We are glad that you are following our tutorials. Our team tries to provide you with the best educational and resources in the field of web, network, internet, and related sciences. If you have any comments, questions, or suggestions, please leave a comment to help us improve.

condition-if

Condition IF in Python

Condition IF in Python We use the IF statement in programming to run a group of statements but only when a condition is met. In this section, we want to introduce the syntax and examples of Condition IF in Python. IF is one of the conditional commands that is very widely used in programming and learning it is recommended to everyone. There are three forms of the IF In Python: if if  else if   elif   else elif allows to check multiple statements for TRUE and if one the condition was True then it execute those statements. else: if all conditions…
Create user in Microsoft 365

Create user in Microsoft 365

Create user in Microsoft 365 The Microsoft Office 365 Administration Center is a web-based portal administrator. We use this portal to manage accounts and configure services such as Intune, SharePoint, Teams, Exchange, OneDrive, and all office products. In this part, we want to create user in Microsoft 365 with Admin Center. Users section: create, delete, manage users, set permissions, edit user details, and reset passwords. Groups section: create, organize, manage, and delete groups With the Admin role we can login and try to create users. For starting we login to this link. https://admin.microsoft.com/ In the menu we click on User\Active…
Port-Scanning

Port Scanning

What is Port Scanning? It is an intrusion method that hackers use to find open entrances or network weaknesses. Through this attack, they find open ports in the system and can send or receive information. They can make sure that firewalls are active or inactive by cyber-attack on ports scanning. They send a packet to a port and in the message that they receive, they can determine whether the port is active or inactive and whether there is a weak point to enter the system or not. Network administrators inform about the vulnerability of the network system in companies and…
Add win10,11 to Esxi? Learning-en

Storage Area Network (SAN)

Storage Area Network (SAN) A Storage Area Network (SAN) is a specialized network that provides high-speed block-level access to data storage. Unlike Network Attached Storage (NAS), which provides file-level access to data, SANs are designed to provide direct access to individual storage devices, such as hard drives, solid-state drives, or tape drives. A SAN typically consists of a dedicated network of servers, storage devices, and switches that are optimized for high-speed data transfer. The servers in a SAN are often connected to the storage devices via Fibre Channel, a high-speed networking technology that allows for low-latency and high-bandwidth data transfer.…
Sample Exams (Blockchain, U.S. Dep Certification) Learning-en

Sample Exams (Blockchain, U.S. Dep Certification)

Sample Exams of Cybersecurity In these series we have some “Sample Exams of Cybersecurity”, “Practice Cybersecurity Examinations”, “Cybersecurity Test Previews” and “Mock Cybersecurity Tests” Which certifications meets the U.S. Department of Defense Directive 8570.01-M requirements, which is important for anyone looking to work in IT security for the federal government? As of my last knowledge update in January 2022, the U.S. Department of Defense Directive 8570.01-M (DoD 8570) established requirements for the certification and training of personnel working in Information Assurance (IA) roles within the Department of Defense (DoD). These requirements were important for anyone looking to work in IT…
What is Azure?

What is Azure?

What is Azure? Microsoft Azure is a cloud computing platform and infrastructure created by Microsoft for building, deploying, and managing applications and services through a global network of Microsoft-managed data centers. It provides a variety of services such as computing power, storage, and networking, as well as many pre-built tools and frameworks for different programming languages and platforms, making it easy for developers to build and deploy applications on the cloud.   Now, let’s to see the video from our YouTube channel:   You can find all learning for Azure by clicking here.
3D Printing (Flash Man) Learning-en

3D Printing (Flash Man)

3D Printing (Flash Man) Flash Man is a character from the classic video game series “Mega Man” developed by Capcom. He is one of the Robot Masters created by the nefarious Dr. Wily. Flash Man made his first appearance as a boss character in “Mega Man 2,” which was released for the Nintendo Entertainment System (NES) in 1988. Flash Man is known for his ability to manipulate time using his Time Stopper weapon. This weapon allows him to briefly freeze time, giving him an advantage during battles. In his stage, players navigate through various obstacles and enemies before facing Flash…
Create VLan

Create VLan

What is a VLAN? Set of devices within the network that communicates with each other and forms a single local area network. In our concept, by dividing a larger network into smaller networks, each smaller network works like an independent network. The advantage of this method is reducing excessive network traffic and dividing it into smaller units. When two devices in the same network send data packets at the same time, the data collides and requires users to wait, we can prevent such collisions by dividing the network. There is also increased data security and logical partitioning in this method.…
Install Active Directory on Server Learning-en

Install Active Directory on Server

How to Install Active Directory on Server ? Installing Active Directory on a Windows Server involves several steps. Active Directory is a directory service provided by Microsoft for Windows network environments. It allows you to manage users, computers, and other network resources in a centralized and secure manner. Here’s a step-by-step guide on how to install Active Directory on a Windows Server: Note: You’ll need to have a Windows Server operating system installed on your server before you can install Active Directory. Additionally, make sure your server has a static IP address and DNS settings configured correctly. Open Server Manager:…
Problems running Hyper-V & VirtualBox

Problems running Hyper-V & VirtualBox

Problems running Hyper-V & VirtualBox   The use of virtual machines is being used day by day. In companies, institutions and even at home for practice and learning. We can install virtual machines on personal computers that have minimal functionality. When we install these softwares on Windows 10 or 11, in some cases, problems arise to run it. One of them is, “Problems running Hyper-V & VirtualBox” at the same time. Here we are going to explain how to solve this problem. If you installed Hyper-V and you want to install VirtualBox, you will have this issue: mes you get…
Add win10,11 to Esxi? Learning-en

GPO – Create Shortcut

GPO: Create Shortcut Today’s tutorial will show you how to easily create a desktop shortcut from a shared folder on your server. In this video, we will be demonstrating how to create a shortcut from a shared folder by using GPO on your server in just a few simple steps. let’s to see video from our YouTube channel Please check more videos for This Topic
Python Standard Library

Python Standard Library

Python Standard Library With Python Standard Library, we call module code that is ready to use. We cannot use these modules without recall and if we need, we must call them. The Python standard library is very extensive and offers many features. In this library, we see internal modules that are often written in C language. For example, we can access the file input/output system through these modules, without these modules, Python programming will be inaccessible. These modules provide increased programming capabilities. In the installed version of Python in Windows or Mac, usually the entire standard library also install and…
FOR in Python

Data Structure in Python

Data Structure in Python Data structure in python makes it possible to store and organize data in a very efficient way. Using it, we can link the data together and perform the desired operations on them. In programming, this process is especially important because it enables us to access and recall data more easily. There is four general Data Structures in Python: List: ordered, changeable, duplicate members. Dictionary: ordered, changeable, No duplicate members. Set: unordered, unchangeable, unindexed, No duplicate members. Tuples: ordered, unchangeable, duplicate members. LIST:  >>>a = [] for example: >>>a = [2, 5, 10]          …
Microsoft Intune, "Retire," "Wipe," and "Delete" Learning-en

Microsoft Intune, “Retire,” “Wipe,” and “Delete”

Microsoft Intune, “Retire,” “Wipe,” and “Delete” In Microsoft Intune, “Retire,” “Wipe,” and “Delete” are actions you can take when managing mobile devices and sometimes computers. These actions are used to control and secure the data and settings on the devices. 1- Retire: Purpose: Retiring a device means marking it as no longer needed or in use. It’s a way to indicate that the device is no longer managed by the organization. Effects: When you retire a device, it typically removes company data and settings associated with that device, but it doesn’t wipe the entire device or delete personal data. Use…
PowerShell

PowerShell (Shutdown-Restart)

PowerShell (Shutdown-Restart) PowerShell is a platform that consists of a command line, a programming language, and a configuration manager. You can run it on Windows, Linux, and MacOS. With it, we can do the things that we do graphically in Windows with the command line. in this learning, we want to know, how we can use Shut down or Restart computer by command. let’s start PowerShell (Shutdown-Restart). First, we open it from the Start menu. This command will shut down computer as Force without any confirmation: when we use this command, system will shut down without any confirmation, this command…
Windows Server

What is the Windows Server? Include Installation tutorial

Windows Server : Windows Server is a server operating system developed by Microsoft and designed to provide a platform for running network services such as file and print sharing, web and application servers, database management, and other enterprise-level applications. There are several different versions, including Server 2019, Server 2016, Server 2012 R2, and Server 2008 R2. Each version provides unique features and capabilities, and the choice of which version to use depends on the needs of the organization. Some of the key features of Windows Server include Active Directory, which provides a centralized management system for user accounts, security groups,…
Sample Exams (Type of Attack, Hat) Learning-en

Sample Exams (Type of Attack, Hat)

Sample Exams of Cybersecurity In these series we have some “Sample Exams of Cybersecurity”, “Practice Cybersecurity Examinations”, “Cybersecurity Test Previews” and “Mock Cybersecurity Tests”   Type of Attack: 1. Hacktivists: These are individuals or groups who engage in hacking activities to promote a social or political agenda. Their goal is to raise awareness or effect change through their actions. 2. Cybercriminals: Cybercriminals are motivated by financial gain. They may engage in activities like stealing personal information, credit card data, or conducting ransomware attacks to demand money from victims. 3. Nation-State Actors: Governments and state-sponsored groups conduct cyber-espionage and cyber-attacks to…
What is Azure?

Dynamic Group

Dynamic Group In Azure AD, a dynamic group is a special type of group that is defined by a rule or criteria rather than by a static list of members. Dynamic groups can be useful for managing access to resources based on user attributes, such as department, job title, or location. For example, you could create a dynamic group for all users in the “Marketing” department, and then grant access to marketing-related resources to that group. Azure Active Directory (Azure AD) is Microsoft’s cloud-based identity and access management service. It allows organizations to manage user identities and access to resources…
Sample Exams (McCumber Cube, Cyberwarfare) Learning-en

Sample Exams (McCumber Cube, Cyberwarfare)

Sample Exams of Cybersecurity In these series we have some “Sample Exams of Cybersecurity”, “Practice Cybersecurity Examinations”, “Cybersecurity Test Previews” and “Mock Cybersecurity Tests”   McCumber CUBE: This could refer to a cybersecurity risk management framework developed by John McCumber, known as the McCumber Cube. It provides a structured way of understanding and managing security risks within an organization by considering three dimensions: confidentiality, integrity, and availability (often referred to as the CIA triad). McCumber diagram: In software engineering, the McCumber diagram is a graphical representation used to depict various dimensions of security in a system. It can display information…
Add win10,11 to Esxi? Learning-en

What is Active Directory? Include Installation tutorial

What is Active Directory? Active Directory (AD) is a directory service developed by Microsoft Corporation for managing user accounts, computers, and other resources on a network. It is used in Windows-based networks to provide a centralized authentication and authorization mechanism. AD stores information about users, groups, computers, and other resources in a hierarchical structure that can be called a domain. Each domain has a unique name and contains objects that represent users, groups, and other resources. AD provides a single sign-on (SSO) feature that allows users to authenticate once and access multiple resources on the network without having to re-enter…

Thanks

bussiness-man1
John Doe

Thanks for your information

business-man2
Eric Melan

[vc_tabs interval=”3″][vc_tab title=”Cisco” tab_id=”7c9e6b5f-4f2f-4″]

[/vc_tab][vc_tab title=”PowerShell” tab_id=”0ad27cb7-f7e7-0″]
[/vc_tab][vc_tab title=”Python” tab_id=”1672618581754-2-9″]
[/vc_tab][vc_tab title=”Microsoft Azure” tab_id=”1672624966524-3-4″]
[/vc_tab][vc_tab title=”Microsoft 365″ tab_id=”1672624967419-4-3″]
[/vc_tab][vc_tab title=”Windows Server” tab_id=”1672624968171-5-8″][/vc_tab][vc_tab title=”Virtualization” tab_id=”1672624968779-6-1″]
[/vc_tab][vc_tab title=”Network Security” tab_id=”1672624969451-7-2″][/vc_tab][vc_tab title=”Linux” tab_id=”1672625234812-8-4″]
[/vc_tab][vc_tab title=”Web Design” tab_id=”1672625259819-9-7″]
No results found.
[/vc_tab][/vc_tabs]

keyboard_arrow_up