We are glad that you are following our tutorials. Our team tries to provide you with the best educational and resources in the field of web, network, internet, and related sciences. If you have any comments, questions, or suggestions, please leave a comment to help us improve.

MITRE ATT&CK Learning-en

MITRE ATT&CK

MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) is a framework developed by MITRE Corporation, a not-for-profit organization dedicated to solving problems for a safer world. ATT&CK is a knowledge base that categorizes the tactics, techniques, and procedures (TTPs) used by adversaries or attackers during cyber intrusions. The framework provides a comprehensive understanding of how cyber adversaries operate by organizing their behaviors into a matrix. This matrix consists of various tactics that represent high-level objectives an attacker may have (such as initial access, execution, persistence, privilege escalation, etc.) and techniques that represent specific methods or actions used to achieve those…
Add win10,11 to Esxi? Learning-en

What is Active Directory? Include Installation tutorial

What is Active Directory? Active Directory (AD) is a directory service developed by Microsoft Corporation for managing user accounts, computers, and other resources on a network. It is used in Windows-based networks to provide a centralized authentication and authorization mechanism. AD stores information about users, groups, computers, and other resources in a hierarchical structure that can be called a domain. Each domain has a unique name and contains objects that represent users, groups, and other resources. AD provides a single sign-on (SSO) feature that allows users to authenticate once and access multiple resources on the network without having to re-enter…
help desk support, IT support, website, web design, pc repair

Backup and Recovery

Backup and Recovery In this part we want to know, what is Backup and Recovery? Backup refers to storing information in external memory to protect information from accidents and loss. Recovery refers to returning data from a saved copy to the original location or to an alternate location where information has been lost or damaged. To store information, we use a separate system or media such as virtual hard drives, data storage servers or cloud storage space to protect them against the possibility of data damage. Why do we need backups? Why do we need backups? By making a backup…
What is Azure?

Dynamic Group

Dynamic Group In Azure AD, a dynamic group is a special type of group that is defined by a rule or criteria rather than by a static list of members. Dynamic groups can be useful for managing access to resources based on user attributes, such as department, job title, or location. For example, you could create a dynamic group for all users in the “Marketing” department, and then grant access to marketing-related resources to that group. Azure Active Directory (Azure AD) is Microsoft’s cloud-based identity and access management service. It allows organizations to manage user identities and access to resources…
Create User in Azure Learning-en

Create User in Azure

Create User in Azure Active Directory In this part, we want to create user in Azure with portal Azure. With the Admin role we can login and try to create users. For starting we login to this link. https://portal.azure.com/ To add a new user in Azure Active Directory (Azure AD), you typically have a few different methods to choose from, depending on your needs and preferences. Here’s a common method using the Azure portal: Sign in, to Azure Portal: Sign in, to your Azure portal using your admin account Access Azure Active Directory : Click on “Azure Active Directory” in…
WHILE in Python

WHILE in Python

WHILE in Python WHILE loop is especially useful in Python programming, and we use it many times. In the WHILE loop, we start a loop until the condition in the loop becomes True and the loop stops. In this loop, while first evaluates the desired condition, if the condition is correct, the command inside the loop is executed. After that, the condition is reevaluated and this process continues until the desired condition is violated and when the condition becomes False, the loop will stop. Syntax: while condition: statement In WHILE loop, we need a condition to stop loop, if we…
Sample Exams (Malware, confidentiality, McCumber Cube) Learning-en

Sample Exams (Malware, confidentiality, McCumber Cube)

Sample Exams of Cybersecurity In these series we have some “Sample Exams of Cybersecurity”, “Practice Cybersecurity Examinations”, “Cybersecurity Test Previews” and “Mock Cybersecurity Tests” Which of the following would be classified as personal data? (1,2,3) Social security number Driver license number Date and place of birth Job title IP address   Which one is the confidentiality of information? (3,5,6) Backup Version control Data encryption File permission settings Two-factor authentication Username ID and password   Which one is in the McCumber Cube? (2,4,5) Access Integrity Scalability Availability Confidentiality Intervention   Types of Malware on cyber security Viruses: Viruses are self-replicating programs…
3D Printing (Flash Man) Learning-en

3D Printing (Flash Man)

3D Printing (Flash Man) Flash Man is a character from the classic video game series “Mega Man” developed by Capcom. He is one of the Robot Masters created by the nefarious Dr. Wily. Flash Man made his first appearance as a boss character in “Mega Man 2,” which was released for the Nintendo Entertainment System (NES) in 1988. Flash Man is known for his ability to manipulate time using his Time Stopper weapon. This weapon allows him to briefly freeze time, giving him an advantage during battles. In his stage, players navigate through various obstacles and enemies before facing Flash…
FOR in Python

Functions in Python

Functions in Python A function in Python is a block of code that performs a specific task and returns a result. Functions help break down a program into smaller, more manageable pieces and make the code easier to read, test, and maintain. Functions define using the def keyword, followed by the name of the function, a set of parentheses, and a colon. The code within the function indent under the definition and execute when the function can call. def func_name (optional_arguments) statement … return optional_value   Arguments: Functions accept arguments, which values pass to the function when it calls and…
Add win10,11 to Esxi? Learning-en

What is the GPO? Include an example

What is the GPO? Group Policy Object, which is a feature of Microsoft Active Directory that allows administrators to manage and enforce policies across a network of computers. A GPO is a collection of settings and rules that define the behavior and configuration of a set of computers or users within an Active Directory domain. These settings can include security policies, software installation and configuration, network settings, and many others. GPOs are created, managed, and linked to Active Directory objects such as sites, domains, or organizational units (OUs). Once a GPO is linked to an object, it applies its settings to…
PowerShell

PowerShell (Install Calculator)

PowerShell (Install Calculator) To install the Windows 10 calculator using PowerShell, you can follow these steps: Open PowerShell : Press the Windows key, type “PowerShell,” and click on “Windows PowerShell” in the search results. Make sure to run PowerShell as an administrator. Run the following command to install the Windows Calculator app from the Microsoft Store: PowerShell code: Get-AppxPackage -Name Microsoft.WindowsCalculator | Add-AppxPackage   Wait for the command to execute. It will download and install the Windows Calculator app from the Microsoft Store. Once the installation is complete, you can close PowerShell. After following these steps, you should have the…
Server-logo

What is the Server? And Types of Servers

What is a Server? In fact, we call a supercomputer or a computer with extremely performance as a server, so it is a computer or a program that can provides services to the programs installed on the user’s computer or another computer. It can refer to a physical machine, virtual machine, or software that performs services. We can use them for various purposes, we can change according to our needs.   What Types we have?   Servers can be divided into physical and virtual Physical: like a physical computer, but it works much more powerfully and is used to run server…
Port-Scanning

Port Scanning

What is Port Scanning? It is an intrusion method that hackers use to find open entrances or network weaknesses. Through this attack, they find open ports in the system and can send or receive information. They can make sure that firewalls are active or inactive by cyber-attack on ports scanning. They send a packet to a port and in the message that they receive, they can determine whether the port is active or inactive and whether there is a weak point to enter the system or not. Network administrators inform about the vulnerability of the network system in companies and…
Network-Security-logo

Network Security

What is Network Security? One of the main topics of computer networks is Network Security. After configuring and deploying the hardware, we must pay special attention to this topic. In this section, we will examine the following: What is computer network security? Wireless networks Firewall What is computer network security? It includes things like software used, data stored, and information theft. Everything that is used in a computer network system (both software and hardware) must be protected against attacks and risks. Three principal factors are needed in the security of a computer network, these three factors (CIA) are the basic…
Add win10,11 to Esxi? Learning-en

Storage Area Network (SAN)

Storage Area Network (SAN) A Storage Area Network (SAN) is a specialized network that provides high-speed block-level access to data storage. Unlike Network Attached Storage (NAS), which provides file-level access to data, SANs are designed to provide direct access to individual storage devices, such as hard drives, solid-state drives, or tape drives. A SAN typically consists of a dedicated network of servers, storage devices, and switches that are optimized for high-speed data transfer. The servers in a SAN are often connected to the storage devices via Fibre Channel, a high-speed networking technology that allows for low-latency and high-bandwidth data transfer.…
FOR in Python

Data Structure in Python

Data Structure in Python Data structure in python makes it possible to store and organize data in a very efficient way. Using it, we can link the data together and perform the desired operations on them. In programming, this process is especially important because it enables us to access and recall data more easily. There is four general Data Structures in Python: List: ordered, changeable, duplicate members. Dictionary: ordered, changeable, No duplicate members. Set: unordered, unchangeable, unindexed, No duplicate members. Tuples: ordered, unchangeable, duplicate members. LIST:  >>>a = [] for example: >>>a = [2, 5, 10]          …
How to Create Users in Linux (useradd Command)

How to Create Users in Linux (useradd Command)

How to Create Users in Linux (useradd Command) In this course of Linux commands, we will introduce How to Create Users in Linux (useradd Command). We start tutorial by mentioning the structure and example. In Linux, the adduser command is for creating a user. There are several commands and methods to create a user in Linux, such as useradd, adduser. One of the features of the Linux operating system is multi-user support. It is possible to create different users and separate groups by specifying the access level for each user or group in Linux. The two commands adduser and useradd work…
Firewall-CentOS-logo

Firewall in CentOS

Firewall in CentOS In this tutorial we want to try Firewall in CentOS but before that we ask: What is a firewall? Firewalls are the first line of defense in network security. They are a network security device that can be hardware or software and control incoming and outgoing traffic.   Firewall is a part of network security that controls and filters traffic. The firewall place between the Internet and the end user and filters the Internet based on the rules previously defined for it and whether it allows access or not. In Linux, Netfilter use to allow access or…
Install Active Directory on Server Learning-en

Install Active Directory on Server

How to Install Active Directory on Server ? Installing Active Directory on a Windows Server involves several steps. Active Directory is a directory service provided by Microsoft for Windows network environments. It allows you to manage users, computers, and other network resources in a centralized and secure manner. Here’s a step-by-step guide on how to install Active Directory on a Windows Server: Note: You’ll need to have a Windows Server operating system installed on your server before you can install Active Directory. Additionally, make sure your server has a static IP address and DNS settings configured correctly. Open Server Manager:…
Activate TPM on VMware

Activate TPM on VMware

Activate TPM on VMware : In this part we try to activate TPM on VMware, but before that we ask, what is TPM? That’s mean Trusted Platform Module, it is an international standard for secure encryption processors. The function of this microcontroller is to protect the hardware by integrating cryptographic keys. These chips are either integrated into the PC motherboard or added to the CPU.  Its revised version, version 1.2, was released on March 3, 2011, and the latest version is version 2.0 This technology is used to measure system integrity and generate keys. When booting a system, the load boot…

Thanks

bussiness-man1
John Doe

Thanks for your information

business-man2
Eric Melan

[vc_tabs interval=”3″][vc_tab title=”Cisco” tab_id=”7c9e6b5f-4f2f-4″]

[/vc_tab][vc_tab title=”PowerShell” tab_id=”0ad27cb7-f7e7-0″]
[/vc_tab][vc_tab title=”Python” tab_id=”1672618581754-2-9″]
[/vc_tab][vc_tab title=”Microsoft Azure” tab_id=”1672624966524-3-4″]
[/vc_tab][vc_tab title=”Microsoft 365″ tab_id=”1672624967419-4-3″]
[/vc_tab][vc_tab title=”Windows Server” tab_id=”1672624968171-5-8″][/vc_tab][vc_tab title=”Virtualization” tab_id=”1672624968779-6-1″]
[/vc_tab][vc_tab title=”Network Security” tab_id=”1672624969451-7-2″][/vc_tab][vc_tab title=”Linux” tab_id=”1672625234812-8-4″]
[/vc_tab][vc_tab title=”Web Design” tab_id=”1672625259819-9-7″]
No results found.
[/vc_tab][/vc_tabs]

keyboard_arrow_up