Remco Hannink ICT Security Consultancy

Size: px
Start display at page:

Download "Remco Hannink ICT Security Consultancy"

Transcription

1 Remco Hannink ICT Security Consultancy Holterweg DH Nijverdal Education BSc, Computer engineering, Hogeschool Enschede (graduated 1992) MSc, Computer science, Universiteit Twente (graduated 1995) Courses Alfresco Jumpstart Course CISSP (2007) CCENT (CCNA part 1) Masterclass Infrastructure and Architecture (Cibit) Personal Skils - Company internal Writing of comprehensive documentation Windows NT workstation (MCSE) Windows NT server (MCSE) TCP/IP networking (IBM) Visual Age C++ for Java (IBM) IBM 4758 Crypto course (IBM) Introduction Prince II Projectmanagement Employment Period: August current Company: Self employed at Foursec Job description: ICT Security consultant / owner Period: March August 2008 Company: Be-Value b.v. Job description: Senior ICT consultant Period: August December 2003 Company: Stelvio b.v. Job description: Internet security consultant Period: August August 2001 Company: IBM Professional services N.V. Job description: Architect Project experience Period: November current Organization: Department of Defense NL - JIVC/SATS

2 Job description: Network security architect Designing and accreditation of several gateways between networks with different classifications. Perform a (technical) risk analysis according to VIR E&E methodology. Design and implement a Drivelock endpoint solution on classified networks. Accreditation of a military classified semi-static network. Design and implement security measures to secure a mobile Android platform for military and classified use. Integrate DefCERT within military and classified networks. Period: March November 2013 Organization: Department of Defense NL C2SC project TITAAN Job description: Security architect Design and implement an IDS/IDP. Design and implement a SIEM solution based on Intellitactics software. Design and test a Network Access Control (NAC) sytem based on 802.1X, PKI en RADIUS. Performance measurements en testing of application of different VPN solutions (hardware, software, tunnel mode, transport mode). Design of an Electronic Key Management Systeem for crypto hardware. Designing and implement an accredited gateway between networks with different classifications. Implementation of government security guidelines using the CRAMM analysis method. Design and implementation of security measures in the area of transmission, networks, VoIP and applications for a new semi-static military network (TITAAN). Implementation of a layer 2 crypto in an existing WAN network. Implementation of IP crypto s in an existing WAN network. Design and implementation of a RADIUS authentication system.

3 Design of a SNMPv3 management system. Design and implementation of a VPN solution. Development of a security awareness training. Development of a secure architecture training. Design and implementation of an IDS based on opensource software. Securing an Android tablet/smartphone to proces restricted information. Period: November 2002 March 2004 Organization: Stelvio b.v. Job description: Productmanager Design and implementation of a centralized Spamand Virusfilter. Based on open source products. Period May 2000 March 2004 Organization: nl.tree Job Description: Architect / security specialist Design parts of the new Kennisnet network (cisco) Design and migrate to a new serverfarm for Kennisnet (SUN Solaris en Iplanet) Design and projectmanagement of a provisioning system. Period December 2000 March 2004 Organization: nl.tree Job Description: Security consultant Implementation of security management within nl.tree. Perform an Afhankelijkheden & Kwetsbaarheden (A&K) risk analysis on all parts of Kennisnet. Design of a decentralized firewall service Design of a nationwide VPN service. Design of a nationwide Remote Access service. Design of a SSO (Single Sign On) and Identity Management platform. Period: June 2003 Organization: FOM (stichting Fundamenteel Onderzoek Materie) Job description: Consultant Design a secure remote connection, product selection and review of the implementation by third party.

4 Period: May 2003 Organization: Stelvio b.v. Job Description: Consultant Designing, implementing, testing and migrating an Open Source mailserver (Linux, software RAID, Postfix, Cyrus, Mailman en Apache). Period: May 2002 Organization: LSOP (Dutch Police Academy) Job description: Consultant Perform a security scan and penetration test on extranet part of the network. Implement security management in the organization and perform A&K analysis on a part of the network. Period: May 2001 Organization: Hogeschool van Utrecht Job Description: Consultant Advice on measures for restricting internet access by students. Period: June 2000 en June 2001 Organization: PBNA Job description: Trainer Teach 2 PBNA courses on Information security based on the Code voor Informatiebeveiliging guidelines from the Dutch government. Period: September 2000 June 2001 Organization: PON automobielhandel Job description: Project manager Technical projectmanagement for router management for their complete worldwide network. Period: Augustus 2000 December 2000 Organization: DSM Born Job description: Consultant Compose a policy for internet access. Period: May 2000 November 2000 Organization: NIMR (Nederlands Instituut voor metallurgische Research)

5 Job description: Consultant Consult the organization on securing their LAN, Internet Access and Intranet. Period: January 1999 July 1999 Organization: Informatie beheer Groep Job description: Design and System integration of a Student administration application by using Student Chipcard as authentication token. Period: July 1999 January 2000 Organization: Easychip (Interpay) en RAI Datacenter Job description: IT architect: Design, implement and perform system integration of a license plate registration application using Chipknip as an authentication token. Period: July 1999 Organisatie: IBM Nederland N.V. IT architect Design, product selection and installing a PKI system integrated with smartcards. Period: May 1999 June 1999 Organization: CenE bankiers Utrecht Integration of a homebanking application with a smartcard (Java, PC/SC en smartcards). Period: March 1999 Organization: KLM Security scan and penetration test of the KLM office LAN. Period: June 1998 Organization: De Nederlandsche Bank Review of a payment system (PC hardware, Tokenring, SNA en cryptohardware). Period: March 1998

6 Organization: Chipper (Postbank) Design and implement a refund application for the Chipper smartcard. Period: September 1996 December 1997 Organization: Informatie beheer groep Functie Design and system integration of an IBG selfservice terminal for students (OS/2, AS/400 CM/2, ISDN, smartcards en TCP/IP). Design and integration of a smartcard helpdesk station (X25, ISDN, Client Access, 5250 emulatie). Period: September 1995 February 1996 Organization: Studentenchipkaart IT architect Skills Languages : Security : Design and system integration of a smartcard Personalisation Station (OS/2. hardware-integratie, AS/400 koppeling). Dutch, native language. English, fluent in speaking and writing. German, Intermediate in speaking an writing. Designing and implementing of an IDS- IDP solution (Juniper, Niksun, Snort, Cisco ASA, open source solutions and Intellitactics) Performing penetration test on systems and networks Security Reviews on systems and networks Design of secure networks Design of secure systems Hardening of systems Firewalls (checkpoint, Linux, IBM, Cisco and Netscreen) Remote access solutions (Netscreen and Cisco) VPN technieken (Cisco, OpenVPN)

7 Hardware: Code voor informatiebeveiliging (dutch government guidelines) A&K analyse VIR 94 CRAMM NEN/ISO 17799:2005 / BS 7799 Common Criteria Smartcards and other secure tokens Cryptography (cryptohardware and algoritmes) NATO crypto, layer 2 and layer 3 PGP and S/MIME Public Key Infrastructures Workstation Security (port security, hard disk security) Identity management Netwerk equipment, Cisco, Palo Alto and Netscreen (routers, switches, firewalls en VPN concentrators) PC hardware RS/6000 hardware SUN hardware Apple hardware Crypto hardware (Serial and IP) 4th generation firewalls Microcontrollers Arduino Raspberry Pi Operating systems: Windows XP / Vista / Vista / 7 / 8 Windows advanced server 2003 Windows Server 2003 R2 / 2008 R2 / 2012 R2 UNIX (Solaris, AIX en BSD) Linux Ubuntu Redhat, Debian, Fedora en Suse Mac OS X (server) OS/2 Networking : LAN (Ethernet/Tokenring) WAN connections (ISDN, X25, G.703) WLAN ( and the security aspects) TCP/IP, NetBIOS Cisco IOS ((dynamic) routing and switching) Cisco PIX and ASA OS Palo Alto 4th generation firewalls Netwerkrouting

8 Internet/Intranet : Projectmanagement: Design IP number plan Serial protocols and interfacing (RS-232, RS-449, EIA530, X21, V11, V35, en LVDS) VoIP, SIP, H.323 DNS, DHCP, LDAP, SNMP, POP3, IMAP en SMTP servers off Microsoft Iplanet and other open source products Webservers (IIS, Apache en Iplanet) VoIP services (Cisco and Asterisk) Prince II Programming languages: C/C++ Java, Javascript, NodeJS PHP, Perl, Python en Bash Windows script and Powershell Databases: MSAccess ( , 2000) SQL server MySQL 4.* 5.* PostgreSQL Oracle

kerry@crypt.gen.nz http://www.crypt.gen.nz Technology Consultant Security Specialist High Profile Organisations Overview and Core Competencies

kerry@crypt.gen.nz http://www.crypt.gen.nz Technology Consultant Security Specialist High Profile Organisations Overview and Core Competencies KERRY THOMPSON kerry@crypt.gen.nz http://www.crypt.gen.nz PROFESSIONAL PROFILE Technology Consultant Security Specialist High Profile Organisations Overview and Core Competencies Highly experienced CISSP

More information

Principal IT Consultant. Michael Buth IT Consultant Werner Str. 29 44388 Dortmund (Germany) +49 231 330 378 76. michael.buth@mbuth.

Principal IT Consultant. Michael Buth IT Consultant Werner Str. 29 44388 Dortmund (Germany) +49 231 330 378 76. michael.buth@mbuth. Michael Buth Principal IT Consultant Personal details Name, Surname Address Phone E-Mail Web Year of birth Education Foreign languages Buth, Michael Michael Buth IT Consultant Werner Str. 29 44388 Dortmund

More information

Masters Degree Information Technology CCSE, CCSA, MCSE, CISSP. English, Danish, Persian, Spanish, Portuguese, Azeri and Turkish

Masters Degree Information Technology CCSE, CCSA, MCSE, CISSP. English, Danish, Persian, Spanish, Portuguese, Azeri and Turkish SPECIALIST PROFILE Personal Details Reference: Job Title: Nationality: IT Experience: Qualifications: Languages: Availability: BT2691 UNIX Security Specialist British and Danish 13 years Masters Degree

More information

Connecting PTE to Careers in Idaho

Connecting PTE to Careers in Idaho 1 Connecting PTE to Careers in Idaho Wendi Secrist Director, Business Outreach July 21, 2015 www.pte.idaho.gov 2 School Portals NextSteps Career Information Where do I start? SkillStack lmi.idaho.gov College/University

More information

Diploma in Computer Science

Diploma in Computer Science SPECIALIST PROFILE Personal Details Reference: Job Title: Nationality: IT Experience: Qualifications: Languages: CN5191 Senior Linux Engineer British 22 years RedHat Certified Engineer Diploma in Computer

More information

Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture

Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture Deploying Cisco ASA VPN Solutions Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and Course Flow Additional Cisco Glossary of Terms Your Training Curriculum Evaluation of the Cisco

More information

Fast, Easy to use and On-demand A Content Platform from the 21st Century

Fast, Easy to use and On-demand A Content Platform from the 21st Century OpenIMS Open Information Management Server Fast, Easy to use and On-demand A Content Platform from the 21st Century E-mail Management Server Whitepaper Open Information Management Server www.openims.com

More information

Hamish Whittal, 41. PRESENT POSITION: IT Manager, SAAO, Cape Town.

Hamish Whittal, 41. PRESENT POSITION: IT Manager, SAAO, Cape Town. Hamish Whittal, 41 PRESENT POSITION: IT Manager, SAAO, Cape Town. BACKGROUND I have been involved in the IT industry for over 16 years and over this time have worked in a number of diverse environments,

More information

L2F Case Study Overview

L2F Case Study Overview LF Case Study Overview Introduction This case study describes how one Internet service provider (ISP) plans, designs, and implements an access virtual private network (VPN) by using Layer Forwarding (LF)

More information

MCSE SYLLABUS. Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003:

MCSE SYLLABUS. Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003: MCSE SYLLABUS Course Contents : Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003: Managing Users, Computers and Groups. Configure access to shared folders. Managing and Maintaining

More information

RESUME. Multiple years of hands on experience design, analyze, implement, and setup with OSPF, ISIS, EIGRP, BGP and RIP.

RESUME. Multiple years of hands on experience design, analyze, implement, and setup with OSPF, ISIS, EIGRP, BGP and RIP. RESUME First Name: MOHAMMAD Last Name: KOLEINY Email:mkoleiny@gmail.com Mobile: +989126413877 SUMMARY: have over 7 years of IT/Enterprise and R&D industry experiences which include expertise in design,

More information

Curriculum Vitae / Resume

Curriculum Vitae / Resume General profile & key qualifications UNIX Consultant / UNIX Systems Admin Family name Wezenaar First Name Rick Residence Place and date of birth Utrecht, 11 th august 1968 Nationality Dutch Civil status

More information

138 To satisfy a prerequisite, the student must have earned a letter grade of A, B, C or CR in the prerequisite course, unless otherwise stated.

138 To satisfy a prerequisite, the student must have earned a letter grade of A, B, C or CR in the prerequisite course, unless otherwise stated. Computer Science and Information Systems: Information Technology - Networking CSIT 131 Word (1) (Formerly CSIS 127) Word word processing software. Prepares individuals who are seeking to become a Microsoft

More information

Research, recommend, and assist in implementing identity automation solution.

Research, recommend, and assist in implementing identity automation solution. Stephen Hargrove PO Box 592241 San Antonio, TX 78259 210-239-9763 stephen@stephenhargrove.com EXPERIENCE Information Security Officer Manager, Information Security Administration, UTHSCSA; San Antonio,

More information

WINNEBAGO COUNTY INFORMATION TECHNOLOGY STANDARDS 2014/2015

WINNEBAGO COUNTY INFORMATION TECHNOLOGY STANDARDS 2014/2015 WINNEBAGO COUNTY INFORMATION TECHNOLOGY STANDARDS 2014/2015 Platform Architecture Standards: End User Software Platform Architecture Standards: End User Hardware Platform Architecture Standards: Hand Held

More information

Microsoft Windows Apple Mac OS X

Microsoft Windows Apple Mac OS X Products Snow License Manager Snow Inventory Server, IDP, IDR Client for Windows Client for OSX Client for Linux Client for Unix Oracle Scanner External Data Provider Snow Distribution Date 2014-02-12

More information

PCISS-1. Job Description: Key Responsibilities: I. Perform troubleshooting& support:

PCISS-1. Job Description: Key Responsibilities: I. Perform troubleshooting& support: PCISS-1 Job Description: Perform hardware and software installation, configuration, and upgrades Monitoring systems to ensure system availability to all users and performing necessary maintenance to support

More information

CimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred

CimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred DETECT All changes across your IT environment With coverage for your servers, network devices, critical workstations, point of sale systems, and more, CimTrak has your infrastructure covered. CimTrak provides

More information

TABLE OF CONTENTS NETWORK SECURITY 2...1

TABLE OF CONTENTS NETWORK SECURITY 2...1 Network Security 2 This document is the exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors

More information

Cisco is a registered trademark or trademark of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.

Cisco is a registered trademark or trademark of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries. Legal Notices Copyright 1999, 2009 BMC Software, Inc. Copyright 1996-2014 Numara Software, Inc. BMC, BMC Software, and the BMC Software logo are the exclusive properties of BMC Software, Inc., are registered

More information

SUN COBALT Qube 3 Appliance FAQ

SUN COBALT Qube 3 Appliance FAQ SUN COBALT Qube 3 Appliance - Frequently Asked Questions NEW FEATURES: VPN Remote Access PPTP VPN LAN to LAN IPSEC Print sharing Windows Domain Controller Port forwarding Multi-level administration 7 languages

More information

Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets

Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 8 Device Interface

More information

Professional Profile Company Experience & Biography SixNet Consulting Group .SixNetConsulting

Professional Profile Company Experience & Biography SixNet Consulting Group .SixNetConsulting Professional Profile Company Experience & Biography SixNet Consulting Group SixNet Consulting Group, LLC Michel Thomatis, CCIE #6778 March 12, 2007 Overview 10 Years of Networking & System Experience Cisco

More information

Our Systems Experience, Specifically:

Our Systems Experience, Specifically: Our Systems Experience, Specifically: This list is not all encompassing; if you are looking for something in particular that is not listed, we hope you please call or email. Windows Server 2003/XP/Vista

More information

Implementing a Microsoft Windows 2000 Network Infrastructure

Implementing a Microsoft Windows 2000 Network Infrastructure Course Outline Implementing a Microsoft Windows 2000 Network Infrastructure Other Information MS2153 Days 5 Starting Time 9:00 Finish Time 4:30 Lunch & refreshments are included with this course. Implementing

More information

Network Security 1 Module 4 Trust and Identity Technology

Network Security 1 Module 4 Trust and Identity Technology Network Security 1 Module 4 Trust and Identity Technology 1 Learning Objectives 4.1 AAA 4.2 Authentication Technologies 4.3 Identity Based Networking Services (IBNS) 4.4 Network Admission Control (NAC)

More information

Proven Technical and Management skills over a career spanning more than 10 years. Brunswick Vic 3056 Australia

Proven Technical and Management skills over a career spanning more than 10 years. Brunswick Vic 3056 Australia Resume: Michael McNab Systems Administrator and Web Support Proven Technical and Management skills over a career spanning more than 10 years Name: Address: Phone: Email Address: Website: Michael McNab

More information

Mac OS X. Playing nice in a heterogeneous world PRESENTED BY:Charles Edge 318.COM

Mac OS X. Playing nice in a heterogeneous world PRESENTED BY:Charles Edge 318.COM Mac OS X Playing nice in a heterogeneous world PRESENTED BY:Charles Edge 318.COM Whoami Charles Edge, MCSE, CCNA, ACSA, Network+ Partner, Three18 - Consulting firm in Santa Monica, California Author, Mac

More information

Security Correlation Server Quick Installation Guide

Security Correlation Server Quick Installation Guide orrelogtm Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also

More information

Where can I install GFI EventsManager on my network?

Where can I install GFI EventsManager on my network? Installation Introduction Where can I install GFI EventsManager on my network? GFI EventsManager can be installed on any computer which meets the minimum system requirements irrespective of the location

More information

TABLE OF CONTENTS NETWORK SECURITY 1...1

TABLE OF CONTENTS NETWORK SECURITY 1...1 Network Security 1 This document is the exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors

More information

Microsoft Windows Apple Mac OS X

Microsoft Windows Apple Mac OS X Products Snow License Manager Snow Inventory Server, IDP, IDR Client for Windows Client for OS X Client for Linux Client for Unix Oracle Scanner External Data Provider Snow Distribution Date 2014-04-02

More information

NETWORK SYSTEMS ENGINEER II

NETWORK SYSTEMS ENGINEER II NETWORK SYSTEMS ENGINEER II DEFINITION Under direction, provides technical support for the County s infrastructure of Local Area Networks (LANs), Wide Area Network (WAN) and other related data network

More information

MICROSOFT CERTIFIED SYSTEMS ENGINEER Windows 2003 Track

MICROSOFT CERTIFIED SYSTEMS ENGINEER Windows 2003 Track MICROSOFT CERTIFIED SYSTEMS ENGINEER Windows 2003 Track In recent years Microsoft s MCSE programs has established itself as the premier computer and networking industry certification. For the Windows 2003

More information

MUHAMMAD USMAN SHARIF

MUHAMMAD USMAN SHARIF MUHAMMAD USMAN SHARIF CCIE # 47806 (Service Provider) Email-Address : usmanlodhi1001@gmail.com Skype Name : usman_lodhi1001 LinkedIn : https://pk.linkedin.com/in/usmanlodhi1001 Mobile No : 0092-323-4947956

More information

Data Sheet. NCP Secure Enterprise Management. General description. Highlights

Data Sheet. NCP Secure Enterprise Management. General description. Highlights Data Sheet NCP Secure Enterprise Management General description NCP Secure Enterprise Management is the central component of the NCP Next Generation Network Access technology with integrated RADIUS server

More information

Cisco Which VPN Solution is Right for You?

Cisco Which VPN Solution is Right for You? Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2

More information

Check list เตร ยมความพร อมด าน Cyber Security ให หน วยงาน 6 th October 2015 Avirut Liangsiri 1. Effective: 2015-07-01

Check list เตร ยมความพร อมด าน Cyber Security ให หน วยงาน 6 th October 2015 Avirut Liangsiri 1. Effective: 2015-07-01 Check list เตร ยมความพร อมด าน Cyber Security ให หน วยงาน 6 th October 2015 Avirut Liangsiri 1 Agenda Traditional vs. Modern Cyber Defense แตกต างหร อส งเสร มก นและก น อย างไร? Industry Standard Checklist

More information

Associate in Science Degree in Computer Network Systems Engineering

Associate in Science Degree in Computer Network Systems Engineering Moorpark College Associate in Science Degree in Computer Network Systems Engineering To earn an Associate in Science Degree with a major in Computer Network Systems Engineering, students complete 40.5-45

More information

SNOW LICENSE MANAGER (8.X)... 4

SNOW LICENSE MANAGER (8.X)... 4 SYSTEM REQUIREMENTS Products Snow License Manager Snow Automation Platform Snow Device Manager Snow Inventory Server, IDR, IDP Mobile Information Server Client for Windows Client for Unix Client for OS

More information

NCP Secure Enterprise Management Next Generation Network Access Technology

NCP Secure Enterprise Management Next Generation Network Access Technology Data Sheet NCP Secure Enterprise Management Next Generation Network Access Technology General description NCP Secure Enterprise Management is the central component of the NCP Next Generation Network Access

More information

Information Technology Services Classification Level Range C Reports to. Manager ITS Infrastructure Effective Date June 29 th, 2015 Position Summary

Information Technology Services Classification Level Range C Reports to. Manager ITS Infrastructure Effective Date June 29 th, 2015 Position Summary Athabasca University Professional Position Description Section I Position Update Only Information Position Title Senior System Administrator Position # 999716,999902 Department Information Technology Services

More information

OVERVIEW OF TYPICAL WINDOWS SERVER ROLES

OVERVIEW OF TYPICAL WINDOWS SERVER ROLES OVERVIEW OF TYPICAL WINDOWS SERVER ROLES Before you start Objectives: learn about common server roles which can be used in Windows environment. Prerequisites: no prerequisites. Key terms: network, server,

More information

MIT s Current SIP Infrastructure. Mark Silis MIT Information Services and Technology February 2, 2006

MIT s Current SIP Infrastructure. Mark Silis MIT Information Services and Technology February 2, 2006 MIT s Current SIP Infrastructure Mark Silis MIT Information Services and Technology February 2, 2006 Current SIP Implementation Utilizes the IETF standards based SIP protocol Comprised of several different

More information

Supported Devices. Application Servers Microsoft ASP.NET Oracle WebLogic IBM WebSphere Red Hat JBoss Sun GlassFish Apache Tomcat

Supported Devices. Application Servers Microsoft ASP.NET Oracle WebLogic IBM WebSphere Red Hat JBoss Sun GlassFish Apache Tomcat Supported Devices The following is a list of infrastructure sources that AccelOps supports. This page is frequently updated. If you don t find a source located on the list, please contact info@accelops.com.

More information

E M P I R E C O L L E G E

E M P I R E C O L L E G E 34 E M P I R E C O L L E G E Specialized Associate Degree Information Technology Objective: The Specialized Associate Degree Information Technology program is intended to give the student knowledge of

More information

Senior System Engineer Project Leader SQL Server DBA Oracle DBA

Senior System Engineer Project Leader SQL Server DBA Oracle DBA Senior System Engineer Project Leader SQL Server DBA Oracle DBA PERSONAL INFORMATION Name: Herman De Rycke City: Antwerpen Nationality: Belgium Date of Birth: 18/10/1960 KEY SKILLS Networking, servers

More information

Cisco Network Specialist CCNA

Cisco Network Specialist CCNA Web Development I CIST 1510 3 Scripting Technologies CIST 1520 3 Web Graphics I CIST 1530 3 Information Security Fundamentals CIST 1601 3 PHP Programming I CIST 2351 4 Web Technologies CIST 2510 3 Web

More information

13 Courses Quick Guide

13 Courses Quick Guide 13 Courses Quick Guide Microsoft Network Infrastructure 2008 Microsoft Certified Solution Associate (MCSA 2012) MCSE 2012 (Private Cloud) MCSE Server infrastructure 2012 Administering & Configuring Microsoft

More information

Computer Network Engineering

Computer Network Engineering 226 Computer Network Engineering Computer Network Engineering Degrees, Certificates and Awards Associate in Science: Computer Network Engineering Certificate of Achievement: Computer Network Engineering

More information

Cisco IOS Firewall. Scenarios

Cisco IOS Firewall. Scenarios Cisco IOS Firewall Common Deployment Scenarios http://www.cisco.com/go/iosfirewall com/go/iosfirewall Presentation_ID 2007 Cisco Systems, Inc. All rights reserved. 1 Cisco IOS Firewall Feature Overview

More information

1.Cisco Network Architect

1.Cisco Network Architect 1.Cisco Network Architect Analyze business requirements to develop technical network solutions and their framework. Design, test, and inspect data communications systems. Perform network modeling, analysis,

More information

SNOW LICENSE MANAGER (7.X)... 3

SNOW LICENSE MANAGER (7.X)... 3 SYSTEM REQUIREMENTS Products Snow License Manager Snow Inventory Server, IDR, IDP Client for Windows Client for Linux Client for Unix Client for OS X Oracle Scanner External Data Provider Snow Distribution

More information

Richard S. Conto. Hello,

Richard S. Conto. Hello, Richard S. Conto Hello, I have had a long career in Information Technology that I have thoroughly enjoyed, a career focusing primarily on taking the brightest ideas to come out of Higher Education and

More information

Open Source in the Data Centre. John Ferlito Bulletproof Networks

Open Source in the Data Centre. John Ferlito Bulletproof Networks Open Source in the Data Centre John Ferlito Bulletproof Networks About Me Experience Previous Engineer, ZipWorld (ISP) Senior Engineer, Pacific Internet (ISP) Current Technical Guru, linux.conf.au 2007

More information

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

CH ENSA EC-Council Network Security Administrator Detailed Course Outline CH ENSA EC-Council Network Security Administrator Detailed Course Outline Summary Duration Vendor Audience 5 Days hands-on training EC-Council Security Professionals Level Technology Category Advance Ethical

More information

Security Correlation Server Quick Installation Guide

Security Correlation Server Quick Installation Guide orrelog Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also

More information

Michael Bösch. EDV-Consulting. Dipl. Informatiker (FH)

Michael Bösch. EDV-Consulting. Dipl. Informatiker (FH) Michael Bösch Dipl. Informatiker (FH) EDV-Consulting Äußeres Pfaffengäßchen 11B 86152 Augsburg Germany Tel.: +49-821-4206523 Fax: +49-821-4206524 Mobil: +49-172-8628736 E-Mail: boesch@boesch-it.de Home-Page:

More information

Products, Features & Services

Products, Features & Services Products, Features & Services PowerDNS PowerDNS, founded in the late 1990s, is a premier supplier of DNS software, services and support. Deployed throughout the world with some of the most demanding users

More information

LAIKIPIA UNIVERSITY CISCO ACADEMY BRONCHURE

LAIKIPIA UNIVERSITY CISCO ACADEMY BRONCHURE CISCO COURSES LAIKIPIA UNIVERSITY CISCO ACADEMY BRONCHURE Cisco/CompTIA IT Essentials (PC Hardware and Software) The IT Essentials course provides hand-on training on computer hardware and software skills

More information

MANAGEMENT INFORMATION SYSTEMS 8/E

MANAGEMENT INFORMATION SYSTEMS 8/E MANAGEMENT INFORMATION SYSTEMS 8/E Raymond McLeod, Jr. and George Schell Chapter 10 Data Communications Copyright 2001 Prentice-Hall, Inc. 10-1 Objectives Understand data communication basics. Know the

More information

John Smith Prattville, AL career@hashbangsecurity.com

John Smith Prattville, AL career@hashbangsecurity.com John Smith Prattville, AL career@hashbangsecurity.com Career Objective I am a certified and skilled senior security and UNIX systems administrator with over twenty years of experience. I am seeking a position

More information

Information Technology Cluster

Information Technology Cluster Network Systems Pathway Information Technology Cluster Assistant Network Technician -- This major prepares students to install, configure, operate, and connections to remote sites in a wide area network

More information

Written by Dave Carrigan Saturday, 28 February 2009 18:23 - Last Updated Saturday, 28 February 2009 21:34

Written by Dave Carrigan Saturday, 28 February 2009 18:23 - Last Updated Saturday, 28 February 2009 21:34 Skills System, Security and Internet/Intranet Administration I have over twenty years of experience with administering multiple versions of Unix/POSIX OSes, including Linux (Debian, Ubuntu, Red Hat, Slackware,

More information

IBM enetwork VPN Solutions

IBM enetwork VPN Solutions IBM enetwork VPN Solutions the Reach of Your Network Extend Agenda Description and Value of a VPN VPN Technology IBM's VPN Solutions and Future Enhancements Summary What is a VPN? Remote Access Business

More information

CompTIA Network+ (Exam N10-005)

CompTIA Network+ (Exam N10-005) CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate

More information

Basic Network Configuration

Basic Network Configuration Basic Network Configuration 2 Table of Contents Basic Network Configuration... 25 LAN (local area network) vs WAN (wide area network)... 25 Local Area Network... 25 Wide Area Network... 26 Accessing the

More information

inforouter V8.0 Server & Client Requirements

inforouter V8.0 Server & Client Requirements inforouter V8.0 Server & Client Requirements Please review this document thoroughly before proceeding with the installation of inforouter Version 8. This document describes the minimum and recommended

More information

Detecting a Hacking Attempt

Detecting a Hacking Attempt Detecting a Hacking Attempt Speaker: Isaac Thompson Director of Sales Engineering and Training About Prism Microsystems Founded in 1999, headquartered Columbia, Maryland Current Version EventTracker 6

More information

SNOW LICENSE MANAGER (7.X)... 3

SNOW LICENSE MANAGER (7.X)... 3 SYSTEM REQUIREMENTS Products Snow License Manager Software Store Option Snow Inventory Server, IDR, IDP Client for Windows Client for Linux Client for Unix Client for OS X Oracle Scanner Snow Integration

More information

Diploma in Information Technology Network Intergration Specialist COURSE INFORMATION PACK

Diploma in Information Technology Network Intergration Specialist COURSE INFORMATION PACK Diploma in Information Technology COURSE INFORMATION PACK REGISTRATION AND ACCREDITATION Prestige Academy (Pty) Ltd is a widely recognized and credible institution. Prestige Academy is registered with

More information

642 552 Securing Cisco Network Devices (SND)

642 552 Securing Cisco Network Devices (SND) 642 552 Securing Cisco Network Devices (SND) Course Number: 642 552 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional, Cisco Firewall Specialist,

More information

Realization of Network Systems using open source components (OpenWRT, Elastix & Asterisk)

Realization of Network Systems using open source components (OpenWRT, Elastix & Asterisk) Realization of Network Systems using open source components (OpenWRT, Elastix & Asterisk) About Gadgeon: Gadgeon, an Embedded System Company with special focus on outsourced product development in the

More information

Total Protection for Enterprise-Advanced

Total Protection for Enterprise-Advanced System Requirements Total Protection for Enterprise-Advanced One integrated solution, one console, proven comprehensive protection McAfee Alert Manager 4.7.1 Free disk space 1.5 MB (complete installation)

More information

Profile. Emile van Bergen

Profile. Emile van Bergen Emile van Bergen Heysterbachstraat 92, 3312 JL, Dordrecht, The Netherlands Tel.: +31 78 6144845 E-mail: emile@e-advies.nl Nationality: Dutch Date of birth: may 21, 1977 Marital status: married, 5 children.

More information

ICAWEB424A Evaluate and select a web hosting service

ICAWEB424A Evaluate and select a web hosting service ICAWEB424A Evaluate and select a web hosting service Release: 1 ICAWEB424A Evaluate and select a web hosting service Modification History Release Release 1 Comments This Unit first released with ICA11

More information

APPLICATION FOR BOARD APPROVAL. of Locally Developed Course. MCP CERTIFICATION 11/12a/12b/12c

APPLICATION FOR BOARD APPROVAL. of Locally Developed Course. MCP CERTIFICATION 11/12a/12b/12c APPLICATION FOR BOARD APPROVAL of Locally Developed Course MCP CERTIFICATION 11/12a/12b/12c John Murtha APPLICATION FOR BOARD APPROVAL Of the Locally Developed MCP CERTIFICATION 11/12a/12b/12c PREAMBLE:

More information

Network System Design Lesson Objectives

Network System Design Lesson Objectives Network System Design Lesson Unit 1: INTRODUCTION TO NETWORK DESIGN Assignment Customer Needs and Goals Identify the purpose and parts of a good customer needs report. Gather information to identify network

More information

GF Financial Markets I.T. Architecture Role

GF Financial Markets I.T. Architecture Role GF Financial Markets ( GFFM ) is a London-based wholly owned subsidiary of GF Securities, one of China s largest security houses. GFFM is FCA regulated and a Ring Dealing member of the London Metal Exchange.

More information

SNOW LICENSE MANAGER (7.X)... 3

SNOW LICENSE MANAGER (7.X)... 3 SYSTEM REQUIREMENTS Products Snow License Manager Snow Automation Platform Snow Device Manager Snow Inventory Server, IDR, IDP Mobile Information Server Client for Windows Client for Linux Client for Unix

More information

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0 EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single

More information

More than 6 years of experience in IT Projects/Networking /Systems

More than 6 years of experience in IT Projects/Networking /Systems Mohammed Riyas. V.P Email: riyas101@yahoo.com riyas101@live.com Abu Dhabi Mobile: 055 6693840 U.A.E Passport No: G9871465 Career Objective CURRICULUM VITAE Highly motivated IT Engineer with sound professional

More information

NetSupport Manager v11

NetSupport Manager v11 Remote Support For Any Environment NetSupport Manager v11 NetSupport Manager has been helping organizations optimize the delivery of their IT support services since 1989 and while the use of Remote Control

More information

Measurably reducing risk through collaboration, consensus & practical security management. 2015 CIS Security Benchmarks 1

Measurably reducing risk through collaboration, consensus & practical security management. 2015 CIS Security Benchmarks 1 Measurably reducing risk through collaboration, consensus & practical security management 2015 CIS Security Benchmarks 1 Background State of Idaho s Rights and Benefits as a CIS Security Benchmarks Member

More information

MANAGED SECURITY SERVICES

MANAGED SECURITY SERVICES MANAGED SECURITY SERVICES Security first Safety first! Security is becoming increasingly important for companies, especially for the extension of networking to mission-critical environments, with new intranet

More information

APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10)

APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10) APNIC elearning: Network Security Fundamentals 20 March 2013 10:30 pm Brisbane Time (GMT+10) Introduction Presenter/s Nurul Islam Roman Senior Training Specialist nurul@apnic.net Specialties: Routing &

More information

CA Service Desk Manager Release 12.5 Certification Matrix

CA Service Desk Manager Release 12.5 Certification Matrix CA Service Desk Manager Release 12.5 Certification Matrix Last Updated: February 11, 2014 End-of-Service: May 31, 2013 CA Service Desk Manager will support service-packs and point-releases of Operating

More information

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led Certification: ENSA Exam 312-38 Course Description This course looks at the network security in defensive view.

More information

A Guide to New Features in Propalms OneGate 4.0

A Guide to New Features in Propalms OneGate 4.0 A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously

More information

ACADEMIC PROGRAM REVIEW PC AGE 145 TALMADGE ROAD EDISON, NJ 08817 REVIEW DATE. Report Amended October 2011

ACADEMIC PROGRAM REVIEW PC AGE 145 TALMADGE ROAD EDISON, NJ 08817 REVIEW DATE. Report Amended October 2011 ACADEMIC PROGRAM REVIEW of PC AGE 145 TALMADGE ROAD EDISON, NJ 08817 REVIEW DATE May 12-13, 2011 Report Amended October 2011 Table of Contents PC AGE Organizational Profile... 3 Academic Program Review

More information

How To Configure Apple ipad for Cyberoam L2TP

How To Configure Apple ipad for Cyberoam L2TP How To Configure Apple ipad for Cyberoam L2TP VPN Connection Applicable to Version: 10.00 (All builds) Layer 2 Tunneling Protocol (L2TP) can be used to create VPN tunnel over public networks such as the

More information

Deployment Guide. Websense Web Security Websense Web Filter. v7.1

Deployment Guide. Websense Web Security Websense Web Filter. v7.1 Deployment Guide Websense Web Security Websense Web Filter v7.1 1996 2009, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published 2009 Printed in the United States

More information

Information Technology Services

Information Technology Services Information Technology Services The purpose of an Information Technology Standard is to specify requirements for compliance with Old Dominion University Information Technology policies, other University

More information

Cisco PIX vs. Checkpoint Firewall

Cisco PIX vs. Checkpoint Firewall Cisco PIX vs. Checkpoint Firewall Introduction Firewall technology ranges from packet filtering to application-layer proxies, to Stateful inspection; each technique gleaning the benefits from its predecessor.

More information

Wide technical Know-how, Cross-platform engineering and troubleshooting, Administration

Wide technical Know-how, Cross-platform engineering and troubleshooting, Administration Business Partner Summary Sheet Last name external consultant: First name external consultant: Main skill: Dietz Oliver T. Wide technical Know-how, Cross-platform engineering and troubleshooting, Administration

More information

Module 5 Introduction to Processes and Controls

Module 5 Introduction to Processes and Controls IT Terminology 1. General IT Environment The general IT environment is the umbrella over the following IT processes: 1. Operating Systems 2. Physical and Logical Security 3. Program Changes 4. System Development

More information