_Guide.pdfBlack_Box_Cabling_Guide.pdf
Black_Box_Cabling_Guide.pdf
 
Ebook Guide To Data Centers
Ebook Guide To Data CentersEbook Guide To Data Centers
Ebook Guide To Data Centers
 
ISM Unit 1.pdf
ISM Unit 1.pdfISM Unit 1.pdf
ISM Unit 1.pdf
 
Choosing A Secondary Storage
Choosing A Secondary StorageChoosing A Secondary Storage
Choosing A Secondary Storage
 
PACE-IT: Networking Services and Applications (part 1) - N10 006
PACE-IT: Networking Services and Applications (part 1) - N10 006PACE-IT: Networking Services and Applications (part 1) - N10 006
PACE-IT: Networking Services and Applications (part 1) - N10 006
 
Advanced computer network
Advanced computer networkAdvanced computer network
Advanced computer network
 
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdfComputer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
 

More from Pace IT at Edmonds Community College

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPace IT at Edmonds Community College
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)Pace IT at Edmonds Community College
 

More from Pace IT at Edmonds Community College (20)

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
 
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account ManagementPACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account Management
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
 
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication ServicesPACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication Services
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
 
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data SecurityPACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment ToolsPACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment Tools
 
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement TechniquesPACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement Techniques
 
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
 
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
 

Recently uploaded

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 

Recently uploaded (20)

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 

Pace IT - Network Devices (part 2)

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of Expertise Industry Certifications  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 – Firewalls. – Network attached storage (NAS). – Other devices. PACE-IT
  • 5. Page 5 – The firewall. » It can be built into routers or be its own device. » It functions at multiple layers of the OSI model. • Specifically at layers 2, 3, 4, and 7. » It is used to prevent or mitigate security threats. » It blocks packets from entering or leaving the network. • Via stateless inspection: the firewall will examine every packet against a set of rules. Once the packet matches a rule, the rule is enforced, and the specified action is taken. • Via stateful inspection: the firewall will only examine the state of the connection between networks. Specifically, when a connection is made from an internal network to an external network, the firewall will not examine any packets returning from the external connection. As a general rule, external connections are not allowed to be initiated with the internal network. » It is the first line of defense in protecting the internal network from outside threats. • Consider it the police force of the network. Network devices II.
  • 7. Page 7 – The NAS. » One solution to the data storage needs of the modern world. • It is a specifically designed pool of storage. » NAS is usually deployed as a network appliance. • A network appliance is a device that is purchased and deployed with a preconfigured operating system and software. It is designed to perform a specific function and to do that function very well. • Network appliances limit the amount of configuration that the user is allowed to perform. » NAS offers several storage solution benefits. • NAS is often designed and deployed with performance in mind (with some form of RAID striping and multiple connections to the network, thus increasing the possible throughput). • NAS is often designed with high availability in mind (with some form of RAID mirroring and redundant systems in case of equipment failure). • NAS is always designed and deployed with high storage capacity in mind. The size of the NAS is usually only limited by the budget of the purchaser. Network devices II.
  • 9. Page 9 – Voice over IP (VoIP) phones. » Use the network and Internet to provide telephone service. » Offer more than just normal telephone functions. • They can automatically log VoIP traffic, they are often programmed with time clock applications, and they are often programmed with simple browsers. » VoIP can reduce the cost of operating telephones. • Reduced long distance costs. • Reduced cost of reconfiguration and ease of management of the system. – Internet appliances. » A category of purpose built devices that are designed to connect to a network and offer simple communication. • An example would be a device that measures the amount of material in a tank and, when it reaches a certain level, it will send a message to reorder the necessary supply. » They are usually designed to simplify a process or procedure. Network devices II.
  • 10. Page 10 Network devices II. They can be built into routers or purpose built. They function at multiple levels of the OSI model in an effort to mitigate and protect the network from security threats. They control the flow of traffic into and out of networks. Topic Firewalls. Summary A mass storage solution for the modern network. NAS is often deployed with high performance and/or high availability in mind. This is achieved through the use of RAID and other redundancy built into them. They tend to be a type of network appliance that is built to achieve a specific purpose. The size of the storage solution is only limited by the budget for it. Network attached storage. VoIP phones offer telephone service over the network and Internet. VoIP can offer more than just telephone service (logging, time card functions, and the inclusion of a simple browser are common). VoIP can be used to reduce the normal cost of telephony. Internet appliances are purpose built devices that are designed to connect to networks and offer simple communication. Other devices.
  • 12. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.