Internet Engineering Course

Slides:



Advertisements
Similar presentations
1 Effective, secure and reliable hosted security and continuity solution.
Advertisements

Which server is right for you? Get in Contact with us
Windows Remote Desktop Services for Cloud Applications.
Microsoft Security Solutions A Great New Way of Making $$$ !!! Jimmy Tan Platform Strategy Manager Microsoft Singapore.
Chapter 7 LAN Operating Systems LAN Software Software Compatibility Network Operating System (NOP) Architecture NOP Functions NOP Trends.
Accelerate Your Business RP IaaS (Infrastructure as a Service) IaaS.
Understand Virtualized Clients Windows Operating System Fundamentals LESSON 2.4.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
“Turn you Smart phone into Business phone “
Cloud Services for Education
Web Server Administration
1 Chapter 7 IT Infrastructures Business-Driven Technology
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
by Evolve IP Managed Services
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
The Internetworked E-Business Enterprise
Barracuda Load Balancer Server Availability and Scalability.
Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over the Internet. Cloud is the metaphor for.
Exchange 2000 on Windows 2000 Data Center The Opportunity for Server Consolidation.
Software Licensing, Made Simple SELECT Server XM Edition
Internet Engineering Course Network Design. Internet Engineering Course; Sharif University of Technology Contents Define and analyse an organization network.
7-1 Chapter 7 IT Infrastructures Business-Driven Technology.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
7-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 7 IT Infrastructures.
7-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 7 IT Infrastructures.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
Selling Strategies Microsoft Internet Security and Acceleration (ISA) Server 2004 Powerful Protection for Microsoft Applications.
Chapter 2 Securing Network Server and User Workstations.
Community Sign-On and BEN. Table of Contents  What is community sign-on?  Benefits  How it works (Shibboleth)  Shibboleth components  CSO workflow.
SharePoint in the Education Space Presented by: Daniel Petersen Director of Business Solutions Applied Tech.
Unit 9: Distributing Computing & Networking Kaplan University 1.
1 Hosted security and continuity. 2 GFI MAX MailProtection overview GFI MAX MailProtection is a cloud-based security solution » Inbound .
Total Threat Protection Securing All Your Threat Vectors Hartford Tech Summit.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
Implementing Microsoft Exchange Online with Microsoft Office 365
Introduction TO Network Administration
Windows SharePoint Services. Overview Windows SharePoint Services (WSS) Information Worker Infrastructure component delivered in Windows Server 2003 Enables.
Internet Engineering Course Outline. Internet Engineering Course; Sharif University of Technology Aims and Contents To attain necessary skills for handling.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
Citrix On Demand Services. Agenda About Citrix & the “on-demand” access infrastructure Traditional client/server via Citrix Access Infrastructure –Scalable,
Secure Services Shared Hosted MS Exchange 2010.
“Business first, technology's the tool.”. The Application Hosting business model is based on a very simple idea:  Install application software on powerful.
What is Cloud Computing 1. Cloud computing is a service that helps you to perform the tasks over the Internet. The users can access resources as they.
ASBO Annual Conference Ocean City May WiFi Username: asbo WiFi Password: asbo2016.
Community Sign-On and BEN. Table of Contents  What is community sign-on?  Benefits  How it works (Shibboleth)  Shibboleth components  CSO workflow.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
INTRODUCTION SAP Portal Fundamentals SAP Web AS Fundamental SAP Web AS ABAP Administration: SAP Web AS Java Administration SAP NetWeaver Portal Fundamentals.
HIPS. Host-Based Intrusion Prevention Systems  One of the major benefits to HIPS technology is the ability to identify and stop known and unknown attacks,
CLOUDENTIFY.
Unit 3 Virtualization.
Chapter 7. Identifying Assets and Activities to Be Protected
Chapter 6: Securing the Cloud
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Computer Virus and Antivirus
Introduction to Cloud Computing
Microsoft Azure Enables Enhanced Parental Control and Advanced Multi-Device Security “Security, scalability, and high availability were our most important.
Replace with Application Image
Tailor slide to customer industry/pain points
Check Point Connectra NGX R60
In House or Cloud Based ERP Implementation
CLOUD COMPUTING.
PLANNING A SECURE BASELINE INSTALLATION
Microsoft Virtual Academy
Designing IIS Security (IIS – Internet Information Service)
STATEL an easy way to transfer data
Microsoft Virtual Academy
worlds largest IT service provider
Presentation transcript:

Internet Engineering Course Problem specification

Internet Engineering Course; Sharif University of Technology Contents A typical scenario for Internet Engineering case Analysis and discussion on requirement Internet Engineering Course; Sharif University of Technology

Internet Engineering Course; Sharif University of Technology A typical scenario An organization wants to build and enhance its current infrastructure and services for better presence on the Internet. You are assigned to analyse the organization needs, develop a solution and implement it. In this course we follow a typical software engineering process and try to make a suitable solution. Internet Engineering Course; Sharif University of Technology

Internet Engineering Course; Sharif University of Technology Requirements To have an Internet platform with following components and features: Mail service Web site Central user and workstations managements Secure Access to the organization’s services anytime and anywhere Stable and reliable platform Internet Engineering Course; Sharif University of Technology

Internet Engineering Course; Sharif University of Technology Requirements (cont.) Mail service: Send and receiving emails Spam detection Secure Web interface Mailing lists Internet Engineering Course; Sharif University of Technology

Internet Engineering Course; Sharif University of Technology Requirements (cont.) Web site Hosting company web site as well as internal web applications (portals, groupware, ERP, etc.) Secure platform Easy deployment and configuration Supporting multiple web languages Internet Engineering Course; Sharif University of Technology

Internet Engineering Course; Sharif University of Technology Requirements (cont.) Central user and workstation management Single sign on capability – Single user and password for many services Remote antivirus installation and maintenance OS patch installation Remote configuration Internet Engineering Course; Sharif University of Technology

Internet Engineering Course; Sharif University of Technology Requirements (cont.) Secure environment Resistant to intrusions Internet Engineering Course; Sharif University of Technology

Internet Engineering Course; Sharif University of Technology Requirements (cont.) Access to the organization’s services anytime and anywhere Be able to use company resources outside the organization Permit partner organizations to access some part of the organization’s infrastructure Internet Engineering Course; Sharif University of Technology

Internet Engineering Course; Sharif University of Technology Requirements (cont.) Stable and reliable Data and service protection from software and hardware faults Scalable service offering Internet Engineering Course; Sharif University of Technology

Internet Engineering Course; Sharif University of Technology Next step? Analysis of the requirements Evaluate candidate solutions Select the most suitable solution set Internet Engineering Course; Sharif University of Technology