Emerging Career Paths in Computer Networking Field

Slide Note
Embed
Share

The demand for individuals with expertise in computer network management is on the rise due to the increasing use of internet-based applications like e-commerce, e-governance, and VPN. Job titles in this domain include Network Administrator, Network Technician, and Network Security professional. Responsibilities range from configuring and managing networks to ensuring security and troubleshooting. Understanding these roles is crucial for pursuing a career in networking.


Uploaded on Dec 12, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. With the increase of B2C, B2B,G2C, websites, e- commerce, e-governance, VPN (Virtual Private Networks) and other Internet and telecom-based applications like remote servicing, the demand for people with good knowledge of computer network management on various platforms is expected to peak in the next couple of are in high demand. Generally there are several types of positions exist in networking, each with different average salaries and long-term potential, and one should possess a clear understanding of these.

  2. The basic job titles one sees for computer networking and networking-related positions include Network Administrator Network (Service) Technician Network security Network Manager

  3. The Network Administrator Working from the concept upwards, involving configure and manage LANs (Local Area Networks), WANs (Wide Area Networks) and VPNs (Virtual Private Networks). Including analyzing, installing and configuring the company s network even from a remote location. Monitoring network performance, troubleshooting problems and maintaining network security has to be done on a daily basis. Must be Familiarity with the specific systems being used by a company: Windows Network, Novell, Unix, Linux and others. Security and virus-protection schemes, system diagnostic utilities and experience with routers and Switch According to HOBO COMPUTING, NETWORK ADMINISTRATOR "Candidate will be responsible for analysis, installation and configuration of company networks. Daily activities include monitoring network performance, troubleshooting problems and maintaining network security. Other activities include assisting customers with operating systems and network adapters, configuring routers, switches, and firewalls, and evaluating third-party tools. The Network Administrator According to HOBO COMPUTING, NETWORK ADMINISTRATOR

  4. A Network Technician Focus on the setup, troubleshooting, and repair of specific hardware and software products. Service Technicians in particular often must travel to remote customer sites to perform "field" upgrades and support the customers. Specialize in evaluating third-party products and integrating new software technologies into an existing network environment or to build a new environment. Network Technician

  5. Network Security In today s network trend many organizations move their offline transactions online and vast quantities of vital and sensitive data travels through networks, the need for developing e-security systems to safeguard the networks and databases from extensive cracking has emerged as the number one IT concern globally. Network Security

  6. In fact 300 new viruses released everyday and widespread hacking (82,000 recorded cases, according to a Carnegie Mellon University study) because of that, IS spend and tightened access to their systems and core applications. They are looking for people who can administer their enterprise network security safely and securely as a strategic priority. You must be as familiar with system programming and administration as with security configuration and firewalls. This also includes knowledge of advanced TCP/IP, security fundamentals, security implementation, router security and attack routes. enterprise network security safely and securely as a strategic priority.

  7. Managers, administrators, engineers, technicians, and/or programmers. Network / Information Systems Managers also focus on longer- range planning and strategy considerations, in some stage they will be focusing on tasks such as troubleshooting, monitoring, LAN performance, adding or deleting users, adding new servers. Managers, supervise the work of

  8. What have to be prepare Knowledge of computer hardware is the foundation for a career in computer networking. The basics of operating systems, microprocessors, peripheral devices, computer architecture, installing various software, configuring PCs, preventive maintenance and troubleshooting. Microsoft network, Unix from SCO, Solaris from Sun Microsystems, Netware from Novell, etc. It can be further connected to the Internet through internetworking devices such as Routers and Switches. Vendor certifications like Microsoft s MCSE or Cisco s CCNA or CCNP or CCIE, or Novel s CNE or Sun Microsystems Sun Solaris Administrator at the higher end, are increasingly sought by recruiters. What have to be prepare

  9. Some of the popular International Certifications available for LAN/WAN Administration are MCSE, UNIX Admin, LINUX Admin, CNE, etc., whereas for WAN Administration you need CCNA, CCNP, CCDA, CCDP, CCIE.

  10. HOUSE KEEPING

  11. Network Hacking Ping The IP address gives the Internet address. The numerical address like 212.214.172.81 does not reveal much. You can use PING to convert the address into a domain name in WINDOWS: The Domain Name Service (DNS) protocol reveals the matching domain name. PING stands for Packet Internet Groper Ping uses ICMP (Internet Control Messaging Protocol) to determine whether the target host is reachable or not. Ping sends out ICMP Echo packets to the target host, if the target host is alive it would respond back with ICMP Echo reply packets. Tracert Tracert is another interesting tool available to find more interesting information about a remote host. Uses ICMP. Tracert helps you to find out some information about the systems involved in sending data (packets) from source to destination. Ping Packet Internet Groper Tracert: :

  12. Nmap Recently evolved into the 4.x series. Nmap (Network Mapper) is a free open source utility for network explorat or security auditing. -Rapidly scan large networks -Nmap uses raw IP packets to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and others Nmap

  13. Nessus Nessus Remote Security Scanner Remote Security Scanner Nessus is the worlds most popular vulnerability scanner used in over 75,000 organizations world-wide. Many of the worlds largest organizations are realizing significant cost savings by using Nessus to audit business-critical enterprise devices and applications. Recently went closed source, but is still essentially free. Works with a client- server framework

  14. Yersinia Yersinia is a network tool designed to take advantage of some weakeness in different Layer 2 protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems. Network protocol available Spanning Tree Protocol (STP), Cisco Discovery Protocol (CDP), Dynamic Trunking Protocol (DTP), Dynamic Host Configuration Protocol (DHCP), Inter-Switch Link Protocol (ISL), VLAN Trunking Protocol (VTP). Yersinia

  15. Eraser Eraser Eraser is an advanced security tool (for Windows), which allows you to completely remove sensitive data from your hard drive by overwriting it several GNU General Public License. An excellent tool for keeping your data really safe, if you ve deleted it..make sure it s really goneGet Eraser Here - http://www.heidi.ie/eraser/download.ph 10. 10. PuTTY PuTTY PuTTY is a free implementation of Telnet and SSH for Win32 and Unix platforms, Get PuTTY Here. - http://www.chiark.greenend.org.uk/~sgtatham/putty/

  16. IT Audit COBIT Framework Reputable and solid IT security certifications are: CompTIA's Security+ (vendor-neutral, entry-level), MCSE: Security, MCSA: Security (Microsoft plus Security), Certified Information Systems Security Professional (CISSP) (vendor-neutral IT security management), Certified Information System Auditor (CISA) (vendor-neutral IT Security auditing) and Cisco Certified Security Professional (CCSP) (Cisco plus security).

  17. IP telephony is the technologies that use the Internet Protocol's packet-switched connections to exchange voice, fax, video and other forms of information that have traditionally been carried over the dedicated circuit-switched connections of the public switched telephone network (PSTN). VoIP IP data network, whether on the Internet or your own internal network. A primary attraction of VoIP is its ability to help reduce expenses because telephone calls travel over the data network rather than the phone company's network. VoIP refers to a way to carry phone calls over an

  18. Cisco Launches New Voice Certification Cisco IP Telephony Design Specialist Cisco IP Telephony Express Specialist Cisco Certified Voice Professional (CCVP) Cisco Launches New Voice Certification Cisco IP Telephony Design Specialist Cisco IP Telephony Express Specialist Cisco Certified Voice Professional (CCVP)

  19. Design Installation Drawing Backbone Repeater Installation Indoor Outdoor

  20. 802.11 b (1-11 Mbps) 802.11 a/g (54 Mbps) 802.11 n (600 Mbps) 802.16 Wimax ?????? The IEEE 802.11 standard is now over 2,500 pages long, and new amendments are being developed all the time (Complex..) we sit on the edge of 802.11ac, which will allow devices to leverage superior modulation, multiple radios, and bonded channels to share a maximum of 6.9 Gbps! Wireless LAN Demand is high for IT professionals with wireless networking skills. Career opportunities exist for professionals to get involved in designing, deploying and supporting wireless network infrastructure. Cisco survey, 65 percent of IT managers expected to add dedicated wireless networking job roles

  21. Certified Wireless Network Administrator (CWNA) Certified Wireless Network Professional (CWNP) CISCO Wireless LAN Certification Microsoft Windows Network Certifications Microsoft MCSE Microsoft MCSE Server Microsoft's Windows MCSA Microsoft's Windows MCSA Microsoft Certified Architect Program MCSE / MCSA Specializations Microsoft Windows Network Certifications

  22. TINGKAT CLUSTER NAMA SERTIFIKAT Dasar (BASIC) Junior Network Administrator Menengah (INTERMEDIATE) Network Administrator Lanjut Senior Network Administrator (ADVANCED)

More Related Content