Tonight – Finishing off workshop

Slides:



Advertisements
Similar presentations
Microsoft ® Official Course First Look Clinic Overview of Windows 8 By Ragowo Riantory, S.Kom, MCP.
Advertisements

1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
Mr C Johnston ICT Teacher
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
Lesson 4-Installing Network Operating Systems. Overview Installing and configuring Novell NetWare 6.0. Installing and configuring Windows 2000 Server.
E-commerce security by Asif Dalwai Introduction E-commerce applications Threats in e-commerce applications Measures to handle threats Incorporate.
What is it? CLOUD COMPUTING.  Connects to the cloud via the Internet  Does computing tasks, or  Runs applications, or  Stores Data THE AVERAGE CLOUD.
1 Enabling Secure Internet Access with ISA Server.
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
Installing Active Directory on Windows Server 2008 R2 Installing Active Directory on a fresh Windows Server 2008 R2 machine in a home network. These instructions.
Load Test Planning Especially with HP LoadRunner >>>>>>>>>>>>>>>>>>>>>>
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 15 Installing and Using Windows XP Professional.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Term 2, 2011 Week 3. CONTENTS The physical design of a network Network diagrams People who develop and support networks Developing a network Supporting.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
蓄勢待發迎WebSAMS Preparation Forum for WebSAMS Implementation Document 12
An Introduction to IBM Systems Director
Common Servers in a Workplace Environment Brandon Reynolds Computer Electronic Networking Dept. of Technology, Eastern Kentucky University.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
Core 3: Communication Systems. Network software includes the Network Operating Software (NOS) and also network based applications such as those running.
Microsoft Management Seminar Series SMS 2003 Change Management.
What is it? CLOUD COMPUTING.  Connects to the cloud via the Internet  Does computing tasks, or  Runs applications, or  Stores Data THE AVERAGE CLOUD.
Virtualization Technology and Microsoft Virtual PC 2007 YOU ARE WELCOME By : Osama Tamimi.
AQA A2 COMP 3: Internet Security. Lesson Aim By the end of the lesson: By the end of the lesson: Describe different security issues and recommend tools/techniques.
Website Design:. Once you have created a website on your hard drive you need to get it up on to the Web. This is called "uploading“ or “publishing” or.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
IS 4506 Windows NTFS and IIS Security Features.  Overview Windows NTFS Server security Internet Information Server security features Securing communication.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Windows Server 2003 { First Steps and Administration} Benedikt Riedel MCSE + Messaging
BY: SALMAN 1.
Unit 27: Network Operating Systems
ZIMBRA DESKTOP USER MANUAL
BY: SALMAN.
Backdoor Attacks.
Preinstallation Tasks
Network security threats
Assignment 2 Unit 2 Computer Systems.
FTP - File Transfer Protocol
Business Risks of Insecure Networks
Unit 2 Computer Systems HND in Computing and Systems Development
Introduction to Networking
How to Fix Windows 10 Update Error 0x ?.
Welcome To : Group 1 VC Presentation
Building a PC Chapter 12.
CIS 332 Competitive Success-- snaptutorial.com
CIS 332 Education for Service-- snaptutorial.com
CIS 332 Teaching Effectively-- snaptutorial.com
CIS 332 Inspiring Innovation-- snaptutorial.com
NTC 324 RANK Education for Service-- ntc324rank.com.
Unit 27: Network Operating Systems
Dev Test on Windows Azure Solution in a Box
Design Unit 26 Design a small or home office network
Design Unit 26 Design a small or home office network
IS4680 Security Auditing for Compliance
Configuring Internet-related services
Practical 2 Unit 26 Design a small or home office network
Level 2 Diploma Unit 11 IT Security
NETWORK SECURITY LAB Lab 8. Firewall and VPN.
Tackling underperformance in ICT
Operating Systems Networking for Home and Small Businesses – Chapter 2 – Introduction To Networking.
Assignment 2 Task 1 – Help Document.
Chapter 10: Advanced Cisco Adaptive Security Appliance
DEPLOYING SECURITY CONFIGURATION
PLANNING A SECURE BASELINE INSTALLATION
Assignment 2: Activity 2 Produce a written report to explain how software utilities can improve the performance of Computer Systems. Select 3-4 utilities.
SBS 2008 – One year on David Overton

Presentation transcript:

Tonight – Finishing off workshop Unit 27 NOS Assignment 2 Due: 06/06/19 Tonight – Finishing off workshop Unit 27 NOS Assignment 2 - Task 2 – Implementation of your NOS design. Virtual Box is installed on these PC’s and I have pre-installed images for Windows Server 2016 and Windows 10. Or use the lab. Practical help docs on website. Screenshot and document the implementation process Test that the network works correctly using a test plan. Unit 27 NOS Assignment 2 - Task 3 Test performance and security of the network. Could add on to test plan. After testing explain any improvements you’ve made Create a user guide for the network and it’s various features Create an evaluation which include an analysis and recommendations of improvements U27 NOS A2 Task 2 & 3 help doc on jamestedder.net

Unit 27 NOS Assignment 2: Task 2– Guide 2.1 Implement network taking screenshots. Document and explain this process. Elements should include a minimum of user accounts and group policy to set user access levels. Use and follow your design document. 2.2 – 2.3 Testing the NOS Functionality Create a table like below. Include everything you have installed or configured on Windows Server. Include tests at the client end to check services and features have been set up correctly. Screenshot’s ideally should be used as evidence. Test Expected Result Actual Result Problems Installation of Windows 2012 Successful installation of NOS Successful but had issues creating a new partition. List issues and how you overcame them. Domain created/set up Successful domain creation of ABCMarketing.net domain  

Unit 27 NOS Assignment 2: Task 3 – Guide 3.1 - You need to establish and justify a performance baseline and monitor the performance of the network against this baseline. (U27 4.1, 4.2) Essentially testing your networks performance. Test initial boot up times, login time, network transfer speeds(Lan speed test), internet access download and upload speeds(speedtest.net), backup times, virus and malware detection, disc space and usage speeds, firewall(Including internet filtering) etc. Then test average speeds when under heavy load over a period of time. A table such as above could be used. Use the checklist on my website to check security elements have been implemented. Check security configurations. Log changes and improvements that you make. 3.2 – Justify the performance optimisation and update to the NOS. (U27 4.3) Based on 3.1 explain the improvements you have made to the network, justifying any expense or changes with evidence when possible. 3.3 – Manage the network security solution applied. (U46 4.1) Explain the security software or hardware you have installed (e.g. anti-virus, firewall, physical security.). How do you use them to manage the network? Create documentation which would show the network manager how to use the security features you have implemented. Include username, passwords, IP addresses and a user guide on configuring software and devices. 3.4 – Analyse (U46 4.2) Think about the strengths and weakness of the network and its creation. Could be merged with 3.5 to include improvements. 3.5 – Recommend potential changes that you could make to the security. (U46 4.3)