How To Install & Configure a Router: A Beginner’s Guide to Networking

Posted by & filed under CompTIA A+.

A+ certification develops PC hardware and software troubleshooting skills. Professionals in the information technology industry may find A+ certification to be an advantage when searching for jobs. Technicians that have the certification tend to earn 5 to 15 percent more than those that don’t. Some employers require A+ certification for entry-level technical support positions. IT… Read more »

Identify the Common Connector Types

Posted by & filed under CompTIA A+, MICROSOFT MTA SECURITY, Sec+.

Identify the Common Connector Types A+ certification develops PC hardware and software troubleshooting skills. Professionals in the information technology industry may find A+ certification to be an advantage when searching for jobs. Technicians that have the certification tend to earn 5 to 15 percent more than those that don’t. Some employers require A+ certification for… Read more »

The Importance of Secure Coding Techniques: Why You Need to Know It!

Posted by & filed under CompTIA Security+, MICROSOFT MTA SECURITY, Sec+.

The Importance of Secure Coding Techniques: Why You Need to Know It! Are you looking to break into the exciting field of cybersecurity? Join our 5-day CompTIA Security+ Bootcamp Training and build your cybersecurity knowledge and skills.  Coding is a big deal. It is the process of taking digital information and making it usable by machines. Programmers… Read more »

Should You Perform a Pentest on a Production Environment or a Non-production Environment?

Posted by & filed under CompTIA Security+, MICROSOFT MTA SECURITY, Sec+.

The Pros and Cons of Performing a Pentest on Production Environment vs Non-Production Environment Cybersecurity is a top priority for any organization. With more and more data breaches occurring, it’s crucial to implement security measures to protect your company from cyberattacks. A pentest is a valuable tool that can help you get ahead of the… Read more »

Amazon Leads $180-Billion Cloud Market

Posted by & filed under Webinar.

Details Interested to earn “$150K+/Year”? If yes, please join our meeting and share with others. Are you Unemployed/Underemployed/Impacted by Pandemic? Not to worry. We are here to help. ASM Educational Center (ASM) “family-owned” & operated business (30+ years) is approved under Federal Training Funds (WIOA) & other funding programs. We will review “eligibility” requirements for… Read more »

Network shares 2

Posted by & filed under CompTIA A+.

Given a scenario configure MS windows network on a client/desktop Network sharing is a feature that allows resources such as files, documents, folders, media, etc., to be shared over a network. These resources are made accessible to other users/computers over a network. In this post, we will describe how you can manage administrative shares in… Read more »

Network shares

Posted by & filed under CompTIA A+.

Given a scenario configure MS windows network on a client/desktop Network sharing is a feature that allows resources such as files, documents, folders, media, etc., to be shared over a network. These resources are made accessible to other users/computers over a network. In this post, we will describe how you can enable a user account… Read more »

Distributed denial-of-service

Posted by & filed under CompTIA Security+.

What is a distributed denial of service attack (DDoS)? Security+ Objectives A denial-of-service (DoS) attack occurs when legitimate users are unable to access information systems, devices, or other network resources due to the actions of a malicious cyber threat actor. Services affected may include email, websites, online accounts (e.g., banking), or other services that rely… Read more »

Setting Up LinkedIn So That Recruiters Can Find You

Posted by & filed under Webinar.

Setting Up LinkedIn So That Recruiters Can Find You   We will team up with Career Confidence to explain the basics of LinkedIn from setting up your profile to how recruiters use LinkedIn to find candidates. 94% of recruiters are highly active on LinkedIn. Therefore you must be active on LinkedIn in order to be… Read more »

#1 Job Search Strategy We All Need to Follow

Posted by & filed under Webinar.

#1 Job Search Strategy We All Need to Follow We will spend the entire evening on various topics all related to how quality jobs are found through people. Too often, job seekers get so frustrated with “their opinion of the mechanics of a job search” that they ignore the most important strategy which is people…. Read more »

Different threat actors P.1

Posted by & filed under CompTIA Security+.

Different threat actors P.1 Advanced persistent threat (APT)    An adversary with sophisticated levels of expertise and significant resources, allowing it through the use of multiple different attack vectors (e.g., cyber, physical, and deception) to generate opportunities to achieve its objectives, which are typically to establish and extend footholds within the information technology infrastructure of… Read more »

How to PASS your Amazon AWS SAA Exam on First Try

Posted by & filed under Webinar.

How to PASS your Amazon AWS SAA Exam on your First Try   Amazon Web Services (AWS) is the largest Cloud Provider in the market. The AWS Certified Solutions Architect-Associate(SAA) Certification was listed by CIO as one of the top 10 certifications that deliver higher pay. The average salary of an AWS-certified IT professional is… Read more »

How To Transition Into a Career in Cybersecurity

Posted by & filed under Webinar.

How To Transition Into a Career in Cybersecurity Have you been thinking about transitioning to a career in cybersecurity, but are not quite sure how to make your dream a reality? Are you currently working a cyber job but want to make a plan for advancement? This program walks you through the steps that you… Read more »

Analyze Potential Indicators Associated With : Domain Name Systems (DNS) Attacks – Part 1

Posted by & filed under CompTIA A+, Uncategorized.

Analyze Potential Indicators Associated With : Domain Name Systems (DNS) Attacks – Part 1 Domain Name Server (DNS) is a standard protocol that helps Internet users discover websites using human readable addresses. Like a phonebook which lets you look up the name of a person and discover their number, DNS lets you type the address… Read more »

MSConfig

Posted by & filed under CompTIA A+, Uncategorized.

MSConfig MSConfig is a system utility to troubleshoot the Microsoft Windows startup process. It can disable or re-enable software, device drivers and Windows services that run at startup, or change boot parameters. Windows includes all sorts of hidden little utilities that you can use to configure and change system settings that are normally not visible… Read more »

MSConfig

Posted by & filed under Uncategorized.

MSConfig is a system utility to troubleshoot the Microsoft Windows startup process. It can disable or re-enable software, device drivers and Windows services that run at startup, or change boot parameters. Windows includes all sorts of hidden little utilities that you can use to configure and change system settings that are normally not visible in… Read more »

Layer 2 Attacks

Posted by & filed under CompTIA Security+.

Overview A large number of common threats need to be considered when securing a network, but a frequently overlooked area is the security of the LAN. When people think about security, often they’re thinking specifically of the layers above Layer 2, but there’s no reason to limit a security plan to these upper layers. A… Read more »

Amazon AWS Application Load Balancer

Posted by & filed under Amazon AWS.

https://youtu.be/fHI22nijPOw Application Load Balancer (ALB ) Lab Practice Before we do the lab, we need to setup the infrastructure with these 4 instances as follows: You need 4 Virtual Linux Machines PC1 should be called LinuxPic1: us-east-1a PC2 should be called LinuxPic2 : us-east-1a PC3 should be called LinuxVideo3: us-east-1c PC4 should be called LinuxVideo4:… Read more »

AWS Cloud Practitioner Sample Exam Questions

Posted by & filed under Amazon AWS.

Amazon AWS Cloud Practitioner Sample Exam with Explanation 1) Why is AWS more economical than traditional data centers for applications with varying compute workloads? a) Amazon EC2 costs are billed on a monthly basis. b) Users retain full administrative access to their Amazon EC2 instances. c) Amazon EC2 instances can be launched on demand when… Read more »

Is CompTIA Security+ Worth it?

Posted by & filed under CompTIA Security+.

What do CCNA Security, CCNP Security, CEH, ISA, Infosec CISSP and Amazon AWS Certified Security have in common? They are all part of the large grouping of cybersecurity certifications currently available. Each of these certifications is valuable and serves a valid purpose. But what about the CompTIA Security+ certification? If you’ve got questions, we’ve got… Read more »

Emerging Trends in Information Technology

Posted by & filed under ABOUT IT.

What are the Emerging Trends in Technology?   To help meet the demands of a technology-enabled consumer base, solution providers must embrace digital transformation to realize their full potential. But, where to begin? These are the top 15 emerging technologies that businesses need to keep an eye on. Sanitizing Techniques AI Artificial intelligence is poised… Read more »

CompTIA Network+ 007 vs. 008

Posted by & filed under CompTIA Network+.

CompTIA routinely updates certification exams to ensure that the content accurately reflects updates in technology and industry standards. Specifically, CompTIA Network+ gets revised every three years. The updated CompTIA Network+ (N10-008) certification validates the skills required to implement enterprise-level wired and wireless network solutions; identify and troubleshoot network performance issues and harden networks against threats… Read more »

Microsoft Azure Access Windows VMs over SSL without Public IPs using Azure Bastion

Posted by & filed under Microsoft Azure.

Azure Bastion is a service you deploy that lets you connect to a virtual machine using your browser and the Azure portal. The Azure Bastion service is a fully platform-managed PaaS service that you provision inside your virtual network. It provides secure and seamless RDP/SSH connectivity to your virtual machines directly from the Azure portal… Read more »

Remote Access vs Site-To-Site VPN

Posted by & filed under CompTIA Security+.

Remote Access VPN What is a Remote Access VPN? A remote access VPN gives employees access to secure connection with a remote computer network and they can access resources on the network as if they were directly plugged into the network’s servers. How Remote Access VPN Works? A remote-access VPN works by creating a virtual… Read more »

Protocols and Encryption

Posted by & filed under CompTIA A+, CompTIA Security+.

CompTIA A+ Core 2 -Chap 2.2 | Security+ Chap 6.3 Protocols and Encryption WEP WEP – (wired equivalent privacy) is a standard network protocol that adds security to Wi-Fi and other 802.11 wireless networks. WEP was designed to give wireless networks the same level of privacy protection as a comparable wired network, but technical flaws… Read more »

The What, Why, When, and How of Penetration Testing

Posted by & filed under Uncategorized.

The What, Why, When, and How of Penetration Testing   What is Pen Testing? Penetration testing (pen testing) is a simulation of possible cyberattacks performed by penetration testers (pen testers) with no malicious intention. The main objective of pen testing is to examine the security defenses of the IT infrastructure. Pen testing is performed to… Read more »

How to use AWS Certificate Manager with AWS CloudFormation

Posted by & filed under Amazon AWS.

Automate issuing a public DNS validated certificate Before the ACM can issue a certificate for your site, it must verify that you own or control all of the domain names that you specified in your request. You can choose either email validation or DNS validation when you request a certificate. Previously, when you requested DNS validation, you had to manually add… Read more »

Type of Installations

Posted by & filed under A+, CompTIA A+.

Type of Installations Unattended Installations An Unattended Installation is an automated installation technology that you can use to install with no user intervention. Unattended installation is typically used during large-scale rollouts when it would be too slow and costly to have administrators or technicians interactively install the Operating System/ Software on individual computers. An example… Read more »

How to Sanitize your Data?

Posted by & filed under CompTIA Security+.

Data Sanitization For the general user, the delete or format command appears to be the logical method of removing unwanted data files. These methods, however, are like sweeping something under the carpet: you may not be able to see it, but it’s still there. When you delete files and then empty the Recycle Bin, you… Read more »

How to Create Amazon RDS DB Instances on AWS Outposts

Posted by & filed under Amazon AWS.

DB Instances on AWS Outposts AWS launched support for MySQL and PostgreSQL, with plans to add other database engines in the future Creating a DB Instance Create a DB Instance using the RDS Console, API (CreateDBInstance), CLI (create-db-instance), or CloudFormation (AWS::RDS::DBInstance). I’ll use the Console, taking care to select the AWS Region that serves as… Read more »

Penetration Testing Vs Vulnerability Scanning

Posted by & filed under CompTIA Security+, Sec+.

Security+ Objectives 1.4 Penetration Testing & Vulnerability Scanning, What’s the Difference? What is Penetration Testing? Penetration testing is a way to “stress test” your IT infrastructure security. Penetration techniques are used to evaluate the safety and security of the network in a controlled manner. Operating systems, services, applications, and even the behavior of the end… Read more »

Amazon AWS VPC vs Transit Gateway

Posted by & filed under Amazon AWS.

Here we will have 3 VPC as follow and if you remember VPC do not offer transitive Peering; in order to make a peering between all VPC ; we need to make sure all VPC are peer together and this take a lots of time and effort.   That is if VPC1 is peering VPC2… Read more »

Black Box, Grey Box, White Box Testing

Posted by & filed under CompTIA Security+.

Security+ Objectives 1.4 Black Box, Grey Box, White Box testing: What Differences? There are several ways to conduct penetration tests. If you’re considering penetration testing for your network, you’ll likely choose either black, white, or gray box testing. Each method has merits, so it’s helpful to understand the difference between these tests in order to… Read more »

Privilege Escalation

Posted by & filed under Uncategorized.

ComTIA Security+ Objective 1.4 What Is Privilege Escalation and Why Is It Important? The term “Privilege Escalation” describes a type of application security vulnerability in which a user has the ability to access information, features, or functionality that they are not entitled to in their role. It is only a concern in applications in which… Read more »

Establish networking connections

Posted by & filed under CompTIA A+, MICROSOFT MTA O/S.

Establishing Network Connections Configure Microsoft Windows Networking on a Client/Desktop CompTIA A+ Core 2 Section 1.8 VPN Active reconnaissance is a type of computer attack in which an intruder engages with the targeted system to gather information about vulnerabilities. This may be through automated scanning or manual testing using various tools like ping, traceroute, netcat… Read more »

CompTIA Security+|MTA Security – Load Balancing

Posted by & filed under CompTIA Security+, MICROSOFT MTA SECURITY.

Load Balancing CompTIA Security+ Section 2.0   Load BalancerDefinition: “Load balancing is defined as the methodical and efficient distribution of network or application traffic across multiple servers in a server farm.” A load balancer works in-between client devices and back end servers, and it receives then distributes incoming requests to any available server capable of… Read more »

Active Vs Passive Reconnaissance

Posted by & filed under CompTIA Security+, MICROSOFT MTA SECURITY.

Penetration Testing Concepts 1 CompTIA Sec+ Section 1.4 Active Reconnaissance Active reconnaissance is a type of computer attack in which an intruder engages with the targeted system to gather information about vulnerabilities. This may be through automated scanning or manual testing using various tools like ping, traceroute, netcat etc. This type of recon requires that… Read more »

Other Certs

Posted by & filed under Uncategorized.

Other Courses and Certifications ITIL Google Salesforce Data Science Blockchain Programming & Coding Customized Curriculum Train The Trainer (TTT) VMware Juniper Microsoft Office CWNP SCP Electronics Other Courses and Certifications ITIL ITIL ITIL Courses Google Google Google Cloud Certified Courses Salesforce Salesforce Salesforce Courses Data Science Data Scientist /Machine Learning/ Big Data Data Scientist /Machine… Read more »

How to Install Python on Amazon Linux Server

Posted by & filed under Amazon AWS.

How to Install Python on Amazon Linux Server In technical terms, Python is an object-oriented, high-level programming language with integrated dynamic semantics primarily for web and app development. It is extremely attractive in the field of Rapid Application Development because it offers dynamic typing and dynamic binding options. Python is relatively simple, so it’s easy… Read more »

Amazon AWS : Lambda – Backup EC2 Instance

Posted by & filed under Amazon AWS.

How to backup an EC2 instance through Lambda Amazon AWS EBS Backup via Lambda and CloudWatch https://youtu.be/_FX9XY3uDQw The goal is to backup the EBS volume via AWS lambda and CloudWatch , we will do it two way ; One will be done in 1 Min interval ( using the Lambda function and another one using… Read more »

32-bit VS 64-bit

Posted by & filed under CompTIA A+.

CompTIA A+ Objective 1.1 The terms “32-bit” and “64-bit” are commonly seen in system requirements and other technical literature, but few people actually know what these terms mean. Do they refer to hardware or software specifications? Up until 2006, all Windows operating systems have been written using 32-bit architecture. 32-bits is simply the “width” of… Read more »