-Workstation Troubleshooting
-System Tune-ups
-Virus / Malware Removals
-System Setup
-OS Restore
-Application Installation
-Connection Points
-Cable Management
-Clearly Identifiable Location Maps
-Switch-Port Configurations
-Spanning-Tree
-Dot.1q Tagging
-Aggregation Points
-Layer-2 Security
-IPv4 and IPv6 Provisioning
-Dynamic and Static Routing
-Wide Area Network (WAN) Designs
-Server Virtualization
-Desktop Virtulization
-Application Virtualization
-Private/Public Cloud Computing
-Microsoft Exchange
-iSCSI and Fibre Channel Architectures
-De-Dupe Technologies
-Business Continuity Best Practices
-Secured Backup and Recovery
-Multifactor Authentication
-Risk Analysis
-Application Aware Firewalls
-Secured Unified Wireless
-Key Management and Data Loss Prevention
-Security Information Event Management (SIEM)
-Intrusion Prevention Systems (IPS)