Video Description

This lesson focuses on unified communications and how technology is used so everyone can work together:

  • Telephony: Voice over IP (VoIP)
  • Email
  • Instant messaging and presence
  • Web conferencing
  • Video conferencing
  • Secure collaboration platforms
  • Remote Access
  • Desktop sharing
  • Remote assistance

Participants also learn about securing VoIP through the following five steps: - Establishing baseline metrics

  • Analyzing and remediating network congestion
  • Estimating Network resource utilization
  • Selecting a codec
  • Optimizing the network performance via traffic prioritization

The unit also discusses securing mobile devices and the issue of people bringing in their own devices for business use as well as securing the technology lifecycle.

Course Modules