SlideShare a Scribd company logo
SYSTEM ADMINISTRATION
PRESENTED BY:
ADEEL KHURRAM
Definitions.
1. Being the consultant for Computer Problems b
eyond the knowledge ofTechnical Support sta
ff.
2. It is a job that require to maintain and operate
a computer system and/or network.
3. Activities performed by a system administrator
such as monitoring security configuration,
managing allocation of user names and
passwords, monitoring disk space and other
resource use, performing backups, and setting
up new hardware and software.
Duties Of SA!
1. • Performing routine audit of system and software
2. • Performing backup
3. • Applying operating system updates, patches, and
configuration changes
4. • Installing and configuring new hardware and software
5. • Adding, removing, or updating user account
information, resetting password. • Answering technical
queries.
Duties Of SA!
1. * Responsibility for security
2. * Responsibility for documentation the configuration of the system
3. *Troubleshooting any reported problems
4. * System performance tuning * Insuring that the network
infrastructure is up and running.
5. • Performing routine audit of system and software
6. • Performing backup
7. • Applying operating system updates, patches, and configuration
changes
8. • Installing and configuring new hardware and software
9. • Adding, removing, or updating user account information, resetting
password.
10. • Answering technical queries
ThankX.

More Related Content

What's hot

introduction to system administration
introduction to system administrationintroduction to system administration
introduction to system administration
gamme123
 
Landis - System Administration
Landis - System AdministrationLandis - System Administration
Landis - System Administration
ckuyehar
 
Section01 overview (1)
Section01 overview (1)Section01 overview (1)
Section01 overview (1)
Vimarsh Padha
 
Section01 overview
Section01 overviewSection01 overview
Section01 overview
Vimarsh Padha
 
5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems
MEN Mikro Elektronik GmbH
 
Procedural Controls
Procedural ControlsProcedural Controls
Procedural Controls
Dr. Rosemarie Sibbaluca-Guirre
 
Security and Control Issues in information Systems
Security and Control Issues in information SystemsSecurity and Control Issues in information Systems
Security and Control Issues in information Systems
Dr. Rosemarie Sibbaluca-Guirre
 
Security issues in os
Security issues in osSecurity issues in os
Security issues in os
DevAdnani
 
Introduction to real time software systems script
Introduction to real time software systems scriptIntroduction to real time software systems script
Introduction to real time software systems script
sommerville-videos
 
System Administration: Introduction to system administration
System Administration: Introduction to system administrationSystem Administration: Introduction to system administration
System Administration: Introduction to system administration
Khang-Ling Loh
 
Software engineering critical systems
Software engineering   critical systemsSoftware engineering   critical systems
Software engineering critical systems
Dr. Loganathan R
 
ME Information Security
ME Information SecurityME Information Security
ME Information Security
Mohamed Monsef
 
Introduction to Computer Programming
 Introduction to  Computer Programming  Introduction to  Computer Programming
Introduction to Computer Programming
Dr. Rosemarie Sibbaluca-Guirre
 
5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems
Angela Hauber
 
General computer - Software and hardware
General computer - Software and hardwareGeneral computer - Software and hardware
General computer - Software and hardware
Dr. I. Uma Maheswari Maheswari
 
Security
SecuritySecurity
Security
Pooja Talreja
 
Operating system security
Operating system securityOperating system security
Operating system security
Ramesh Ogania
 
Hipaa checklist - information security
Hipaa checklist - information securityHipaa checklist - information security
Hipaa checklist - information security
Vijay Sekar
 
Operating System
Operating SystemOperating System
Operating System
Sandeep Ghosh
 
Auditing information System
Auditing information SystemAuditing information System
Auditing information System
Dr. Rosemarie Sibbaluca-Guirre
 

What's hot (20)

introduction to system administration
introduction to system administrationintroduction to system administration
introduction to system administration
 
Landis - System Administration
Landis - System AdministrationLandis - System Administration
Landis - System Administration
 
Section01 overview (1)
Section01 overview (1)Section01 overview (1)
Section01 overview (1)
 
Section01 overview
Section01 overviewSection01 overview
Section01 overview
 
5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems
 
Procedural Controls
Procedural ControlsProcedural Controls
Procedural Controls
 
Security and Control Issues in information Systems
Security and Control Issues in information SystemsSecurity and Control Issues in information Systems
Security and Control Issues in information Systems
 
Security issues in os
Security issues in osSecurity issues in os
Security issues in os
 
Introduction to real time software systems script
Introduction to real time software systems scriptIntroduction to real time software systems script
Introduction to real time software systems script
 
System Administration: Introduction to system administration
System Administration: Introduction to system administrationSystem Administration: Introduction to system administration
System Administration: Introduction to system administration
 
Software engineering critical systems
Software engineering   critical systemsSoftware engineering   critical systems
Software engineering critical systems
 
ME Information Security
ME Information SecurityME Information Security
ME Information Security
 
Introduction to Computer Programming
 Introduction to  Computer Programming  Introduction to  Computer Programming
Introduction to Computer Programming
 
5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems
 
General computer - Software and hardware
General computer - Software and hardwareGeneral computer - Software and hardware
General computer - Software and hardware
 
Security
SecuritySecurity
Security
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Hipaa checklist - information security
Hipaa checklist - information securityHipaa checklist - information security
Hipaa checklist - information security
 
Operating System
Operating SystemOperating System
Operating System
 
Auditing information System
Auditing information SystemAuditing information System
Auditing information System
 

Viewers also liked

Building Homes, Communities, and Hope UWBC 1
Building Homes, Communities, and Hope UWBC 1Building Homes, Communities, and Hope UWBC 1
Building Homes, Communities, and Hope UWBC 1
Jadwega Handorf
 
DBMS & DP Seatwork
DBMS & DP SeatworkDBMS & DP Seatwork
DBMS & DP Seatwork
Mavict Obar
 
Rashad professional cv (3)
Rashad professional cv  (3)Rashad professional cv  (3)
Rashad professional cv (3)
Rashad Elmulla
 
Дизайн как он есть
Дизайн  как он естьДизайн  как он есть
Дизайн как он есть
bntulibrary
 
Carrefour certificate
Carrefour certificateCarrefour certificate
Carrefour certificate
Lubna Nser
 
Современный подход к организации отдела консультационных продаж
Современный подход к организации отдела консультационных продажСовременный подход к организации отдела консультационных продаж
Современный подход к организации отдела консультационных продаж
UltraUnion
 
Chinese Tea Culture By Kusiima Patric
Chinese Tea Culture By Kusiima PatricChinese Tea Culture By Kusiima Patric
Chinese Tea Culture By Kusiima Patric
kusrick29
 
Thistle DevOps Solutions Offerings
Thistle DevOps Solutions OfferingsThistle DevOps Solutions Offerings
Thistle DevOps Solutions Offerings
Tracy Peck
 
3tier
3tier3tier
3tier
hydeumb
 
3 Tier Animation
3 Tier Animation3 Tier Animation
3 Tier Animation
Chris Jobling
 
Linux Training Workshop
Linux Training WorkshopLinux Training Workshop
Linux Training Workshop
Meraj Khattak
 
Linux Administration
Linux AdministrationLinux Administration
Linux Administration
SiliconExpert Technologies
 
Teaching System Administration
Teaching System AdministrationTeaching System Administration
Teaching System Administration
guesta7a59e
 
Ch02 system administration
Ch02 system administration Ch02 system administration
Ch02 system administration
Raja Waseem Akhtar
 
Linux lecture6
Linux lecture6Linux lecture6
Linux lecture6
Haider Adnan
 
ONTAP : System Administration Guide NetApp, Inc.
ONTAP : System Administration Guide NetApp, Inc.ONTAP : System Administration Guide NetApp, Inc.
ONTAP : System Administration Guide NetApp, Inc.
Kumaran Balachandran
 
Internet dan ISP
Internet dan ISPInternet dan ISP
Internet dan ISProsmida
 
Linux system administration - part-2
Linux system administration - part-2Linux system administration - part-2
Linux system administration - part-2
M.M.Rahman Munna, Linux, VMware and Mail Server Expert
 

Viewers also liked (18)

Building Homes, Communities, and Hope UWBC 1
Building Homes, Communities, and Hope UWBC 1Building Homes, Communities, and Hope UWBC 1
Building Homes, Communities, and Hope UWBC 1
 
DBMS & DP Seatwork
DBMS & DP SeatworkDBMS & DP Seatwork
DBMS & DP Seatwork
 
Rashad professional cv (3)
Rashad professional cv  (3)Rashad professional cv  (3)
Rashad professional cv (3)
 
Дизайн как он есть
Дизайн  как он естьДизайн  как он есть
Дизайн как он есть
 
Carrefour certificate
Carrefour certificateCarrefour certificate
Carrefour certificate
 
Современный подход к организации отдела консультационных продаж
Современный подход к организации отдела консультационных продажСовременный подход к организации отдела консультационных продаж
Современный подход к организации отдела консультационных продаж
 
Chinese Tea Culture By Kusiima Patric
Chinese Tea Culture By Kusiima PatricChinese Tea Culture By Kusiima Patric
Chinese Tea Culture By Kusiima Patric
 
Thistle DevOps Solutions Offerings
Thistle DevOps Solutions OfferingsThistle DevOps Solutions Offerings
Thistle DevOps Solutions Offerings
 
3tier
3tier3tier
3tier
 
3 Tier Animation
3 Tier Animation3 Tier Animation
3 Tier Animation
 
Linux Training Workshop
Linux Training WorkshopLinux Training Workshop
Linux Training Workshop
 
Linux Administration
Linux AdministrationLinux Administration
Linux Administration
 
Teaching System Administration
Teaching System AdministrationTeaching System Administration
Teaching System Administration
 
Ch02 system administration
Ch02 system administration Ch02 system administration
Ch02 system administration
 
Linux lecture6
Linux lecture6Linux lecture6
Linux lecture6
 
ONTAP : System Administration Guide NetApp, Inc.
ONTAP : System Administration Guide NetApp, Inc.ONTAP : System Administration Guide NetApp, Inc.
ONTAP : System Administration Guide NetApp, Inc.
 
Internet dan ISP
Internet dan ISPInternet dan ISP
Internet dan ISP
 
Linux system administration - part-2
Linux system administration - part-2Linux system administration - part-2
Linux system administration - part-2
 

Similar to System administration(adeel khorram)

CH12-CompSec4e.pptx
CH12-CompSec4e.pptxCH12-CompSec4e.pptx
CH12-CompSec4e.pptx
ams1ams11
 
CISA_WK_4.pptx
CISA_WK_4.pptxCISA_WK_4.pptx
CISA_WK_4.pptx
dotco
 
Ite v5.0 chapter4
Ite v5.0 chapter4Ite v5.0 chapter4
Ite v5.0 chapter4
Kazi Rafsun Shaanto
 
Resume_Kunal Sakpal
Resume_Kunal SakpalResume_Kunal Sakpal
Resume_Kunal Sakpal
kunal sakpal
 
A075434624
A075434624A075434624
A075434624
Dharmendra Kumar
 
gautam_resume
gautam_resumegautam_resume
gautam_resume
Ajay Gautam
 
ITE v5.0 - Chapter 4
ITE v5.0 - Chapter 4ITE v5.0 - Chapter 4
ITE v5.0 - Chapter 4
Irsandi Hasan
 
Aud5_Chapter-26.pptx
Aud5_Chapter-26.pptxAud5_Chapter-26.pptx
Aud5_Chapter-26.pptx
JayLloyd8
 
Resume
ResumeResume
Resume
Ravi C L
 
Knowedge Skills Ability
Knowedge Skills AbilityKnowedge Skills Ability
Knowedge Skills Ability
Joseph Lynn
 
Kempu
KempuKempu
Microsoft Offical Course 20410C_12
Microsoft Offical Course 20410C_12Microsoft Offical Course 20410C_12
Microsoft Offical Course 20410C_12
gameaxt
 
The Dark Side of Powerful Users
The Dark Side of Powerful UsersThe Dark Side of Powerful Users
The Dark Side of Powerful Users
HelpSystems
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
Seth Nurul
 
mary_jhun_macayana
mary_jhun_macayanamary_jhun_macayana
mary_jhun_macayana
Mary Jhun Macayana
 
PENTRATION TESTING Linux Escalation.ppt
PENTRATION TESTING Linux  Escalation.pptPENTRATION TESTING Linux  Escalation.ppt
PENTRATION TESTING Linux Escalation.ppt
jospinjj
 
Moamen CV
Moamen CVMoamen CV
Moamen CV
moamen mohamed
 
10 tips for hardening your system
10 tips for hardening your system10 tips for hardening your system
10 tips for hardening your system
Revital Lapidot
 
10 tips for hardening your system
10 tips for hardening your system10 tips for hardening your system
10 tips for hardening your system
Revital Lapidot
 
CISA Training - Chapter 5 - 2016
CISA Training - Chapter 5 - 2016CISA Training - Chapter 5 - 2016
CISA Training - Chapter 5 - 2016
Hafiz Sheikh Adnan Ahmed
 

Similar to System administration(adeel khorram) (20)

CH12-CompSec4e.pptx
CH12-CompSec4e.pptxCH12-CompSec4e.pptx
CH12-CompSec4e.pptx
 
CISA_WK_4.pptx
CISA_WK_4.pptxCISA_WK_4.pptx
CISA_WK_4.pptx
 
Ite v5.0 chapter4
Ite v5.0 chapter4Ite v5.0 chapter4
Ite v5.0 chapter4
 
Resume_Kunal Sakpal
Resume_Kunal SakpalResume_Kunal Sakpal
Resume_Kunal Sakpal
 
A075434624
A075434624A075434624
A075434624
 
gautam_resume
gautam_resumegautam_resume
gautam_resume
 
ITE v5.0 - Chapter 4
ITE v5.0 - Chapter 4ITE v5.0 - Chapter 4
ITE v5.0 - Chapter 4
 
Aud5_Chapter-26.pptx
Aud5_Chapter-26.pptxAud5_Chapter-26.pptx
Aud5_Chapter-26.pptx
 
Resume
ResumeResume
Resume
 
Knowedge Skills Ability
Knowedge Skills AbilityKnowedge Skills Ability
Knowedge Skills Ability
 
Kempu
KempuKempu
Kempu
 
Microsoft Offical Course 20410C_12
Microsoft Offical Course 20410C_12Microsoft Offical Course 20410C_12
Microsoft Offical Course 20410C_12
 
The Dark Side of Powerful Users
The Dark Side of Powerful UsersThe Dark Side of Powerful Users
The Dark Side of Powerful Users
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
mary_jhun_macayana
mary_jhun_macayanamary_jhun_macayana
mary_jhun_macayana
 
PENTRATION TESTING Linux Escalation.ppt
PENTRATION TESTING Linux  Escalation.pptPENTRATION TESTING Linux  Escalation.ppt
PENTRATION TESTING Linux Escalation.ppt
 
Moamen CV
Moamen CVMoamen CV
Moamen CV
 
10 tips for hardening your system
10 tips for hardening your system10 tips for hardening your system
10 tips for hardening your system
 
10 tips for hardening your system
10 tips for hardening your system10 tips for hardening your system
10 tips for hardening your system
 
CISA Training - Chapter 5 - 2016
CISA Training - Chapter 5 - 2016CISA Training - Chapter 5 - 2016
CISA Training - Chapter 5 - 2016
 

Recently uploaded

Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
marufrahmanstratejm
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
SAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloudSAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloud
maazsz111
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 

Recently uploaded (20)

Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
SAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloudSAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloud
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 

System administration(adeel khorram)

  • 2. Definitions. 1. Being the consultant for Computer Problems b eyond the knowledge ofTechnical Support sta ff. 2. It is a job that require to maintain and operate a computer system and/or network. 3. Activities performed by a system administrator such as monitoring security configuration, managing allocation of user names and passwords, monitoring disk space and other resource use, performing backups, and setting up new hardware and software.
  • 3. Duties Of SA! 1. • Performing routine audit of system and software 2. • Performing backup 3. • Applying operating system updates, patches, and configuration changes 4. • Installing and configuring new hardware and software 5. • Adding, removing, or updating user account information, resetting password. • Answering technical queries.
  • 4. Duties Of SA! 1. * Responsibility for security 2. * Responsibility for documentation the configuration of the system 3. *Troubleshooting any reported problems 4. * System performance tuning * Insuring that the network infrastructure is up and running. 5. • Performing routine audit of system and software 6. • Performing backup 7. • Applying operating system updates, patches, and configuration changes 8. • Installing and configuring new hardware and software 9. • Adding, removing, or updating user account information, resetting password. 10. • Answering technical queries