Network Carrier - Bina Darma e

advertisement


With the increase of B2C, B2B,G2C, websites, ecommerce, e-governance, VPN (Virtual Private
Networks) and other Internet and telecom-based
applications like remote servicing, the demand for
people with good knowledge of computer network
management on various platforms is expected to
peak in the next couple of are in high demand.
Generally there are several types of positions exist
in networking, each with different average salaries
and long-term potential, and one should possess a
clear understanding of these.





The basic job titles one sees for computer
networking and networking-related positions
include
Network Administrator
Network (Service) Technician
Network security
Network Manager





The Network Administrator
Working from the concept upwards, involving configure and
manage LANs (Local Area Networks), WANs (Wide Area Networks)
and VPNs (Virtual Private Networks). Including analyzing,
installing and configuring the company’s network even from a
remote location.
Monitoring network performance, troubleshooting problems and
maintaining network security has to be done on a daily basis.
Must be Familiarity with the specific systems being used by a
company: Windows Network, Novell, Unix, Linux and others.
Security and virus-protection schemes, system diagnostic
utilities and experience with routers and Switch
According to HOBO COMPUTING, NETWORK ADMINISTRATOR
"Candidate will be responsible for analysis, installation and
configuration of company networks. Daily activities include
monitoring network performance, troubleshooting problems and
maintaining network security. Other activities include assisting
customers with operating systems and network adapters,
configuring routers, switches, and firewalls, and evaluating
third-party tools.“



A Network Technician
Focus on the setup, troubleshooting, and
repair of specific hardware and software
products. Service Technicians in particular
often must travel to remote customer sites to
perform "field" upgrades and support the
customers.
Specialize in evaluating third-party products
and integrating new software technologies
into an existing network environment or to
build a new environment.

Network Security
In today’s network trend many organizations
move their offline transactions online and
vast quantities of vital and sensitive data
travels through networks, the need for
developing e-security systems to safeguard
the networks and databases from extensive
cracking has emerged as the number one IT
concern globally.





In fact
300 new viruses released everyday and widespread
hacking (82,000 recorded cases, according to a
Carnegie Mellon University study) because of that, IS
spend and tightened access to their systems and core
applications.
They are looking for people who can administer their
enterprise network security safely and securely as a
strategic priority.
You must be as familiar with system programming
and administration as with security configuration and
firewalls.
This also includes knowledge of advanced TCP/IP,
security fundamentals, security implementation,
router security and attack routes.

Managers, supervise the work of
administrators, engineers, technicians,
and/or programmers. Network / Information
Systems Managers also focus on longerrange planning and strategy considerations,
in some stage they will be focusing on tasks
such as troubleshooting, monitoring, LAN
performance, adding or deleting users,
adding new servers.





What have to be prepare
Knowledge of computer hardware is the foundation for a
career in computer networking.
The basics of operating systems, microprocessors,
peripheral devices, computer architecture, installing
various software, configuring PCs, preventive maintenance
and troubleshooting.
Microsoft network, Unix from SCO, Solaris from Sun
Microsystems, Netware from Novell, etc.
It can be further connected to the Internet through
internetworking devices such as Routers and Switches.
Vendor certifications like Microsoft’s MCSE or Cisco’s
CCNA or CCNP or CCIE, or Novel’s CNE or Sun
Microsystems’ Sun Solaris Administrator at the higher end,
are increasingly sought by recruiters.

Some of the popular International
Certifications available for LAN/WAN
Administration are MCSE, UNIX Admin, LINUX
Admin, CNE, etc., whereas for WAN
Administration you need CCNA, CCNP, CCDA,
CCDP, CCIE.
HOUSE
KEEPING






Network Hacking
Ping
The IP address gives the Internet address. The numerical
address like 212.214.172.81 does not reveal much. You
can use PING to convert the address into a domain name in
WINDOWS: The Domain Name Service (DNS) protocol
reveals the matching domain name. PING stands for
“Packet Internet Groper”
Ping uses ICMP (Internet Control Messaging Protocol) to
determine whether the target host is reachable or not. Ping
sends out ICMP Echo packets to the target host, if the
target host is alive it would respond back with ICMP
Echo reply packets.
Tracert:
Tracert is another interesting tool available to find more
interesting information about a remote host. Uses ICMP.
Tracert helps you to find out some information about the
systems involved in sending data (packets) from source to
destination.
Nmap
 Recently evolved into the 4.x series.
 Nmap (Network Mapper) is a free open source
utility for network explorat or security auditing.
-Rapidly scan large networks
-Nmap uses raw IP packets to determine what
hosts are available on the network, what services
(application name and version) those hosts are
offering, what operating systems (and OS
versions) they are running, what type of packet
filters/firewalls are in use,
and others




Nessus Remote Security Scanner
Nessus is the worlds most popular vulnerability
scanner used in over 75,000
organizations world-wide. Many of the worlds
largest organizations are
realizing significant cost savings by using Nessus
to audit business-critical enterprise devices and
applications.
Recently went closed source, but is still
essentially free. Works with a clientserver framework




Yersinia
Yersinia is a network tool designed to take
advantage of some weakeness in
different Layer 2 protocols.
It pretends to be a solid framework for analyzing
and testing the deployed networks and systems.
Network protocol available
Spanning Tree Protocol (STP), Cisco Discovery
Protocol (CDP), Dynamic Trunking Protocol (DTP),
Dynamic Host Configuration
Protocol (DHCP), Inter-Switch
Link Protocol (ISL), VLAN Trunking Protocol (VTP).





Eraser
Eraser is an advanced security tool (for Windows), which allows you
to
completely remove sensitive data from your hard drive by
overwriting it several
GNU General Public License.
An excellent tool for keeping your data really safe, if you’ve deleted
it..make
sure it’s really goneGet Eraser Here http://www.heidi.ie/eraser/download.ph
10. PuTTY
PuTTY is a free implementation of Telnet and SSH for Win32 and
Unix platforms,
Get PuTTY Here. http://www.chiark.greenend.org.uk/~sgtatham/putty/

IT Audit
COBIT Framework
Reputable and solid IT security certifications are:
CompTIA's Security+ (vendor-neutral, entry-level),
MCSE: Security, MCSA: Security (Microsoft plus
Security), Certified Information Systems Security
Professional (CISSP) (vendor-neutral IT security
management), Certified Information System Auditor
(CISA) (vendor-neutral IT Security auditing) and
Cisco Certified Security Professional (CCSP) (Cisco
plus security).
IP telephony is the technologies that use the
Internet Protocol's packet-switched
connections to exchange voice, fax, video and
other forms of information that have
traditionally been carried over the dedicated
circuit-switched connections of the public
switched telephone network (PSTN).
VoIP refers to a way to carry phone calls over an
IP data network, whether on the Internet or
your own internal network.
A primary attraction of VoIP is its ability to help
reduce expenses because telephone calls
travel over the data network rather than the
phone company's network.

Cisco Launches New Voice Certification
 Cisco IP Telephony Design Specialist
 Cisco IP Telephony Express Specialist
 Cisco Certified Voice Professional (CCVP)

Design Installation
◦ Drawing
 Backbone
 Repeater
◦ Installation
 Indoor
 Outdoor




802.11 b (1-11 Mbps)
802.11 a/g (54 Mbps)
802.11 n (600 Mbps)
802.16  Wimax ??????
The IEEE 802.11 standard is now over 2,500 pages long,
and new amendments are being developed all the time
(Complex..)
we sit on the edge of 802.11ac, which will allow devices
to leverage superior modulation, multiple radios, and
bonded channels to share a maximum of 6.9 Gbps!
Wireless LAN
Demand is high for IT professionals with wireless
networking skills. Career opportunities exist for
professionals to get involved in designing, deploying
and supporting wireless network infrastructure.
Cisco survey, 65 percent of IT managers expected to add
dedicated wireless networking job roles
Certified Wireless Network Administrator (CWNA)
Certified Wireless Network Professional (CWNP)
CISCO Wireless LAN Certification



Microsoft Windows Network Certifications
Microsoft MCSE
Microsoft MCSE Server
Microsoft's Windows MCSA
Microsoft's Windows MCSA
Microsoft Certified Architect Program
MCSE / MCSA Specializations
NAMA SERTIFIKAT
Junior Network Administrator
Network Administrator
Senior Network Administrator
TINGKAT CLUSTER
Dasar
(BASIC)
Menengah
(INTERMEDIATE)
Lanjut
(ADVANCED)
Download