SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Client side
network setup II.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of Expertise Industry Certifications
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
– Establishing network connections.
– Proxy settings.
– Remote Desktop.
PACE-IT.
Page 4
Client side network setup II.
Page 5
– Dial-up.
» Requires a modem and an ISP that accepts dial-up
connections.
– Set up.
» Select Network and Sharing Center from the Control
Panel.
» Select Set Up a New Connection or Network.
» Enter the information provided by the ISP (e.g., the
number to use, username, and password).
» Either allow or disallow other people to use the
connection.
» Click on the Create button.
Client side network setup II.
Page 6
– Virtual Private Network (VPN).
» Allows for private connection over public networks.
» Creates an encrypted tunnel to the VPN server or
firewall.
– Set up.
» Select Network and Sharing Center from the Control
Panel.
» Select Set up a new connection or network.
» Select Connect to a workplace.
» Click on the Use my Internet connection (VPN) button.
» Enter the IP address of the VPN server.
» Enter the proper username, password, and domain (if
required).
» Click on the Connect button.
» The computer will cycle through all the available
tunneling protocols until the VPN server accepts one.
Client side network setup II.
Page 7
– Wireless.
» Requires the capability (wireless adapter), a compatible
wireless access point (WAP), and an Internet connection.
– Set up.
» Know the service set identifier (SSID) of the wireless
network.
» Know the type of security used (WEP, WPA, WPA2, or
802.X).
» Click Start.
» Select Connect To.
» Select the wireless network you wish to join.
» Select Connect.
» Enter the proper credentials when prompted.
» Click on the OK button.
Client side network setup II.
Page 8
– Wired.
» Requires a network interface card (NIC) and the proper
type of cabling (e.g., Cat5, Cat5e, or Cat6).
» Requires a switch or router, or both.
– Set up.
» In most cases, the set up for a wired network is
automatic, as access to a functioning switch port is
deemed sufficient authorization to use a network.
» Set up for both wired and wireless networks often use
DHCP to configure the proper IP addresses.
Client side network setup II.
Page 9
Client side network setup II.
Page 10
Proxy servers enable a
network to use caching and
filtering on the network.
Caching conserves bandwidth, while filtering
restricts access to Web pages. An added benefit to
using a proxy server is that the end user is hidden
(shielded) from the Internet.
Client side network setup II.
Page 11
– Proxy Settings.
» Most client side proxy settings are established by the
browser.
– Set up.
» Select Internet Options from the Control Panel.
» Click the Connections tab.
» Click the LAN Settings button.
» Check the box for Use a Proxy Server for Your LAN.
» Enter the IP address and port for the proxy server.
» It is possible to bypass the proxy server for local network
traffic.
» Click on the OK button.
Client side network setup II.
Page 12
Client side network setup II.
Page 13
Allowing Remote Desktop
access means you can use
your PC from anywhere you
have Internet access.
Remote Desktop can be a powerful tool in your
arsenal, but it is also a vulnerability. Allowing
Remote Desktop permits outside access to what
should be a secure system.
Client side network setup II.
Page 14
– Remote Desktop.
» Remote settings need to be allowed before Remote
Desktop can be enabled.
» By default Windows Firewall blocks access to the
Remote Desktop feature.
– Set up.
» Select System from the Control Panel.
» Select Remote settings.
» Select the radio button that sets the remote connection
level that is desired.
» Click Apply.
» Select Windows Firewall from the Control Panel.
» Select Allow a program or feature through Windows
Firewall.
» Check the box for Remote Desktop and then check the
box for the types of network profiles allowed, either
Private or Public (not recommended).
» Click the OK button.
Client side network setup II.
Page 15
Client side network setup II.
Dial-up, VPN, wireless, and wired networks all have their own methods of
establishing connections. Wired networks are the easiest, as access to a
working port is usually deemed sufficient authentication.
Topic
Establishing network
connections.
Summary
Proxy servers allow for caching of and restriction to Web pages. On the
client side, the settings are usually established by the Web browser.Proxy settings.
Remote Desktop requires a two-step process. Remote Desktop must be
enabled under the Systems settings and then Windows Firewall must be
configured to allow the remote connection into the system.
Remote Desktop.
Page 16
THANK YOU!
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

Weitere ähnliche Inhalte

Was ist angesagt?

E brochure it253_networkconnection
E brochure it253_networkconnectionE brochure it253_networkconnection
E brochure it253_networkconnectionI-r Papa
 
Resume-kumar
Resume-kumarResume-kumar
Resume-kumarM Prem
 

Was ist angesagt? (19)

PACE-IT: Troubleshooting Wireless Networks (part 1)
PACE-IT: Troubleshooting Wireless Networks (part 1)PACE-IT: Troubleshooting Wireless Networks (part 1)
PACE-IT: Troubleshooting Wireless Networks (part 1)
 
Pace it troubleshooting-common_network_issues_bf
Pace it troubleshooting-common_network_issues_bfPace it troubleshooting-common_network_issues_bf
Pace it troubleshooting-common_network_issues_bf
 
PACE-IT: Network Hardening Techniques (part 2)
PACE-IT: Network Hardening Techniques (part 2)PACE-IT: Network Hardening Techniques (part 2)
PACE-IT: Network Hardening Techniques (part 2)
 
PACE-IT: Network Hardening Techniques (part 3)
PACE-IT: Network Hardening Techniques (part 3)PACE-IT: Network Hardening Techniques (part 3)
PACE-IT: Network Hardening Techniques (part 3)
 
Pace IT - Cables and Connections
Pace IT - Cables and ConnectionsPace IT - Cables and Connections
Pace IT - Cables and Connections
 
PACE-IT: Common Network Vulnerabilities
PACE-IT: Common Network VulnerabilitiesPACE-IT: Common Network Vulnerabilities
PACE-IT: Common Network Vulnerabilities
 
PACE-IT: Wireless LAN Infrastructure (part 1)
PACE-IT: Wireless LAN Infrastructure (part 1)PACE-IT: Wireless LAN Infrastructure (part 1)
PACE-IT: Wireless LAN Infrastructure (part 1)
 
PACE-IT: Supporting Configuration Management (part 1)
PACE-IT: Supporting Configuration Management (part 1)PACE-IT: Supporting Configuration Management (part 1)
PACE-IT: Supporting Configuration Management (part 1)
 
PACE-IT: Network Hardening Techniques (part 1)
PACE-IT: Network Hardening Techniques (part 1)PACE-IT: Network Hardening Techniques (part 1)
PACE-IT: Network Hardening Techniques (part 1)
 
Pace IT - Expansion Cards
Pace IT - Expansion CardsPace IT - Expansion Cards
Pace IT - Expansion Cards
 
E brochure it253_networkconnection
E brochure it253_networkconnectionE brochure it253_networkconnection
E brochure it253_networkconnection
 
Pace IT - Troubleshooting Wireless Networks
Pace IT - Troubleshooting Wireless NetworksPace IT - Troubleshooting Wireless Networks
Pace IT - Troubleshooting Wireless Networks
 
Pace IT - Troubleshooting Networks Wired
Pace IT - Troubleshooting Networks WiredPace IT - Troubleshooting Networks Wired
Pace IT - Troubleshooting Networks Wired
 
Pace IT - Introduction to the Bios
Pace IT - Introduction to the BiosPace IT - Introduction to the Bios
Pace IT - Introduction to the Bios
 
Pace IT - Network Devices (part 2)
Pace IT - Network Devices (part 2)Pace IT - Network Devices (part 2)
Pace IT - Network Devices (part 2)
 
Intranet and extranet
Intranet and extranet Intranet and extranet
Intranet and extranet
 
Resume-kumar
Resume-kumarResume-kumar
Resume-kumar
 
Pace IT - Storage Devices (part 2)
Pace IT - Storage Devices (part 2)Pace IT - Storage Devices (part 2)
Pace IT - Storage Devices (part 2)
 
PACE-IT: Operation System Features
PACE-IT: Operation System FeaturesPACE-IT: Operation System Features
PACE-IT: Operation System Features
 

Andere mochten auch

Письменная речь
Письменная речьПисьменная речь
Письменная речьFeko91
 
Writing task 2
Writing task 2Writing task 2
Writing task 2Pikids
 
Cronograma
CronogramaCronograma
CronogramaEddy G.
 
Substititution example slides
Substititution example slidesSubstititution example slides
Substititution example slidesevanschilling
 
Paul brobson & Reliant Technology - A Perfect Fit
Paul brobson & Reliant Technology - A Perfect FitPaul brobson & Reliant Technology - A Perfect Fit
Paul brobson & Reliant Technology - A Perfect FitPaul Brobson
 
The ‘lived now.’ Observing the changes in the spatiotemporal experience of ev...
The ‘lived now.’ Observing the changes in the spatiotemporal experience of ev...The ‘lived now.’ Observing the changes in the spatiotemporal experience of ev...
The ‘lived now.’ Observing the changes in the spatiotemporal experience of ev...cyborgology
 
Publicity and Music Management Recommendation for Nicolette Fontaine
Publicity and Music Management Recommendation for Nicolette FontainePublicity and Music Management Recommendation for Nicolette Fontaine
Publicity and Music Management Recommendation for Nicolette FontaineNicolette Fontaine, J.D.
 

Andere mochten auch (20)

Pace IT - Basic OS Security Settings (Part 1)
Pace IT - Basic OS Security Settings (Part 1)Pace IT - Basic OS Security Settings (Part 1)
Pace IT - Basic OS Security Settings (Part 1)
 
Письменная речь
Письменная речьПисьменная речь
Письменная речь
 
Pace IT - Basic OS Security Settings (Part 2)
Pace IT - Basic OS Security Settings (Part 2)Pace IT - Basic OS Security Settings (Part 2)
Pace IT - Basic OS Security Settings (Part 2)
 
Writing task 2
Writing task 2Writing task 2
Writing task 2
 
Pace IT - Client Networking (Part 3)
Pace IT - Client Networking (Part 3)Pace IT - Client Networking (Part 3)
Pace IT - Client Networking (Part 3)
 
Cronograma
CronogramaCronograma
Cronograma
 
ZAO Retailers Presentation 2015
ZAO Retailers Presentation 2015ZAO Retailers Presentation 2015
ZAO Retailers Presentation 2015
 
Substititution example slides
Substititution example slidesSubstititution example slides
Substititution example slides
 
Paul brobson & Reliant Technology - A Perfect Fit
Paul brobson & Reliant Technology - A Perfect FitPaul brobson & Reliant Technology - A Perfect Fit
Paul brobson & Reliant Technology - A Perfect Fit
 
Pace IT - Maintenance Procedures Best Practices
Pace IT - Maintenance Procedures Best PracticesPace IT - Maintenance Procedures Best Practices
Pace IT - Maintenance Procedures Best Practices
 
Pace IT - Control Panel (Part 3)
Pace IT - Control Panel (Part 3)Pace IT - Control Panel (Part 3)
Pace IT - Control Panel (Part 3)
 
Pace IT - Command Line Networking
Pace IT - Command Line NetworkingPace IT - Command Line Networking
Pace IT - Command Line Networking
 
The ‘lived now.’ Observing the changes in the spatiotemporal experience of ev...
The ‘lived now.’ Observing the changes in the spatiotemporal experience of ev...The ‘lived now.’ Observing the changes in the spatiotemporal experience of ev...
The ‘lived now.’ Observing the changes in the spatiotemporal experience of ev...
 
Pace IT - Command Line OS (Part 1)
Pace IT - Command Line OS (Part 1)Pace IT - Command Line OS (Part 1)
Pace IT - Command Line OS (Part 1)
 
Pace IT - Command Line OS (Part 2)
Pace IT - Command Line OS (Part 2)Pace IT - Command Line OS (Part 2)
Pace IT - Command Line OS (Part 2)
 
Pace IT - Common Security Threats
Pace IT - Common Security ThreatsPace IT - Common Security Threats
Pace IT - Common Security Threats
 
Pace IT - Install and Configure OS (Part 1)
Pace IT - Install and Configure OS (Part 1)Pace IT - Install and Configure OS (Part 1)
Pace IT - Install and Configure OS (Part 1)
 
Pace IT - Install and Configure OS (Part 2)
Pace IT - Install and Configure OS (Part 2)Pace IT - Install and Configure OS (Part 2)
Pace IT - Install and Configure OS (Part 2)
 
Publicity and Music Management Recommendation for Nicolette Fontaine
Publicity and Music Management Recommendation for Nicolette FontainePublicity and Music Management Recommendation for Nicolette Fontaine
Publicity and Music Management Recommendation for Nicolette Fontaine
 
Pres 1
Pres 1Pres 1
Pres 1
 

Ähnlich wie Pace IT - Client Networking (Part 2)

Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxikirkton
 
SEC321___Week_6___Network_Security___Firewalls.pdf.pdf
SEC321___Week_6___Network_Security___Firewalls.pdf.pdfSEC321___Week_6___Network_Security___Firewalls.pdf.pdf
SEC321___Week_6___Network_Security___Firewalls.pdf.pdfahmed53254
 
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxWWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxericbrooks84875
 
Setting up a WiFi Network v3
Setting up a WiFi Network v3Setting up a WiFi Network v3
Setting up a WiFi Network v3Ali Nezhad
 
CNS599_NLEN_InformationSecurity
CNS599_NLEN_InformationSecurityCNS599_NLEN_InformationSecurity
CNS599_NLEN_InformationSecurityTaishaun Owens
 
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docxAuthentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docxrock73
 
MasterCapstoneV9
MasterCapstoneV9MasterCapstoneV9
MasterCapstoneV9Tracy Payne
 
CNS599NLEN_RiskAssessment
CNS599NLEN_RiskAssessmentCNS599NLEN_RiskAssessment
CNS599NLEN_RiskAssessmentTaishaun Owens
 
PACE-IT, Security+1.3: Secure Network Design Elements and Components
PACE-IT, Security+1.3: Secure Network Design Elements and ComponentsPACE-IT, Security+1.3: Secure Network Design Elements and Components
PACE-IT, Security+1.3: Secure Network Design Elements and ComponentsPace IT at Edmonds Community College
 
Maxis Fibre Internet FTTH Self Help Guide
Maxis Fibre Internet FTTH Self Help GuideMaxis Fibre Internet FTTH Self Help Guide
Maxis Fibre Internet FTTH Self Help GuideMaxis Fibre
 

Ähnlich wie Pace IT - Client Networking (Part 2) (20)

PACE-IT: Implementing a Basic Network - N10 006
PACE-IT: Implementing a Basic Network - N10 006 PACE-IT: Implementing a Basic Network - N10 006
PACE-IT: Implementing a Basic Network - N10 006
 
Pace IT - Setting Up a SOHO Network
Pace IT - Setting Up a SOHO NetworkPace IT - Setting Up a SOHO Network
Pace IT - Setting Up a SOHO Network
 
PACE-IT, Security+1.5: Wireless Security Considerations
PACE-IT, Security+1.5: Wireless Security ConsiderationsPACE-IT, Security+1.5: Wireless Security Considerations
PACE-IT, Security+1.5: Wireless Security Considerations
 
PACE-IT: Networking Services and Applications (part 2) - N10 006
PACE-IT: Networking Services and Applications (part 2) - N10 006PACE-IT: Networking Services and Applications (part 2) - N10 006
PACE-IT: Networking Services and Applications (part 2) - N10 006
 
PACE-IT: Introduction_to Network Devices (part 2) - N10 006
PACE-IT: Introduction_to Network Devices (part 2) - N10 006 PACE-IT: Introduction_to Network Devices (part 2) - N10 006
PACE-IT: Introduction_to Network Devices (part 2) - N10 006
 
Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docx
 
Pace IT - Control Panel (Part 2)
Pace IT - Control Panel (Part 2)Pace IT - Control Panel (Part 2)
Pace IT - Control Panel (Part 2)
 
SEC321___Week_6___Network_Security___Firewalls.pdf.pdf
SEC321___Week_6___Network_Security___Firewalls.pdf.pdfSEC321___Week_6___Network_Security___Firewalls.pdf.pdf
SEC321___Week_6___Network_Security___Firewalls.pdf.pdf
 
PACE-IT: Common Networking Protocols (part 2)
PACE-IT: Common Networking Protocols (part 2)PACE-IT: Common Networking Protocols (part 2)
PACE-IT: Common Networking Protocols (part 2)
 
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxWWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
 
Pace IT - Basic Mobile Network
Pace IT - Basic Mobile NetworkPace IT - Basic Mobile Network
Pace IT - Basic Mobile Network
 
Setting up a WiFi Network v3
Setting up a WiFi Network v3Setting up a WiFi Network v3
Setting up a WiFi Network v3
 
CNS599_NLEN_InformationSecurity
CNS599_NLEN_InformationSecurityCNS599_NLEN_InformationSecurity
CNS599_NLEN_InformationSecurity
 
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docxAuthentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
 
Pace IT - Peripheral Devices
Pace IT - Peripheral DevicesPace IT - Peripheral Devices
Pace IT - Peripheral Devices
 
MasterCapstoneV9
MasterCapstoneV9MasterCapstoneV9
MasterCapstoneV9
 
CNS599NLEN_RiskAssessment
CNS599NLEN_RiskAssessmentCNS599NLEN_RiskAssessment
CNS599NLEN_RiskAssessment
 
PACE-IT, Security+1.3: Secure Network Design Elements and Components
PACE-IT, Security+1.3: Secure Network Design Elements and ComponentsPACE-IT, Security+1.3: Secure Network Design Elements and Components
PACE-IT, Security+1.3: Secure Network Design Elements and Components
 
Maxis Fibre Internet FTTH Self Help Guide
Maxis Fibre Internet FTTH Self Help GuideMaxis Fibre Internet FTTH Self Help Guide
Maxis Fibre Internet FTTH Self Help Guide
 
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
 

Mehr von Pace IT at Edmonds Community College

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPace IT at Edmonds Community College
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)Pace IT at Edmonds Community College
 

Mehr von Pace IT at Edmonds Community College (20)

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
 
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account ManagementPACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account Management
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
 
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication ServicesPACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication Services
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
 
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data SecurityPACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment ToolsPACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment Tools
 
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement TechniquesPACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement Techniques
 
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
 
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
 

Kürzlich hochgeladen

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfSanaAli374401
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.MateoGardella
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterMateoGardella
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...KokoStevan
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 

Kürzlich hochgeladen (20)

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 

Pace IT - Client Networking (Part 2)

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of Expertise Industry Certifications  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 – Establishing network connections. – Proxy settings. – Remote Desktop. PACE-IT.
  • 4. Page 4 Client side network setup II.
  • 5. Page 5 – Dial-up. » Requires a modem and an ISP that accepts dial-up connections. – Set up. » Select Network and Sharing Center from the Control Panel. » Select Set Up a New Connection or Network. » Enter the information provided by the ISP (e.g., the number to use, username, and password). » Either allow or disallow other people to use the connection. » Click on the Create button. Client side network setup II.
  • 6. Page 6 – Virtual Private Network (VPN). » Allows for private connection over public networks. » Creates an encrypted tunnel to the VPN server or firewall. – Set up. » Select Network and Sharing Center from the Control Panel. » Select Set up a new connection or network. » Select Connect to a workplace. » Click on the Use my Internet connection (VPN) button. » Enter the IP address of the VPN server. » Enter the proper username, password, and domain (if required). » Click on the Connect button. » The computer will cycle through all the available tunneling protocols until the VPN server accepts one. Client side network setup II.
  • 7. Page 7 – Wireless. » Requires the capability (wireless adapter), a compatible wireless access point (WAP), and an Internet connection. – Set up. » Know the service set identifier (SSID) of the wireless network. » Know the type of security used (WEP, WPA, WPA2, or 802.X). » Click Start. » Select Connect To. » Select the wireless network you wish to join. » Select Connect. » Enter the proper credentials when prompted. » Click on the OK button. Client side network setup II.
  • 8. Page 8 – Wired. » Requires a network interface card (NIC) and the proper type of cabling (e.g., Cat5, Cat5e, or Cat6). » Requires a switch or router, or both. – Set up. » In most cases, the set up for a wired network is automatic, as access to a functioning switch port is deemed sufficient authorization to use a network. » Set up for both wired and wireless networks often use DHCP to configure the proper IP addresses. Client side network setup II.
  • 9. Page 9 Client side network setup II.
  • 10. Page 10 Proxy servers enable a network to use caching and filtering on the network. Caching conserves bandwidth, while filtering restricts access to Web pages. An added benefit to using a proxy server is that the end user is hidden (shielded) from the Internet. Client side network setup II.
  • 11. Page 11 – Proxy Settings. » Most client side proxy settings are established by the browser. – Set up. » Select Internet Options from the Control Panel. » Click the Connections tab. » Click the LAN Settings button. » Check the box for Use a Proxy Server for Your LAN. » Enter the IP address and port for the proxy server. » It is possible to bypass the proxy server for local network traffic. » Click on the OK button. Client side network setup II.
  • 12. Page 12 Client side network setup II.
  • 13. Page 13 Allowing Remote Desktop access means you can use your PC from anywhere you have Internet access. Remote Desktop can be a powerful tool in your arsenal, but it is also a vulnerability. Allowing Remote Desktop permits outside access to what should be a secure system. Client side network setup II.
  • 14. Page 14 – Remote Desktop. » Remote settings need to be allowed before Remote Desktop can be enabled. » By default Windows Firewall blocks access to the Remote Desktop feature. – Set up. » Select System from the Control Panel. » Select Remote settings. » Select the radio button that sets the remote connection level that is desired. » Click Apply. » Select Windows Firewall from the Control Panel. » Select Allow a program or feature through Windows Firewall. » Check the box for Remote Desktop and then check the box for the types of network profiles allowed, either Private or Public (not recommended). » Click the OK button. Client side network setup II.
  • 15. Page 15 Client side network setup II. Dial-up, VPN, wireless, and wired networks all have their own methods of establishing connections. Wired networks are the easiest, as access to a working port is usually deemed sufficient authentication. Topic Establishing network connections. Summary Proxy servers allow for caching of and restriction to Web pages. On the client side, the settings are usually established by the Web browser.Proxy settings. Remote Desktop requires a two-step process. Remote Desktop must be enabled under the Systems settings and then Windows Firewall must be configured to allow the remote connection into the system. Remote Desktop.
  • 17. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.