SlideShare a Scribd company logo
Network
monitoring I.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of expertise Industry Certifications
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
PACE-IT.
– The why of network monitoring.
– Tools to monitor the network.
Page 4
Network monitoring I.
Page 5
How do you know what is
going on in your network? Is
it healthy or is it about to
crash?
Network administrators hate to be surprised by
failures in their networks—especially ones that could
have been foreseen and, therefore, forestalled. How
do they keep from being surprised? They enact a
plethora of procedures and tools to monitor their
networks and keep track of how they are behaving.
Network monitoring I.
Page 6
Network monitoring I.
Page 7
Network monitoring I.
– Log files.
» All operating systems offer a means of viewing events that
occur to that specific machine.
• This includes networking equipment.
» Some applications have been developed to monitor systems
and networks that also generate log files (among other actions).
» Log files can be used to help pinpoint when a problem occurred
and help to narrow down the cause of an issue.
» Log files can also be used to help create a baseline of network
behavior.
» Log files can usually be classified as being: system logs,
general logs, or history logs.
• As a general rule, log files are an after-the-fact means of
monitoring the network and are not very good for real time
analysis, partially due to the amount of information that they
generate.
Page 8
Network monitoring I.
– Event viewer.
» Windows Server and most other Windows operating systems
use this tool to keep track of and to log events. The most
important logs contained in the tools are: Application, Security,
and System logs.
– Application logs.
» Contain events triggered by the actions of applications.
• For example, LiveUpdate will create log entries based on
actions taken.
– Security logs.
» Contain events triggered by security events.
• For example, logs are created for successful and
unsuccessful logon attempts.
– System logs.
» Contain events triggered by Windows system components.
• For example, when drivers start or fail to start, a log entry will
be created.
Page 9
Network monitoring I.
– Syslog.
» Developed in the 1980s, provides devices that normally would
not be able to communicate with a means of delivering
performance and problem information to system administrators.
» Permits there to be separation between the software that
generates the message, the storage of the message, and the
software that analyzes the generated message.
• This allows syslog to be highly configurable and has allowed it
to continue to be a vital tool for monitoring networks.
» The Internet Engineering Task Force (IETF) standardized
syslog in 2009.
» It generates log messages based on the types of service and
includes a severity level from zero (most severe) to seven
(least severe).
» Syslog can generate a lot of log messages, most network
administrators configure it so that they only get alerted when a
minimum severity level has been reached.
• Network administrators may receive alerts via SMS or email.
Page 10
Network monitoring I.
– SNMP (Simple Network Management
Protocol).
» An application layer (OSI model Layer 7) protocol used to
monitor and manage a network’s health.
» Network or systems administrator configures monitors—often
called traps—on devices that view the operation of a specific
item (e.g., is the interface up or down?).
• The monitors periodically communicate with a network
management station (NMS) through GET messages that the
NMS sends out.
• The response from the monitors is stored in a Management
Information Base (MIB), which is a type of log file.
• The administrator can configure the monitors with SET
messages sent from the NMS.
» When an event occurs (the interface goes down), the trap is
tripped and the event is logged.
• It can be configured to just log the event or it can be
configured to contact a network administrator (via email or
SMS).
» This ability provides a more real time monitoring method.
Page 11
Network monitoring I.
– SIEM (Security information and event
management).
» A term for software products and services that combine
security information management (SIM) and security event
management (SEM).
• SIEM may be provided by a software package, a network
appliance, or as a third party service.
» It is used as a means of monitoring and providing real-time
analysis of security alerts.
• This is an example of the SEM functionality.
» It can be used to as a tool to analyze long-term data and log
files.
• This is an example of the SIM functionality.
» Can be highly configured to the needs of the individual network
needs.
Page 12
Network monitoring I.
As network administrators are responsible for keeping the network up and
running, they hate to be surprised by network failures—especially ones they
could have foreseen and, therefore, have forestalled. To prevent this, they
will deploy a variety of tools to keep track of the network’s health and
behavior.
Topic
The why of network
monitoring.
Summary
Log files are an important tool that network administrators can use to track
how their network and systems are running. Almost all operating systems
are capable of generating log files, which are usually a more passive and
after-the-fact type of monitoring. Event Viewer is a Microsoft tool used to
track and organize log files. Syslog was created in the 1980s to provide a
method of communication between devices that would not normally
communicate. Syslog events are rated on a scale of zero to seven, based
on the severity of the event (with zero being the most severe). SNMP is a
protocol that takes a more active approach in monitoring the network and
systems. With SNMP, a trap is set on a device. When the trap is tripped, a
message is sent to the NMS, which stores the event in the MIB. Depending
on the severity, a message may be sent to an administrator via SMS or
email.
Tools for monitoring the
network.
Page 13
THANK YOU!
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

More Related Content

PPTX
PACE-IT: Virtualization Technology - N10 006
PPTX
PACE-IT: Network Monitoring (part 2) - N10 006
PPTX
PACE-IT: Basic Cloud Concepts - N10 006
PPTX
PACE-IT: Networking Services and Applications (part 1) - N10 006
PPTX
PACE-IT: Implementing a Basic Network - N10 006
PPTX
PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006
PPTX
PACE-IT: Wireless LAN Infrastructure (part 2)
PPTX
PACE-IT: Special IP Networking Concepts - N10 006
PACE-IT: Virtualization Technology - N10 006
PACE-IT: Network Monitoring (part 2) - N10 006
PACE-IT: Basic Cloud Concepts - N10 006
PACE-IT: Networking Services and Applications (part 1) - N10 006
PACE-IT: Implementing a Basic Network - N10 006
PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006
PACE-IT: Wireless LAN Infrastructure (part 2)
PACE-IT: Special IP Networking Concepts - N10 006

What's hot (20)

PPTX
PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006
PPTX
PACE-IT: Introduction to IPv4 (part 2) - N10 006
PPTX
PACE-IT: Configuring Switches (part 2)
PPTX
PACE-IT: Configuring Switches (part 1)
PPTX
PACE-IT: Troubleshooting Wireless Networks (part 1)
PPTX
PACE-IT: Networking Services and Applications (part 2) - N10 006
PPTX
PACE-IT: Wireless LAN Infrastructure (part 1)
PPTX
PACE-IT: Introduction_to Network Devices (part 1) - N10 006
PPTX
Pace it troubleshooting-common_network_issues_bf
PPTX
PACE-IT: The Importance of Network Segmentation
PPTX
Pace IT - Tools for Working on Networks
PPTX
PACE-IT: Firewall Basics
PPTX
PACE-IT: Troubleshooting Wireless Networks (part 2)
PPTX
PACE-IT: Introduction to Routing Protocols - N10 006
PPTX
PACE-IT: Common WAN Components and Issues
PPTX
PACE-IT: Introducing_NAT - N10 006
PPTX
PACE-IT: Applying Patches and Upgrades
PPTX
PACE-IT: Network Cabling (part 1) - N10 006
PPTX
PACE-IT: Troubleshooting Connectivity With Utilities
PPTX
PACE-IT: Basic Elements of Unified Communications - N10 006
PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006
PACE-IT: Introduction to IPv4 (part 2) - N10 006
PACE-IT: Configuring Switches (part 2)
PACE-IT: Configuring Switches (part 1)
PACE-IT: Troubleshooting Wireless Networks (part 1)
PACE-IT: Networking Services and Applications (part 2) - N10 006
PACE-IT: Wireless LAN Infrastructure (part 1)
PACE-IT: Introduction_to Network Devices (part 1) - N10 006
Pace it troubleshooting-common_network_issues_bf
PACE-IT: The Importance of Network Segmentation
Pace IT - Tools for Working on Networks
PACE-IT: Firewall Basics
PACE-IT: Troubleshooting Wireless Networks (part 2)
PACE-IT: Introduction to Routing Protocols - N10 006
PACE-IT: Common WAN Components and Issues
PACE-IT: Introducing_NAT - N10 006
PACE-IT: Applying Patches and Upgrades
PACE-IT: Network Cabling (part 1) - N10 006
PACE-IT: Troubleshooting Connectivity With Utilities
PACE-IT: Basic Elements of Unified Communications - N10 006
Ad

Viewers also liked (15)

PDF
Monitoring and Managing Network Application Performance
PPTX
SteelCentral Network Planning and Configuration Management (NPCM)
PDF
Data Access Network for Monitoring and Troubleshooting
PDF
Managing and Monitoring Application Performance
PPTX
Network Monitoring Trends 2014
PDF
2016 Network Monitoring & Backup Brand Leader Survey Mini-Report
PPTX
Network & Application Performance Monitoring - Troubleshooting HTTP Applicati...
PPTX
Application Performance Monitoring (APM)
PPTX
Best Network Performance Monitoring Tool
PPT
Application Performance Monitoring
PDF
Cloud Storage: The Next 40 Years
PDF
CCNAv5 - S4: Chapter8 monitoring the network
DOCX
Rapprot de satge supervision de résau par EyesOfNetwok
PPTX
Gestion des performances applicatives en environnement Cloud et Virtualisation
PPTX
Supervision V2 ppt
Monitoring and Managing Network Application Performance
SteelCentral Network Planning and Configuration Management (NPCM)
Data Access Network for Monitoring and Troubleshooting
Managing and Monitoring Application Performance
Network Monitoring Trends 2014
2016 Network Monitoring & Backup Brand Leader Survey Mini-Report
Network & Application Performance Monitoring - Troubleshooting HTTP Applicati...
Application Performance Monitoring (APM)
Best Network Performance Monitoring Tool
Application Performance Monitoring
Cloud Storage: The Next 40 Years
CCNAv5 - S4: Chapter8 monitoring the network
Rapprot de satge supervision de résau par EyesOfNetwok
Gestion des performances applicatives en environnement Cloud et Virtualisation
Supervision V2 ppt
Ad

Similar to PACE-IT: Network Monitoring (part 1) - N10 006 (20)

PPTX
infoAssurance (1).pptx
PPTX
Network Monitoring Basics
PPTX
SIEM 1 solution .pptx
PPTX
Monitoring & Analysis 101 - N00b to Ninja in 60 Minutes at ISSW on April 9, 2016
PDF
Identify and Resolve Ntwork Problems.pdf
PPTX
First Responders Course - Session 6 - Detection Systems [2004]
PDF
UNIT -III SIEM aur baato kaise hai aap log.pdf
PPTX
Siem tools-monitor-your-network
PPT
Ch10 Conducting Audits
PDF
CNIT 152: 9 Network Evidence
PDF
BSIT3CD_Continuation of Cyber incident response (1).pdf
PPTX
Dcit 418-Slide two presentation (1).pptx
PPT
Network management aa
PDF
Network security monitoring with open source tools
PDF
HOST AND NETWORK SECURITY by ThesisScientist.com
PPTX
PACE-IT: Analyzing Monitoring Reports
PDF
Loggin alerting and hunting technology hub 2016
PPT
Network management
PPTX
PACE-IT, Security+3.6: Security Enhancement Techniques
PDF
Ceh v5 module 19 evading ids firewall and honeypot
infoAssurance (1).pptx
Network Monitoring Basics
SIEM 1 solution .pptx
Monitoring & Analysis 101 - N00b to Ninja in 60 Minutes at ISSW on April 9, 2016
Identify and Resolve Ntwork Problems.pdf
First Responders Course - Session 6 - Detection Systems [2004]
UNIT -III SIEM aur baato kaise hai aap log.pdf
Siem tools-monitor-your-network
Ch10 Conducting Audits
CNIT 152: 9 Network Evidence
BSIT3CD_Continuation of Cyber incident response (1).pdf
Dcit 418-Slide two presentation (1).pptx
Network management aa
Network security monitoring with open source tools
HOST AND NETWORK SECURITY by ThesisScientist.com
PACE-IT: Analyzing Monitoring Reports
Loggin alerting and hunting technology hub 2016
Network management
PACE-IT, Security+3.6: Security Enhancement Techniques
Ceh v5 module 19 evading ids firewall and honeypot

More from Pace IT at Edmonds Community College (20)

PPTX
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PPTX
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PPTX
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PPTX
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PPTX
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PPTX
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PPTX
PACE-IT, Security + 5.3: Security Controls for Account Management
PPTX
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PPTX
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PPTX
PACE-IT, Security + 5.1: Summary of Authentication Services
PPTX
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PPTX
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PPTX
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PPTX
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PPTX
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PPTX
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PPTX
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PPTX
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PPTX
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PPTX
PACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.4: Summary of Wireless Attacks

Recently uploaded (20)

PPTX
Institutional Correction lecture only . . .
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
GDM (1) (1).pptx small presentation for students
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
Cell Types and Its function , kingdom of life
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
Lesson notes of climatology university.
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
01-Introduction-to-Information-Management.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
Pharma ospi slides which help in ospi learning
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
TR - Agricultural Crops Production NC III.pdf
Institutional Correction lecture only . . .
Abdominal Access Techniques with Prof. Dr. R K Mishra
GDM (1) (1).pptx small presentation for students
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
O5-L3 Freight Transport Ops (International) V1.pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Cell Types and Its function , kingdom of life
Anesthesia in Laparoscopic Surgery in India
2.FourierTransform-ShortQuestionswithAnswers.pdf
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Lesson notes of climatology university.
Pharmacology of Heart Failure /Pharmacotherapy of CHF
STATICS OF THE RIGID BODIES Hibbelers.pdf
01-Introduction-to-Information-Management.pdf
human mycosis Human fungal infections are called human mycosis..pptx
Final Presentation General Medicine 03-08-2024.pptx
Supply Chain Operations Speaking Notes -ICLT Program
Pharma ospi slides which help in ospi learning
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
TR - Agricultural Crops Production NC III.pdf

PACE-IT: Network Monitoring (part 1) - N10 006

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of expertise Industry Certifications  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 PACE-IT. – The why of network monitoring. – Tools to monitor the network.
  • 5. Page 5 How do you know what is going on in your network? Is it healthy or is it about to crash? Network administrators hate to be surprised by failures in their networks—especially ones that could have been foreseen and, therefore, forestalled. How do they keep from being surprised? They enact a plethora of procedures and tools to monitor their networks and keep track of how they are behaving. Network monitoring I.
  • 7. Page 7 Network monitoring I. – Log files. » All operating systems offer a means of viewing events that occur to that specific machine. • This includes networking equipment. » Some applications have been developed to monitor systems and networks that also generate log files (among other actions). » Log files can be used to help pinpoint when a problem occurred and help to narrow down the cause of an issue. » Log files can also be used to help create a baseline of network behavior. » Log files can usually be classified as being: system logs, general logs, or history logs. • As a general rule, log files are an after-the-fact means of monitoring the network and are not very good for real time analysis, partially due to the amount of information that they generate.
  • 8. Page 8 Network monitoring I. – Event viewer. » Windows Server and most other Windows operating systems use this tool to keep track of and to log events. The most important logs contained in the tools are: Application, Security, and System logs. – Application logs. » Contain events triggered by the actions of applications. • For example, LiveUpdate will create log entries based on actions taken. – Security logs. » Contain events triggered by security events. • For example, logs are created for successful and unsuccessful logon attempts. – System logs. » Contain events triggered by Windows system components. • For example, when drivers start or fail to start, a log entry will be created.
  • 9. Page 9 Network monitoring I. – Syslog. » Developed in the 1980s, provides devices that normally would not be able to communicate with a means of delivering performance and problem information to system administrators. » Permits there to be separation between the software that generates the message, the storage of the message, and the software that analyzes the generated message. • This allows syslog to be highly configurable and has allowed it to continue to be a vital tool for monitoring networks. » The Internet Engineering Task Force (IETF) standardized syslog in 2009. » It generates log messages based on the types of service and includes a severity level from zero (most severe) to seven (least severe). » Syslog can generate a lot of log messages, most network administrators configure it so that they only get alerted when a minimum severity level has been reached. • Network administrators may receive alerts via SMS or email.
  • 10. Page 10 Network monitoring I. – SNMP (Simple Network Management Protocol). » An application layer (OSI model Layer 7) protocol used to monitor and manage a network’s health. » Network or systems administrator configures monitors—often called traps—on devices that view the operation of a specific item (e.g., is the interface up or down?). • The monitors periodically communicate with a network management station (NMS) through GET messages that the NMS sends out. • The response from the monitors is stored in a Management Information Base (MIB), which is a type of log file. • The administrator can configure the monitors with SET messages sent from the NMS. » When an event occurs (the interface goes down), the trap is tripped and the event is logged. • It can be configured to just log the event or it can be configured to contact a network administrator (via email or SMS). » This ability provides a more real time monitoring method.
  • 11. Page 11 Network monitoring I. – SIEM (Security information and event management). » A term for software products and services that combine security information management (SIM) and security event management (SEM). • SIEM may be provided by a software package, a network appliance, or as a third party service. » It is used as a means of monitoring and providing real-time analysis of security alerts. • This is an example of the SEM functionality. » It can be used to as a tool to analyze long-term data and log files. • This is an example of the SIM functionality. » Can be highly configured to the needs of the individual network needs.
  • 12. Page 12 Network monitoring I. As network administrators are responsible for keeping the network up and running, they hate to be surprised by network failures—especially ones they could have foreseen and, therefore, have forestalled. To prevent this, they will deploy a variety of tools to keep track of the network’s health and behavior. Topic The why of network monitoring. Summary Log files are an important tool that network administrators can use to track how their network and systems are running. Almost all operating systems are capable of generating log files, which are usually a more passive and after-the-fact type of monitoring. Event Viewer is a Microsoft tool used to track and organize log files. Syslog was created in the 1980s to provide a method of communication between devices that would not normally communicate. Syslog events are rated on a scale of zero to seven, based on the severity of the event (with zero being the most severe). SNMP is a protocol that takes a more active approach in monitoring the network and systems. With SNMP, a trap is set on a device. When the trap is tripped, a message is sent to the NMS, which stores the event in the MIB. Depending on the severity, a message may be sent to an administrator via SMS or email. Tools for monitoring the network.
  • 14. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.