We are glad that you are following our tutorials. Our team tries to provide you with the best educational and resources in the field of web, network, internet, and related sciences. If you have any comments, questions, or suggestions, please leave a comment to help us improve.

FOR in Python

FOR in Python

FOR in Python Loops are used for sequential traversal, that’s mean used for repeating variables such as numbers, strings, lists or sets. The loop continues until it is terminated by the variable or by terminating the loop with the Break command. In this section, we want to learn how to use loops. loop in programming languages is an iterative method and is also found in other object-oriented languages. With a loop, we can execute a set of commands, once for each item. Loops in every programming language start with a set of rules, but they may be slightly different in…
Install DHCP on Windows Server

What is the DHCP Server ? Include installation tutorial

What is DHCP (Dynamic Host Configuration Protocol): DHCP is a network management protocol on Windows servers to automate the process of assigning IP addresses and other network configuration settings to devices on a network. The DHCP server on a Windows server allows clients on the network to automatically obtain an IP address, subnet mask, default gateway, and DNS server information. This helps simplify network administration and eliminates network administrators to manually configure each device on the network. Some of the key roles and functions of DHCP on a Windows server include: IP address management: It automatically assigns IP addresses to…
Add win10,11 to Esxi? Learning-en

Application in Intune (for windows)?

How to add application in Intune? In this tutorial we want to learn how we can add Application in Intune (for windows)? To add an app in Microsoft Intune, you can follow these general steps: Sign into the Microsoft Endpoint Manager admin center (https://endpoint.microsoft.com) using your administrator account. Navigate to “Apps” from the left-hand menu. Click on “Add” to start the process of adding a new app. Select the app type you want to add. Intune supports several types of apps, including “Managed Google Play app,” “iOS/iPadOS app,” “Android app,” “Windows app (Win32),” “Windows app (store),” and more. Choose the…
Create VLan

Create VLan

What is a VLAN? Set of devices within the network that communicates with each other and forms a single local area network. In our concept, by dividing a larger network into smaller networks, each smaller network works like an independent network. The advantage of this method is reducing excessive network traffic and dividing it into smaller units. When two devices in the same network send data packets at the same time, the data collides and requires users to wait, we can prevent such collisions by dividing the network. There is also increased data security and logical partitioning in this method.…
Create User in Azure Learning-en

Create User in Azure

Create User in Azure Active Directory In this part, we want to create user in Azure with portal Azure. With the Admin role we can login and try to create users. For starting we login to this link. https://portal.azure.com/ To add a new user in Azure Active Directory (Azure AD), you typically have a few different methods to choose from, depending on your needs and preferences. Here’s a common method using the Azure portal: Sign in, to Azure Portal: Sign in, to your Azure portal using your admin account Access Azure Active Directory : Click on “Azure Active Directory” in…
Virtualization-logo

What is Virtualization?

What is virtualization and what is the use of virtualization? It is a modern technology in the network and the use of this technology leads to cost and time reduction and increases efficiency and optimization. In this article, we examine the importance of Virtualization. With virtualization, we can create a layer between the hardware of computer systems and the software that runs on it. Of course, in this design, there is a logical view of consumption resources. The virtualization solution first gives you the ability to recognize a group of servers as a single source of computing to the operating…
Install ESXi on VMware

How to add HDD to Esxi?

How to add HDD to Esxi? To add a hard disk drive (HDD) to an ESXi host, you typically follow these steps: Physically Install the HDD: – Shut down the ESXi host. – Physically install the HDD into the server, making sure it’s properly connected and recognized by the hardware. Access ESXi Host: – Power on the ESXi host. – Connect to the ESXi host using VMware vSphere Client or VMware vSphere Web Client. You’ll need administrative credentials to log in. Navigate to Storage: – In the vSphere Client, go to the ESXi host you want to add the HDD…
Sample Exams (McCumber Cube, Cyberwarfare) Learning-en

Sample Exams (McCumber Cube, Cyberwarfare)

Sample Exams of Cybersecurity In these series we have some “Sample Exams of Cybersecurity”, “Practice Cybersecurity Examinations”, “Cybersecurity Test Previews” and “Mock Cybersecurity Tests”   McCumber CUBE: This could refer to a cybersecurity risk management framework developed by John McCumber, known as the McCumber Cube. It provides a structured way of understanding and managing security risks within an organization by considering three dimensions: confidentiality, integrity, and availability (often referred to as the CIA triad). McCumber diagram: In software engineering, the McCumber diagram is a graphical representation used to depict various dimensions of security in a system. It can display information…
help desk support, IT support, website, web design, pc repair

Backup and Recovery

Backup and Recovery In this part we want to know, what is Backup and Recovery? Backup refers to storing information in external memory to protect information from accidents and loss. Recovery refers to returning data from a saved copy to the original location or to an alternate location where information has been lost or damaged. To store information, we use a separate system or media such as virtual hard drives, data storage servers or cloud storage space to protect them against the possibility of data damage. Why do we need backups? Why do we need backups? By making a backup…
Python-Variable-Types-logo

Variables in Python

Variables in Programming Language Python The programing languages store data in the form of Variables. Every variable has data type, name, and a value assigned to it. Variables are assigned places in the computer memory to store data in which they can be known or unknown based on the value given to them. Also, they can be used for more than one value. They can tag and store data in memory and we can recall them when we need them. In this section, we want to introduce the most used Variables in Python. In Python, we have four commonly used groups…
How to Create Users in Linux (useradd Command)

How to Create Users in Linux (useradd Command)

How to Create Users in Linux (useradd Command) In this course of Linux commands, we will introduce How to Create Users in Linux (useradd Command). We start tutorial by mentioning the structure and example. In Linux, the adduser command is for creating a user. There are several commands and methods to create a user in Linux, such as useradd, adduser. One of the features of the Linux operating system is multi-user support. It is possible to create different users and separate groups by specifying the access level for each user or group in Linux. The two commands adduser and useradd work…
What is the history of 3D Printing? Learning-en

What is the history of 3D Printing?

What is the history of 3d Printing? It also known as additive manufacturing, has a rich history that dates back several decades. Here’s a brief overview of the key milestones in the history of 3D printing, along with some images to illustrate its evolution: Charles W. Hull   1960s Invention of Stereolithography (SLA): The concept of this printers began with the invention of stereolithography by Charles W. Hull in 1983. He later co-founded 3D Systems, a pioneering 3D printing company. 1980s Fused Deposition Modeling (FDM) Patented: Scott Crump patented Fused Deposition Modeling in the late 1980s, which laid the foundation…
Server-logo

What is the Server? And Types of Servers

What is a Server? In fact, we call a supercomputer or a computer with extremely performance as a server, so it is a computer or a program that can provides services to the programs installed on the user’s computer or another computer. It can refer to a physical machine, virtual machine, or software that performs services. We can use them for various purposes, we can change according to our needs.   What Types we have?   Servers can be divided into physical and virtual Physical: like a physical computer, but it works much more powerfully and is used to run server…
Python Standard Library

Python Standard Library

Python Standard Library With Python Standard Library, we call module code that is ready to use. We cannot use these modules without recall and if we need, we must call them. The Python standard library is very extensive and offers many features. In this library, we see internal modules that are often written in C language. For example, we can access the file input/output system through these modules, without these modules, Python programming will be inaccessible. These modules provide increased programming capabilities. In the installed version of Python in Windows or Mac, usually the entire standard library also install and…
Install Active Directory on Server Learning-en

Install Active Directory on Server

How to Install Active Directory on Server ? Installing Active Directory on a Windows Server involves several steps. Active Directory is a directory service provided by Microsoft for Windows network environments. It allows you to manage users, computers, and other network resources in a centralized and secure manner. Here’s a step-by-step guide on how to install Active Directory on a Windows Server: Note: You’ll need to have a Windows Server operating system installed on your server before you can install Active Directory. Additionally, make sure your server has a static IP address and DNS settings configured correctly. Open Server Manager:…
Network-Security-logo

Network Security

What is Network Security? One of the main topics of computer networks is Network Security. After configuring and deploying the hardware, we must pay special attention to this topic. In this section, we will examine the following: What is computer network security? Wireless networks Firewall What is computer network security? It includes things like software used, data stored, and information theft. Everything that is used in a computer network system (both software and hardware) must be protected against attacks and risks. Three principal factors are needed in the security of a computer network, these three factors (CIA) are the basic…
Create user in Microsoft 365

Create user in Microsoft 365

Create user in Microsoft 365 The Microsoft Office 365 Administration Center is a web-based portal administrator. We use this portal to manage accounts and configure services such as Intune, SharePoint, Teams, Exchange, OneDrive, and all office products. In this part, we want to create user in Microsoft 365 with Admin Center. Users section: create, delete, manage users, set permissions, edit user details, and reset passwords. Groups section: create, organize, manage, and delete groups With the Admin role we can login and try to create users. For starting we login to this link. https://admin.microsoft.com/ In the menu we click on User\Active…
Sample Exams (Malware, confidentiality, McCumber Cube) Learning-en

Sample Exams (Malware, confidentiality, McCumber Cube)

Sample Exams of Cybersecurity In these series we have some “Sample Exams of Cybersecurity”, “Practice Cybersecurity Examinations”, “Cybersecurity Test Previews” and “Mock Cybersecurity Tests” Which of the following would be classified as personal data? (1,2,3) Social security number Driver license number Date and place of birth Job title IP address   Which one is the confidentiality of information? (3,5,6) Backup Version control Data encryption File permission settings Two-factor authentication Username ID and password   Which one is in the McCumber Cube? (2,4,5) Access Integrity Scalability Availability Confidentiality Intervention   Types of Malware on cyber security Viruses: Viruses are self-replicating programs…
Install DNS on windows server-logo

What is the DNS Server? Include Installation tutorial

Install DNS on Windows Server In this tutorial we want to install DNS on Windows Server, but before that, we ask What is DNS and Why do we use it? What is DNS and Why do we use it? The DNS system is a process for addressing a domain name to an IP address. Since it is difficult to remember the IP, we can use this process to consider a name for each address, and when we type the domain name, the IP address will call automatically. Domain name servers or DNS contain a database that stores all public domains and…
MITRE ATT&CK Learning-en

MITRE ATT&CK

MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) is a framework developed by MITRE Corporation, a not-for-profit organization dedicated to solving problems for a safer world. ATT&CK is a knowledge base that categorizes the tactics, techniques, and procedures (TTPs) used by adversaries or attackers during cyber intrusions. The framework provides a comprehensive understanding of how cyber adversaries operate by organizing their behaviors into a matrix. This matrix consists of various tactics that represent high-level objectives an attacker may have (such as initial access, execution, persistence, privilege escalation, etc.) and techniques that represent specific methods or actions used to achieve those…

Thanks

bussiness-man1
John Doe

Thanks for your information

business-man2
Eric Melan

[vc_tabs interval=”3″][vc_tab title=”Cisco” tab_id=”7c9e6b5f-4f2f-4″]

[/vc_tab][vc_tab title=”PowerShell” tab_id=”0ad27cb7-f7e7-0″]
[/vc_tab][vc_tab title=”Python” tab_id=”1672618581754-2-9″]
[/vc_tab][vc_tab title=”Microsoft Azure” tab_id=”1672624966524-3-4″]
[/vc_tab][vc_tab title=”Microsoft 365″ tab_id=”1672624967419-4-3″]
[/vc_tab][vc_tab title=”Windows Server” tab_id=”1672624968171-5-8″][/vc_tab][vc_tab title=”Virtualization” tab_id=”1672624968779-6-1″]
[/vc_tab][vc_tab title=”Network Security” tab_id=”1672624969451-7-2″][/vc_tab][vc_tab title=”Linux” tab_id=”1672625234812-8-4″]
[/vc_tab][vc_tab title=”Web Design” tab_id=”1672625259819-9-7″]
No results found.
[/vc_tab][/vc_tabs]

keyboard_arrow_up