...trained professional seeking a challenging position in the information technology field with an opportunity to utilize my experiences and networking skills. EDUCATION Associate of Applied Science Degree in Computer Network Systems ITT Technical Institute, Orland Park Chicago (June 2010 - JUNE 2012) ACADEMIC FOCUS * Computer hardware * Python (Programming) * Windows Server 2008/Active Directory * Linux System Administration * Database Development * Network Standards and Protocols * Network Application Services and Security * Network Technology and Service Integration * Fundamental of Information System and Security SUMMARY OF QUALIFICATIONS * Operating Systems: DOS, Fedora LINUX. Windows NT,Windows Server 2008, Windows XP/7 * Implementing and Supporting the Functions and Administration of Network Information Systems: Included planning, configuring and Installing file server, work station and print servers in the local area environment. Configured and installed Active Directory (Parent/Child DC, RODC, OUs, Group Policy, User Groups, DNS, DHCP) Configured and installed Fedora Linux (Create, Add or Delete users, Web Server, SAMBA Server, DHCP, IP Tables) * Network Background:Peer-to-Peer and server-based network connections using NetBEUI, TCP/IP Configuredand installed Cisco Routers: ( 1700, 2600, 3600)and Cisco Switches (2950, 2960 series and 2948-GL3) Configured and installed communication Radio and WIFI System s (Link Sys...
Words: 317 - Pages: 2
...computing, including distributed virtual services, is an evolving paradigm that is fundamentally and rapidly changing communication services and infrastructure. The diversity of these services and the underlying infrastructure has itself produced different perspectives. In general, most of the many forums dealing with cloud computing have found common ground in the following description (Special Publication 800-145, The NIST Definition of Cloud Computing, Sept 2011 [x])” ( ETSI DTR 101 567 V0.0.5 Lawful Interception (LI);Cloud/Virtual Services (CLI) [y]. Definition of “Cloud Computing” According to NIST: “Cloud Computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.” Cloud Essential Characteristics • On-demand...
Words: 1499 - Pages: 6
...Security Risk Analysis of time in expansion of network IT projects can be many times a daunting task to both the contracted IT Company and the clients. With some short deadlines, there is usually a small window of opportunity to present skills and produce positive results. As a network administrator, the pressure to deliver top notch and a robust system is a priority. U.S. industry Inc is just a young company that has both the quality and skills and knowledge to produce excellent work considering previous contracts that have been undertaken by the company. The US government department aims to expand its network infrastructure to enlarge the capacity and enable it provide quality services. The cost estimation of the contract is approximately three $3 million dollars lasting for a period of six months. A network administrator’s roles include: Ø setting up of the network Ø Designing and planning of the network Ø Expanding the network Ø Network maintenance Designing and planning of the network a network administrator is tasked with identify the US government departments requirement that necessitates the kind of system to set up. The US department may require certain special specification of their particular network depending on its purpose and objectives. It marks the first phase of the contract. Setting up a network The second phase is where the physical is setting up, and configuration of the network begins. Hardware installation and files, data,...
Words: 1088 - Pages: 5
...during [1/6/2013 -2/12/2013] in [IT401-1301A] with [Kay N. Crook]." Re-use: "This task contains portions of material that were originally submitted during [8/19/2012 -9/26/2012] in [ENGL205-1203B-04] with [Carmen Kimble]." IT326-1401A-01: Network Infrastructure Administration D & S Residential Services Network Implementation Plan-2014 Titius Ivie February 3, 2014 Table of Contents Target Organization 5 Corporate Structure 5 Business Goal 5 Part 1: Proposed Network Solution 7 Network Configuration 7 Transmission Media 7 Targeted Users 8 Hardware and Software Requirements 8 Production Applications 10 External and Internal Costs 11 Personnel (External Costs) 11 Hardware and Software (Internal Costs) 12 Short Term and Long Term Benefits to the Organization 13 Part 2: Network Design 14 Physical Topology 14 Part 3: Installation and Configuration 15 Installation and Configuration Steps 15 Part 4: Maintenance and Troubleshooting 19 Maintaining servers on the network 19 Maintaining PCs on the network 19 Implementing security 20 Managing network connections 21 Unauthorized Usage 21 Proper Network Operating System 22 Training users 23 Conclusion 24 Part 5: Remote Access 26 Network Pro Prep Toolkit Screenshots 27 Screenshot of Completed Labs--Phase 1 27 Screenshot of Completed Labs--Phase 2 28 Screenshot of Completed Labs--Phase 3 32 References 35 Target Organization D & S Residential Services has been providing...
Words: 4303 - Pages: 18
...DEPARTMENT ITSA 255 – Information Systems Security Assignment 4 – Network System Administrator Tools/Utilities Students are to perform independent Internet research and write a short paragraph describing the functionality and utilization for each of the following Network System Administrator Tools/Utilities: * FileZilla FileZilla is a cross platform File Transfer Protocol (FTP) application software that allows the ability to transfer multiple files over the internet. It is made up of a FileZilla client and a FileZilla server. It is available for use with Windows, Linux and MAC OSX. It supports FTP, SFTP (SSH File Transfer protocol), FTPS (FTP secure). Some of the features include support in IPv6, Drag and Drop, Filename feature, Remote file editing, FTP proxy support and much more. It includes two methods to invoke security which is the explicit method and implicit method. Many bug fixes and vulnerability patches were made over the initial release of June 22, 2001. * Nessus Nessus is a open source cross-platform network vulnerability scanner software developed by Tenable Network Security. First introduced during 1998; it was created to be used as a free remote security scanner to the internet community. It allows for various scanning which scans a computer and raises an alert if it discovers any vulnerability that hackers could use to gain access to a computer that is connected to a network. Nessus scans for a certain range of vulnerabilities. It scans for vulnerabilities...
Words: 856 - Pages: 4
...Zenmap Specs * Supported Operating systems: Windows, Mac, Linux, BSD * Cost: Free * Requirements: Nmap Who’s it for? Zenmap is for any network or security administrator who needs to keep a constant check on their network topology. With it’s next-to-zero learning curve, just about any network administrator can have all of the information they need quickly. Zenmap will work for any size company or even a single-user consultancy, where a quick scan of a network topology can make the difference between spotting a security issue and finding a resolution or, well…not. What problem does it solve? There are two very key issues Zenmap solves. One is making the more-challenging Nmap scanner useable for the average administrator. Nmap is a console-only tool and the majority of administrators do not want to spend their day at the console (with a nod to the old-school Linux and UNIX admins who would much rather spend their day at the command line than in a GUI tool). Zenmap also gives the administrator a topology mapping tool where they can actually see an interactive, animated visualization of the hosts on your network. Key features * Free * Easy-to-use GUI * Quickly saves scans * Uses traceroute and ping * Saves profiles for frequent run tests * Topology mapping * Compares scan results of different scans * Runs multiple scans and views them as one big scan * Plenty of default scan profiles to choose from * Searches scan results...
Words: 251 - Pages: 2
...My Dream Job I guess my dream job would be a combination of things. I don’t like just sitting at a desk. I need to get up and move around. I guess it would be a helpdesk role along with a systems administrator and a network administrator. I enjoy working with people hence the helpdesk role. I like the freedom to move around of the helpdesk role. Network administration is the most challenging of the roles. System admin is probably the most mundane of all. The helpdesk requires you to go to a person’s desk and interact with them. In the network admin role you work with the different devices. You may have to troubleshoot a connectivity issue, install a device, and configure the device. In the system admin role you mostly create user accounts, set shares and permissions, create e-mail accounts. To be able to land this type of job I will have to update some of my credentials. Probably go to college for at least an associate’s or maybe a bachelor’s degree. A lot of job advertisements I am seeing are requiring those now. I have experience but no degree. I need to renew my CCNA certification. That entails either going to classes or studying online. Going to classes would be the best because it would go toward a degree and give some hands on experience. The same applies to my A+ certification. Some of the other certifications also need refreshing. At my age I wonder if it would be worth the effort of working toward a degree. It would take over two years to complete...
Words: 649 - Pages: 3
...its main building in Al-Daffna in addition to the employees of the sport federations who are located outside the main building and using their own network and databases. The IT department of QOC is responsible for the IT from both sides the hardware and the software and all what is related to them in order to facilitate all activities needed to run the authorization and to make sure all the technologies used are up to date, secure and meet the standards. The IT department has many units that is working together to reach the goal of the department as well as the goal of the entire authorization. One main unit of those units is the help desk unit that is responsible in brief for employees' requests to set services, solve problems or incidents. There are more than one way that is used by the help desk unit to interact with employees to help them with their IT needs i.e. call center, emails and the IT services system. This paper contains a comparison and evaluation of the two systems that have been used by QOC IT department to receive users' requests (HP open view, BMC9.1 & BMC10.1) in term of PIECES framework. The evaluation of the system is based on system administrator's point of view and end users' (QOC employees) point of view. An evaluation of the current system (BMC10.1) has been conducted based on employees & administrator surveys & interviews and after the analyzing of those surveys problems with performance and input has been highlighted. A suggested solution that...
Words: 1469 - Pages: 6
...hard economy nursing homes have to make cuts, and unfortunately they are cutting all in the wrong places. Many times office jobs in the nursing home are the last to be cut and the nurse aides are the first to be cut, and the reason being is because many states do not have laws stating the aide to resident ratio. Today, a local nursing home has just got a new hope in recovering the problem of the loss of success that their nursing home has encountered. They have begun to cut nurse aides and have begun to run the halls short-handed, unfortunately their complaints have went up and their residents have become very unhappy. The nursing home has now decided to fire the current administrator and hire a new administrator in hope for new ideas and better success for their nursing home. Although the new administrator has many difficult problems to solve she has a lot of faith in recovering the problem the nursing home is now encountering. The new administrated began looking through past experiences working in a nursing home as a nurse aide. She remember the hard work that was endure every day, and how every resident depended on those few nurse aides that work on each hall. To be a nurse aide you have to have the heart and love for each every resident, and this administrated motto was “treat every resident as you...
Words: 1161 - Pages: 5
...objective was to ensure that the Customers don’t have to leave the confines of their comfort to book a ticket, and to help them get a ticket when they need it the most. • The internet was being voted as a medium people couldn’t do without. PC and net penetration was increasing not only in urban areas, but also in rural India. Also, people were getting used to booking tickets for travel using IRCTC and private airline websites. So, why not buses? • Online system provides real time quotations, real time bus booking services for round trips, multiple payment channels, cost comparison, last minute booking, an in-house call center and even home delivery of tickets. ➢ Admin Back-End System(home page of administrator) : ➢ Able to view & edit customer details ➢ 3 types of admins, user level permissions ➢ Bus details display. ➢ Assigning drivers to buses and...
Words: 306 - Pages: 2
...System Administrator | ← Job Descriptions Main Page | ESSENTIAL FUNCTIONS: The System Administrator (SA) is responsible for effective provisioning, installation/configuration, operation, and maintenance of systems hardware and software and related infrastructure. This individual participates in technical research and development to enable continuing innovation within the infrastructure. This individual ensures that system hardware, operating systems, software systems, and related procedures adhere to organizational values, enabling staff, volunteers, and Partners. This individual will assist project teams with technical issues in the Initiation and Planning phases of our standard Project Management Methodology. These activities include the definition of needs, benefits, and technical strategy; research & development within the project life-cycle; technical analysis and design; and support of operations staff in executing, testing and rolling-out the solutions. Participation on projects is focused on smoothing the transition of projects from development staff to production staff by performing operations activities within the project life-cycle. This individual is accountable for the following systems: Linux and Windows systems that support GIS infrastructure; Linux, Windows and Application systems that support Asset Management; Responsibilities on these systems include SA engineering and provisioning, operations and support, maintenance and research and development...
Words: 1105 - Pages: 5
...projected from 2008 through 2018. One of the most important things in the IT field is to keep up to date with the latest trends. There is a chart covering the annual income of some of the careers in the field. As well as a chart that covers the annual total cost of tuition and fees for some of the best online schools. Professional Language and Culture Report What is Information Technology (IT)? IT is an acronym for “Information Technology” and you pronounce it by saying the letters individually. IT is anything related to computing such as the internet, hardware, software, networking, and even the people it takes to operate and maintain the systems. Almost all large companies have their own IT department that manage the computers, servers, networks, security, and anything else that falls into their area of expertise (Techterms, 2011). Culture According to a blog, by La Salle, “Culture has been a constant worry in the Information Technology (IT) field, since it has been observed that culture can influence on the success of IT adoption and usage” (2010). More often than not the professionals in the IT field go unnoticed until something goes wrong. What is really happening is they are behind the scenes operating and maintaining current systems as well as testing and implementing new ideas and technology into the field. The IT field is growing rapidly and is always looking for new professionals. Most of the information conveyed in this field comes through knowledge and...
Words: 1279 - Pages: 6
...Career Choice: Network and Computer Systems Administrator Business and Writing for the IT Professional July 26, 2009 Abstract A network and systems administrator is responsible for network security, installing new applications, implementing software updates, monitoring the integrity of the system, developing management programs, and performing routine backups. As has been noted throughout my research, there has been a decline in technology majors throughout the past couple of years, thus affecting the job market. The survey that was conducted on high school seniors, as well as research done by some universities, has proven that lack of information and interest affects this type of career choice. By properly informing potential technology students and offering them resources, we can better equip our future system and network administrators to perform to their potential. Topic Proposal Author Background An interest in computers came to my attention shortly after graduating from high school. I first involved myself in working with cameras and fixing them for several customers. The satisfying knowledge that I gained came from realizing that I could take apart, fix a piece of technology and do it well. Computers as a hobby came only after my brother gave me one to fix and keep for my use. Although I was daunted at first, I took apart and drew diagrams, to remember where the components where located. I had no previous experience from computers that I had learned...
Words: 1945 - Pages: 8
...Lauren Lamotte | 7714 Lancer Ct | Niceville, FL 32578 | (850) 408-6789 | lauren.lamotte@us.af.mil November 14, 2015 Linda Vinetti Hiring Manager Capriccio Software, Inc. 3556 Gen DeGualle Blvd New Orleans, LA 70128 Dear Ms. Vinetti: I read of your company’s need for a Linux Systems Administrator in the New Orleans area on Indeed.com. I will be returning to New Orleans after my military enlistment is complete, and I believe that I would be an excellent fit for the company. I have worked as an IT professional in the United States Air Force for over six years, with my last three years working as a Linux Systems Administrator, and I am confident in my ability to become a valuable member of your team. I have an Associates degree in IT, and I am working towards by Bachelors degree in Information Systems Management. I am also professionally certified from Microsoft, Cisco, and CompTIA. As a Linux System Administrator, I have extensive experience in the following areas: * System Administration and Repair * Systems Installation, Configuration & Upgrading * Programming and Scripting * System Security, Backup and Recovery As a supervisor in the United States Air Force, I have experience working in teams, and I thrive under pressure. Additionally, I have excellent communication and interpersonal skills, which has...
Words: 894 - Pages: 4
...Ellery Corley NT 1230 Wednesday Unit 4. Exercise 1 User-Profile Scenario From: Systems Administrator To: Manager I have reviewed your email inquiry and have the following recommendations. 1. Interns should not have the level of access that allows the changing of their workstations. Thus all interns will be combined into a group for restricted access. This group will be given standard access, not allowing for any changes to workstation unless authorized by System Administrator. This includes the changing of their password every 60 days. 2. Team leads need to have access to their files from any workstation. Thusly, all team leads will be assigned roaming user profiles. This will allow any team lead to access any work station at their convenience as long as the computer is on the network. This will also require team leads to lock or sign out of a work station when they are not using it. Due to the level of access and availability of said access, Team Lead passwords will be set to be changed every 30 days. 3. Since to Marketing Staff have dedicated work stations, they will be added to an ACL, and be designated user rights applicable to their needs. As System Admin, I do understand the need for access to applications, storage, the network, and the ability to change and customize as needed. Due to the level of access that the Marketing Staff will be assigned, they will be required to change their passwords every 30 days. They will be given a list...
Words: 326 - Pages: 2