Preview

Microsoft

Satisfactory Essays
Open Document
Open Document
369 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Microsoft
Summary
This report describes the network security training planned for the staff of Orchard Street Art Center. The training will be provided by Brookstone Network Consulting and will focus on new security requirements for the wireless network.
Liability Insurance Requirements
Network security training for all staff is required by the center’s liability insurance policy. As specified by our insurance carrier, Universal Pro Inc., each staff member will be assigned to one of three training levels. General users must complete multiple one-hour Level 1 classes to be held onsite at the art center. Department managers will be assigned to a one-day Level 2 training session on basic system administration and security management. The center’s two network managers and all technical staff must complete a two-day Level 3 security training seminar at the offices of Brookstone Network Consulting. Level 3 training will be supplemented with ongoing monthly education on emerging network threats.
Instructors
Brookstone Network Consulting specializes in end-user support, network upgrade project management, and security infrastructure audits. The company’s training team combines classroom lectures with hands-on exercises designed to give students immediate, successful experiences with new technologies. Members of the Brookstone training team have won numerous teaching awards and volunteer their time at high schools throughout the St. Louis area.
The class instructors and their professional specialties are as follows:
[instructor names]
Training Schedule
The dates for Level 2 and Level 3 training are flexible, as long as all training is completed by the end of June. Network managers are free to set up their department’s training dates with the appropriate instructors at Brookstone. Level 1 training will begin in March and continue through the spring. Topics will be covered in the order shown in the following schedule:
Level 1 Equipment Needs
The Level 1 training classes

You May Also Find These Documents Helpful

  • Satisfactory Essays

    -RESULTS DRIVEN. As Security Manager, he supervised three quarterly Cyber Security spot checks covering 14 secure spaces between 11 tenant commands island-wide, maintaining compliance of Defense Information Systems Agency's Physical Security posture…

    • 165 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    Access to the company network will be secured by multiple firewalls set up with our routers. Firewall filters will be set up with a specific list of allowed users and programs. All other traffic will be blocked by default until it has been approved by IT. There will be a limited number of wireless access points around the building, with password access. These passwords will be changed on a regular basis. Access to the local network will be secured by user authentication passwords. Users will be limited to only the system resources that they absolutely need to complete their work. Users’ passwords must be changed every 90 days.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    IT255 Project 1

    • 663 Words
    • 2 Pages

    A priority to the LAN domain is proper security of physical equipment. Only authorized personnel are allowed to gain access into...…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    We will educate employees on how to properly secure information by user ID and password management training. Instructing them on how to…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Classify at least two (2) security assurances that could be achieved by the CIO developing a formal security awareness, training, and educational program.…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Prepare a 5 to 10 minute PowerPoint assisted presentation on important access control infrastructure, and management aspects from each location.…

    • 991 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    It241 Final

    • 446 Words
    • 2 Pages

    In the final project, you assume the role of a wireless network consultant working for a company called Apex Designs. You must present Apex Designs with a plan that outlines how you intend to design their wireless network. The plan must be based on the recommended steps for designing a WLAN, outlined in the following bulleted list. In addition to the design of the network, Apex Designs has asked that you provide a basic wireless security policy. To that end, your plan must consist of the following elements:…

    • 446 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    He or she must read magazines and journals to learn about commonly available technologies that can be used on a network or work in parallel to it. For example, security personnel must be aware of how electrical power-line network adapters work. By understand how this technology works, the security administrator can can prevent an employee from setting up a second Ethernet adapter in his or her computer, creating a workgroup of covert network of employees communicating and running a private business over the electrical wires in the building.…

    • 11068 Words
    • 45 Pages
    Good Essays
  • Satisfactory Essays

    ISA 650 Final Exam Paper

    • 4435 Words
    • 18 Pages

    73. Requires the creation of computer security plans, and the appropriate training of system users or…

    • 4435 Words
    • 18 Pages
    Satisfactory Essays
  • Good Essays

    The Microsoft Corporation

    • 8391 Words
    • 34 Pages

    Where should the repayment of the education credit Fred claimed in a previous year be…

    • 8391 Words
    • 34 Pages
    Good Essays
  • Good Essays

    Security Interview

    • 1458 Words
    • 5 Pages

    Contact a security manager and conduct the interview listed in Part I (space has been provided for extra questions, should you ask any). Once the interview has been completed, answer the questions in Part II.…

    • 1458 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Shark Tank Microsoft

    • 730 Words
    • 3 Pages

    In the early 1970’s two young men stumbled upon what would one day, be one of the top companies within its market. Paul Allen and Bill Gates, founders of Microsoft Corp, had a vision that every household would own a personal computer, and they were going to be the ones to help make that possible through the development of computer software. Microsoft was first able to get a foot in the market when IBM approached them in June of 1980 about developing an operating system for their new line of personal computers. Microsoft’s first system developed was named “Ms-Dos” a revolutionary operating system that was the bridge, which IBM was looking for between the computer hardware and programs. (Source 1). Due to the complexity of the system, Microsoft was forced to deliver a new system which was more user friendly Two years later the start of the windows, which we know today, was born. The amazing thing about Windows was the ability to use a mouse to click on multiple screens within the operating system, and also the ability to utilize more than one program at a time, without having to open and close each program. Within the next few years, Windows 2 was released, increasing the speed and capabilities of the operating system. Gates and Allen, did not stop there, since the first version of Windows, Microsoft released many newer, updated version of the operating system that were revolutionary in their time period. In the first three Windows, Microsoft focused on improving the operating system, through increases in speed, memory and graphics. By Microsoft 3.0 Microsoft had gained control of the market through huge popularity among computer users. Windows 95, their fourth version of windows, was one of the most important releases within the company’s history. This windows system, allowed users an operating system capable of using the internet. With software to allow easy browsing and usage powerful tools, Microsoft Office 95 changed the way people work.…

    • 730 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Wireless Security

    • 2559 Words
    • 11 Pages

    Executive Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3…

    • 2559 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    Microsoft Who We Are

    • 485 Words
    • 3 Pages

    Delivering on this mission requires a clearly defined set of values and tenets. Our company values are not new, but have…

    • 485 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    • • • • • Add your name and logo (and remove ours) Add your own content to make the training more relevant to your clients (i.e. using examples and case studies from within your organization or city) Train unlimited users within your organization No Annual Renewal Fees Download training material on your time, from our secure servers International 130 Provost Street, #301 New Glasgow, NS, Canada Phone: 001-902-695-3660 Fax: 001-902-695-3661 sales@corporatetrainingmaterials.com…

    • 5695 Words
    • 23 Pages
    Good Essays

Related Topics