SlideShare uma empresa Scribd logo
1 de 22
Configure Network
Services
By. ROBERT V. DANGLE
Opening Prayer
Checking of Attendance
Reading Definition of Terms
Network Services
 The term network services is used to describe a wide range of software and
connectivity tools that are managed by a central group and distributed to the
networked computers. A networked computer environment occurs when
multiple computers are connected to each other or a central server. The
computers are able to access shared files and utilities from a central location.
There are several advantages to this type of environment, ranging from
increased quality control to performance and issue management.
 Network Services include IP addressing, Domain Name System (DNS), primary
domain email service, Internet access, web content filtering, security
products such as firewalls, VPN termination and intrusion prevention systems
(IPS), and the necessary tools and staff to support these services.
What are the different Network
services?
 IP Addressing
 Domain Name System(DNS)
 Primary Domain Email Service
 Internet Access
 Web Content Filtering
 Security Products Such as Firewalls, Anti Virus Software
 VPN termination and intrusion prevention systems (IPS)
 Necessary tools and staff to support these services
IP Address/Internet Protocol Address
 IP address stands for internet protocol address; it is an identifying number
that is associated with a specific computer or computer network. When
connected to the internet, the IP address allows the computers to send and
receive information.
Domain Name System(DNS)
Domain Name System(DNS)
 is a hierarchical and distributed naming system for computers, services, and other
resources in the Internet or other Internet Protocol (IP) networks. It associates various
information with domain names assigned to each of the associated entities. Most
prominently, it translates readily memorized domain names to the numerical IP
addresses needed for locating and identifying computer services and devices with the
underlying network protocols.[1] The Domain Name System has been an essential
component of the functionality of the Internet since 1985.
 In the world of networking, computers do not represent by names like humans do, they
represent by numbers because that is how computers and other similar devices talk and
identify with each other over a network, which is by using numbers such as IP addresses.
 Humans on the other hand are accustomed to using names instead of numbers, whether is
talking directly to another person or identifying a country, place, or things, humans identify
with names instead of numbers. So in order to bridge the communication gap between
computers and humans and make the communication of a lot easier networking engineers
developed DNS.
 DNS resolves names to numbers, to be more specific it resolves domain names to IP
addresses. So if you type in a web address in your web browser, DNS will resolve the name
to a number because the only thing computers know are numbers.
Primary Domain Email Services
 An email domain is the part of an email address that comes after the @
symbol. For personal emails, it is most often gmail.com, outlook.com or
yahoo.com.
Internet access
Internet access
 Internet access is the process of connecting to the internet using personal
computers, laptops or mobile devices by users or enterprises. Internet access
is subject to data signalling rates and users could be connected at different
internet speeds. Internet access enables individuals or organizations to avail
internet services/web-based services.
 Internet access is often provided at home, schools, workplaces, public places,
internet cafes, libraries and other locations. The internet began to gain
popularity with dial-up internet access. In a relatively short time, internet
access technologies changed, providing faster and more reliable options.
Currently, broadband technologies such as cable internet and ADSL are the
most widely used methods for internet access. The speed, cost, reliability and
availability of internet access depends on the region, internet service
provider and type of connection.
 Internet access is the ability of individuals and organizations to connect to the
Internet using computer terminals, computers, and other devices; and to
access services such as email and the World
Web Content Filtering
Web Content Filtering
 Web content filtering is a technicque that blocks and screens access to
inappropriate or unsafe web content. Uses include a company keeping
employees from visiting known spam sites or school systems restricting
students from adult content.
 Web content filtering is the practice of blocking access to web content that
may be deemed offensive, inappropriate, or even dangerous.
Security Products Such as Firewalls, Anti Virus
Software
Security Products Such as Firewalls, Anti Virus
Software
 A firewall is a security network designed to protect computer systems and
networks from malicious attacks. Antivirus is is a software utility program
designed to protect a system from internal attacks from viruses, trojan horse,
spyware etc.
 A firewall is a security network that can be either hardware or software,
or both, and is meant to protect computer systems and networks from
harmful intrusions ..
VPN termination and intrusion prevention
systems (IPS)
VPN termination and intrusion prevention
systems (IPS)
 is the network security technology that constantly monitors network traffic to
identify threats. Under the general meaning of IPS, IPS technology is also an
intrusion detection prevention system (IDPS).
 includes anti-virus/anti-malware software, firewall, anti-spoofing software,
and network traffic monitoring. Enterprises use IPS to document threats,
uncover problems with security policies, and block external or insider security
violations.
 is typically deployed “in-line” where they sit in the direct communication
path between the source and the destination, where it can analyze in real-
time all the network traffic flow along that path and take automated
preventive action.
Necessary tools and staff to support these
services
Necessary tools and staff to support these
services
 A computer networking tool is any type that assists in the creation,
maintenance, or distribution of a wireless network. Also, computer
networking tools aid in a website’s creation, maintenance, advertising,
security, and modification.
 They are responsible for the maintenance of local area networks, especially
in situations that involve dozens or hundreds of computers within the same
network.
 Computer networking tools are used for both domestic and commercial
purposes and are available on sale or for free. Every software listed in this
article is a free computer networking tool that anyone can use for any
purpose.
 Network DOS Commands like IPCONFIG, PING, DCPROMO….
Question and Answer
 What is an IP Address?
 What is the difference between Static and Dynamic IP address?
 What is IPCONFIG command?
 What is DNS?
 What is a wireless network?
 What is a Default Gateway?
 What should be the preferred DNS of the Client Computer?
 What should be the preferred DNS of the Server Computer?
 How to configure the server computer?
Application
 The class will be divided into 6 groups with a maximum of 3 members per
group. The learners will be given a chance to setup and configure a
client/server network considering the necessary Network Services, Tools and
applications.

Mais conteúdo relacionado

Semelhante a Configure Network Services.pptx

Networking and Data Management
Networking and Data ManagementNetworking and Data Management
Networking and Data ManagementArmanArafatAnik
 
Foundation Course: Information Technology UNIT 4
Foundation Course: Information Technology UNIT 4Foundation Course: Information Technology UNIT 4
Foundation Course: Information Technology UNIT 4University of Delhi
 
Running head NETWORK DESIGNNETWORK DESIGN6Netwo.docx
Running head NETWORK DESIGNNETWORK DESIGN6Netwo.docxRunning head NETWORK DESIGNNETWORK DESIGN6Netwo.docx
Running head NETWORK DESIGNNETWORK DESIGN6Netwo.docxcharisellington63520
 
Week 6 - Networking and the Internet.pptx
Week 6 - Networking and the Internet.pptxWeek 6 - Networking and the Internet.pptx
Week 6 - Networking and the Internet.pptxKwadjoOwusuAnsahQuar
 
Types of Networks Week7 Part4-IS RevisionSu2013 .docx
Types of Networks  Week7 Part4-IS RevisionSu2013 .docxTypes of Networks  Week7 Part4-IS RevisionSu2013 .docx
Types of Networks Week7 Part4-IS RevisionSu2013 .docxwillcoxjanay
 
КЛМ_Урок 1
КЛМ_Урок 1КЛМ_Урок 1
КЛМ_Урок 1RaynaITSTEP
 
Introduction to Internets and Intranets.ppt
Introduction to Internets and Intranets.pptIntroduction to Internets and Intranets.ppt
Introduction to Internets and Intranets.pptJOHN BABATUNDE LEE
 
Network Internet Presentation Downing
Network Internet Presentation DowningNetwork Internet Presentation Downing
Network Internet Presentation DowningIWCS
 
Networks and the Internet
Networks and the InternetNetworks and the Internet
Networks and the InternetKristy
 
DevOps Project Training | DevOps Training in Ameerpet.pdf
 DevOps Project Training  |  DevOps Training in Ameerpet.pdf DevOps Project Training  |  DevOps Training in Ameerpet.pdf
DevOps Project Training | DevOps Training in Ameerpet.pdfTalluriRenuka
 

Semelhante a Configure Network Services.pptx (20)

Networking and Data Management
Networking and Data ManagementNetworking and Data Management
Networking and Data Management
 
Foundation Course: Information Technology UNIT 4
Foundation Course: Information Technology UNIT 4Foundation Course: Information Technology UNIT 4
Foundation Course: Information Technology UNIT 4
 
Report on intranet
Report on intranetReport on intranet
Report on intranet
 
Running head NETWORK DESIGNNETWORK DESIGN6Netwo.docx
Running head NETWORK DESIGNNETWORK DESIGN6Netwo.docxRunning head NETWORK DESIGNNETWORK DESIGN6Netwo.docx
Running head NETWORK DESIGNNETWORK DESIGN6Netwo.docx
 
Networking.docx
Networking.docxNetworking.docx
Networking.docx
 
Week 6 - Networking and the Internet.pptx
Week 6 - Networking and the Internet.pptxWeek 6 - Networking and the Internet.pptx
Week 6 - Networking and the Internet.pptx
 
Info scince pp
Info scince ppInfo scince pp
Info scince pp
 
Types of Networks Week7 Part4-IS RevisionSu2013 .docx
Types of Networks  Week7 Part4-IS RevisionSu2013 .docxTypes of Networks  Week7 Part4-IS RevisionSu2013 .docx
Types of Networks Week7 Part4-IS RevisionSu2013 .docx
 
Internet
InternetInternet
Internet
 
КЛМ_Урок 1
КЛМ_Урок 1КЛМ_Урок 1
КЛМ_Урок 1
 
Introduction to Internets and Intranets.ppt
Introduction to Internets and Intranets.pptIntroduction to Internets and Intranets.ppt
Introduction to Internets and Intranets.ppt
 
PROJECT REPORT.docx
PROJECT REPORT.docxPROJECT REPORT.docx
PROJECT REPORT.docx
 
Bryanpulido
BryanpulidoBryanpulido
Bryanpulido
 
Network Internet Presentation Downing
Network Internet Presentation DowningNetwork Internet Presentation Downing
Network Internet Presentation Downing
 
Network security
Network security Network security
Network security
 
Firewall & DMZ.pptx
Firewall & DMZ.pptxFirewall & DMZ.pptx
Firewall & DMZ.pptx
 
Firewall
FirewallFirewall
Firewall
 
Networks and the Internet
Networks and the InternetNetworks and the Internet
Networks and the Internet
 
DevOps Project Training | DevOps Training in Ameerpet.pdf
 DevOps Project Training  |  DevOps Training in Ameerpet.pdf DevOps Project Training  |  DevOps Training in Ameerpet.pdf
DevOps Project Training | DevOps Training in Ameerpet.pdf
 
Computer Networks
Computer Networks Computer Networks
Computer Networks
 

Último

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 

Último (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 

Configure Network Services.pptx

  • 5. Network Services  The term network services is used to describe a wide range of software and connectivity tools that are managed by a central group and distributed to the networked computers. A networked computer environment occurs when multiple computers are connected to each other or a central server. The computers are able to access shared files and utilities from a central location. There are several advantages to this type of environment, ranging from increased quality control to performance and issue management.  Network Services include IP addressing, Domain Name System (DNS), primary domain email service, Internet access, web content filtering, security products such as firewalls, VPN termination and intrusion prevention systems (IPS), and the necessary tools and staff to support these services.
  • 6. What are the different Network services?  IP Addressing  Domain Name System(DNS)  Primary Domain Email Service  Internet Access  Web Content Filtering  Security Products Such as Firewalls, Anti Virus Software  VPN termination and intrusion prevention systems (IPS)  Necessary tools and staff to support these services
  • 7. IP Address/Internet Protocol Address  IP address stands for internet protocol address; it is an identifying number that is associated with a specific computer or computer network. When connected to the internet, the IP address allows the computers to send and receive information.
  • 9. Domain Name System(DNS)  is a hierarchical and distributed naming system for computers, services, and other resources in the Internet or other Internet Protocol (IP) networks. It associates various information with domain names assigned to each of the associated entities. Most prominently, it translates readily memorized domain names to the numerical IP addresses needed for locating and identifying computer services and devices with the underlying network protocols.[1] The Domain Name System has been an essential component of the functionality of the Internet since 1985.  In the world of networking, computers do not represent by names like humans do, they represent by numbers because that is how computers and other similar devices talk and identify with each other over a network, which is by using numbers such as IP addresses.  Humans on the other hand are accustomed to using names instead of numbers, whether is talking directly to another person or identifying a country, place, or things, humans identify with names instead of numbers. So in order to bridge the communication gap between computers and humans and make the communication of a lot easier networking engineers developed DNS.  DNS resolves names to numbers, to be more specific it resolves domain names to IP addresses. So if you type in a web address in your web browser, DNS will resolve the name to a number because the only thing computers know are numbers.
  • 10. Primary Domain Email Services  An email domain is the part of an email address that comes after the @ symbol. For personal emails, it is most often gmail.com, outlook.com or yahoo.com.
  • 12. Internet access  Internet access is the process of connecting to the internet using personal computers, laptops or mobile devices by users or enterprises. Internet access is subject to data signalling rates and users could be connected at different internet speeds. Internet access enables individuals or organizations to avail internet services/web-based services.  Internet access is often provided at home, schools, workplaces, public places, internet cafes, libraries and other locations. The internet began to gain popularity with dial-up internet access. In a relatively short time, internet access technologies changed, providing faster and more reliable options. Currently, broadband technologies such as cable internet and ADSL are the most widely used methods for internet access. The speed, cost, reliability and availability of internet access depends on the region, internet service provider and type of connection.  Internet access is the ability of individuals and organizations to connect to the Internet using computer terminals, computers, and other devices; and to access services such as email and the World
  • 14. Web Content Filtering  Web content filtering is a technicque that blocks and screens access to inappropriate or unsafe web content. Uses include a company keeping employees from visiting known spam sites or school systems restricting students from adult content.  Web content filtering is the practice of blocking access to web content that may be deemed offensive, inappropriate, or even dangerous.
  • 15. Security Products Such as Firewalls, Anti Virus Software
  • 16. Security Products Such as Firewalls, Anti Virus Software  A firewall is a security network designed to protect computer systems and networks from malicious attacks. Antivirus is is a software utility program designed to protect a system from internal attacks from viruses, trojan horse, spyware etc.  A firewall is a security network that can be either hardware or software, or both, and is meant to protect computer systems and networks from harmful intrusions ..
  • 17. VPN termination and intrusion prevention systems (IPS)
  • 18. VPN termination and intrusion prevention systems (IPS)  is the network security technology that constantly monitors network traffic to identify threats. Under the general meaning of IPS, IPS technology is also an intrusion detection prevention system (IDPS).  includes anti-virus/anti-malware software, firewall, anti-spoofing software, and network traffic monitoring. Enterprises use IPS to document threats, uncover problems with security policies, and block external or insider security violations.  is typically deployed “in-line” where they sit in the direct communication path between the source and the destination, where it can analyze in real- time all the network traffic flow along that path and take automated preventive action.
  • 19. Necessary tools and staff to support these services
  • 20. Necessary tools and staff to support these services  A computer networking tool is any type that assists in the creation, maintenance, or distribution of a wireless network. Also, computer networking tools aid in a website’s creation, maintenance, advertising, security, and modification.  They are responsible for the maintenance of local area networks, especially in situations that involve dozens or hundreds of computers within the same network.  Computer networking tools are used for both domestic and commercial purposes and are available on sale or for free. Every software listed in this article is a free computer networking tool that anyone can use for any purpose.  Network DOS Commands like IPCONFIG, PING, DCPROMO….
  • 21. Question and Answer  What is an IP Address?  What is the difference between Static and Dynamic IP address?  What is IPCONFIG command?  What is DNS?  What is a wireless network?  What is a Default Gateway?  What should be the preferred DNS of the Client Computer?  What should be the preferred DNS of the Server Computer?  How to configure the server computer?
  • 22. Application  The class will be divided into 6 groups with a maximum of 3 members per group. The learners will be given a chance to setup and configure a client/server network considering the necessary Network Services, Tools and applications.