Principal IT Consultant. Michael Buth IT Consultant Werner Str Dortmund (Germany)

Size: px
Start display at page:

Download "Principal IT Consultant. Michael Buth IT Consultant Werner Str. 29 44388 Dortmund (Germany) +49 231 330 378 76. michael.buth@mbuth."

Transcription

1 Michael Buth Principal IT Consultant Personal details Name, Surname Address Phone Web Year of birth Education Foreign languages Buth, Michael Michael Buth IT Consultant Werner Str Dortmund (Germany) in Münster, Germany Study economical informatics Westfälische Wilhelms Universität, Münster (Germany) Tax consultant assistant English (fluently), French (basic skills)

2 Professional experience Michael Buth IT Consultant now Ø IT Consulting Project & Program Management Ø PKI Designer / Architect Ø IT Architecture & Infrastructure Disgn Ø Transition & Out Sourcing Know-How Ø Freelancer Warp Chamber of commerce (IHK Nord Westfalen) now Chamber of commerce Akademie der Wirtschaft der IHK Nord Westfalen IT- System Service Steuerbüro Margot Rittmeier Ø Chief Executive Officer (CEO) Ø Program / Project Management Ø Principal Integrator / Principal IT Consultant Ø Network and System Engineering Ø Member in the board of examiners Certified IT-Manager" / Certified IT Project-Manager / Certified IT Business Manager Ø IT Trainer Ø Network and System Engineering Ø System and Security Administration Ø IT Trainer Ø IT Consultant Ø 2 nd and 3 rd level Support Ø Apprenticeship, tax consultant Ø Network administrator

3 Project experiences CUSTOMER (PERIOD) Schmitz Wortmann Steuerberatungs- GbR ( ) TASKS Ø Analysis an consulting Ø Customizing DNS Ø Customizing Kerio Connect mail server Ø Customizing web server Ø Customizing Active Directory City of Lünen ( ) IHK Nord Westfalen ( ) die Sprachwerkstatt ( ) KG Deutsche Gasrußwerke & Co ( ) Rittmeier Steuerberatung ( ) ID-ware Deutschland ( ) ( ) Ø Consulting Proxy Infrastructure Ø Consulting Bring Your Own Device (BYOD) Ø Analysis and configuration of layer-3 Components (Routen and Switches) Ø Integration of VPN Ø Concept and Integration Active Directory Enterprise Public Key Infrastructure (PKI) Ø Integration of Mobile Devices in 802.1x Wifi Ø Bring Your Own Device (BYOD) concept Ø Firewall integration concept Ø Concept for RADIUS authentication Ø Concept for proxy server integration Ø Concept for kerberos authentication Ø Konzept Kiosk Client Ø Migration VMware ESXi to 5.5 Ø New IT Security concept Ø High Availability Firewall concept Ø Redundant Internet connection concept Ø Kerio Connect Mail Server integration in Active Directory Domain Structure Ø Concept for a Open Source Datacenter Firewalls Ø Concept for Datacenter Active Components Ø Deployment of Open Source Datacenter Firewalls Ø Concept for Client Rollout Ø Concept for Client Deployment Ø Concept for Printer Management Ø Client Deployment Ø Software Deployment

4 ID-ware Deutschland Ø Concept for a Public Key-Infrastructure (PKI) Ø Concept migration network datacenter ( ) Ø Concept network security datacenter Ø Concept Active Directory datacenter Ø Concept VPN-/Firewall-Appliances Ø Migration network datacenter Ø Migration Firewall-/VPN datacenter Ø Migration Cisco router Datacenter Ø Migration Datacenter Mail Server ( ) KfW Bankengruppe Kreditanstalt für Wiederaufbau ( ) KfW Bankengruppe Kreditanstalt für Wiederaufbau ( ) Eurowings ( ) KG Deutsche Gasrußwerke & Co ( ) die Sprachwerkstatt ( ) Ø Concept for moving data center Ø Concept for DNS and Domain Administration Ø Concept for Redundant Network Datacenter Ø Outsourcing Webservices Ø Outsourcing Mailservices Ø Migration VMware ESX Ø Migration Storage System Ø Migration Active Directory Ø Migration VPN-/Firewall-Appliances Ø Deployment Windows 7 Ø Notebook Deployment Windows 7 Ø User Experience Virtualization (UE-V) Ø System Center Configuration Manager (SCCM) Ø Concept for a Public Key-Infrastructure (PKI) Ø Consulting Verwaltungs-PKI (BSI V-PKI) Ø Architecture and design proposals Ø Concept for Codesigning & SSL encryption Ø Processmanagement Ø Implementation of an enterprise PKI Ø Operational Manual Ø Concept for PKI transition Ø Customizing PKI Ø Technologie- and Know-How transfer Ø PKI customizing for advanced SmartCard usage Ø Implementation of proxy-server as central control authorities Ø Virtualization of SQUID

5 printing company Ø Concept Mac OS X Server implementation ( ) Ø Migration Active Directory -> OS X Open Directory Ø Mac OS X Server 10.7 NetBoot, RADIUS 802.1x Wifi & Ethernet Ø Integration of Kerio Connect Mail Server Ø Integration of iphones in 802.1x Wifi Infrastructure Ø Firewall, VPN & Squid Proxy Server KG Deutsche Gasrußwerke & Co ( ) Rittmeier Steuerberatung ( ) ( ) Eurowings Luftverkehrs AG ( ) HighSolutuions AG ( ) DECO LEISURE ( ) IHK Nord Westfalen ( ) Ø Migration Windows Server > Windows Server 2008 R2 Ø Integration of Smart Phones (iphone, Android) in 802.1x Wifi Ø Integration of SmartCard Public Key Infrastructure (PKI) Ø Integration Active Directory Enterprise Public Key Infrastructure (PKI) Ø Integration RADIUS (NPS) 802.1x Wifi Active Directory Infrastructure Ø Integration RADIUS (NPS) 802.1x Wired Access Infrastructure Ø Integration Squid Proxy based on Server Windows Server 2008 R2 with User Auth. Ø Concept for securing conference rooms Ø Concept Migration Windows XP -> Windows 7 64bit Ø Concept Migration Office > Office 2010 Ø VMware ESXi migration from 4.1 to 5.0 Ø Migration Windows Server 2003 to Windows Server 2008 R2 Active Directory Ø Automated deployment of Windows 7 and Office 2010 using Automated Deployment Kit (AIK / WAIK) Ø VMware ESXi migration from 4.1 to 5.0 Ø Integration of iphone (Kerio Connect Mailserver) Ø Integration of Secure (S/MIME) Public Key (PKI) Ø Integration of Windows Server 2008 R2 VPN IPsec network Ø Network analysis Ø Development of scalable future-oriented proposals for network Ø Workshop Windows Server 2008 R2 Ø Workshop Migration Novell NetWare 6 -> Windows Server 2008 R2

6 Ø VMware ESXi migration from 3.5 to Ø Concept Migration Windows XP to Windows 7 64bit Ø Concept Microsoft WDS Roll Out ( ) Steuerberatung Rittmeier ( ) ( ) Ø Server virtualization to VMware ESXi 4.1 Ø Integration of iphone Ø Integration of iphones in 802.1x Wifi Infrastructure Ø Integration of secure Wifi Ø Data center virtualization to VMware ESX Ø Integration of iphone Ø Firewall migration to Cisco ASA Ø Backup concept T-Mobile Deutschland ( ) T-Mobile Deutschland ( ) St. Elisabeth-Hospital Beckum ( ) Kreis Soest ( ) T-Mobile International AG ( ) Fachhochschule Köln ( ) Ø Migration of FTP services to secure web based services Ø Design Proposals Ø Migration Microsoft 2000 Server -> Windows Server 2008 Ø Active Directory Design Proposals Ø Project Management Ø Migration Lotus Notes -> Microsoft Exchange Ø Linux Reverse Proxy Integration -> Active Sync, OWA, Outlook over RPC/HTTPS Ø Integration and maintenance of RSA SecurID Appliance Ø Project Management Ø Design, maintenance and monitoring of CeBIT / Systems platform for mobile devices Ø Integration of RIM Blackberry Ø Integration of Apple iphone Enterprise Infrastructure Ø Maintenance of Check Point firewalls and Cisco VPN-Gateways Ø Maintenance of active network components Ø Integration of Public-Key-Infrastructure (PKI) Ø Design and implementation of network Ø Migration of Windows NT 4.0 network to Microsoft Server 2003 Active Directory

7 Haupt Pharma AG Ø Project Management ( ) Ø Migration of Windows NT 4.0 network to Microsoft Server 2003 Active Directory Ø Implementation of VMware ESX Server Infrastructure Ø Design and implementation of network Ø Integration of Cisco Failover Firewall Cluster Ø Integration of VPN Ø Integration of Squid Proxy Servers (failover) Ø Support for SAP migration project Kreis Soest ( ) T-Mobile Mobile Bussiness Solution ( ) UNITED LABLES AG ( ) Ø Migration of Check Point Firewalls to Cisco Pix Firewalls Ø Integration and maintenance Cisco Failover Firewall Cluster and VPN-Gateways Ø Design and implementation of network and VLANs Ø EIP / SIP Project Ø Design, integration, maintenance of Check Point Nokia Cluster Firewalls Ø Integration and maintenance of active components HP and Cisco Switches, Cisco Routers, VPN- Gateways Ø Integration of VLAN, OSPF Routing Ø Design and integration of DNS Servers Ø Support for Microsoft consultants & developers Ø Maintenance and administration Microsoft ISA Servers Ø Support for Speed Proxy integration Ø Development and integration of external mobile services and integration of needed VPN and security Ø Enterprise customers support integrating VPN and mobile services Ø Design and integration of security concepts Ø Design and integration of Cisco Firewall Appliances Ø Integration of VPN Chamber of commerce IHK Nord Westfalen ( ) Ø Design and implementation of network Ø Design and implementation of intranet & internet Ø Firewall, Proxy, Mail, Web, DNS

8 Competencies COMPETENCE Operating Systems (Computer) Operating Systems (Appliances) Software DESCRIPTION Ø Windows NT, 2000, 2003, 2008, 2012, XP, Vista, 7, 8, 10 Ø UNIX, Linux (RHEL, CentOS, Fedora, SuSE, Debian) Ø SUNOS/Solaris Ø OpenBSD, FreeBSD, NetBSD Ø Novell Netware Ø Mac OS X, Mac OS X Server Ø Cisco Pix, ASA, VPN, IOS Ø Check Point Ø Juniper Ø Netscreen Ø RSA SecurID Ø NOKIA Ø Open source firewall systems Ø Switches: Cisco, HP, Dell etc. Ø Microsoft Server & Products Ø Kerio Connect Mail Server Ø VMware (NAS / SAN) Ø Red Hat Directory Server (LDAP) Ø Apache Ø MySQL Ø Postfix Ø Nagios Ø Squid Ø RADIUS Ø Black Berry Enterprise Server Ø etc

9 Networking & Ø Expert Public Key Infrastructure (PKI) know how Security Skills Ø PGP, S/MIME Soft Skills Ø Expert IP know how Ø Project and process management (ITIL) Ø Architecture- and design Ø Complex IP Network Design Ø Migration and integration Ø Systems and network management and analyses Ø Virtualization Ø Security audits Ø Intrusion prevention Ø Trouble shooting Ø Firewall, VPN Ø VLAN Ø Routing Ø Switching Ø Clustering, load balancing Ø Directory Services Ø LDAP Ø Active Directory Ø GPO Ø 13 years of management experience Ø Professional attitude and appearance Ø Decisive and accountable character Ø Excellent presentation and communication skills Ø Profound experience in transforming marketing requirements and business strategies into technical solution Ø Proven ability to lead teams to deliver in time and budget Ø Visionary thinking and open-minded, innovative intellect Ø Well established contacts https://www.xing.com/profile/michael_buth Ø Profound knowledge of IT technologies and technical improvements Other Skills Ø Accredited as auditor for the certification of persons to ISO Ø Ausbildereignung (AdA) Ø

kerry@crypt.gen.nz http://www.crypt.gen.nz Technology Consultant Security Specialist High Profile Organisations Overview and Core Competencies

kerry@crypt.gen.nz http://www.crypt.gen.nz Technology Consultant Security Specialist High Profile Organisations Overview and Core Competencies KERRY THOMPSON kerry@crypt.gen.nz http://www.crypt.gen.nz PROFESSIONAL PROFILE Technology Consultant Security Specialist High Profile Organisations Overview and Core Competencies Highly experienced CISSP

More information

Measurably reducing risk through collaboration, consensus & practical security management. 2013 CIS Security Benchmarks 1

Measurably reducing risk through collaboration, consensus & practical security management. 2013 CIS Security Benchmarks 1 Measurably reducing risk through collaboration, consensus & practical security management 2013 CIS Security Benchmarks 1 Background City University of New York s Rights and Benefits as a CIS Security Benchmarks

More information

Measurably reducing risk through collaboration, consensus & practical security management. 2015 CIS Security Benchmarks 1

Measurably reducing risk through collaboration, consensus & practical security management. 2015 CIS Security Benchmarks 1 Measurably reducing risk through collaboration, consensus & practical security management 2015 CIS Security Benchmarks 1 Background State of Idaho s Rights and Benefits as a CIS Security Benchmarks Member

More information

Our Systems Experience, Specifically:

Our Systems Experience, Specifically: Our Systems Experience, Specifically: This list is not all encompassing; if you are looking for something in particular that is not listed, we hope you please call or email. Windows Server 2003/XP/Vista

More information

Operating Systems compatible with GigasoftOBM / GigasoftACB (Supported Operation System List):

Operating Systems compatible with GigasoftOBM / GigasoftACB (Supported Operation System List): Product Version: Gigasoft Software: Post6.0 Description: This document lists the available operating systems, platforms, and applications specifically tested to be compatible with Ahsay software. Contents:

More information

OVERVIEW OF TYPICAL WINDOWS SERVER ROLES

OVERVIEW OF TYPICAL WINDOWS SERVER ROLES OVERVIEW OF TYPICAL WINDOWS SERVER ROLES Before you start Objectives: learn about common server roles which can be used in Windows environment. Prerequisites: no prerequisites. Key terms: network, server,

More information

MANAGED SERVICES. Remote Monitoring. Contact US: 800.677.1919 info@millenniuminc.com millenniuminc.com

MANAGED SERVICES. Remote Monitoring. Contact US: 800.677.1919 info@millenniuminc.com millenniuminc.com MANAGED SERVICES Remote Monitoring A N D Ma n a g e m e n t D O C U MENTATION AND Services Gu i d e Contact US: 800.677.1919 info@millenniuminc.com millenniuminc.com ABOUT RMM SERVICES Millennium s RMM

More information

Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture

Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture Deploying Cisco ASA VPN Solutions Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and Course Flow Additional Cisco Glossary of Terms Your Training Curriculum Evaluation of the Cisco

More information

RESUME. Multiple years of hands on experience design, analyze, implement, and setup with OSPF, ISIS, EIGRP, BGP and RIP.

RESUME. Multiple years of hands on experience design, analyze, implement, and setup with OSPF, ISIS, EIGRP, BGP and RIP. RESUME First Name: MOHAMMAD Last Name: KOLEINY Email:mkoleiny@gmail.com Mobile: +989126413877 SUMMARY: have over 7 years of IT/Enterprise and R&D industry experiences which include expertise in design,

More information

ProtectID. for Financial Services

ProtectID. for Financial Services ProtectID for Financial Services StrikeForce Technologies, Inc. 1090 King Georges Post Road #108 Edison, NJ 08837, USA http://www.strikeforcetech.com Tel: 732 661-9641 Fax: 732 661-9647 Introduction 2

More information

Cisco is a registered trademark or trademark of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.

Cisco is a registered trademark or trademark of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries. Legal Notices Copyright 1999, 2009 BMC Software, Inc. Copyright 1996-2014 Numara Software, Inc. BMC, BMC Software, and the BMC Software logo are the exclusive properties of BMC Software, Inc., are registered

More information

Ahmed Al-Haffar. Objectives. Experience

Ahmed Al-Haffar. Objectives. Experience Ahmed Al-Haffar Kuwait - Salmiya (+965) 9724-9062 E-mail: ahmed.haffar@hotmail.com Objectives A Microsoft techie & B.E Computer Science Engineer, with MCSA, MCTS, MCITP, Network+ and CCNA with 6 years

More information

SNOW LICENSE MANAGER (7.X)... 3

SNOW LICENSE MANAGER (7.X)... 3 SYSTEM REQUIREMENTS Products Snow License Manager Snow Automation Platform Snow Device Manager Snow Inventory Server, IDR, IDP Mobile Information Server Client for Windows Client for Linux Client for Unix

More information

70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network

70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network 70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network Course Number: 70 299 Length: 1 Day(s) Course Overview This course is part of the MCSA training.. Prerequisites

More information

Symantec Mobile Management Suite

Symantec Mobile Management Suite Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the

More information

Module 1: Overview of Network Infrastructure Design This module describes the key components of network infrastructure design.

Module 1: Overview of Network Infrastructure Design This module describes the key components of network infrastructure design. SSM6435 - Course 6435A: Designing a Windows Server 2008 Network Infrastructure Overview About this Course This five-day course will provide students with an understanding of how to design a Windows Server

More information

Wide technical Know-how, Cross-platform engineering and troubleshooting, Administration

Wide technical Know-how, Cross-platform engineering and troubleshooting, Administration Business Partner Summary Sheet Last name external consultant: First name external consultant: Main skill: Dietz Oliver T. Wide technical Know-how, Cross-platform engineering and troubleshooting, Administration

More information

GF Financial Markets I.T. Architecture Role

GF Financial Markets I.T. Architecture Role GF Financial Markets ( GFFM ) is a London-based wholly owned subsidiary of GF Securities, one of China s largest security houses. GFFM is FCA regulated and a Ring Dealing member of the London Metal Exchange.

More information

Deployment Guide. Websense Web Security Websense Web Filter. v7.1

Deployment Guide. Websense Web Security Websense Web Filter. v7.1 Deployment Guide Websense Web Security Websense Web Filter v7.1 1996 2009, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published 2009 Printed in the United States

More information

Hosting topology SMS PASSCODE 2015

Hosting topology SMS PASSCODE 2015 Hosting topology SMS PASSCODE 2015 Hosting Topology In a hosting environment, you have a backend and a several front end (clients). In the example below, there is a backend at the right side. At the left

More information

MANAGED HOSTING SERVICES

MANAGED HOSTING SERVICES MANAGED HOSTING SERVICES OVERVIEW AND PRICING Managed hosting is all about peace of mind and comfort in knowing that infrastructure experts look out for your company s most critical assets at all times.

More information

Proven Technical and Management skills over a career spanning more than 10 years. Brunswick Vic 3056 Australia

Proven Technical and Management skills over a career spanning more than 10 years. Brunswick Vic 3056 Australia Resume: Michael McNab Systems Administrator and Web Support Proven Technical and Management skills over a career spanning more than 10 years Name: Address: Phone: Email Address: Website: Michael McNab

More information

Replacing legacy twofactor. with YubiRADIUS for corporate remote access. How to Guide

Replacing legacy twofactor. with YubiRADIUS for corporate remote access. How to Guide Replacing legacy twofactor authentication with YubiRADIUS for corporate remote access How to Guide May 15, 2012 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection.

More information

PCISS-1. Job Description: Key Responsibilities: I. Perform troubleshooting& support:

PCISS-1. Job Description: Key Responsibilities: I. Perform troubleshooting& support: PCISS-1 Job Description: Perform hardware and software installation, configuration, and upgrades Monitoring systems to ensure system availability to all users and performing necessary maintenance to support

More information

Why a Reverse Proxy with My Instant Communicator for mobiles??

Why a Reverse Proxy with My Instant Communicator for mobiles?? Why a Reverse Proxy with My Instant Communicator for mobiles?? INTEGRATED COMMUNICATION SYSTEMS 8AL020043359DRARA, February 2010 What is OmniTouch 8600 My Instant Communicator? Is an aggregator of all

More information

Cisco TrustSec How-To Guide: Planning and Predeployment Checklists

Cisco TrustSec How-To Guide: Planning and Predeployment Checklists Cisco TrustSec How-To Guide: Planning and Predeployment Checklists For Comments, please email: howtoguides@external.cisco.com Current Document Version: 3.0 August 27, 2012 Table of Contents Table of Contents...

More information

CHOOSE CONNECTRIA CLOUD AND MANAGED HOSTING

CHOOSE CONNECTRIA CLOUD AND MANAGED HOSTING CHOOSE CONNECTRIA CLOUD AND MANAGED HOSTING There are hundreds of managed hosting providers that all claim to offer the best managed hosting. But there are vast differences in terms of their reliability,

More information

Check list เตร ยมความพร อมด าน Cyber Security ให หน วยงาน 6 th October 2015 Avirut Liangsiri 1. Effective: 2015-07-01

Check list เตร ยมความพร อมด าน Cyber Security ให หน วยงาน 6 th October 2015 Avirut Liangsiri 1. Effective: 2015-07-01 Check list เตร ยมความพร อมด าน Cyber Security ให หน วยงาน 6 th October 2015 Avirut Liangsiri 1 Agenda Traditional vs. Modern Cyber Defense แตกต างหร อส งเสร มก นและก น อย างไร? Industry Standard Checklist

More information

Select IT Consulting Services RFP 11-01 Technical and Network Support Specialist Services (Lot Group C)

Select IT Consulting Services RFP 11-01 Technical and Network Support Specialist Services (Lot Group C) Computer/Application Support Specialist Computer/Application Support Specialist 1 Typical Functions: Preferred This function requires business work experience with Windows XP, IT experience, work experience

More information

CA Service Desk Manager Release 12.5 Certification Matrix

CA Service Desk Manager Release 12.5 Certification Matrix CA Service Desk Manager Release 12.5 Certification Matrix Last Updated: February 11, 2014 End-of-Service: May 31, 2013 CA Service Desk Manager will support service-packs and point-releases of Operating

More information

The Bomgar Appliance in the Network

The Bomgar Appliance in the Network The Bomgar Appliance in the Network The architecture of the Bomgar application environment relies on the Bomgar Appliance as a centralized routing point for all communications between application components.

More information

ACL Compliance Director FAQ

ACL Compliance Director FAQ Abstract Cyber Operations, Inc., Cyber Operations, Inc. Copyright 2008 Cyber Operations, Inc. This document contains frequently asked questions about ACL Compliance Director with answers. Table of Contents...

More information

PROFILE: SENIOR SYSTEM ENGINEER

PROFILE: SENIOR SYSTEM ENGINEER PROFILE: SENIOR SYSTEM ENGINEER HOLISTIC ICT: BRIDGING THE GAP BETWEEN BUSINESS-ORIENTED DEMANDS AND TECHNOLOGY-DRIVEN SOLUTIONS. PERSONAL INFORMATION: PERSONAL: NAME: KOEN JANSSENS NATIONALITY: BELGIAN

More information

SOFTNIX LOGGER Centralized Logs Management

SOFTNIX LOGGER Centralized Logs Management SOFTNIX LOGGER Centralized Logs Management STANDARD, RELIABLE, SECURITY Softnix Logger Our goal is not only regulate data follow by cyber law but also focus on the most significant such as to storage data

More information

List of Supported Systems & Devices

List of Supported Systems & Devices List of Supported Systems & Devices February 2012 Cyber-Ark's Privileged Identity Management (PIM) Suite is an enterprise-class, unified policy-based solution that secures, manages and monitors all privileged

More information

Status of Open Source and commercial IPv6 firewall implementations

Status of Open Source and commercial IPv6 firewall implementations Status of Open Source and commercial IPv6 firewall implementations Dr. Peter Bieringer AERAsec Network Services & Security GmbH info@aerasec.de European Conference on Applied IPv6 (ECAI6) Cologne, Germany

More information

E M P I R E C O L L E G E

E M P I R E C O L L E G E 34 E M P I R E C O L L E G E Specialized Associate Degree Information Technology Objective: The Specialized Associate Degree Information Technology program is intended to give the student knowledge of

More information

Mobile Admin Architecture

Mobile Admin Architecture Mobile Admin Architecture Introduction Mobile Admin is an enterprise-ready IT Management solution that enables system administrators to monitor and manage their corporate IT infrastructure from a mobile

More information

Introduction to Computer Administration. System Administration

Introduction to Computer Administration. System Administration Introduction to Computer Administration System Administration System Administration System Administration Duties of System Administrator Types of Administrators/Users Operating Systems Supporting Administration

More information

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

CH ENSA EC-Council Network Security Administrator Detailed Course Outline CH ENSA EC-Council Network Security Administrator Detailed Course Outline Summary Duration Vendor Audience 5 Days hands-on training EC-Council Security Professionals Level Technology Category Advance Ethical

More information

ClickShare Network Integration

ClickShare Network Integration ClickShare Network Integration Application note 1 Introduction ClickShare Network Integration aims at deploying ClickShare in larger organizations without interfering with the existing wireless network

More information

Designing a Windows Server 2008 Network Infrastructure

Designing a Windows Server 2008 Network Infrastructure Designing a Windows Server 2008 Network Infrastructure MOC6435 About this Course This five-day course will provide students with an understanding of how to design a Windows Server 2008 Network Infrastructure

More information

Workspot, Inc. RSA SecurID Ready Implementation Guide. Partner Information. Last Modified: September 16, 2013. Product Information Partner Name

Workspot, Inc. RSA SecurID Ready Implementation Guide. Partner Information. Last Modified: September 16, 2013. Product Information Partner Name RSA SecurID Ready Implementation Guide Partner Information Last Modified: September 16, 2013 Product Information Partner Name Web Site Product Name Version & Platform Product Description, Inc. workspot.com

More information

Mobile Admin Security

Mobile Admin Security Mobile Admin Security Introduction Mobile Admin is an enterprise-ready IT Management solution that generates significant cost savings by dramatically increasing the responsiveness of IT organizations facing

More information

Shipping Products Chart. Contents

Shipping Products Chart. Contents Shipping Products Chart Currently shipping EVault Software products and supported platforms Contents Director (Vault) and Related Products Director (Vault) 7.11c ()... 2 Director Management Console (console

More information

Diploma in Computer Science

Diploma in Computer Science SPECIALIST PROFILE Personal Details Reference: Job Title: Nationality: IT Experience: Qualifications: Languages: CN5191 Senior Linux Engineer British 22 years RedHat Certified Engineer Diploma in Computer

More information

SNOW LICENSE MANAGER (8.X)... 4

SNOW LICENSE MANAGER (8.X)... 4 SYSTEM REQUIREMENTS Products Snow License Manager Snow Automation Platform Snow Device Manager Snow Inventory Server, IDR, IDP Mobile Information Server Client for Windows Client for Unix Client for OS

More information

MS-6416D: Updating Your Windows Server 2003 Technology Skills to Windows Server 2008

MS-6416D: Updating Your Windows Server 2003 Technology Skills to Windows Server 2008 MS-6416D: Updating Your Windows Server 2003 Technology Skills to Windows Server 2008 Description This five-day instructor-led course teaches the features and technologies of Windows Server 2008 and Windows

More information

Course Venue :- Lab 302, IT Dept., Govt. Polytechnic Mumbai, Bandra (E)

Course Venue :- Lab 302, IT Dept., Govt. Polytechnic Mumbai, Bandra (E) Information Technology Department CEP on CLOUD COMPUTING (Starting from 3 rd Jan 2015) Module No Course No Course Title Duration Fees Module 1 Course 1 RHCSA (Red Hat certified System 3 Weeks Rs. 6000

More information

Updating Your Windows Server 2003 Technology Skills to Windows Server 2008

Updating Your Windows Server 2003 Technology Skills to Windows Server 2008 Updating Your Windows Server 2003 Technology Skills to MS6416: 5 Days Course Overview This five-day instructor-led course teaches the features and technologies of and R2 to IT professionals who have specialist

More information

Pulse Connect Secure. Supported Platforms Guide. Product Release 8.1. Document Revision 3.0 Published: 2015-03-31

Pulse Connect Secure. Supported Platforms Guide. Product Release 8.1. Document Revision 3.0 Published: 2015-03-31 Pulse Connect Secure Supported Platforms Guide Product Release 8.1 Document Revision 3.0 Published: 2015-03-31 Pulse Connect Secure Supported Platforms Guide 2700 Zanker Road, Suite 200 San Jose, CA 95134

More information

Cisco Which VPN Solution is Right for You?

Cisco Which VPN Solution is Right for You? Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2

More information

YubiRADIUS Deployment Guide for corporate remote access. How to Guide

YubiRADIUS Deployment Guide for corporate remote access. How to Guide YubiRADIUS Deployment Guide for corporate remote access How to Guide May 15, 2012 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection. The company s flagship

More information

iphone in Business How-To Setup Guide for Users

iphone in Business How-To Setup Guide for Users iphone in Business How-To Setup Guide for Users iphone is ready for business. It supports Microsoft Exchange ActiveSync, as well as standards-based services, delivering email, calendars, and contacts over

More information

Kaspersky Endpoint Security 10 for Windows. Deployment guide

Kaspersky Endpoint Security 10 for Windows. Deployment guide Kaspersky Endpoint Security 10 for Windows Deployment guide Introduction Typical Corporate Network Network servers Internet Gateway Workstations Mail servers Portable media Malware Intrusion Routes Viruses

More information

Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper

Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper StrikeForce Technologies, Inc. 1090 King Georges Post Rd. Edison, NJ 08837, USA Tel: 732 661-9641 Fax: 732 661-9647 http://www.sftnj.com

More information

Symantec App Center 4.0 Admin Documentation

Symantec App Center 4.0 Admin Documentation Symantec App Center 4.0 Admin Documentation Installation Planning Guide September 2012 Symantec Corporation, 2012 Page 1 Table of Contents Purpose of Document... 3 Deployment Options Overview... 3 Public

More information

Phong Dam. Objective. Experience

Phong Dam. Objective. Experience Phong Dam 8610 Causeway Dr Houston, TX 77083 pddam@newagedev.net Cell: 8328660213 Objective Obtain a challenge position of the dynamic world of information technology in which I can utilize my knowledge

More information

vcloud Automation Center Support Matrix vcloud Automation Center 5.2

vcloud Automation Center Support Matrix vcloud Automation Center 5.2 vcloud Automation Center Support Matrix vcloud Automation Center 5.2 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Microsoft Windows Server 2008: MS-6435 Designing Network and Applications Infrastructure MCITP 6435

Microsoft Windows Server 2008: MS-6435 Designing Network and Applications Infrastructure MCITP 6435 coursemonster.com/au Microsoft Windows Server 2008: MS-6435 Designing Network and Applications Infrastructure MCITP 6435 View training dates» Overview This course will provide students with an understanding

More information

Software Requirements, Version 2015_01_12

Software Requirements, Version 2015_01_12 Software Requirements, Version 2015_01_12 Product / Version DSM 7.2.1 DSM 2013.2 DSM 2014.1 Server Software (EN) Windows Server 2008 R2 Standard, Enterprise, Datacenter, Core (all SP) Windows Server 2008

More information

Web Hosting. E-Mail Hosting. Cloud File Hosting. The Genio Group (214) 732-7411 info@thegeniogroup.com www.thegeniogroup.com

Web Hosting. E-Mail Hosting. Cloud File Hosting. The Genio Group (214) 732-7411 info@thegeniogroup.com www.thegeniogroup.com Web Hosting E-Mail Hosting Cloud File Hosting Genio Hosting Servers All of Genio s Hosting Servers run on Apple hardware running Mac OS X Server. Mac OS X Server leverages the computing power of 64-bit

More information

Pulse Policy Secure. Supported Platforms Guide. Product Release 5.1. Document Revision 1.0 Published: 2014-12-15

Pulse Policy Secure. Supported Platforms Guide. Product Release 5.1. Document Revision 1.0 Published: 2014-12-15 Pulse Policy Secure Supported Platforms Guide Product Release 5.1 Document Revision 1.0 Published: 2014-12-15 2014 by Pulse Secure, LLC. All rights reserved Pulse Secure, LLC 2700 Zanker Road, Suite 200

More information

PROFILE: SENIOR SYSTEM ENGINEER

PROFILE: SENIOR SYSTEM ENGINEER PROFILE: SENIOR SYSTEM ENGINEER MISSION STATEMENT: TO DECIDE UPON & BRING THE RELEVANT TECHNOLOGIES TO THE BUSINESS WITHOUT LOSING SIGHT OF BOTH BUSINESS NEEDS AND IMPLEMENTATION GOALS. IN OTHER WORDS:

More information

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led Certification: ENSA Exam 312-38 Course Description This course looks at the network security in defensive view.

More information

Release Notes. for Kerio Connect 8.0.0

Release Notes. for Kerio Connect 8.0.0 Release Notes for Kerio Connect 8.0.0 Date: December 4, 2012 2012 Kerio Technologies. All rights reserved. 1 Important changes in this version New Kerio Connect client The Kerio Connect webmail interface

More information

ITEC 495 Capstone Project Ideas

ITEC 495 Capstone Project Ideas ITEC 495 Capstone Project Ideas Open Source Content Filtering OpenDNS A 25 person architectural firm with one single location needs to implement a low cost, secure, easy to deploy and administer web content

More information

Course 6416D: Updating Your Windows Server 2003 Technology Skills to Windows Server 2008

Course 6416D: Updating Your Windows Server 2003 Technology Skills to Windows Server 2008 Course 6416D: Updating Your Windows Server 2003 Technology Skills to Windows Server 2008 Length: Delivery Method: 5 Days Instructor-led (classroom) About this Course This five-day instructor-led course

More information

n2grate Open Positions March 2015

n2grate Open Positions March 2015 n2grate Open Positions March 2015 Table of Contents 1. CMS Centers for Medicare & Medicaid Services Roles... 1 1.1 Role 012 Computer System Analysts II...1 1.1.1 Location: Dallas, Texas... 1 1.3 Role 013

More information

Symantec Encryption Solutions for Email, Powered by PGP Technology

Symantec Encryption Solutions for Email, Powered by PGP Technology Symantec Encryption Solutions for Email, Powered by PGP Technology Data Sheet: Encryption The Problem with Email Are you worried that users are emailing sensitive information openly? According to Osterman

More information

Shipping Products Chart. Contents

Shipping Products Chart. Contents Shipping Products Chart Currently shipping EVault Software products and supported platforms Contents Director (Vault) and Related Products Director (Vault) 7.02b ()... 2 Director Console (console only)

More information

Request for Proposal MDM0031012338. Offeror s Questions for RFP for Virtual Private Network Solution (VPN)

Request for Proposal MDM0031012338. Offeror s Questions for RFP for Virtual Private Network Solution (VPN) Request for Proposal MDM0031012338 Offeror s Questions for RFP for Virtual Private Network Solution (VPN) 1. How much throughput must the VPN support long-term? Answer: 10 GB firewall, 4 GB 3DES/AES VPN

More information

Fundamentals of Windows Server 2008 Network and Applications Infrastructure

Fundamentals of Windows Server 2008 Network and Applications Infrastructure Fundamentals of Windows Server 2008 Network and Applications Infrastructure MOC6420 About this Course This five-day instructor-led course introduces students to network and applications infrastructure

More information

Corporate VPN Using Mikrotik Cloud Feature. By SOUMIL GUPTA BHAYA Mikortik Certified Trainer

Corporate VPN Using Mikrotik Cloud Feature. By SOUMIL GUPTA BHAYA Mikortik Certified Trainer Corporate VPN Using Mikrotik Cloud Feature By SOUMIL GUPTA BHAYA Mikortik Certified Trainer What is a VPN? A virtual private network (VPN) is a method for the extension of a private network across a public

More information

MUHAMMAD USMAN SHARIF

MUHAMMAD USMAN SHARIF MUHAMMAD USMAN SHARIF CCIE # 47806 (Service Provider) Email-Address : usmanlodhi1001@gmail.com Skype Name : usman_lodhi1001 LinkedIn : https://pk.linkedin.com/in/usmanlodhi1001 Mobile No : 0092-323-4947956

More information

MCITP MCITP: Enterprise Administrator on Windows Server 2008 (5 Modules)

MCITP MCITP: Enterprise Administrator on Windows Server 2008 (5 Modules) MCITP Windows 2008 Enterprise Edition is considered as Microsoft s most reliable, scalable and high-performing server operating system. It has been designed to simplify the process of Migration from the

More information

ACCREDITED SOLUTION. EXPLORER Cisco Systems VPN Client

ACCREDITED SOLUTION. EXPLORER Cisco Systems VPN Client ACCREDITED SOLUTION EXPLORER Cisco Systems VPN Client Document Name: EXPLORER Cisco Systems VPN Client Revision: PA2 Introduction: Typical Applications: Product Description: This document describes the

More information

Sophos Certified Architect Course overview

Sophos Certified Architect Course overview Sophos Certified Architect Course overview UTM This course provides an in-depth study of UTM, designed for experienced technical professionals who will be planning, installing, configuring and supporting

More information

Cisco WebEx Meetings Server

Cisco WebEx Meetings Server Data Sheet Cisco WebEx Meetings Server Now you can bring Cisco WebEx conferencing into your company s private cloud, for a cost-effective, secure, and flexible collaboration and communications solution.

More information

Content Distribution Management

Content Distribution Management Digitizing the Olympics was truly one of the most ambitious media projects in history, and we could not have done it without Signiant. We used Signiant CDM to automate 54 different workflows between 11

More information

IVAN WINDON - CCENT NETWORK / SYSTEMS ADMINISTRATOR AREAS OF EXPERTISE:

IVAN WINDON - CCENT NETWORK / SYSTEMS ADMINISTRATOR AREAS OF EXPERTISE: IVAN WINDON - CCENT 5295 S Netherland Way, Centennial, CO 80015 720.258.6311 c https://www.l3pdu.com ivan.windon@l3pdu.com NETWORK / SYSTEMS ADMINISTRATOR Solutions-focused IT professional driven to advance

More information

To support all ICT network, telecommunications and network security systems within the Council

To support all ICT network, telecommunications and network security systems within the Council JOB DESCRIPTION JOB TITLE: Network Officer SERVICE AREA: ICT LOCATION: As Reasonably Determined JOB NO: SECTION: ICT Technical Services GRADE: G7 SCP s: N/A : PURPOSE OF JOB: To support all ICT network,

More information

Access Your Cisco Smart Storage Remotely Via WebDAV

Access Your Cisco Smart Storage Remotely Via WebDAV Application Note Access Your Cisco Smart Storage Remotely Via WebDAV WebDAV (Web-based Distributed Authoring and Versioning), is a set of extensions to the HTTP(S) protocol that allows a web server to

More information

VNLINFOTECH JOIN US & MAKE YOUR FUTURE BRIGHT. mcsa (70-413) Microsoft certified system administrator. (designing & implementing server infrasturcure)

VNLINFOTECH JOIN US & MAKE YOUR FUTURE BRIGHT. mcsa (70-413) Microsoft certified system administrator. (designing & implementing server infrasturcure) VNLINFOTECH JOIN US & MAKE YOUR FUTURE BRIGHT mcsa (70-413) Microsoft certified system administrator (designing & implementing server infrasturcure) www.vnlinfotech.com MODULE 1 : Considerations for Upgrades

More information

"cv" Saman Khalilian. Certificates. IT Courses Passed. Technical Skills

cv Saman Khalilian. Certificates. IT Courses Passed. Technical Skills "cv" Saman Khalilian Certificates MCP, since 6002, MCP ID: 6205062 MCSA on Windows 6006 MCSA: Messaging on Windows 6006 MCSE on Windows 6006 MCSE: Messaging on Windows 6006 MCTS MCITP: Enterprise Administrator

More information

VPN_2: Deploying Cisco ASA VPN Solutions

VPN_2: Deploying Cisco ASA VPN Solutions VPN_2: Deploying Cisco ASA VPN Solutions Description Deploying Cisco ASA VPN Solutions (VPN) 2.0 is the latest update to the Cisco Certified VPN Training that aims at providing network security engineers

More information

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players The Current and Future State of IT When, Where, and How To Leverage the The and the Players Software as a Service Citrix VMWare Google SalesForce.com Created and Presented by: Rand Morimoto, Ph.D., MCITP,

More information

Remco Hannink ICT Security Consultancy

Remco Hannink ICT Security Consultancy Remco Hannink ICT Security Consultancy Holterweg 36 7441DH Nijverdal 06-34204098 087-8724221 info@foursec.nl www.foursec.nl Education BSc, Computer engineering, Hogeschool Enschede (graduated 1992) MSc,

More information

CURRICULUM VITAE. Swedish/American (dual citizenships)

CURRICULUM VITAE. Swedish/American (dual citizenships) CURRICULUM VITAE PERSONAL INFORMATION Name NICO DAVIS Address FURALLÉN 34 218 36 BUNKEFLOSTRAND E-mail Nationality SWEDEN nico@davis.se Date of birth 22 OCTOBER 1971 Microsoft Certified Professional ID

More information

DEPLOYMENT GUIDE. Websense Enterprise Websense Web Security Suite TM. v6.3.1

DEPLOYMENT GUIDE. Websense Enterprise Websense Web Security Suite TM. v6.3.1 DEPLOYMENT GUIDE Websense Enterprise Websense Web Security Suite TM v6.3.1 1996 2009, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published June 13, 2007 Printed

More information

SINGLE COURSE. 136 Total Hours. After completing this course, students will be able to:

SINGLE COURSE. 136 Total Hours. After completing this course, students will be able to: NH204-1314 Designing and Implementing Server Infrastructure 136 Total Hours COURSE TITLE: Designing and Implementing Server Infrastructure COURSE OVERVIEW: After completing this course, students will be

More information

VMware Identity Manager Connector Installation and Configuration

VMware Identity Manager Connector Installation and Configuration VMware Identity Manager Connector Installation and Configuration VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until the document

More information

ecopy ShareScan v4.3 Pre-Installation Checklist

ecopy ShareScan v4.3 Pre-Installation Checklist ecopy ShareScan v4.3 Pre-Installation Checklist This document is used to gather data about your environment in order to ensure a smooth product implementation. The Network Communication section describes

More information

Supported Devices (Event Log Sources)

Supported Devices (Event Log Sources) Operating Systems HP Insight Manager Windows Time service CISCO CatOS IBM DB2 UDB Websense WSG CISCO IOS Imperva Cisco NX OS LogBinder SP Astaro Citrix NetScaler OS MacAfee Intrushield IPS Security 110

More information

Oregon Enterprise Technology Services Architecture Request for Proposals (RFP) Guidelines

Oregon Enterprise Technology Services Architecture Request for Proposals (RFP) Guidelines Oregon Enterprise Technology Services (ETS) Customer Requests ETS customers issuing RFPs to support application development initiatives often have hardware requirements. Standards and guidelines for equipment

More information