fbpx

We are glad that you are following our tutorials. Our team tries to provide you with the best educational and resources in the field of web, network, internet, and related sciences. If you have any comments, questions, or suggestions, please leave a comment to help us improve.

Add win10,11 to Esxi? Learning-en

Storage Area Network (SAN)

Storage Area Network (SAN) A Storage Area Network (SAN) is a specialized network that provides high-speed block-level access to data storage. Unlike Network Attached Storage (NAS), which provides file-level access to data, SANs are designed to provide direct access to individual storage devices, such as hard drives, solid-state drives, or tape drives. A SAN typically consists of a dedicated network of servers, storage devices, and switches that are optimized for high-speed data transfer. The servers in a SAN are often connected to the storage devices via Fibre Channel, a high-speed networking technology that allows for low-latency and high-bandwidth data transfer.…
MITRE ATT&CK Learning-en

MITRE ATT&CK

MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) is a framework developed by MITRE Corporation, a not-for-profit organization dedicated to solving problems for a safer world. ATT&CK is a knowledge base that categorizes the tactics, techniques, and procedures (TTPs) used by adversaries or attackers during cyber intrusions. The framework provides a comprehensive understanding of how cyber adversaries operate by organizing their behaviors into a matrix. This matrix consists of various tactics that represent high-level objectives an attacker may have (such as initial access, execution, persistence, privilege escalation, etc.) and techniques that represent specific methods or actions used to achieve those…
FOR in Python

FOR in Python

FOR in Python Loops are used for sequential traversal, that’s mean used for repeating variables such as numbers, strings, lists or sets. The loop continues until it is terminated by the variable or by terminating the loop with the Break command. In this section, we want to learn how to use loops. loop in programming languages is an iterative method and is also found in other object-oriented languages. With a loop, we can execute a set of commands, once for each item. Loops in every programming language start with a set of rules, but they may be slightly different in…
condition-if

Condition IF in Python

Condition IF in Python We use the IF statement in programming to run a group of statements but only when a condition is met. In this section, we want to introduce the syntax and examples of Condition IF in Python. IF is one of the conditional commands that is very widely used in programming and learning it is recommended to everyone. There are three forms of the IF In Python: if if  else if   elif   else elif allows to check multiple statements for TRUE and if one the condition was True then it execute those statements. else: if all conditions…
Add win10,11 to Esxi? Learning-en

What is the GPO? Include an example

What is the GPO? Group Policy Object, which is a feature of Microsoft Active Directory that allows administrators to manage and enforce policies across a network of computers. A GPO is a collection of settings and rules that define the behavior and configuration of a set of computers or users within an Active Directory domain. These settings can include security policies, software installation and configuration, network settings, and many others. GPOs are created, managed, and linked to Active Directory objects such as sites, domains, or organizational units (OUs). Once a GPO is linked to an object, it applies its settings to…
Python-Variable-Types-logo

Variables in Python

Variables in Programming Language Python The programing languages store data in the form of Variables. Every variable has data type, name, and a value assigned to it. Variables are assigned places in the computer memory to store data in which they can be known or unknown based on the value given to them. Also, they can be used for more than one value. They can tag and store data in memory and we can recall them when we need them. In this section, we want to introduce the most used Variables in Python. In Python, we have four commonly used groups…
Create user in Microsoft 365

Create user in Microsoft 365

Create user in Microsoft 365 The Microsoft Office 365 Administration Center is a web-based portal administrator. We use this portal to manage accounts and configure services such as Intune, SharePoint, Teams, Exchange, OneDrive, and all office products. In this part, we want to create user in Microsoft 365 with Admin Center. Users section: create, delete, manage users, set permissions, edit user details, and reset passwords. Groups section: create, organize, manage, and delete groups With the Admin role we can login and try to create users. For starting we login to this link. https://admin.microsoft.com/ In the menu we click on User\Active…
Add win10,11 to Esxi? Learning-en

Application in Intune (for windows)?

How to add application in Intune? In this tutorial we want to learn how we can add Application in Intune (for windows)? To add an app in Microsoft Intune, you can follow these general steps: Sign into the Microsoft Endpoint Manager admin center (https://endpoint.microsoft.com) using your administrator account. Navigate to “Apps” from the left-hand menu. Click on “Add” to start the process of adding a new app. Select the app type you want to add. Intune supports several types of apps, including “Managed Google Play app,” “iOS/iPadOS app,” “Android app,” “Windows app (Win32),” “Windows app (store),” and more. Choose the…
Problems running Hyper-V & VirtualBox

Problems running Hyper-V & VirtualBox

Problems running Hyper-V & VirtualBox   The use of virtual machines is being used day by day. In companies, institutions and even at home for practice and learning. We can install virtual machines on personal computers that have minimal functionality. When we install these softwares on Windows 10 or 11, in some cases, problems arise to run it. One of them is, “Problems running Hyper-V & VirtualBox” at the same time. Here we are going to explain how to solve this problem. If you installed Hyper-V and you want to install VirtualBox, you will have this issue: mes you get…
Linux Command - (apt-get)-logo

Linux Command – (apt-get)(Shutdown)(tree)(which-where)

Linux Command In this course of Linux commands, we will introduce four Linux Command – (apt-get)(Shutdown)(tree)(which-where): apt-get Shutdown tree which-where (apt-get): The apt-get update command updates the list of available packages (programs) that can be downloaded. *If you type this command as a non-root user, the system will refuse to execute the command because the user does not have the necessary privileges. > apt-get update -y > sudo apt-get update -y let’s to see video from our YouTube channel (Shutdown): • The shutdown command allows you to schedule device shutdowns and restarts, sends a warning message, and prevents other users…
Install ESXi on VMware

How to add HDD to Esxi?

How to add HDD to Esxi? To add a hard disk drive (HDD) to an ESXi host, you typically follow these steps: Physically Install the HDD: – Shut down the ESXi host. – Physically install the HDD into the server, making sure it’s properly connected and recognized by the hardware. Access ESXi Host: – Power on the ESXi host. – Connect to the ESXi host using VMware vSphere Client or VMware vSphere Web Client. You’ll need administrative credentials to log in. Navigate to Storage: – In the vSphere Client, go to the ESXi host you want to add the HDD…
Create User in Azure Learning-en

Create User in Azure

Create User in Azure Active Directory In this part, we want to create user in Azure with portal Azure. With the Admin role we can login and try to create users. For starting we login to this link. https://portal.azure.com/ To add a new user in Azure Active Directory (Azure AD), you typically have a few different methods to choose from, depending on your needs and preferences. Here’s a common method using the Azure portal: Sign in, to Azure Portal: Sign in, to your Azure portal using your admin account Access Azure Active Directory : Click on “Azure Active Directory” in…
FOR in Python

Data Structure in Python

Data Structure in Python Data structure in python makes it possible to store and organize data in a very efficient way. Using it, we can link the data together and perform the desired operations on them. In programming, this process is especially important because it enables us to access and recall data more easily. There is four general Data Structures in Python: List: ordered, changeable, duplicate members. Dictionary: ordered, changeable, No duplicate members. Set: unordered, unchangeable, unindexed, No duplicate members. Tuples: ordered, unchangeable, duplicate members. LIST:  >>>a = [] for example: >>>a = [2, 5, 10]          …
Virtualization-logo

What is Virtualization?

What is virtualization and what is the use of virtualization? It is a modern technology in the network and the use of this technology leads to cost and time reduction and increases efficiency and optimization. In this article, we examine the importance of Virtualization. With virtualization, we can create a layer between the hardware of computer systems and the software that runs on it. Of course, in this design, there is a logical view of consumption resources. The virtualization solution first gives you the ability to recognize a group of servers as a single source of computing to the operating…
Sample Exams (Malware, confidentiality, McCumber Cube) Learning-en

Sample Exams (Malware, confidentiality, McCumber Cube)

Sample Exams of Cybersecurity In these series we have some “Sample Exams of Cybersecurity”, “Practice Cybersecurity Examinations”, “Cybersecurity Test Previews” and “Mock Cybersecurity Tests” Which of the following would be classified as personal data? (1,2,3) Social security number Driver license number Date and place of birth Job title IP address   Which one is the confidentiality of information? (3,5,6) Backup Version control Data encryption File permission settings Two-factor authentication Username ID and password   Which one is in the McCumber Cube? (2,4,5) Access Integrity Scalability Availability Confidentiality Intervention   Types of Malware on cyber security Viruses: Viruses are self-replicating programs…
Network-Security-logo

Network Security

What is Network Security? One of the main topics of computer networks is Network Security. After configuring and deploying the hardware, we must pay special attention to this topic. In this section, we will examine the following: What is computer network security? Wireless networks Firewall What is computer network security? It includes things like software used, data stored, and information theft. Everything that is used in a computer network system (both software and hardware) must be protected against attacks and risks. Three principal factors are needed in the security of a computer network, these three factors (CIA) are the basic…
Create VLan

Create VLan

What is a VLAN? Set of devices within the network that communicates with each other and forms a single local area network. In our concept, by dividing a larger network into smaller networks, each smaller network works like an independent network. The advantage of this method is reducing excessive network traffic and dividing it into smaller units. When two devices in the same network send data packets at the same time, the data collides and requires users to wait, we can prevent such collisions by dividing the network. There is also increased data security and logical partitioning in this method.…
Activate TPM on VMware

Activate TPM on VMware

Activate TPM on VMware : In this part we try to activate TPM on VMware, but before that we ask, what is TPM? That’s mean Trusted Platform Module, it is an international standard for secure encryption processors. The function of this microcontroller is to protect the hardware by integrating cryptographic keys. These chips are either integrated into the PC motherboard or added to the CPU.  Its revised version, version 1.2, was released on March 3, 2011, and the latest version is version 2.0 This technology is used to measure system integrity and generate keys. When booting a system, the load boot…
Add win10,11 to Esxi? Learning-en

GPO: Remove Recycle Bin

GPO: Remove Recycle Bin Discover how to hide the Recycle Bin for specific End Users using Group Policy Objects (GPO) in this video tutorial and learn how to customize End User settings by following along as we demonstrate how to remove the Recycle Bin through GPO in this video. let’s to see video from our YouTube channel Please check more videos for This Topic
What is Azure?

What is Azure?

What is Azure? Microsoft Azure is a cloud computing platform and infrastructure created by Microsoft for building, deploying, and managing applications and services through a global network of Microsoft-managed data centers. It provides a variety of services such as computing power, storage, and networking, as well as many pre-built tools and frameworks for different programming languages and platforms, making it easy for developers to build and deploy applications on the cloud.   Now, let’s to see the video from our YouTube channel:   You can find all learning for Azure by clicking here.

Thanks

bussiness-man1
John Doe

Thanks for your information

business-man2
Eric Melan

[vc_tabs interval=”3″][vc_tab title=”Cisco” tab_id=”7c9e6b5f-4f2f-4″]

[/vc_tab][vc_tab title=”PowerShell” tab_id=”0ad27cb7-f7e7-0″]
[/vc_tab][vc_tab title=”Python” tab_id=”1672618581754-2-9″]
[/vc_tab][vc_tab title=”Microsoft Azure” tab_id=”1672624966524-3-4″]
[/vc_tab][vc_tab title=”Microsoft 365″ tab_id=”1672624967419-4-3″]
[/vc_tab][vc_tab title=”Windows Server” tab_id=”1672624968171-5-8″][/vc_tab][vc_tab title=”Virtualization” tab_id=”1672624968779-6-1″]
[/vc_tab][vc_tab title=”Network Security” tab_id=”1672624969451-7-2″][/vc_tab][vc_tab title=”Linux” tab_id=”1672625234812-8-4″]
[/vc_tab][vc_tab title=”Web Design” tab_id=”1672625259819-9-7″]
No results found.
[/vc_tab][/vc_tabs]

keyboard_arrow_up