Windows 8

1. Windows 8 2. Module 1 - Installing and Deploying Windows 8. 3. Windows 8 editions. 4. Advantage of 64 bit Processor. 5. Minimum hardware requirement for Windows 8 6. Option for installing Windows 8 7. Installation of Windows 8 8. Upgrading and Migrating to Windows 8 9. What is Upgrading 10. What is Migration 11. Migrating User Data and Settings 12. Migrating using USMT ( User State Migration Tool ) 13. MBR - Master Boot Record 14. GUID - GPT Disk. 15. Disk Management tools. 16. Simple Volume 17. Spanned and Striped Volumes 18. Maintaining Disks, Partitions, and Volumes 19. Disk Quota 20. Device Driver in Windows 8 21. System Restore 22. LAST KNOWN GOOD CONFIGURATION 23. Configure and Trouble shoot Network Connections 24. What is an IPv4 Address 25. Default Gateway 26. Public and Private IPv4 Address 27. IPv6 Network Connectivity 28. IPv4 Address can be assigned by following types 29. Implementing Name Resolution 30. Trouble Shooting Network Connectivity 31. Implementing Wireless Security 32. Wireless network Technologies 33. What is Wireless Broadband? 34. IEEE 802.11 35. Wireless Network Configuration 36. Security Types 37. Implementing Network Security. 38. Configuring Windows Firewall 39. Ports and Application 40. Important Application, Protocol and Port Number 41. Configure Inbound and Outbound Rules 42. Securing Network traffic 43. Configuring Windows Defender 44. Managing File Access 45. NTFS Standard permission for FOLDER 46. Preventing Permission Inheritance 47. Different ways to Share Folder 48. RULE for setting NTFS + SHARE PERMISSION 49. Managing Printers 50. SkyDrive 51. Securing Windows 8 Desktop 52. User Account Types and Rights 53. Windows Authentication Methods 54. Important Security Features in Windows 8 55. Managing EFS Certificates 56. BitLocker 57. Configuring BitLocker To Go 58. UAC - User Account Control 59. Configuring Application. 60. Application Compatibility Issue 61. Resolve Common Application Compatibility Issues 62. Office 365 63. Windows Store 64. LOB (Line Of Business) and Sideloading 65. Configuring Internet Explorer Settings 66. AppLocker 67. Optimizing and Maintaining Windows 8 Client Computers 68. Performance Monitor 69. Commonly used Performance Counters 70. Resource Monitor 71. Managing Reliability of Windows 8 72. Managing Windows 8 Updates 73. Configuring Mobile Computing and Remote Access 74. Tools for Configuring Mobile Computers and Device Setting 75. Configure VPN Access 76. Data encryption 77. VPN Tunneling Protocols 78. Configure Remote Desktop and Remote Assistance 79. Remote Assistance 80. DirectAccess 81. Hyper-V 82. VHD 83. Managing Snapshot 84. Troubleshooting and Recovery Options for Windows 8 85. Enable and configure Windows 7 File Recovery 86. Advance Troubleshoot now option 87. Windows 8 System Restore 88. Using Windows PowerShell
Pr.Pg Next Pg

Implementing Wireless Security tutorials

  • With increasing organization going wireless network, itís time to discuss about.

  • Wireless Networks.

  • Wireless Network Technologies.

  • What is Wireless Broadband.

  • Security protocols for Wireless Network.

  • A wireless network as name suggests connect devices using Radio signals instead of wires or cables.

  • A wireless network provides more flexibility, mobility and convince to user.

  • You can create public network where guest can use Internet connection without creating security issue.

  • Wireless network technologies have evolved tremendously and many organizations from large to small scale today rely upon wireless network.

 

Advantages of wireless network

Disadvantages of wireless network

Convenient to extend network, sometimes it is difficult or impossible to lay cables by drilling holes and pull cables through walls and ceilings.

Wireless network poses serious security threats. As signals are spread in the air, it is convenient for hackers to heck into network.

Wireless network provide portability. The mobility of laptop and smart devices is enabling people to work from wherever there is wireless connection.

Needs very tight security so that unauthorized user cannot exploit situation.

 

Increase productivity for mobile employees.

Common users might not be aware of ways to address security matters. So it requires additional cost for security expert.

Easy to add new devices as no cables required.

Wireless network could be significantly slower than wired network.

Helps to create internet access in public places like Airport, Education camps, Library. You can enables your guest to have internet connection without causing possible security issues to your corporate network.

Wireless reception may be impaired by number of factors such as distance and interference from physical and electrical signal from codeless phone, Bluetooth device or any other wireless devices.

 

Wireless Network Modes

  • A wireless network operates in two modes.

    1) Ad-Hoc Mode

    2) Infrastructure Mode

Ad-hoc Mode

  • In this mode, two wireless network Adapters are connected directly to each one. Instead of using router or WAP (Wireless Access Point) devices are connected directly to each other. It is also known as peer to peer communication.

  • To reach internet or another network, you must configure one of the peer-to-peer computers as a router that connects to the network.

  • It is typically used to share files, video and internet connection among multiple computers and devices.

  • Young generation with latest smart devices know this technology by name of Tethering or Portable hotspot.

 

Infrastructure Mode

  • In this mode network adapters connect only to special radio bridges or WAP (Wireless Access Point).

  • You need to setup WAP connections using Wireless Routers.

  • Business units and Home network typically uses this mode for setting Wireless Access Point.

Pr.Pg border                                              Next Pg