SlideShare a Scribd company logo
Client side
network setup II.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of Expertise Industry Certifications
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
– Establishing network connections.
– Proxy settings.
– Remote Desktop.
PACE-IT.
Page 4
Client side network setup II.
Page 5
– Dial-up.
» Requires a modem and an ISP that accepts dial-up
connections.
– Set up.
» Select Network and Sharing Center from the Control
Panel.
» Select Set Up a New Connection or Network.
» Enter the information provided by the ISP (e.g., the
number to use, username, and password).
» Either allow or disallow other people to use the
connection.
» Click on the Create button.
Client side network setup II.
Page 6
– Virtual Private Network (VPN).
» Allows for private connection over public networks.
» Creates an encrypted tunnel to the VPN server or
firewall.
– Set up.
» Select Network and Sharing Center from the Control
Panel.
» Select Set up a new connection or network.
» Select Connect to a workplace.
» Click on the Use my Internet connection (VPN) button.
» Enter the IP address of the VPN server.
» Enter the proper username, password, and domain (if
required).
» Click on the Connect button.
» The computer will cycle through all the available
tunneling protocols until the VPN server accepts one.
Client side network setup II.
Page 7
– Wireless.
» Requires the capability (wireless adapter), a compatible
wireless access point (WAP), and an Internet connection.
– Set up.
» Know the service set identifier (SSID) of the wireless
network.
» Know the type of security used (WEP, WPA, WPA2, or
802.X).
» Click Start.
» Select Connect To.
» Select the wireless network you wish to join.
» Select Connect.
» Enter the proper credentials when prompted.
» Click on the OK button.
Client side network setup II.
Page 8
– Wired.
» Requires a network interface card (NIC) and the proper
type of cabling (e.g., Cat5, Cat5e, or Cat6).
» Requires a switch or router, or both.
– Set up.
» In most cases, the set up for a wired network is
automatic, as access to a functioning switch port is
deemed sufficient authorization to use a network.
» Set up for both wired and wireless networks often use
DHCP to configure the proper IP addresses.
Client side network setup II.
Page 9
Client side network setup II.
Page 10
Proxy servers enable a
network to use caching and
filtering on the network.
Caching conserves bandwidth, while filtering
restricts access to Web pages. An added benefit to
using a proxy server is that the end user is hidden
(shielded) from the Internet.
Client side network setup II.
Page 11
– Proxy Settings.
» Most client side proxy settings are established by the
browser.
– Set up.
» Select Internet Options from the Control Panel.
» Click the Connections tab.
» Click the LAN Settings button.
» Check the box for Use a Proxy Server for Your LAN.
» Enter the IP address and port for the proxy server.
» It is possible to bypass the proxy server for local network
traffic.
» Click on the OK button.
Client side network setup II.
Page 12
Client side network setup II.
Page 13
Allowing Remote Desktop
access means you can use
your PC from anywhere you
have Internet access.
Remote Desktop can be a powerful tool in your
arsenal, but it is also a vulnerability. Allowing
Remote Desktop permits outside access to what
should be a secure system.
Client side network setup II.
Page 14
– Remote Desktop.
» Remote settings need to be allowed before Remote
Desktop can be enabled.
» By default Windows Firewall blocks access to the
Remote Desktop feature.
– Set up.
» Select System from the Control Panel.
» Select Remote settings.
» Select the radio button that sets the remote connection
level that is desired.
» Click Apply.
» Select Windows Firewall from the Control Panel.
» Select Allow a program or feature through Windows
Firewall.
» Check the box for Remote Desktop and then check the
box for the types of network profiles allowed, either
Private or Public (not recommended).
» Click the OK button.
Client side network setup II.
Page 15
Client side network setup II.
Dial-up, VPN, wireless, and wired networks all have their own methods of
establishing connections. Wired networks are the easiest, as access to a
working port is usually deemed sufficient authentication.
Topic
Establishing network
connections.
Summary
Proxy servers allow for caching of and restriction to Web pages. On the
client side, the settings are usually established by the Web browser.Proxy settings.
Remote Desktop requires a two-step process. Remote Desktop must be
enabled under the Systems settings and then Windows Firewall must be
configured to allow the remote connection into the system.
Remote Desktop.
Page 16
THANK YOU!
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

More Related Content

What's hot

PACE-IT: Troubleshooting Wireless Networks (part 1)
PACE-IT: Troubleshooting Wireless Networks (part 1)PACE-IT: Troubleshooting Wireless Networks (part 1)
PACE-IT: Troubleshooting Wireless Networks (part 1)
Pace IT at Edmonds Community College
 
Pace it troubleshooting-common_network_issues_bf
Pace it troubleshooting-common_network_issues_bfPace it troubleshooting-common_network_issues_bf
Pace it troubleshooting-common_network_issues_bf
Pace IT at Edmonds Community College
 
PACE-IT: Network Hardening Techniques (part 2)
PACE-IT: Network Hardening Techniques (part 2)PACE-IT: Network Hardening Techniques (part 2)
PACE-IT: Network Hardening Techniques (part 2)
Pace IT at Edmonds Community College
 
PACE-IT: Network Hardening Techniques (part 3)
PACE-IT: Network Hardening Techniques (part 3)PACE-IT: Network Hardening Techniques (part 3)
PACE-IT: Network Hardening Techniques (part 3)
Pace IT at Edmonds Community College
 
Pace IT - Cables and Connections
Pace IT - Cables and ConnectionsPace IT - Cables and Connections
Pace IT - Cables and Connections
Pace IT at Edmonds Community College
 
PACE-IT: Common Network Vulnerabilities
PACE-IT: Common Network VulnerabilitiesPACE-IT: Common Network Vulnerabilities
PACE-IT: Common Network Vulnerabilities
Pace IT at Edmonds Community College
 
PACE-IT: Wireless LAN Infrastructure (part 1)
PACE-IT: Wireless LAN Infrastructure (part 1)PACE-IT: Wireless LAN Infrastructure (part 1)
PACE-IT: Wireless LAN Infrastructure (part 1)
Pace IT at Edmonds Community College
 
PACE-IT: Supporting Configuration Management (part 1)
PACE-IT: Supporting Configuration Management (part 1)PACE-IT: Supporting Configuration Management (part 1)
PACE-IT: Supporting Configuration Management (part 1)
Pace IT at Edmonds Community College
 
PACE-IT: Network Hardening Techniques (part 1)
PACE-IT: Network Hardening Techniques (part 1)PACE-IT: Network Hardening Techniques (part 1)
PACE-IT: Network Hardening Techniques (part 1)
Pace IT at Edmonds Community College
 
Pace IT - Expansion Cards
Pace IT - Expansion CardsPace IT - Expansion Cards
Pace IT - Expansion Cards
Pace IT at Edmonds Community College
 
E brochure it253_networkconnection
E brochure it253_networkconnectionE brochure it253_networkconnection
E brochure it253_networkconnection
I-r Papa
 
Pace IT - Troubleshooting Wireless Networks
Pace IT - Troubleshooting Wireless NetworksPace IT - Troubleshooting Wireless Networks
Pace IT - Troubleshooting Wireless Networks
Pace IT at Edmonds Community College
 
Pace IT - Troubleshooting Networks Wired
Pace IT - Troubleshooting Networks WiredPace IT - Troubleshooting Networks Wired
Pace IT - Troubleshooting Networks Wired
Pace IT at Edmonds Community College
 
Pace IT - Introduction to the Bios
Pace IT - Introduction to the BiosPace IT - Introduction to the Bios
Pace IT - Introduction to the Bios
Pace IT at Edmonds Community College
 
Pace IT - Network Devices (part 2)
Pace IT - Network Devices (part 2)Pace IT - Network Devices (part 2)
Pace IT - Network Devices (part 2)
Pace IT at Edmonds Community College
 
Intranet and extranet
Intranet and extranet Intranet and extranet
Intranet and extranet
Mahmoud Shaqria
 
Resume-kumar
Resume-kumarResume-kumar
Resume-kumar
M Prem
 
Pace IT - Storage Devices (part 2)
Pace IT - Storage Devices (part 2)Pace IT - Storage Devices (part 2)
Pace IT - Storage Devices (part 2)
Pace IT at Edmonds Community College
 
PACE-IT: Operation System Features
PACE-IT: Operation System FeaturesPACE-IT: Operation System Features
PACE-IT: Operation System Features
Pace IT at Edmonds Community College
 

What's hot (19)

PACE-IT: Troubleshooting Wireless Networks (part 1)
PACE-IT: Troubleshooting Wireless Networks (part 1)PACE-IT: Troubleshooting Wireless Networks (part 1)
PACE-IT: Troubleshooting Wireless Networks (part 1)
 
Pace it troubleshooting-common_network_issues_bf
Pace it troubleshooting-common_network_issues_bfPace it troubleshooting-common_network_issues_bf
Pace it troubleshooting-common_network_issues_bf
 
PACE-IT: Network Hardening Techniques (part 2)
PACE-IT: Network Hardening Techniques (part 2)PACE-IT: Network Hardening Techniques (part 2)
PACE-IT: Network Hardening Techniques (part 2)
 
PACE-IT: Network Hardening Techniques (part 3)
PACE-IT: Network Hardening Techniques (part 3)PACE-IT: Network Hardening Techniques (part 3)
PACE-IT: Network Hardening Techniques (part 3)
 
Pace IT - Cables and Connections
Pace IT - Cables and ConnectionsPace IT - Cables and Connections
Pace IT - Cables and Connections
 
PACE-IT: Common Network Vulnerabilities
PACE-IT: Common Network VulnerabilitiesPACE-IT: Common Network Vulnerabilities
PACE-IT: Common Network Vulnerabilities
 
PACE-IT: Wireless LAN Infrastructure (part 1)
PACE-IT: Wireless LAN Infrastructure (part 1)PACE-IT: Wireless LAN Infrastructure (part 1)
PACE-IT: Wireless LAN Infrastructure (part 1)
 
PACE-IT: Supporting Configuration Management (part 1)
PACE-IT: Supporting Configuration Management (part 1)PACE-IT: Supporting Configuration Management (part 1)
PACE-IT: Supporting Configuration Management (part 1)
 
PACE-IT: Network Hardening Techniques (part 1)
PACE-IT: Network Hardening Techniques (part 1)PACE-IT: Network Hardening Techniques (part 1)
PACE-IT: Network Hardening Techniques (part 1)
 
Pace IT - Expansion Cards
Pace IT - Expansion CardsPace IT - Expansion Cards
Pace IT - Expansion Cards
 
E brochure it253_networkconnection
E brochure it253_networkconnectionE brochure it253_networkconnection
E brochure it253_networkconnection
 
Pace IT - Troubleshooting Wireless Networks
Pace IT - Troubleshooting Wireless NetworksPace IT - Troubleshooting Wireless Networks
Pace IT - Troubleshooting Wireless Networks
 
Pace IT - Troubleshooting Networks Wired
Pace IT - Troubleshooting Networks WiredPace IT - Troubleshooting Networks Wired
Pace IT - Troubleshooting Networks Wired
 
Pace IT - Introduction to the Bios
Pace IT - Introduction to the BiosPace IT - Introduction to the Bios
Pace IT - Introduction to the Bios
 
Pace IT - Network Devices (part 2)
Pace IT - Network Devices (part 2)Pace IT - Network Devices (part 2)
Pace IT - Network Devices (part 2)
 
Intranet and extranet
Intranet and extranet Intranet and extranet
Intranet and extranet
 
Resume-kumar
Resume-kumarResume-kumar
Resume-kumar
 
Pace IT - Storage Devices (part 2)
Pace IT - Storage Devices (part 2)Pace IT - Storage Devices (part 2)
Pace IT - Storage Devices (part 2)
 
PACE-IT: Operation System Features
PACE-IT: Operation System FeaturesPACE-IT: Operation System Features
PACE-IT: Operation System Features
 

Viewers also liked

Pace IT - Basic OS Security Settings (Part 1)
Pace IT - Basic OS Security Settings (Part 1)Pace IT - Basic OS Security Settings (Part 1)
Pace IT - Basic OS Security Settings (Part 1)
Pace IT at Edmonds Community College
 
Письменная речь
Письменная речьПисьменная речь
Письменная речь
Feko91
 
Pace IT - Basic OS Security Settings (Part 2)
Pace IT - Basic OS Security Settings (Part 2)Pace IT - Basic OS Security Settings (Part 2)
Pace IT - Basic OS Security Settings (Part 2)
Pace IT at Edmonds Community College
 
Writing task 2
Writing task 2Writing task 2
Writing task 2
Pikids
 
Pace IT - Client Networking (Part 3)
Pace IT - Client Networking (Part 3)Pace IT - Client Networking (Part 3)
Pace IT - Client Networking (Part 3)
Pace IT at Edmonds Community College
 
Cronograma
CronogramaCronograma
Cronograma
Eddy G.
 
ZAO Retailers Presentation 2015
ZAO Retailers Presentation 2015ZAO Retailers Presentation 2015
ZAO Retailers Presentation 2015
Antonio Ruiz-Espaza
 
Substititution example slides
Substititution example slidesSubstititution example slides
Substititution example slides
evanschilling
 
Paul brobson & Reliant Technology - A Perfect Fit
Paul brobson & Reliant Technology - A Perfect FitPaul brobson & Reliant Technology - A Perfect Fit
Paul brobson & Reliant Technology - A Perfect Fit
Paul Brobson
 
Pace IT - Maintenance Procedures Best Practices
Pace IT - Maintenance Procedures Best PracticesPace IT - Maintenance Procedures Best Practices
Pace IT - Maintenance Procedures Best Practices
Pace IT at Edmonds Community College
 
Pace IT - Control Panel (Part 3)
Pace IT - Control Panel (Part 3)Pace IT - Control Panel (Part 3)
Pace IT - Control Panel (Part 3)
Pace IT at Edmonds Community College
 
Pace IT - Command Line Networking
Pace IT - Command Line NetworkingPace IT - Command Line Networking
Pace IT - Command Line Networking
Pace IT at Edmonds Community College
 
The ‘lived now.’ Observing the changes in the spatiotemporal experience of ev...
The ‘lived now.’ Observing the changes in the spatiotemporal experience of ev...The ‘lived now.’ Observing the changes in the spatiotemporal experience of ev...
The ‘lived now.’ Observing the changes in the spatiotemporal experience of ev...
cyborgology
 
Pace IT - Command Line OS (Part 1)
Pace IT - Command Line OS (Part 1)Pace IT - Command Line OS (Part 1)
Pace IT - Command Line OS (Part 1)
Pace IT at Edmonds Community College
 
Pace IT - Command Line OS (Part 2)
Pace IT - Command Line OS (Part 2)Pace IT - Command Line OS (Part 2)
Pace IT - Command Line OS (Part 2)
Pace IT at Edmonds Community College
 
Pace IT - Common Security Threats
Pace IT - Common Security ThreatsPace IT - Common Security Threats
Pace IT - Common Security Threats
Pace IT at Edmonds Community College
 
Pace IT - Install and Configure OS (Part 1)
Pace IT - Install and Configure OS (Part 1)Pace IT - Install and Configure OS (Part 1)
Pace IT - Install and Configure OS (Part 1)
Pace IT at Edmonds Community College
 
Pace IT - Install and Configure OS (Part 2)
Pace IT - Install and Configure OS (Part 2)Pace IT - Install and Configure OS (Part 2)
Pace IT - Install and Configure OS (Part 2)
Pace IT at Edmonds Community College
 
Publicity and Music Management Recommendation for Nicolette Fontaine
Publicity and Music Management Recommendation for Nicolette FontainePublicity and Music Management Recommendation for Nicolette Fontaine
Publicity and Music Management Recommendation for Nicolette Fontaine
Nicolette Fontaine, J.D.
 

Viewers also liked (20)

Pace IT - Basic OS Security Settings (Part 1)
Pace IT - Basic OS Security Settings (Part 1)Pace IT - Basic OS Security Settings (Part 1)
Pace IT - Basic OS Security Settings (Part 1)
 
Письменная речь
Письменная речьПисьменная речь
Письменная речь
 
Pace IT - Basic OS Security Settings (Part 2)
Pace IT - Basic OS Security Settings (Part 2)Pace IT - Basic OS Security Settings (Part 2)
Pace IT - Basic OS Security Settings (Part 2)
 
Writing task 2
Writing task 2Writing task 2
Writing task 2
 
Pace IT - Client Networking (Part 3)
Pace IT - Client Networking (Part 3)Pace IT - Client Networking (Part 3)
Pace IT - Client Networking (Part 3)
 
Cronograma
CronogramaCronograma
Cronograma
 
ZAO Retailers Presentation 2015
ZAO Retailers Presentation 2015ZAO Retailers Presentation 2015
ZAO Retailers Presentation 2015
 
Substititution example slides
Substititution example slidesSubstititution example slides
Substititution example slides
 
Paul brobson & Reliant Technology - A Perfect Fit
Paul brobson & Reliant Technology - A Perfect FitPaul brobson & Reliant Technology - A Perfect Fit
Paul brobson & Reliant Technology - A Perfect Fit
 
Pace IT - Maintenance Procedures Best Practices
Pace IT - Maintenance Procedures Best PracticesPace IT - Maintenance Procedures Best Practices
Pace IT - Maintenance Procedures Best Practices
 
Pace IT - Control Panel (Part 3)
Pace IT - Control Panel (Part 3)Pace IT - Control Panel (Part 3)
Pace IT - Control Panel (Part 3)
 
Pace IT - Command Line Networking
Pace IT - Command Line NetworkingPace IT - Command Line Networking
Pace IT - Command Line Networking
 
The ‘lived now.’ Observing the changes in the spatiotemporal experience of ev...
The ‘lived now.’ Observing the changes in the spatiotemporal experience of ev...The ‘lived now.’ Observing the changes in the spatiotemporal experience of ev...
The ‘lived now.’ Observing the changes in the spatiotemporal experience of ev...
 
Pace IT - Command Line OS (Part 1)
Pace IT - Command Line OS (Part 1)Pace IT - Command Line OS (Part 1)
Pace IT - Command Line OS (Part 1)
 
Pace IT - Command Line OS (Part 2)
Pace IT - Command Line OS (Part 2)Pace IT - Command Line OS (Part 2)
Pace IT - Command Line OS (Part 2)
 
Pace IT - Common Security Threats
Pace IT - Common Security ThreatsPace IT - Common Security Threats
Pace IT - Common Security Threats
 
Pace IT - Install and Configure OS (Part 1)
Pace IT - Install and Configure OS (Part 1)Pace IT - Install and Configure OS (Part 1)
Pace IT - Install and Configure OS (Part 1)
 
Pace IT - Install and Configure OS (Part 2)
Pace IT - Install and Configure OS (Part 2)Pace IT - Install and Configure OS (Part 2)
Pace IT - Install and Configure OS (Part 2)
 
Publicity and Music Management Recommendation for Nicolette Fontaine
Publicity and Music Management Recommendation for Nicolette FontainePublicity and Music Management Recommendation for Nicolette Fontaine
Publicity and Music Management Recommendation for Nicolette Fontaine
 
Pres 1
Pres 1Pres 1
Pres 1
 

Similar to Pace IT - Client Networking (Part 2)

PACE-IT: Implementing a Basic Network - N10 006
PACE-IT: Implementing a Basic Network - N10 006 PACE-IT: Implementing a Basic Network - N10 006
PACE-IT: Implementing a Basic Network - N10 006
Pace IT at Edmonds Community College
 
Pace IT - Setting Up a SOHO Network
Pace IT - Setting Up a SOHO NetworkPace IT - Setting Up a SOHO Network
Pace IT - Setting Up a SOHO Network
Pace IT at Edmonds Community College
 
PACE-IT, Security+1.5: Wireless Security Considerations
PACE-IT, Security+1.5: Wireless Security ConsiderationsPACE-IT, Security+1.5: Wireless Security Considerations
PACE-IT, Security+1.5: Wireless Security Considerations
Pace IT at Edmonds Community College
 
PACE-IT: Networking Services and Applications (part 2) - N10 006
PACE-IT: Networking Services and Applications (part 2) - N10 006PACE-IT: Networking Services and Applications (part 2) - N10 006
PACE-IT: Networking Services and Applications (part 2) - N10 006
Pace IT at Edmonds Community College
 
PACE-IT: Introduction_to Network Devices (part 2) - N10 006
PACE-IT: Introduction_to Network Devices (part 2) - N10 006 PACE-IT: Introduction_to Network Devices (part 2) - N10 006
PACE-IT: Introduction_to Network Devices (part 2) - N10 006
Pace IT at Edmonds Community College
 
Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docx
ikirkton
 
Pace IT - Control Panel (Part 2)
Pace IT - Control Panel (Part 2)Pace IT - Control Panel (Part 2)
Pace IT - Control Panel (Part 2)
Pace IT at Edmonds Community College
 
SEC321___Week_6___Network_Security___Firewalls.pdf.pdf
SEC321___Week_6___Network_Security___Firewalls.pdf.pdfSEC321___Week_6___Network_Security___Firewalls.pdf.pdf
SEC321___Week_6___Network_Security___Firewalls.pdf.pdf
ahmed53254
 
PACE-IT: Common Networking Protocols (part 2)
PACE-IT: Common Networking Protocols (part 2)PACE-IT: Common Networking Protocols (part 2)
PACE-IT: Common Networking Protocols (part 2)
Pace IT at Edmonds Community College
 
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxWWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
ericbrooks84875
 
Pace IT - Basic Mobile Network
Pace IT - Basic Mobile NetworkPace IT - Basic Mobile Network
Pace IT - Basic Mobile Network
Pace IT at Edmonds Community College
 
Setting up a WiFi Network v3
Setting up a WiFi Network v3Setting up a WiFi Network v3
Setting up a WiFi Network v3
Ali Nezhad
 
CNS599_NLEN_InformationSecurity
CNS599_NLEN_InformationSecurityCNS599_NLEN_InformationSecurity
CNS599_NLEN_InformationSecurity
Taishaun Owens
 
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docxAuthentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
rock73
 
Pace IT - Peripheral Devices
Pace IT - Peripheral DevicesPace IT - Peripheral Devices
Pace IT - Peripheral Devices
Pace IT at Edmonds Community College
 
MasterCapstoneV9
MasterCapstoneV9MasterCapstoneV9
MasterCapstoneV9
Tracy Payne
 
CNS599NLEN_RiskAssessment
CNS599NLEN_RiskAssessmentCNS599NLEN_RiskAssessment
CNS599NLEN_RiskAssessment
Taishaun Owens
 
PACE-IT, Security+1.3: Secure Network Design Elements and Components
PACE-IT, Security+1.3: Secure Network Design Elements and ComponentsPACE-IT, Security+1.3: Secure Network Design Elements and Components
PACE-IT, Security+1.3: Secure Network Design Elements and Components
Pace IT at Edmonds Community College
 
Maxis Fibre Internet FTTH Self Help Guide
Maxis Fibre Internet FTTH Self Help GuideMaxis Fibre Internet FTTH Self Help Guide
Maxis Fibre Internet FTTH Self Help Guide
Maxis Fibre
 
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
Pace IT at Edmonds Community College
 

Similar to Pace IT - Client Networking (Part 2) (20)

PACE-IT: Implementing a Basic Network - N10 006
PACE-IT: Implementing a Basic Network - N10 006 PACE-IT: Implementing a Basic Network - N10 006
PACE-IT: Implementing a Basic Network - N10 006
 
Pace IT - Setting Up a SOHO Network
Pace IT - Setting Up a SOHO NetworkPace IT - Setting Up a SOHO Network
Pace IT - Setting Up a SOHO Network
 
PACE-IT, Security+1.5: Wireless Security Considerations
PACE-IT, Security+1.5: Wireless Security ConsiderationsPACE-IT, Security+1.5: Wireless Security Considerations
PACE-IT, Security+1.5: Wireless Security Considerations
 
PACE-IT: Networking Services and Applications (part 2) - N10 006
PACE-IT: Networking Services and Applications (part 2) - N10 006PACE-IT: Networking Services and Applications (part 2) - N10 006
PACE-IT: Networking Services and Applications (part 2) - N10 006
 
PACE-IT: Introduction_to Network Devices (part 2) - N10 006
PACE-IT: Introduction_to Network Devices (part 2) - N10 006 PACE-IT: Introduction_to Network Devices (part 2) - N10 006
PACE-IT: Introduction_to Network Devices (part 2) - N10 006
 
Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docx
 
Pace IT - Control Panel (Part 2)
Pace IT - Control Panel (Part 2)Pace IT - Control Panel (Part 2)
Pace IT - Control Panel (Part 2)
 
SEC321___Week_6___Network_Security___Firewalls.pdf.pdf
SEC321___Week_6___Network_Security___Firewalls.pdf.pdfSEC321___Week_6___Network_Security___Firewalls.pdf.pdf
SEC321___Week_6___Network_Security___Firewalls.pdf.pdf
 
PACE-IT: Common Networking Protocols (part 2)
PACE-IT: Common Networking Protocols (part 2)PACE-IT: Common Networking Protocols (part 2)
PACE-IT: Common Networking Protocols (part 2)
 
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxWWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
 
Pace IT - Basic Mobile Network
Pace IT - Basic Mobile NetworkPace IT - Basic Mobile Network
Pace IT - Basic Mobile Network
 
Setting up a WiFi Network v3
Setting up a WiFi Network v3Setting up a WiFi Network v3
Setting up a WiFi Network v3
 
CNS599_NLEN_InformationSecurity
CNS599_NLEN_InformationSecurityCNS599_NLEN_InformationSecurity
CNS599_NLEN_InformationSecurity
 
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docxAuthentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
 
Pace IT - Peripheral Devices
Pace IT - Peripheral DevicesPace IT - Peripheral Devices
Pace IT - Peripheral Devices
 
MasterCapstoneV9
MasterCapstoneV9MasterCapstoneV9
MasterCapstoneV9
 
CNS599NLEN_RiskAssessment
CNS599NLEN_RiskAssessmentCNS599NLEN_RiskAssessment
CNS599NLEN_RiskAssessment
 
PACE-IT, Security+1.3: Secure Network Design Elements and Components
PACE-IT, Security+1.3: Secure Network Design Elements and ComponentsPACE-IT, Security+1.3: Secure Network Design Elements and Components
PACE-IT, Security+1.3: Secure Network Design Elements and Components
 
Maxis Fibre Internet FTTH Self Help Guide
Maxis Fibre Internet FTTH Self Help GuideMaxis Fibre Internet FTTH Self Help Guide
Maxis Fibre Internet FTTH Self Help Guide
 
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
 

More from Pace IT at Edmonds Community College

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account ManagementPACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account Management
Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication ServicesPACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication Services
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data SecurityPACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment ToolsPACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment Tools
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement TechniquesPACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement Techniques
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
Pace IT at Edmonds Community College
 

More from Pace IT at Edmonds Community College (20)

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
 
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account ManagementPACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account Management
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
 
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication ServicesPACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication Services
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
 
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data SecurityPACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment ToolsPACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment Tools
 
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement TechniquesPACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement Techniques
 
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
 
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
 

Recently uploaded

Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 

Recently uploaded (20)

Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 

Pace IT - Client Networking (Part 2)

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of Expertise Industry Certifications  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 – Establishing network connections. – Proxy settings. – Remote Desktop. PACE-IT.
  • 4. Page 4 Client side network setup II.
  • 5. Page 5 – Dial-up. » Requires a modem and an ISP that accepts dial-up connections. – Set up. » Select Network and Sharing Center from the Control Panel. » Select Set Up a New Connection or Network. » Enter the information provided by the ISP (e.g., the number to use, username, and password). » Either allow or disallow other people to use the connection. » Click on the Create button. Client side network setup II.
  • 6. Page 6 – Virtual Private Network (VPN). » Allows for private connection over public networks. » Creates an encrypted tunnel to the VPN server or firewall. – Set up. » Select Network and Sharing Center from the Control Panel. » Select Set up a new connection or network. » Select Connect to a workplace. » Click on the Use my Internet connection (VPN) button. » Enter the IP address of the VPN server. » Enter the proper username, password, and domain (if required). » Click on the Connect button. » The computer will cycle through all the available tunneling protocols until the VPN server accepts one. Client side network setup II.
  • 7. Page 7 – Wireless. » Requires the capability (wireless adapter), a compatible wireless access point (WAP), and an Internet connection. – Set up. » Know the service set identifier (SSID) of the wireless network. » Know the type of security used (WEP, WPA, WPA2, or 802.X). » Click Start. » Select Connect To. » Select the wireless network you wish to join. » Select Connect. » Enter the proper credentials when prompted. » Click on the OK button. Client side network setup II.
  • 8. Page 8 – Wired. » Requires a network interface card (NIC) and the proper type of cabling (e.g., Cat5, Cat5e, or Cat6). » Requires a switch or router, or both. – Set up. » In most cases, the set up for a wired network is automatic, as access to a functioning switch port is deemed sufficient authorization to use a network. » Set up for both wired and wireless networks often use DHCP to configure the proper IP addresses. Client side network setup II.
  • 9. Page 9 Client side network setup II.
  • 10. Page 10 Proxy servers enable a network to use caching and filtering on the network. Caching conserves bandwidth, while filtering restricts access to Web pages. An added benefit to using a proxy server is that the end user is hidden (shielded) from the Internet. Client side network setup II.
  • 11. Page 11 – Proxy Settings. » Most client side proxy settings are established by the browser. – Set up. » Select Internet Options from the Control Panel. » Click the Connections tab. » Click the LAN Settings button. » Check the box for Use a Proxy Server for Your LAN. » Enter the IP address and port for the proxy server. » It is possible to bypass the proxy server for local network traffic. » Click on the OK button. Client side network setup II.
  • 12. Page 12 Client side network setup II.
  • 13. Page 13 Allowing Remote Desktop access means you can use your PC from anywhere you have Internet access. Remote Desktop can be a powerful tool in your arsenal, but it is also a vulnerability. Allowing Remote Desktop permits outside access to what should be a secure system. Client side network setup II.
  • 14. Page 14 – Remote Desktop. » Remote settings need to be allowed before Remote Desktop can be enabled. » By default Windows Firewall blocks access to the Remote Desktop feature. – Set up. » Select System from the Control Panel. » Select Remote settings. » Select the radio button that sets the remote connection level that is desired. » Click Apply. » Select Windows Firewall from the Control Panel. » Select Allow a program or feature through Windows Firewall. » Check the box for Remote Desktop and then check the box for the types of network profiles allowed, either Private or Public (not recommended). » Click the OK button. Client side network setup II.
  • 15. Page 15 Client side network setup II. Dial-up, VPN, wireless, and wired networks all have their own methods of establishing connections. Wired networks are the easiest, as access to a working port is usually deemed sufficient authentication. Topic Establishing network connections. Summary Proxy servers allow for caching of and restriction to Web pages. On the client side, the settings are usually established by the Web browser.Proxy settings. Remote Desktop requires a two-step process. Remote Desktop must be enabled under the Systems settings and then Windows Firewall must be configured to allow the remote connection into the system. Remote Desktop.
  • 17. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.