IT Management Solutions upgraded the network connections, computer equipment, and software for a physician's group with five offices. This included faster and more secure networks, wireless access for patients and staff, easy access to medical records from any location including online, and a backup disaster recovery plan. The project was completed within budget and on schedule without impacting normal business operations. A team of five individuals with various IT roles completed the work over 49 business days.
Adam Berke is an IT professional with over 15 years of experience in project management, team leadership, and client relationship management. He has a proven track record of successfully delivering complex IT projects on time and on budget. His areas of expertise include project management, strategic planning, communication, and vendor relations.
Benefits of an Managed Service ProviderThe TNS Group
An MSP (managed service provider) can provide IT support for a fixed monthly cost, avoiding expenses associated with hiring internal IT staff like training, benefits, and sick days. An MSP will ensure backups are regularly tested and updated, manage employees' devices through BYOD plans, and provide 24/7 technical support and monitoring. Updates and patching of software will be done daily by an MSP without disrupting business operations.
Today’s electronic physical security systems are complex: servers, workstations, network technologies and edge devices all working together to protect your facility. An undetected problem with a single component can compromise your security coverage. Unfortunately, many people discover a problem with the security system only after an incident has occurred. Join our webinar on May 24th, 1pm CST to learn how System Health Monitoring can help you avoid surprises and keep your facility secure.
In this webinar hosted by Christopher Hugman - VP, Service Innovation, we cover:
- What is System Health Monitoring?
- Do I need System Health Monitoring for my Security Systems?
- How does it work?
- How is SecurePlan different than a standard maintenance program?
The document outlines the responsibilities of setting up the IT infrastructure from scratch for a new health insurance company. It includes planning and implementing the network infrastructure, servers, workstations, security systems, backups, software, and coordinating with external providers. The roles also involve governance tasks like creating IT policies and strategic plans, auditing, and ensuring alignment between IT and business goals.
Transcat Webinar: Fluke Connect - How Wireless Is Changing the GameTranscat
Learn how Fluke Connect and wireless technology can allow you to work faster, more collaboratively, reduce paperwork and improve your safety. Visit transcat.com/flukeconnect for more details.
Presented by Paul Twite, Operations & Energy Services Manager, Delano Utilities
Topics Include:
Common Usage Applications
-Who?
-When?
-Where?
-Why?
Overview of Features
-Video Calls
-Live Trending
-Automatic Measurement Recording
-Equipment History Database
-Cloud Storage
Enabled Tools
-20 Enabled Kits
-Upcoming Releases
Security Updates Matter: Exploitation for BeginnersEnergySec
Abstract: This is a presentation explaining the purposes behind why security updates should be installed on systems and why it matters to protect the bulk electric system. Many people don’t understand the full purpose of installing security updates and this presentation walks through the reasons at a very high level so that everyone can understand.
The Canary in the Coal Mine: Create an Early Warning Tool to Help Your TestingJosiah Renaudin
Many organizations are using virtualization technology to increase the number of available test machines. However, this increase creates a new dilemma for testers. How can you confirm that all test systems are running properly and not showing signs of serious defects? Since many companies are reluctant to add additional staff members to simply “babysit” test environments, teams are forced to do more with less. Stephen Burlingame shares a solution to this problem that takes a proactive, rather than reactive, approach—in the form of a daily status report—to gather data, perform analysis, and generate results. This analysis of each test machine helps expose defects that, if ignored, could pose serious issues once the software is deployed to production. Take away an understanding of how such analysis is completed and a meaningful report compiled. See how critical data points are collected and presented efficiently. Leave with an understanding of how to create a similar early warning tool for your own organization and change the conversations testers are having.
The document provides an overview of control systems security from the perspective of the U.S. Department of Homeland Security. It discusses critical infrastructure sectors, risk drivers like modernization and globalization, vulnerability lifecycles, findings from control system assessments, and several cyber incidents involving control systems that impacted industrial operations. The department works to improve control system security through assessments, training, partnerships with industry, and developing guidance on topics like cyber forensics and firewall deployment.
Adam Berke is an IT professional with over 15 years of experience in project management, team leadership, and client relationship management. He has a proven track record of successfully delivering complex IT projects on time and on budget. His areas of expertise include project management, strategic planning, communication, and vendor relations.
Benefits of an Managed Service ProviderThe TNS Group
An MSP (managed service provider) can provide IT support for a fixed monthly cost, avoiding expenses associated with hiring internal IT staff like training, benefits, and sick days. An MSP will ensure backups are regularly tested and updated, manage employees' devices through BYOD plans, and provide 24/7 technical support and monitoring. Updates and patching of software will be done daily by an MSP without disrupting business operations.
Today’s electronic physical security systems are complex: servers, workstations, network technologies and edge devices all working together to protect your facility. An undetected problem with a single component can compromise your security coverage. Unfortunately, many people discover a problem with the security system only after an incident has occurred. Join our webinar on May 24th, 1pm CST to learn how System Health Monitoring can help you avoid surprises and keep your facility secure.
In this webinar hosted by Christopher Hugman - VP, Service Innovation, we cover:
- What is System Health Monitoring?
- Do I need System Health Monitoring for my Security Systems?
- How does it work?
- How is SecurePlan different than a standard maintenance program?
The document outlines the responsibilities of setting up the IT infrastructure from scratch for a new health insurance company. It includes planning and implementing the network infrastructure, servers, workstations, security systems, backups, software, and coordinating with external providers. The roles also involve governance tasks like creating IT policies and strategic plans, auditing, and ensuring alignment between IT and business goals.
Transcat Webinar: Fluke Connect - How Wireless Is Changing the GameTranscat
Learn how Fluke Connect and wireless technology can allow you to work faster, more collaboratively, reduce paperwork and improve your safety. Visit transcat.com/flukeconnect for more details.
Presented by Paul Twite, Operations & Energy Services Manager, Delano Utilities
Topics Include:
Common Usage Applications
-Who?
-When?
-Where?
-Why?
Overview of Features
-Video Calls
-Live Trending
-Automatic Measurement Recording
-Equipment History Database
-Cloud Storage
Enabled Tools
-20 Enabled Kits
-Upcoming Releases
Security Updates Matter: Exploitation for BeginnersEnergySec
Abstract: This is a presentation explaining the purposes behind why security updates should be installed on systems and why it matters to protect the bulk electric system. Many people don’t understand the full purpose of installing security updates and this presentation walks through the reasons at a very high level so that everyone can understand.
The Canary in the Coal Mine: Create an Early Warning Tool to Help Your TestingJosiah Renaudin
Many organizations are using virtualization technology to increase the number of available test machines. However, this increase creates a new dilemma for testers. How can you confirm that all test systems are running properly and not showing signs of serious defects? Since many companies are reluctant to add additional staff members to simply “babysit” test environments, teams are forced to do more with less. Stephen Burlingame shares a solution to this problem that takes a proactive, rather than reactive, approach—in the form of a daily status report—to gather data, perform analysis, and generate results. This analysis of each test machine helps expose defects that, if ignored, could pose serious issues once the software is deployed to production. Take away an understanding of how such analysis is completed and a meaningful report compiled. See how critical data points are collected and presented efficiently. Leave with an understanding of how to create a similar early warning tool for your own organization and change the conversations testers are having.
The document provides an overview of control systems security from the perspective of the U.S. Department of Homeland Security. It discusses critical infrastructure sectors, risk drivers like modernization and globalization, vulnerability lifecycles, findings from control system assessments, and several cyber incidents involving control systems that impacted industrial operations. The department works to improve control system security through assessments, training, partnerships with industry, and developing guidance on topics like cyber forensics and firewall deployment.
The document outlines an IT managed services company's offerings. It discusses three service plans - bronze, silver, and gold - that differ in the level of remote monitoring, management, and support provided. The bronze plan offers basic monitoring and antivirus protection, while the silver plan adds software deployment, threat management, and monthly on-site visits. The top-tier gold plan provides comprehensive remote management of networks, servers, desktops, security, and backup/storage, as well as weekly on-site visits and quarterly technology consultations. The company aims to help clients focus on their core business by providing consistent IT support, cost control, and increased productivity through these managed services.
HP JetAdvantage Security Manager is a policy-based tool that allows administrators to easily secure HP printers and copiers on their network. It offers automated deployment of security policies across devices, monitoring of devices to ensure compliance with policies, and remediation of any noncompliant devices. The tool provides templates based on security best practices and allows administrators to discover devices automatically on the network or manually import them. Administrators can also use Security Manager to deploy certificates and get reports on the security of their printing fleet.
Techs R Us provides 24/7 IT monitoring and support services to small and mid-sized businesses. Their services include 24/7 monitoring of clients' IT networks, immediate alerting for any issues, and monthly reporting on network health and security. They also conduct regular asset tracking and inventory to help clients plan budgets and reduce technology costs over the long run.
This document discusses security issues with SCADA (Supervisory Control and Data Acquisition) systems. SCADA systems are used to control critical infrastructure like water treatment plants, oil and gas pipelines, electrical grids, and nuclear power plants. However, SCADA systems often have weak security protections due to using outdated protocols and hardware that cannot be easily upgraded. This makes SCADA networks vulnerable to attacks that could disrupt important systems and endanger public safety. The document outlines several past attacks on SCADA networks and control systems that demonstrate these risks. Improving SCADA security will require collaboration between different fields like control systems engineering and cybersecurity.
The document outlines a 60-hour module on installing computer systems and networks. It is divided into 3 major topics: 1) planning and preparing for installation, 2) installing hardware, software, operating systems, and 3) testing the installed computer system. The module aims to teach learners the basic concepts, theories, and competencies for computer systems and networks installation and troubleshooting. Upon completing the module, learners will be able to independently provide quality installation and servicing of computer hardware.
Leveraging updated technology and best practices together can significantly reduce costs associated with downtime and lost productivity. Implementing a rigorous IT best practices plan through a service like Guardian Workstation can reduce downtime risks by up to 85% according to research, and provide an 80% increase in efficiency over those without such services. Guardian Workstation follows strict best practices guidelines for security updates, software management, and hardware maintenance that are designed to maximize the lifespan of equipment while minimizing costs and disruption.
IEC 80001 and Planning for Wi-Fi Capable Medical DevicesAli Youssef
This document summarizes a presentation about planning for Wi-Fi capable medical devices given by Ali Youssef, a senior clinical mobile solutions architect at Henry Ford Health System. It discusses Henry Ford's large Wi-Fi network supporting over 14,000 daily connections across its facilities. It describes some challenges faced with integrating different types of Wi-Fi medical devices and how they were addressed. It also discusses trends in mobility, the IEC 80001 standard for managing risks with medical devices on networks, and Henry Ford's process for certifying and onboarding new Wi-Fi medical devices onto its network.
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...Honeywell
A joint presentation of Yokogawa and NextNine about a 60-site global cybersecurity deployment, including what went right, what went wrong, necessary changes to the processes and technology, and the new technology was developed.
Insight Environmental is an environmental consulting firm specializing in Leak Detection and Repair (LDAR) and Optical Gas Imaging. Their top priority is safety with a zero lost time record since 2004. They work with clients to establish cost effective LDAR programs that meet regulations to achieve their goal of zero non-compliance. Insight offers Optical Gas Imaging Services using infrared cameras which improve worker safety, reduce costs, and enhance quality while allowing compliance monitoring for regulations. They have expertise in LDAR and emissions compliance to ensure safety, integrity, and superior results for clients across the United States.
Accenture & NextNine – Medium Size Oil & Gas Company Cyber Security Case StudyHoneywell
This document provides a summary of a presentation given by Michael Coden and Pete MacLeod on October 7, 2014 about scaling industrial control system (ICS) cybersecurity. It discusses conducting an inventory of ICS assets at an oil and gas facility, comparing manual vs automated inventory methods. The presentation aims to illustrate how centralized OT cybersecurity automation can improve security, reduce time/costs for inventory and incident response, and help address skills shortages through centralization.
Environment health and safety is an ecosystem comprising factors that can ensure safeguarding of an organization’s assets such as man, machine and materials. It is a network of dependencies and co-dependencies that may become hard to discern and understand unless the right methods are in place to encourage the pivotal participants within the ecosystem.
ICS Security from the Plant Floor Up - A Controls Engineers Approach to Secur...Digital Bond
The presentation covers assessment, implementation methodology, and current level of success for addressing four key objectives which are protecting the controls fieldbus (networks) from untrusted networks (domain), secure and safe remote support capability from both inside and outside of the company, control supplier access to manufacturing equipment when onsite, and protect manufacturing systems from Malware and intrusion. This system isn’t theoretical, it’s in broad use and full critical production. If the time and connectivity is available a quick remote access demonstration can be given. The presentation will wrap up with a series of thoughts and ideas that occur to me regarding security in general as I listen to other organizations and groups talking about various security needs and activities.
Tatsuaki Takebe of Yokogawa Electric Corporation provides the closing keynote with a focus on international standards activity and how it affects the Japanese ICS community.
Secure Systems Security and ISA99- IEC62443Yokogawa1
With the new Industrial Network standards like ISA-IEC62443 companies are evolving their IT and OT networks to face evolving threats. This presentation will cover industrial networking best practices, secure architectures and segregation techniques that can be used by all businesses to prevent a minor business network breach from becoming an industrial catastrophe.
Topics Covered in this Seminar Include:
Overview Of Cyber Threat
Introduction - ISA IEC Industrial Control Security Standards
An Example - Advanced Persistent Threat (APT)
ISA/IEC 62443-3-2 Network Separation - An APT countermeasure
The next step in APT defenses System Certification to ISA/IEC 62443 Cybersecurity Standards
ISA/IEC 62443 Cybersecurity Standards Current Efforts
The Future of ISA/IEC 62443 Cybersecurity Standards
4 Best Practices for Patch Management in Education ITKaseya
This document discusses best practices for patch management. It begins with an introduction and speakers. It then discusses challenges with manual patching processes and how the time between patch release and exploits is shrinking. The next sections outline 4 best practices for patch management: 1) discover and assess systems, 2) identify and test patches, 3) evaluate and plan patch deployment, and 4) deploy and remediate patches. An additional best practice of automating patch management is recommended to reduce costs and improve productivity. The document concludes with information about Kaseya as a patch management solution provider.
This document provides instructions for quickly installing and setting up a FireEye appliance. The FireEye appliance can identify malware attacks on a network, block attacks, and alert administrators. Setup instructions are provided for using either the front panel LCD or a serial console. The steps include mounting the appliance, connecting network cables, powering on, and configuring basic network and security settings using a menu interface. Additional documentation is referenced for more complete configuration and usage information.
This project was a culmination of two years of study at ITT-Technical Institutes\'s Bessemer, AL campus for an Associates degree in ITCNS (Information Technology Computer Network Systems). It was a team project of 7 members with the goal of designing a network solution for a fictional medical practice consolidation of 5 doctors in a company named Radiant Medical Services.
This document provides a project plan proposed by Network Solutions Inc. to upgrade the computer network for Healthmark Medical, a medical supply company. The plan outlines the defining problems with the current network having issues supporting demands. It then provides details on the scope, requirements, stakeholders, work breakdown structure, cost analysis, technical implementation approach including network diagrams, risks, and security measures to ensure compliance with HIPAA/Title II privacy guidelines. The network upgrade aims to solidify Healthmark's technology needs for years to come by replacing outdated hardware and software with a new network infrastructure designed to handle their workload demands.
Sherif Abd El Moniem Abd El Hady Mohamed is an Egyptian male who has over 15 years of experience in technical support, quality assurance, and IT management roles. He has worked on over 20 projects in various industries including accounting, medical, and management systems. Sherif is fluent in English and Arabic with strong computer skills including Microsoft Windows, MS Office, and database programs. He currently works as a Technical Support Manager at a software company.
The document outlines a project proposal for designing an infrastructure to connect Greenway Bank branches expanding to four new locations to their headquarters. Key points:
- Black Reign Associates has been appointed to design the infrastructure to connect each new branch location to the headquarters in St. Louis.
- The infrastructure will include networking equipment like routers, firewalls, and switches to connect the Local Area Networks (LANs) at each branch to the wide area network (WAN).
- The project will provide physical, electronic and data security and backup/recovery plans while meeting various banking regulations.
- A team of 6 people from Black Reign Associates will work on planning, designing and implementing the network infrastructure over a 6
Team 4, Team PMP”IT Installation of the Adelphi V.docxmattinsonjanel
Team 4, “Team PMP”
IT Installation of the Adelphi Veterinary Clinic
IFSM 438: Project Management
ITP-1 Project Deliverables - Project Charter
Project Manager Cheryl Brown
Deputy Project Manager Jesse Holmes
Documentation Manager Terence Fletcher
Editor Michael McKnight
Configuration Manager Nhi Thach
Functional Project Manager Brian Sheridan
Clinic Manager Donna McKalip
IT Installation of the Adelphi Veterinary Clinic
Date Issued: June 28, 2015
Project Name: Adelphi Veterinary Clinic IT Installation Project Charter
Project Sponsor: President, University of Maryland - University College
Project Context & Background:
The clinic recently received a monetary grant from UMUC for its first computers and Internet connectivity. The veterinarian clinic is an organization that consists of ten vets, seven animal technicians, and five receptions. The clinic is housed in a single building with a second/adjacent building for animal boarding and long-term care. Each vet had his/her office, and there are eight examination rooms, 3 operating rooms, and three diagnostic rooms for x-rays and tests.
Project objectives:
Team PMP will work together to innovate and incorporate information technology for the Adelphi Veterinary Clinic at the University of Maryland University College. By utilizing Information Technology, the clinic will increase productivity and improve operational efficiency through:
a) Availability – A system that can be trusted to work when needed.
b) Reliability – A system that consistently performs to meet organizational needs.
c) Scalability – A system that will accommodate growth.
d) Supportability – A reasonably priced system that support the organization’s operational needs throughout its entire lifecycle.
e) Serviceability – A system that incorporates long-term preventive maintenance at an affordable cost. (Westland, 2010)
Project Scope:
Methodology/Approach - Team PMP will contact with Apple, Dell, and Gateway and perform price comparisons, thus maximizing the budget and determining who will give us the most quality IT products at an affordable price.
Includes - This will include desktops, laptops, and any other portable electronic devices for all staff members. Renovation of a large office and building for the installation of IT products for the clinic, developing comprehensive space for the network infrastructures (primarily for network connectivity)
Excludes - Project will retire once the IT system is completed, and training is provided. There will be no long-term installations and training provided unless negotiated.
Success Criteria - Achieving and exceeding customer satisfaction through the quality of work performed by Team PMP. From planning and execution, to follow up training, Team PMP wants to make this process the best renovation experience for the clinic staff and its patrons.
Key Stakeholders:
Client: Donna McKalip
Project Manager:Cheryl ...
The document outlines an IT managed services company's offerings. It discusses three service plans - bronze, silver, and gold - that differ in the level of remote monitoring, management, and support provided. The bronze plan offers basic monitoring and antivirus protection, while the silver plan adds software deployment, threat management, and monthly on-site visits. The top-tier gold plan provides comprehensive remote management of networks, servers, desktops, security, and backup/storage, as well as weekly on-site visits and quarterly technology consultations. The company aims to help clients focus on their core business by providing consistent IT support, cost control, and increased productivity through these managed services.
HP JetAdvantage Security Manager is a policy-based tool that allows administrators to easily secure HP printers and copiers on their network. It offers automated deployment of security policies across devices, monitoring of devices to ensure compliance with policies, and remediation of any noncompliant devices. The tool provides templates based on security best practices and allows administrators to discover devices automatically on the network or manually import them. Administrators can also use Security Manager to deploy certificates and get reports on the security of their printing fleet.
Techs R Us provides 24/7 IT monitoring and support services to small and mid-sized businesses. Their services include 24/7 monitoring of clients' IT networks, immediate alerting for any issues, and monthly reporting on network health and security. They also conduct regular asset tracking and inventory to help clients plan budgets and reduce technology costs over the long run.
This document discusses security issues with SCADA (Supervisory Control and Data Acquisition) systems. SCADA systems are used to control critical infrastructure like water treatment plants, oil and gas pipelines, electrical grids, and nuclear power plants. However, SCADA systems often have weak security protections due to using outdated protocols and hardware that cannot be easily upgraded. This makes SCADA networks vulnerable to attacks that could disrupt important systems and endanger public safety. The document outlines several past attacks on SCADA networks and control systems that demonstrate these risks. Improving SCADA security will require collaboration between different fields like control systems engineering and cybersecurity.
The document outlines a 60-hour module on installing computer systems and networks. It is divided into 3 major topics: 1) planning and preparing for installation, 2) installing hardware, software, operating systems, and 3) testing the installed computer system. The module aims to teach learners the basic concepts, theories, and competencies for computer systems and networks installation and troubleshooting. Upon completing the module, learners will be able to independently provide quality installation and servicing of computer hardware.
Leveraging updated technology and best practices together can significantly reduce costs associated with downtime and lost productivity. Implementing a rigorous IT best practices plan through a service like Guardian Workstation can reduce downtime risks by up to 85% according to research, and provide an 80% increase in efficiency over those without such services. Guardian Workstation follows strict best practices guidelines for security updates, software management, and hardware maintenance that are designed to maximize the lifespan of equipment while minimizing costs and disruption.
IEC 80001 and Planning for Wi-Fi Capable Medical DevicesAli Youssef
This document summarizes a presentation about planning for Wi-Fi capable medical devices given by Ali Youssef, a senior clinical mobile solutions architect at Henry Ford Health System. It discusses Henry Ford's large Wi-Fi network supporting over 14,000 daily connections across its facilities. It describes some challenges faced with integrating different types of Wi-Fi medical devices and how they were addressed. It also discusses trends in mobility, the IEC 80001 standard for managing risks with medical devices on networks, and Henry Ford's process for certifying and onboarding new Wi-Fi medical devices onto its network.
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...Honeywell
A joint presentation of Yokogawa and NextNine about a 60-site global cybersecurity deployment, including what went right, what went wrong, necessary changes to the processes and technology, and the new technology was developed.
Insight Environmental is an environmental consulting firm specializing in Leak Detection and Repair (LDAR) and Optical Gas Imaging. Their top priority is safety with a zero lost time record since 2004. They work with clients to establish cost effective LDAR programs that meet regulations to achieve their goal of zero non-compliance. Insight offers Optical Gas Imaging Services using infrared cameras which improve worker safety, reduce costs, and enhance quality while allowing compliance monitoring for regulations. They have expertise in LDAR and emissions compliance to ensure safety, integrity, and superior results for clients across the United States.
Accenture & NextNine – Medium Size Oil & Gas Company Cyber Security Case StudyHoneywell
This document provides a summary of a presentation given by Michael Coden and Pete MacLeod on October 7, 2014 about scaling industrial control system (ICS) cybersecurity. It discusses conducting an inventory of ICS assets at an oil and gas facility, comparing manual vs automated inventory methods. The presentation aims to illustrate how centralized OT cybersecurity automation can improve security, reduce time/costs for inventory and incident response, and help address skills shortages through centralization.
Environment health and safety is an ecosystem comprising factors that can ensure safeguarding of an organization’s assets such as man, machine and materials. It is a network of dependencies and co-dependencies that may become hard to discern and understand unless the right methods are in place to encourage the pivotal participants within the ecosystem.
ICS Security from the Plant Floor Up - A Controls Engineers Approach to Secur...Digital Bond
The presentation covers assessment, implementation methodology, and current level of success for addressing four key objectives which are protecting the controls fieldbus (networks) from untrusted networks (domain), secure and safe remote support capability from both inside and outside of the company, control supplier access to manufacturing equipment when onsite, and protect manufacturing systems from Malware and intrusion. This system isn’t theoretical, it’s in broad use and full critical production. If the time and connectivity is available a quick remote access demonstration can be given. The presentation will wrap up with a series of thoughts and ideas that occur to me regarding security in general as I listen to other organizations and groups talking about various security needs and activities.
Tatsuaki Takebe of Yokogawa Electric Corporation provides the closing keynote with a focus on international standards activity and how it affects the Japanese ICS community.
Secure Systems Security and ISA99- IEC62443Yokogawa1
With the new Industrial Network standards like ISA-IEC62443 companies are evolving their IT and OT networks to face evolving threats. This presentation will cover industrial networking best practices, secure architectures and segregation techniques that can be used by all businesses to prevent a minor business network breach from becoming an industrial catastrophe.
Topics Covered in this Seminar Include:
Overview Of Cyber Threat
Introduction - ISA IEC Industrial Control Security Standards
An Example - Advanced Persistent Threat (APT)
ISA/IEC 62443-3-2 Network Separation - An APT countermeasure
The next step in APT defenses System Certification to ISA/IEC 62443 Cybersecurity Standards
ISA/IEC 62443 Cybersecurity Standards Current Efforts
The Future of ISA/IEC 62443 Cybersecurity Standards
4 Best Practices for Patch Management in Education ITKaseya
This document discusses best practices for patch management. It begins with an introduction and speakers. It then discusses challenges with manual patching processes and how the time between patch release and exploits is shrinking. The next sections outline 4 best practices for patch management: 1) discover and assess systems, 2) identify and test patches, 3) evaluate and plan patch deployment, and 4) deploy and remediate patches. An additional best practice of automating patch management is recommended to reduce costs and improve productivity. The document concludes with information about Kaseya as a patch management solution provider.
This document provides instructions for quickly installing and setting up a FireEye appliance. The FireEye appliance can identify malware attacks on a network, block attacks, and alert administrators. Setup instructions are provided for using either the front panel LCD or a serial console. The steps include mounting the appliance, connecting network cables, powering on, and configuring basic network and security settings using a menu interface. Additional documentation is referenced for more complete configuration and usage information.
This project was a culmination of two years of study at ITT-Technical Institutes\'s Bessemer, AL campus for an Associates degree in ITCNS (Information Technology Computer Network Systems). It was a team project of 7 members with the goal of designing a network solution for a fictional medical practice consolidation of 5 doctors in a company named Radiant Medical Services.
This document provides a project plan proposed by Network Solutions Inc. to upgrade the computer network for Healthmark Medical, a medical supply company. The plan outlines the defining problems with the current network having issues supporting demands. It then provides details on the scope, requirements, stakeholders, work breakdown structure, cost analysis, technical implementation approach including network diagrams, risks, and security measures to ensure compliance with HIPAA/Title II privacy guidelines. The network upgrade aims to solidify Healthmark's technology needs for years to come by replacing outdated hardware and software with a new network infrastructure designed to handle their workload demands.
Sherif Abd El Moniem Abd El Hady Mohamed is an Egyptian male who has over 15 years of experience in technical support, quality assurance, and IT management roles. He has worked on over 20 projects in various industries including accounting, medical, and management systems. Sherif is fluent in English and Arabic with strong computer skills including Microsoft Windows, MS Office, and database programs. He currently works as a Technical Support Manager at a software company.
The document outlines a project proposal for designing an infrastructure to connect Greenway Bank branches expanding to four new locations to their headquarters. Key points:
- Black Reign Associates has been appointed to design the infrastructure to connect each new branch location to the headquarters in St. Louis.
- The infrastructure will include networking equipment like routers, firewalls, and switches to connect the Local Area Networks (LANs) at each branch to the wide area network (WAN).
- The project will provide physical, electronic and data security and backup/recovery plans while meeting various banking regulations.
- A team of 6 people from Black Reign Associates will work on planning, designing and implementing the network infrastructure over a 6
Team 4, Team PMP”IT Installation of the Adelphi V.docxmattinsonjanel
Team 4, “Team PMP”
IT Installation of the Adelphi Veterinary Clinic
IFSM 438: Project Management
ITP-1 Project Deliverables - Project Charter
Project Manager Cheryl Brown
Deputy Project Manager Jesse Holmes
Documentation Manager Terence Fletcher
Editor Michael McKnight
Configuration Manager Nhi Thach
Functional Project Manager Brian Sheridan
Clinic Manager Donna McKalip
IT Installation of the Adelphi Veterinary Clinic
Date Issued: June 28, 2015
Project Name: Adelphi Veterinary Clinic IT Installation Project Charter
Project Sponsor: President, University of Maryland - University College
Project Context & Background:
The clinic recently received a monetary grant from UMUC for its first computers and Internet connectivity. The veterinarian clinic is an organization that consists of ten vets, seven animal technicians, and five receptions. The clinic is housed in a single building with a second/adjacent building for animal boarding and long-term care. Each vet had his/her office, and there are eight examination rooms, 3 operating rooms, and three diagnostic rooms for x-rays and tests.
Project objectives:
Team PMP will work together to innovate and incorporate information technology for the Adelphi Veterinary Clinic at the University of Maryland University College. By utilizing Information Technology, the clinic will increase productivity and improve operational efficiency through:
a) Availability – A system that can be trusted to work when needed.
b) Reliability – A system that consistently performs to meet organizational needs.
c) Scalability – A system that will accommodate growth.
d) Supportability – A reasonably priced system that support the organization’s operational needs throughout its entire lifecycle.
e) Serviceability – A system that incorporates long-term preventive maintenance at an affordable cost. (Westland, 2010)
Project Scope:
Methodology/Approach - Team PMP will contact with Apple, Dell, and Gateway and perform price comparisons, thus maximizing the budget and determining who will give us the most quality IT products at an affordable price.
Includes - This will include desktops, laptops, and any other portable electronic devices for all staff members. Renovation of a large office and building for the installation of IT products for the clinic, developing comprehensive space for the network infrastructures (primarily for network connectivity)
Excludes - Project will retire once the IT system is completed, and training is provided. There will be no long-term installations and training provided unless negotiated.
Success Criteria - Achieving and exceeding customer satisfaction through the quality of work performed by Team PMP. From planning and execution, to follow up training, Team PMP wants to make this process the best renovation experience for the clinic staff and its patrons.
Key Stakeholders:
Client: Donna McKalip
Project Manager:Cheryl ...
The document discusses providing IT solutions and network upgrades for ITT Medical including:
1) Implementing a new secure network with email servers, file servers, and updated hardware and software.
2) Creating a wireless network connecting all PCs to access patient information from any location.
3) Completely backing up old data and restoring it to the new environment.
Cisco Connect 2018 Philippines - introducing cisco dna assuranceNetworkCollaborators
Cisco's DNA Assurance product provides network administrators with tools to help troubleshoot network issues through contextual data and insights. It uses a 360-degree contextual graph to isolate problems, allows network administrators to replicate issues through historical data and predictive analytics, and provides step-by-step guided remediation to resolve problems quickly based on Cisco's expertise. Case studies on Houston Methodist Hospital and Stanford University found that DNA Assurance helps identify small problems before they become big issues and provides the information needed to effectively manage large, complex networks.
IT327-1404A-01 Implementing, Managing and Mainta.docxpriestmanmable
IT327-1404A-01 Implementing, Managing and Maintaining a Network I
Phase 1 Individual Project
Michael F. Ryan Jr.
10/14/14
Contents
Week 1: Target Organization 3
Target Organization 3
Analysis and Recommendations 3
Week 2: Transmission Control Protocol/Internet Protocol (TCP/IP) Addressing and Management 4
Week 3: Fault Tolerance Plan 5
Week 4: Security Plan 6
Week 5: Network Monitoring 7
All Weeks: Network Pro Prep Toolkit 8
Week 1: Target OrganizationTarget Organization
About Ryan Computer Enterprises
Ryan Computer Enterprises formed in 2000, and provides leading business solutions. Currently there are over 8000 employees that are located throughout five states with three locations in Pennsylvania, Florida, California, Texas and New York. The administrative office currently is located in Pennsylvania. Currently there are over 500 additional employees located in the corporate headquarters. The company provides cutting edge solutions and needs USAA, JP Morgan, Goldman Sacks and other financial institutions. In 2002, Forbes magazine rated Ryan Computer Enterprises as the number one business organization for the field of technical consultation.
Major clients of Ryan Computer Enterprises are all in the field of investment banking and insurance. Some major factors of focus for the company will be improvement of business process the clientele have set in place, legacy systems and to have a set solution in place to be utilized thought their organization. Ryan Computer Enterprises has stated that our goal is align both the company and client goals.
Ryan Computer Enterprises has slowly replaced existing infrastructure over the years focusing on workstation, printer, switch and routers. Some areas of interest that go beyond the physical infrastructure are application upgrades. The applications that are in questions for upgrades are DBMS and other various apps such as Office 365. It has been over 2 years since the last upgrade to the IT system has been conducted and in order to provide better security and stability it has been decided that specific facets that have been listed must be upgraded as well as servers and the use of cloud technology must be implemented to allow for virtual storage of information. Other technology that should be visited is the addition of WAPs through out the facilities this allows the vendors and employees to use their mobile devices and other wireless items as well as the clientele.
The last item for discussion that will be addressed as an upgrade will be the addition of remote access. Having VPN capabilities allows Ryan Computer Enterprises to better facilitate troubleshooting and adds to the functionality of its employees. All email services as well as server access allow an employee to better assist with technical work as well as giving the clients the ability to conduct business wherever they might be located.
Metrics that are used to identify some of the issues are based on multiple factors but some ...
This document provides a proposal for upgrading the computer network at Healthmark Medical. It describes the current issues with their outdated network architecture and hardware, which is negatively impacting business operations. The proposed project would replace all employee computers, install a new VOIP phone system, fiber internet connection, servers, switches, and other network components. Requirements for the project are outlined, including the need for HIPAA compliance, improved network speeds, and addressing constraints like timelines. Key stakeholders are identified and a communication plan is proposed to keep everyone informed during the project. The goal is to implement the new network within six months to improve Healthmark Medical's technology and business performance.
Patch Management: 4 Best Practices and More for Today's Healthcare ITKaseya
1) The document discusses best practices for patch management in healthcare IT, including discovering and assessing systems to identify needed patches, identifying and testing patches, evaluating and planning patch deployment, and deploying and remediating patches.
2) It recommends automating patch management for reduced costs, improved productivity and system performance. Automation can assess systems, identify new patches, evaluate needed patches, schedule deployments, and create reports.
3) The document is a presentation about patch management solutions from Kaseya, an IT automation company, and promotes their product for comprehensive, scalable, and affordable automated patch management.
NetIQ Solutions for the Data Center
IT Operations Management Solution
IT Infrastructure & Operations Executives
NetIQ AppManager
AppManager helps with:
• Monitoring all the hardware, infrastructure, systems and
applications used to deliver IT services to the business.
• Troubleshooting and resolving IT problems faster
• Reducing monitoring gaps
• Tackling IT problems before they impact service
NetIQ Operations Center: Getting the “big picture”
Patch Management: 4 Best Practices and More for Today’s Banking IT LeadersKaseya
This document summarizes a webcast about patch management best practices for banking IT leaders. It discusses challenges with manual patching processes and costs associated with them. It then outlines 4 best practices for patch management: 1) discover and assess systems, 2) identify and test patches, 3) evaluate and plan patch deployment, and 4) deploy and remediate patches. An additional best practice of automating patch management processes is recommended to reduce costs and improve productivity. The presentation then provides an overview of Kaseya's patch management automation solutions and customer examples.
The document discusses Computer Troubleshooters, an Ireland-based IT support franchise network. It provides local IT support services while leveraging the strength of a global franchise network. Some key services discussed include managed IT services, hosted cloud solutions, Office 365, VoIP telephony, internet security, data backup, troubleshooting and repairs. The network aims to deliver reliable IT support solutions to local businesses through its professional franchise partners.
Sandeep K. Thakare is an IT System Administrator with over 8 years of experience. He has strong technical skills in areas like networking, systems administration, server administration, security and troubleshooting. Some of his key responsibilities include planning and maintaining IT infrastructure; defining and documenting requirements; analyzing operations and resolving technical problems. He has worked with various organizations like Glenmark Pharmaceuticals and IBM. He is proficient in technologies like Windows, Active Directory, virtualization, Exchange Server and Citrix. He also has various Microsoft certifications in areas like Windows Server administration.
Chuck Roden has over 33 years of experience in roles such as senior systems analyst, SME, project manager, and architectural engineer. He has a proven track record of building team collaboration and meeting or exceeding project metrics. Roden has extensive experience supporting large corporate clients in logistics and overcoming challenges through effective communication. He is immediately available for an interview or new engagement.
Chuck Roden has over 33 years of experience in roles such as senior systems analyst, SME, project manager, and architectural engineer. He has a proven track record of building team collaboration and meeting deliverable timelines. Roden has extensive experience supporting large corporate clients with over 18,000 servers and leading teams of over 45 people. He is seeking a new opportunity and is immediately available for an interview or new engagement.
The document provides a resume for Elmer C. Santos, who has over 9 years of experience in software and hardware support roles across various industries. He has strong skills in Windows, Linux, databases like SQL Server, and networking. His most recent role was as an ICT Specialist at New World Diagnostics Inc. where he supported their servers, systems, networks and various applications. He is looking for a new opportunity where he can continue growing his technical skills and career.
Arnold Aguilar is an experienced IT professional with over 15 years of experience in various roles including healthcare, oil and gas, aerospace, and financial institutions. He holds a Bachelor's degree in Business Administration and an Associate's degree in Computer Systems Technology. He is seeking full-time employment as a desktop support engineer or helpdesk support technician. His experience includes desktop support, imaging, software deployment, Active Directory administration, and server support.
2. Upgraded: Network Connections, Computer equipment
and software for all five offices.
•Faster, Better, Secure and Capable of future growth expectations.
Provided: Ease-of-Use for Patients and Medical staff.
• Easier Access to medical records from any location and online.
Insured: Security, Legal and Regulation.
• Access to medical records compliant with HIPAA laws.
Created: Backup Plan for Disaster Recovery.
• Setup backup servers at each location and cloud storage.
We Completed and Succeed as Planned:
• All without impacting your normal business!
• Within budget and 49 business days for all 5 offices.
What We Did… Met Your Needs
2
3. Team Members & Role
3
Quanda Moore – Project Manager.
• Execute, Delegate and End-to-End Project Responsibilities.
Linda Brown – Project Consultant.
• Field Survey for PMO*, SOP* and Documentation.
Tom Vu – Design / Implementation Engineer.
• Technical Solution for FMO*, Architect and Product Pricing.
Jose Alvarez – Field Operation Manager.
• Technician, Implementation, Testing and Training.
Brandon Montgomery – Security Consultant.
• Security Compliance, Quality Assurance, Legal and Regulation.
*** PMO (Present Mode of Operation), SOP (Standard Operation Procedure), FMO (Future Mode of Operation).
4. Team Experiences & Objectives
4
We have over 20 years of IT Management.
Technical Support on & off site and Customer Service.
Team over 150 associates with holding major certification
such as: HIPPA, CISSP, EHR, PMP, CCIE and CompTIA HIT.
We Installed 20 remote sites for Children’s Healthcare of Atlanta.
Upgraded Gwinnett Medical Center and their Offices.
Currently Working with WellStar and Southern Regional Hospital
to open site in Gwinnett and DeKalb County.
We Ensure and Use HIPAA security checklist to make sure project
completed meet with standard laws, legal and regulation.
Provide 18 Months of IT Management support after project completed.
6. Scope of Work
6
Completed network design plan and pre-
tested using network simulation software.
Purchased all computer equipment and
software necessary to complete the project.
Setup, tested and initialized of all computer
equipment, software and network
connections.
Setup access for patients and medical staff to
have access to medical records.
Trained your medical and IT staff for using new
program, security, basic upgrade and trouble shoot.
Created back up recovery for disaster.
7. 7
We Addressed Your Need . . .
General office
inspected.
Installed equipment
and software for
each office.
Tested network
connections for all
five offices.
Cleaned up offices.
Trained doctors and
staff.
Signed off.
Project Closure.
Signed off.
Phase IIPhase I
Met Face to
Face.
Inspected all
five offices.
Interviewed
doctors and
staff.
Designed and
purchased
equipment.
Signed off.
Phase III
8. 8
Task Name Duration Date Started Date Finished Person Assigned
Scheduled & Details of Work 49 days Thu 1/29/15 Tue 4/7/15
General Inspection (wear, damage, usable):
Power line and outlet.
Network cabling, jack and wall plate.
1 day Thu 1/29/15 Thu 1/29/15 Field Manager
Wiring Installed:
Additional power line and outlet.
New Cat6A cable, Rj45 and wall plate.
10 days Fri 1/30/15 Thu 2/12/15 Technician
Equipment , Software Installed & Setup:
Computer and other peripheral devices.
Servers, server rack, routers, switches, firewall
and patch panel.
Medical Billing Software System, Server2008.
10 days Fri 2/13/15 Thu 2/26/15 Technician
Network & Software Tested:
All computer equipment, network and software.
Security of all data and networks.
Connection to patient information, billing and
insurance claims.
Configuration of all network connection for five
offices locations.
System for data backup disaster recovery.
10 days Fri 2/27/15 Thu 3/12/15
Field Manager,
Technician
Office Cleaned Up:
Removed all old computer systems and other
old peripheral devices.
Final walk through for cleaning up offices.
3 days Fri 3/13/15 Tue 3/17/15 Technician
Doctors and Staffs Trained for:
Use of new computer equipment and software
with proper security protocols in place.
Use of Wireless System and VOIP phones.
15 days Wed 3/18/15 Tue 4/7/15
Security
Consultant,
Technician
Scheduled Details of Each Office
12. 12
Total Cost for 5 Offices
Additional Items Suggested:
ADT Security System & Installation $ 4,000 x 5 = $ 20,000.00
ADT Monthly Service $ 100 x 5 = $ 500.00
Google Cloud Storage Monthly Service $ 1,000 x 5 = $ 5,000.00
Generac 22kw Standby Generator System $ 4,599 x 5 = $ 22,995.00
Approximated Per Office Cost: $ 120,000.00
------------------------------------------------------------------------
Details Cost of All 5 Offices:
Hardware: $ 16,429.35
Software: $ 32,138.05
Equipment: $ 26,195.67
Labor: $ 45,246.18
13. After completed upgrade network,
computer equipment and software:
• Faster and More Secure in Network Connection.
• Faster, Better and Capable of future growth.
• Wireless internet access for medical staff and patients.
• Worry Free for disaster recovery.
Patient and medical staff:
• Patients can be seen at any office.
• Patients can be checked in using wireless devices by
medical staff.
• Patient’s information is seamlessly shared within the five
offices.
• Patients can access medical records online with secure
access that meets HIPPA laws, and legal and regulations.
Project Completed Success
13
16. Certification
16
HIPAA
Health Insurance Portability and Accountability Act.
CISSP
Certified Information System Security Professional.
EHR
Electronic Health Records.
PMP
Project Management Professional.
CIE
Cisco Certified Internetwork Routing and Switching Expert.
CompTIA HIT
Computing Technology Industry Association Healthcare
IT Technical.
17. Service Level Agreement
During 18 Months of IT Management Support.
17
A respond phone call will be made
within 1 hour with remote support.
Level 1: Critical Condition
(4 Hours Onsite Response)
All server down, no internet & network activity.
If problem can’t be solved remotely, Onsite service will be in within 4 hours.
Level 2: Major Condition
(12 Hours Onsite Response)
Individual computer broken down or no network connection.
If problem can’t be solved remotely, Onsite service will be in within 12 hours.
Level 3: Minor Condition
(24 Hours Onsite Response)
Individual computer has software missing, slowing or not running.
If problem can’t be solved remotely, Onsite service will be in within 24 hours.
21. 21
Equipment Cost for 5 Offices
EQUIPMENT Amount Price Total
Net Gear C6300 AC1750 Wi-Fi Cable Modem Router 5 $221.99 $1,109.95
Dell Networking N2048 Switch 5 $2,850.93 $14,254.65
Net Gear Wireless-N Router 8-port Gigabit VPN Firewall 5 $189.99 $949.95
Dell Sonicwall NSA 2600 Security Appliance (Firewall) 5 $2,495.00 $12,475.00
Dell PowerEdge FC3600 Server 8 $3,189.00 $25,512.00
Dell PowerVaul NX400 (Backup Storage) 5 $2,779.00 $13,895.00
Dell Multi Function B & W Network Printer 6 $1,174.99 $7,049.94
Dell Multi Function Color Network Printer 5 $349.99 $1,749.95
Smart APC - UPS system for Server 5 $856.99 $4,284.95
Dell 24 Dual Monitor Bundle (Server Room) 5 $599.99 $2,999.95
Logitech Keyboard & Mouse (Server Room) 5 $16.99 $84.95
APC - UPS for Work Station system (PC) 75 $54.99 $4,124.25
SoundPoint Ip 550 desktop phone 75 $249.99 $18,749.25
Dell OptiPlex 3030 All-in-One (Work Station or PC) 75 $2,166.11 $162,458.25
$269,698.04
22. 22
Hardware & Software Cost for 5 Offices
HARDWARE KIT Amount Price Total
Cat6A Cable 5 (1=1000ft) $259.99 $1,299.95
Cat6A Wall Plate 500 $0.99 $495.00
Cat6A Keystone Insert Jack 500 $7.25 $3,625.00
Cat6A Modular plug 10 $34.95 $349.50
48 Port Cat6A Patch Panel 5 $99.99 $499.95
Dell 4220 42U Server Rack 5 $845.00 $4,225.00
Ladder Rack 5 $100.00 $500.00
Horizontal Cable Manager (23") 50 $21.46 $1,073.00
Vertical Cable Manager (35") 50 $56.35 $2,817.50
Basket Cable Tray (6" x 80") 50 $30.00 $1,500.00
Cable Tie (14") 5 $8.89 $44.45
$16,429.35
SOFTWARE Amount Price Total
Windows 7 Pro 75 $0.00 Included in PC
MS Office Home & Business 2013 75 $0.00 Included in PC
McAfee Security 36 Subscription (1year) 75 $0.00 Included in PC
Intuit QuickBooks Essentials 2015 75 $0.00 Included in PC
Venue 11 Pro 5130 Tablet 75 $0.00 Included in PC
Windows Server 2008 Enterprise (25 Clients) 5 $2,799.99 $13,999.95
Lytec Medical 2015 CS (50 User) 1 $18,139.00 $18,139.00
$32,138.95
Editor's Notes
Light Bulb Questions
(Intermediate)
To reproduce the box effects on this slide, do the following:
On the Home tab, in the Slides group, click Layout, and then click Blank.
On the Design tab, in the Themes group, click the arrow next to Colors and then click Oriel.
On the Insert tab, in the Illustrations group click the arrow under Shapes, and then under Rectangles, select rectangle (first row, first option from left).
On the slide, drag to draw a rectangle.
Under Drawing Tools, in the Format tab, in the Size group, click the arrow at the bottom right corner launching the Format Shape dialog box.
In the Format Shape dialog box, select Size in the left pane, under Size and rotate in the right pane set Height to 1.88” and Width to 2”.
Also in the Format Shape dialog box, select Fill in the left pane, and under Fill in the right pane select No Fill.
Also in the Format Shape dialog box, select Line Color in the left pane, under Line Color in the right pane, select Solid Line, and then click the arrow to the right of Color, and under Theme Colors, select Black, Text 1 (first row, second option from left).
Also in the Format Shape dialog box, select Line Style in the left pane, under Line Style in the right pane set Width to 0.25 pt.
Close the Format Shape dialog box.
Select the rectangle. On the Home tab, in the Drawing group, click Arrange, point to Align, and then do the following:
Click Align Left.
Click Align Top.
Select the rectangle. On the Home tab, in the Clipboard group, click the arrow to the right of Copy, and then click Duplicate. Repeat this process three more times for a total of five rectangles.
Select duplicate on right side. On the Home tab, in the Drawing group, click Arrange, point to Align, and then do the following:
Click Align Right.
Click Align Top.
Select all five rectangles. On the Home tab, in the Drawing group, click Arrange, point to Align, and then do the following:
Click Align Top.
Click Distribute Horizontally.
Under Drawing Tools, on the Format tab, in the Arrange group, click the arrow to the right of Group and select Group.
Select the grouped rectangles. On the Home tab, in the Clipboard group, click the arrow to the right of Copy, and then click Duplicate. Repeat this process two more times for a total of four grouped sets.
Select one grouped set. On the Home tab, in the Drawing group, click Arrange, point to Align, and then do the following:
Click Align Center.
Click Align Bottom.
Select all other grouped sets, and also on the Home tab, in the Drawing group, click Arrange, point to Align, do the following:
Click Align Center.
Click Distribute Vertically.
Select all grouped rectangles. Under Drawing Tools, on the Format tab, in the Arrange group, click the arrow to the right of Group and select Ungroup.
To reproduce the video effects on this slide, do the following:
On the Insert tab, in the Media group, click Video, and then click Video from File.
In the left pane of the Insert Video dialog box, click the drive or library that contains the video. In the right pane of the dialog box, click the first video that you want, and then click Insert.
Under Video Tools, on the Format tab, in the Size group, click the arrow at the bottom right corner to launch the Format Video dialog box.
In the Format Video dialog box, select Size in the left pane, under Size and Rotate in the right pane, set Height to 1.88” and Width to 1.99”.
In the Animations tab, in the Animation group, select Play.
Also on the Animations tab, in the Timing group, click the arrow to the right of Start and select With Previous.
On the Home tab, in the Drawing group, click Arrange, point to Align, and then do the following:
Click Align Left.
Click Align Top.
Also on the Home tab, in the Drawing group, click Arrange, under Order Objects, click Send to Back.
On the Insert tab, in the Media group, click Video, and then click Video from File.
In the left pane of the Insert Video dialog box, click the drive or library that contains the video. In the right pane of the dialog box, click the second video that you want and then click Insert.
In the Format Video dialog box, select Size in the left pane, under Size and Rotate in the right pane, and set Height to 1.88” and Width to 1.99”.
In the Animations tab, in the Animation group, select Play.
Also on the Animations tab, in the Timing group, click the arrow to the right of Start and select With Previous.
On the Home tab, in the Drawing group, click Arrange, point to Align, and then click Align Top.
Press and hold CTRL, select second video and second rectangle from top left. On the Home tab, in the Drawing group, click Arrange, point to Align, and then select Align Left or Align Right (depending on which way the video needs to move to match up with rectangle).
Select the second video, on the Home tab, in the Drawing group, click Arrange, under Order Objects, click Send to Back.
On the Insert tab, in the Media group, click Video, and then click Video from File.
In the left pane of the Insert Video dialog box, click the drive or library that contains the video. In the right pane of the dialog box, click the third video that you want and then click Insert.
Under Video Tools on the Format tab, in the Size group, click the arrow at the bottom right corner to launch the Format Video dialog box.
In the Format Video dialog box, select Size in the left pane, under Size and Rotate in the right pane, set the Height to 3.75” and the Width to 4”.
In the Animations tab, in the Animation group, select Play.
Also on the Animations tab, in the Timing group, click the arrow to the right of Start and select With Previous.
On the Home tab, in the Drawing group, click Arrange, point to Align, and then do the following:
Click Align Right.
Click Align Top.
Also on the Home tab, in the Drawing group, click Arrange, under Order Objects, click Send to Back.
On the Insert tab, in the Media group, click Video, and then click Video from file.
In the left pane of the Insert Video dialog box, click the drive or library that contains the video. In the right pane of the dialog box, click the fourth video that you want and then click Insert.
In the Format Video dialog box, select Size in the left pane, under Size and Rotate in the right pane, set the Height to 1.88” and the Width to 1.99”.
In the Animations tab, in the Animation group, select Play.
Also on the Animations tab, in the Timing group, click the arrow to the right of Start and select With Previous.
On the Home tab, in the Drawing group, click Arrange, point to Align, and then click Align Bottom.
Press and hold CTRL, select fourth video and seventeenth rectangle (fourth row, second option from left). On the Home tab, in the Drawing group, click Arrange, point to Align, and then select Align Left or Align Right (depending on which way the video needs to move to match up with rectangle).
Select just the video, on the Home tab, in the Drawing group, click Arrange, under Order Objects, click Send to Back.
On the Insert tab, in the Media group, click Video, and then click Video from file.
In the left pane of the Insert Video dialog box, click the drive or library that contains the video. In the right pane of the dialog box, click the fifth video that you want and then click Insert.
In the Format Video dialog box, select Size in the left pane, under Size and Rotate in the right pane, set the Height to 1.88” and the Width to 1.99”.
In the Animations tab, in the Animation group, select Play.
Also on the Animations tab, in the Timing group, click the arrow to the right of Start and select With Previous.
Press and hold CTRL, select fifth video and thirteenth rectangle (third row, third option from left). On the Home tab, in the Drawing group, click Arrange, point to Align, and then select Align Left or Align Right, and then Align Top or Align Bottom (depending on which way the video needs to move to match up with rectangle).
Select just the video, on the Home tab, in the Drawing group, click Arrange, under Order Objects, click Send to Back.
On the Insert tab, in the Media group, click Video, and then click Video from file.
In the left pane of the Insert Video dialog box, click the drive or library that contains the video. In the right pane of the dialog box, click the sixth video that you want and then click Insert.
In the Format Video dialog box, select Size in the left pane, under Size and Rotate in the right pane, set Height to 1.88” and Width to 1.99”.
Close the Format Video dialog box.
In the Animations tab, in the Animation group, select Play.
Also on the Animations tab, in the Timing group, click the arrow to the right of Start and select With Previous.
On the Home tab, in the Drawing group, click Arrange, point to Align, and then click Align Bottom.
Press and hold CTRL, select sixth video and nineteenth rectangle (fifth row, fourth option from left). On the Home tab, in the Drawing group, click Arrange, point to Align, and then select Align Left or Align Right (depending on which way the video needs to move to match up with rectangle).
Select just the video, on the Home tab, in the Drawing group, click Arrange, under Order Objects, click Send to Back.
To reproduce the text effects on this slide, do the following:
Press and hold CTRL, select rectangles six, seven and eight (second row, first, second and third options from left), then under the Home tab, in the Clipboard group, click the Cut icon.
On the Insert tab, in the Text group, click Text Box, and then on the slide drag to draw your text box in the area you just cut.
Type text, Questions, in the text box, and then select the text. On the Home tab, in the Font group, select Book Antiqua from the Font list, with a Font Size of 88 pt.
Under Drawing Tools, on the Format tab, in the WordArt Styles group, click the arrow at the bottom right to launch the Format Text Effects dialog box.
In the Format Text Effects dialog box, select Text Fill in the left pane, under Text Fill in the right pane select Solid fill, then click the arrow to the right of Color and under Theme Colors, select Light Yellow, Background 2, Darker 75% (fifth row, third option from left).
Also in the Format Text Effects dialog box, select Shadow in the left pane, under Shadow in the right pane, click the arrow to the right of Color and under Theme Colors, select Black, Text 1 (first row, second option from left), and the do the following:
In the Transparency box, enter 35%.
In the Size box, enter 100%.
In the Blur box, enter 6 pt.
In the Angle box, enter 90 degrees.
In the Distance box, enter 4 pt.
Also in the Format Text Effects dialog box, select 3-D Format in the left pane, under 3-D Format in the right pane, click the arrow to the right of Top, under Bevel select Art Deco (third row, fourth option from left), and then do the following:
To the right of Top, in the Width box, enter 2 pt.
To the right of Top, in the Height box, enter 4.4 pt.
Under Contour, click arrow to right of Color and under Theme Colors, select Light Yellow, Background 2, Darker 10% (second row, third option from left), then set Size to 2pt.
Under Surface, click the arrow to the right of Lighting and under Neutral, select Soft (first row, third option from left).
Select text. On the Home tab, in the Paragraph group, select Center Text.
Close the Format Text Effects dialog box.
To reproduce the background effects on this slide, do the following:
On the Design tab, in the bottom right corner of the Background group, click the arrow at the bottom right to launch the Format Background dialog box.
In the Format Background dialog box, select Fill in the left pane, under Fill in the right pane, select Gradient fill, then click the arrow to the right of Type and select Radial.
Still in the Fill pane, under Gradient stops, click Add gradient stop or Remove gradient stop until four stops appear on the slider. Customize the gradient stops as follows:
Select the first stop on the slider, and then do the following:
In the Position box, enter 0%.
Click the button next to Color, and then under Theme Colors select Gold, Accent 4, Lighter 80% (second row, eighth option from the left).
Select the second stop on the slider, and then do the following:
In the Position box, enter 26%.
Click the button next to Color, and then under Theme Colors select Gold, Accent 4, Lighter 60% (second row, eighth option from the left).
Select the third stop on the slider, and then do the following:
In the Position box, enter 59%.
Click the button next to Color, and then under Theme Colors select Gold, Accent 4, Lighter 40% (fourth row, eighth option from the left).
Select the last stop on the slider, and then do the following:
In the Position box, enter 100%.
Click the button next to Color, and then under Theme Colors select Gold, Accent 4, Darker 25% (fifth row, eighth option from the left).
Close the Format Background dialog box.