Jump to content

Search the Community

Showing results for tags 'Tutorial'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • ANNOUNCEMENTS
    • ANNOUNCEMENTS
  • CERTIFICATION - - - - - NO REQUESTS IN THESE FORUMS - - - - -
    • CISCO SYSTEMS
    • COMPTIA
    • LINUX
    • MICROSOFT
    • ORACLE
    • PROJECT MANAGEMENT
    • SECURITY CERTIFICATIONS
    • SUN MICROSYSTEMS
    • WIRELESS
    • OTHER CERTIFICATIONS
  • CISCO TECHNICAL SECTION
    • CISCO LABS
    • GNS3
    • NETWORK INFRASTRUCTURE
    • SECURITY
    • WIRELESS
    • SERVICE PROVIDERS
    • COLLABORATION, VOICE AND VIDEO
    • DATA CENTER
    • SMALL BUSINESS
  • MICROSOFT TECHNICAL SECTION
  • OTHER TECHNICAL SECTION
  • TRAINING OFFERS & REQUESTS
  • CERTCOLLECTION MALL
  • GENERAL FORUMS
  • COMMUNITY CENTER

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests

Found 878 results

  1. DMVPN Operation A Dynamic Multipoint VPN is an evolved iteration of hub and spoke tunneling (note that DMVPN itself is not a protocol, but merely a design concept). A generic hub and spoke topology implements static tunnels (using GRE or IPsec, typically) between a centrally located hub router and its spokes, which generally attach branch offices. Each new spoke requires additional configuration on the hub router, and traffic between spokes must be detoured through the hub to exit one tunnel and enter another. While this may be an acceptable solution on a small scale, it easily grows unwieldy as spokes multiply in number. DMVPN offers an elegant solution to this problem: multipoint GRE tunneling. Recall that a GRE tunnel encapsulates IP packets with a GRE header and a new IP header for transport across an untrusted network. Point-to-point GRE tunnels have exactly two endpoints, and each tunnel on a router requires a separate virtual interface with its own independent configuration. Conversely, a multipoint GRE tunnel allows for more than two endpoints, and is treated as a non-broadcast multiaccess (NBMA) network. Our lab: Formation of multipoint GRE tunnels: While a legacy hub and spoke setup would require three separate tunnels spanning from R1 to each of the spoke routers, we see that multipoint GRE allows all four routers to have a single tunnel interface in the same IP subnet (192.168.0.0/24). This NBMA configuration is enabled by Next Hop Resolution Protocol, [Hidden Content] which allows multipoint tunnels to be built dynamically. Next Hop Resolution Protocol (NHRP) NHRP (defined in RFC 2332) [Hidden Content] is the catalyst which facilitates dynamic tunnel establishment, providing tunnel-to-physical interface address resolution. NHRP clients (spoke routers) issue requests to the next hop server (hub router) to obtain the physical address of another spoke router. It is interesting to note that, in our scenario, designation as the NHS is the only attribute which distinguishes R1 as the hub router. DMVPN Configuration Let's start by examining the configuration of R1: interface FastEthernet0/0 ip address 172.16.15.2 255.255.255.252 ! interface Tunnel0 ip address 192.168.0.1 255.255.255.0 ip nhrp map multicast dynamic ip nhrp network-id 1 tunnel source 172.16.15.2 tunnel mode gre multipoint The first thing you're likely to notice is that the tunnel does not have an explicit destination specified. This is because multipoint tunnels are built dynamically from the DMVPN spokes to the hub router; the hub router doesn't need to be preconfigured with spoke addresses. Also note that the tunnel mode has been designated as multipoint GRE. ip nhrp network-id 1 uniquely identifies the DMVPN network; tunnels will not form between routers with differing network IDs. ip nhrp multicast dynamic enables forwarding of multicast traffic across the tunnel to dynamic spokes (required by most routing protocols). The configuration of spoke routers is very similar to that of the hub. The configuration presented here is taken from R2. interface FastEthernet0/0 ip address 172.16.25.2 255.255.255.252 ! interface Tunnel0 ip address 192.168.0.2 255.255.255.0 ip nhrp map 192.168.0.1 172.16.15.2 ip nhrp map multicast 172.16.15.2 ip nhrp network-id 1 ip nhrp nhs 192.168.0.1 tunnel source 172.16.25.2 tunnel mode gre multipoint You'll notice two new commands in addition to those found on the hub. ip nhrp nhs 192.168.0.1 designates R1 as the NHS (the only functionality unique to the hub router), and ip nhrp map 192.168.0.1 172.16.15.2 statically maps the NHS address to R1's physical address. The ip nhrp multicast command also differs slightly from its application on the hub in that multicast traffic is only being allowed from spokes to the hub, not from spoke to spoke. After completing the tunnel configuration on each router, we can verify that DMVPN sessions have been established between the hub and each spoke: R1# show dmvpn Legend: Attrb --> S - Static, D - Dynamic, I - Incomplete N - NATed, L - Local, X - No Socket # Ent --> Number of NHRP entries with same NBMA peer Tunnel0, Type:Hub, NHRP Peers:3, # Ent Peer NBMA Addr Peer Tunnel Add State UpDn Tm Attrb ----- --------------- --------------- ----- -------- ----- 1 172.16.25.2 192.168.0.2 UP 00:57:47 D 1 172.16.35.2 192.168.0.3 UP 00:45:56 D 1 172.16.45.2 192.168.0.4 UP 00:45:46 D Dynamic Tunneling While DMVPN certainly provides a tidy configuration, its brilliance lies in its ability to dynamically establish spoke-to-spoke tunnels. In a legacy hub and spoke design, a packet destined from R2 to R4 would need to be routed through R1, to exit the R2 tunnel and be reencapsulated to enter the R4 tunnel. Clearly a better path lies directly via R5, and DMVPN allows us to take advantage of this. Check out this packet capture [Hidden Content] of traffic from R2 to R4. Traffic initially follows the path through R1 as described above, while a dynamic tunnel is built from R2 to R4 using NHRP. After the new tunnel has been established, traffic flows across it, bypassing R1 completely. We can see a new tunnel has been established after traffic destined for R4 has been detected: R2# show dmvpn ... Tunnel0, Type:Spoke, NHRP Peers:1, # Ent Peer NBMA Addr Peer Tunnel Add State UpDn Tm Attrb ----- --------------- --------------- ----- -------- ----- 1 172.16.15.2 192.168.0.1 UP 01:08:02 S R2# ping 192.168.0.4 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 192.168.0.4, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 28/37/56 ms R2# show dmvpn ... Tunnel0, Type:Spoke, NHRP Peers:2, # Ent Peer NBMA Addr Peer Tunnel Add State UpDn Tm Attrb ----- --------------- --------------- ----- -------- ----- 1 172.16.15.2 192.168.0.1 UP 01:08:27 S 1 172.16.45.2 192.168.0.4 UP 00:00:03 D Notice that the tunnel to R4 has been flagged as dynamic, in contrast to the static tunnel to the hub/NHS. Adding Crypto Up to this point the tunnels have been configured as cleartext for the sake of simplicity, but in the real world we probably want to include IPsec encryption to protect tunnels traversing an untrusted path. Fortunately, this is as simple as applying an IPsec protection policy to the tunnel interface on each router. crypto isakmp policy 10 authentication pre-share crypto isakmp key P4ssw0rd address 172.16.0.0 255.255.0.0 ! crypto ipsec transform-set MyTransformSet esp-aes esp-sha-hmac ! crypto ipsec profile MyProfile set transform-set MyTransformSet ! interface Tunnel0 tunnel protection ipsec profile MyProfile After bumping the tunnel interfaces, we can see the DMVPN sessions have been rebuilt, this time sporting some slick military-grade encryption. R1# show dmvpn ... Tunnel0, Type:Hub, NHRP Peers:3, # Ent Peer NBMA Addr Peer Tunnel Add State UpDn Tm Attrb ----- --------------- --------------- ----- -------- ----- 1 172.16.25.2 192.168.0.2 UP 00:02:28 D 1 172.16.35.2 192.168.0.3 UP 00:02:26 D 1 172.16.45.2 192.168.0.4 UP 00:02:25 D R1# show crypto isakmp sa IPv4 Crypto ISAKMP SA dst src state conn-id slot status 172.16.15.2 172.16.35.2 QM_IDLE 1002 0 ACTIVE 172.16.15.2 172.16.25.2 QM_IDLE 1001 0 ACTIVE 172.16.15.2 172.16.45.2 QM_IDLE 1003 0 ACTIVE
  2. INE - Service Provider Core Configuration Service Provider Core Configuration by Travis Bonfigli In this course, the learner will be exposed to the configuration tasks required in the Service Provider (SP) core network. This course also includes a mini-IS-IS boot camp and the semantics of both IS-IS and OSPF are covered. [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]]
  3. CBT Nuggets - Cisco CCNA 200-301 Assessment-Lab by Keith Barker (2020) Cisco CCNA Assessment Labs (200-301) This intermediate Cisco CCNA training prepares learners to take the 200-301 exam, which is the one required exam to earn the CCNA certification. It's pretty indisputable that Cisco is the market leader when it comes to routing and switching. Cisco has a little over half the market, and the closest competition can barely scrape 10%: it's a safe bet to say that knowledge of Cisco technologies is among the most marketable and immediately beneficial skills a network administrator could get. The CCNA certification is an industry standard because it covers every fundamental aspect to administering the world's most prevalent routing and switching technology -- this training is just shy of essential for any network administrator. For anyone who manages their routers and switches training, this Cisco training can be used for 200-301 exam prep, onboarding new network administrators, individual or team training plans, or as a Cisco reference resource. CCNA: What You Need to Know This CCNA training covers 200-301 routers and switches exam objectives, including these topics: Networking fundamentals Setting up network access Managing IP connectivity Configuring IP services Fundamentals of securing networks Automating and programming networks Who Should Take CCNA Training? This CCNA training is considered associate-level Cisco training, which means it was designed for network administrators. This routers and switches skills course is designed for network administrators with three to five years of experience with network infrastructure. New or aspiring network administrators. The CCNA certification is Cisco's way of saying that a network administrator is ready and capable of anything that the routers and switches of a fair-sized network could throw at them. If you're starting out in your career, look no further than the CCNA for verification of your knowledge of network fundamentals, network access, IP connectivity, IP services and security fundamentals. Experienced network administrators. For network administrators who've already been in the field for several years, there are a few reasons they may not have earned their CCNA yet. The most common reason is that an administrator has been doing a lot of what's on the exam already, they just learned it on the job. Another is that they've been isolated in their work experience and haven't spread their experience around. Either way, with this CCNA training, you'll be ready to certify and validate your associate-level competence on Cisco networks. [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]]
  4. Hakin9 Courses [Hidden Content] MOVED TOPIC Topic is moved to proper section. Offer prefix added Kindly open topic in appropriate section with suitable prefix.
  5. INE - MPLS Quality of Service (2020) CISCO MPLS Quality of Service This section covers Quality of Service and its interaction with MPLS VPNs, including Uniform vs. Pipe Mode configurations. [hide][Hidden Content]] [hide][Hidden Content]]
  6. INE - DMVPN (2020) DMVPN stands for Dynamic Multipoint VPN and it is an effective solution for dynamic secure overlay networks. In short, DMVPN is combination of the following technologies: 1) Multipoint GRE (mGRE) 2) Next-Hop Resolution Protocol (NHRP) 4) Dynamic Routing Protocol (EIGRP, RIP, OSPF, BGP) 3) Dynamic IPsec encryption 5) Cisco Express Forwarding (CEF) Assuming that reader has a general understanding of what DMVPN is and a solid understanding of IPsec/CEF, we are going to describe the role and function of each component in details. In this post we are going to illustrate two major phases of DMVPN evolution: 1) Phase 1 – Hub and Spoke (mGRE hub, p2p GRE spokes) 2) Phase 2 – Hub and Spoke with Spoke-to-Spoke tunnels (mGRE everywhere) As for DMVPN Phase 3 – “Scalable Infrastructure”, a separate post is required to cover the subject. This is due to the significant changes made to NHRP resolution logic (NHRP redirects and shortcuts), which are better being illustrated when a reader has good understanding of first two phases. However, some hints about Phase 3 will be also provided in this post. [hide][Hidden Content]] [hide][Hidden Content]]
  7. CBT Nuggets - Cisco DevNet Associate (200-901 DEVASC) 2020 Cisco DevNet Associate (200-901 DEVASC) In this Cisco DevNet Associate exam course, trainers Keith Barker, Ben Finkel, and Knox Hutchinson cover the 200-901 DEVASC exam objectives. The 200-901 DEVASC is the one required exam to earn the DevNet Associate certification. Given how common Cisco technologies are throughout the marketplace, properly trained professionals who hold their DevNet Associate are very valuable across industries. After receiving this DEVNET training, you'll not only find yourself more marketable as a networking professional, but also gain valuable routing and switching skills. With the right experience, DevOps professionals who complete this DevNet Associate training will be well-positioned to step into network or DevOps engineer roles. For IT managers, this DevNet Associate training can be used for exam prep, on-boarding new DevOps professionals, or as part of a team training plan. 200-901 DEVASC: What You Need to Know This DEVNET Associate training maps to the Cisco 200-901 DEVASC exam objectives, and covers topics including: Software development and design Understanding and using APIs Cisco platforms and development Application deployment and security Infrastructure and automation Network fundamentals Who Should Take 200-901 DEVASC Training? This DEVNET Associate training is considered associate-level Cisco training, which means it was designed for DevOps professionals. This 200-901 DEVASC course is valuable for new IT professionals with at least a year of experience with routing and switching and experienced DevOps professionals looking to validate their Cisco skills. New or aspiring DevOps professionals. In addition to DevOps professionals with even a little bit of experience, DEVNET Associate training is also relevant for aspiring DevOps practitioners, be they sysadmins or network admins with some Cisco routing and switching experience. IT training managers might also use 200-901 DEVASC training for on-boarding new DevOps professionals, or as part of an overall IT team training plan. Experienced IT professionals. DevOps or networking professionals with a few years of experience will benefit from the 200-901 DEVASC training, as it will validate their expertise with Cisco technologies, platforms, and software deployment practices. The DEVNET Associate certification can position them for career advancement into roles such as DevOps engineer, release engineer, or automation architect. [hide][Hidden Content]] [hide][Hidden Content]]
  8. INE - Network Security Automation (2020) Network Security Automation This course focuses on the implementation of Security automated solutions. APIs of certain security appliances are also discussed, including their capabilities, characteristics, and components. Course:- Course Introduction Firepower APIs ISE & pxGrid APIs Umbrella APIs Content Security APIs Threat Grid APIs FMC API - Introduction FMC API - Automating Authentication FMC API - Manipulating Objects FMC API - Manipulating Policies Umbrella Enforcement API Umbrella Investigate API Course Conclusion [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]]
  9. Udemy - Windows Privilege Escalation for OSCP & Beyond! (2020) Finding and exploiting Windows vulnerabilities and misconfigurations to gain an administrator shell. What you'll learn Multiple methods for escalating privileges on a Windows system. In depth explanations of why and how these methods work. Tools which can help identify potential privilege escalation vulnerabilities on a Windows system. A setup script you can run on a (free) trial version of Windows 10, creating an intentionally vulnerable VM to practice privilege escalation on. Requirements A basic understanding of Windows systems Description This course teaches privilege escalation in Windows, from basics such as how permissions work, to in-depth coverage and demonstrations of actual privilege escalation techniques. The course comes with a full set of slides (150+), and a script which can be used by students to create an intentionally vulnerable Windows 10 configuration to practice their own privilege escalation skills on. This is a 100% privilege escalation course, with absolutely no filler! Please note that this course is aimed at students currently taking, or planning to take the OSCP, and thus covers more common forms of privilege escalation. Some extra methods are included, and more methods may be added in the future, however this course was not designed to cover every possible (or obscure) method. Who this course is for: Beginner and intermediate ethical hackers. Students currently taking or planning to take the PWK/OSCP course. [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]]
  10. INE - Inter-AS Scenarios (2020) Inter-AS Scenarios In this course, the learner will be introduced to the configuration and deployment semantics behind Inter-AS scenarios. This course will compare and contrast the different Inter-AS scenarios, fully configure all of the different options to include Options A, Option B-1, B2, and B-3, Option C, and Option D (commonly referred to as Option AB). All course simulations are done using Cisco's Virtual Internet Routing Lab (VIRL) software and all configurations areas available in both text files and the original VIRL .virl format. [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]]
  11. CBT Nuggets - AWS Certified SysOps Administrator Associate (SOA-C01) (2020) With Anthony Sequeira Improve your Amazon Web Services skills and use this training to prepare for a certification exam that validates your ability to deploy, operate, and manage AWS solutions. This learning track covers topics such as virtual private networks (VPNs), Elastic Block Store (EBS), Domain Name Servers (DNS), and more. If you have experience using AWS-based applications, are responsible for administering AWS platform solutions, or are studying for the AWS Certified SysOps Administrator – Associate certification, this training is ideal for you. [hide][Hidden Content]]
  12. ITProTV - Cisco Certified DevNet Associate (200-901) 2020 The Cisco Certified DevNet Associate (200-901) show is produced to help the software developer, networking professional and IT professional to achieve the latest Cisco certification offer, the Cisco Certified DevNet Associate certification. It will help you to learn about the core Cisco platforms used, Cisco Programmability strategies, working with applications and working with APIs. Though there are no formal prerequisites for the exam, it is recommended that you have one or more years of hands-on experience in developing and maintaining applications. EPISODES SOFTWARE DEVELOPMENT AND DESIGN Overview Set Up Dev Tools In Linux Set Up Virtalization Tools In Linux Set Up Dev Tools In Windows Set Up Virtualization Tools In Windows Data Formats The JSON Data Format The XML Data Format The YAML Data Format Software Development Basics Agile Development Lean Development Waterfall Development Pick A Development Methodology Software Quality Organize Code Code Organization And Design Patterns Version Control Basics Git Basics: Local Git Basics: Remote UNDERSTANDING AND USING APIS HTTP Basics HTTP Response Codes API Basics Webhooks API Usage - No Authentication API Usage With Authentication APPLICATION DEPLOYMENT AND SECURITY Application Infrastructure Continuous Integration And Deployment Components Of An Application Deployment Application Security DevOps Basics Docker Basics Bash Basics Unit Testing Basics INFRASTRUCTURE AND AUTOMATION Infrastructure As Code Basics Development And Infrastructure As Code Automated Testing Device And Controller Management APIs And Device Management Configure A Device With Bash Configure A Device With Python Configure A Device With Ansible NETWORK FUNDAMENTALS Networking Basics Network Communication Basics IPv4 Addressing Binary And Subnets Subnetting, Real World Example Common Network Components Application Connectivity Network Troubleshooting Devnet IP Services Basics Management, Data And Control Planes CISCO PLATFORM AND DEVELOPMENT Network Management Platform Capabilities Collaboration Platform Capabilities Security Platform Capabilities Compute Management Platform Capabilities Python Scripting With A Cisco SDK Script: Manage WebEx Resources [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]]
  13. INE - Data Center Quality of Service (2020) This series focuses on Data Center QoS, such as Data Center Bridging Exchange (DCBX), QoS on Nexus 5000 & UCS, and Control Plane Policing just to name a few. [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]]
  14. Course Info MP4 | Video: AVC, 1280x720 30 fps | Audio: AAC, 48 KHz, 2 Ch | Duration: 1h 24m Skill Level: Beginner | Genre: eLearning | Language: English + Subtitles | Size: 189 MB Amazon Elastic Compute Cloud (Amazon EC2) provides secure, resizable compute capacity in the cloud. This course describes the fundamentals of this web service. Get introduced to the features of Amazon EC2, find out where it is available, and explore purchasing options based on instance preference: reserved, scheduled, spot, or dedicated. Learn how to work with AMI (Amazon Machine Image), how to launch an instance, and how to connect to an instance using Linux, Mac, or Windows. Topics include: Choosing an AWS region EC2 basics EC2 features Security groups Instance family, class, and size Amazon Machine Images (AMIs) Launching an EC2 instance Connecting from Linux, Mac, or Windows Download [hide][Hidden Content]]
  15. Lynda - Up and Running with VMware NSX (2020) Software-defined networking is the next "big thing" in IT virtualization, and being able to administer an SDN will be a key skill for any IT professional. NSX is VMware's SDN platform, and this course will show how to get it up and running. VMware Certified Instructor Bill Ferguson covers the basics of NSX (including NSX components) and techniques for creating a software-defined data center. He shows how to configure a controller cluster, prepare hosts for VXLAN networking, and configure logical switches and distributed routers. Later in the course, Bill configures static and OSPF routing, load balancing, and a simple VPN, as well as high availability with NSX Edge. By the end of the training, viewers should be able to use NSX on top of their existing network resources to improve performance, deploy services, and increase security—without any additional hardware. Topics include: Overview of virtual networks and NSX components Configuring controller clusters, logical switches, and distributed routers Following packet flow with a DLR Understanding Layer 2 bridging Configuring static and OSPF routing Understanding SNAT and DNAT Configuring load balancing Configuring high availability on NSX Edge [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]]
  16. Opsgility - MS-100 Microsoft 365 Identity and Services (2020) Course Overview In this course, audience will learn how to design and implement Microsoft 365 services, how to manage user identity and roles. They will also learn about managing access and authentications as well as plan for Office 365 workload deployment and application deployment. This course will prepare it's audience for, MS-100: Microsoft 365 Identity and Services exam. Course Details Duration: 3 Days Level: 300 Who this course is designed for This course is designed for persons who are aspiring to the Microsoft 365 Enterprise Admin role and have completed one of the Microsoft 365 work load administrator certification paths. What You Will Learn Office 365 overview Moving your organization to Office 365 Configuring Office 365 Managing Office 365 ProPlus deployments Designing your Microsoft 365 Tenant Configuring your Microsoft 365 Tenant Managing your Microsoft 365 Tenant Manage User Security Groups and Licenses for Cloud Identities Plan and Implement Identity Synchronization Planning and Implementing Federated Identities Implementing Applications and External Access Office 365 Management Learn about Office 365 Management, including key components of Office 365, how to move your organization to Office 365, how to configure Office 365, and how to manage Office 365 ProPlus deployments. Microsoft 365 Tenant & Service Management Learn about Microsoft 365 Tenant and Service Management, including how to plan, manage, and customize your organization’s Microsoft 365 tenant and services.; Microsoft 365 Identity Management Learn about Microsoft 365 Identity Management, including how to manage user security groups and licenses for cloud identities, and how to plan and implement identity synchronization, federated identities, applications, and external access. [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]]
  17. Opsgility - MS-900 Microsoft 365 Fundamentals (2020) Course Overview This course provides foundational knowledge on the considerations and benefits of adopting cloud services and the Software as a Service (SaaS) cloud model, with a specific focus on Microsoft 365 cloud service offerings. You will begin by learning about cloud fundamentals, including an overview of cloud computing and specifically Microsoft cloud services. You will be introduced to Microsoft Azure, and you will examine the differences between Microsoft 365 and Office 365. You will then perform an in-depth review of Microsoft 365, including a comparison of Microsoft on-premises services versus Microsoft 365 cloud services, a review of enterprise mobility in Microsoft 365, and an analysis of how Microsoft 365 services provide collaboration. The course then analyzes how security, compliance, privacy, and trust are handled in Microsoft 365, and it concludes with a review of Microsoft 365 subscriptions, licenses, billing, and support. This course will prepare it's audience for, MS-900: Microsoft 365 Fundamentals exam. Course Details Duration: 2 Days Level: 200 Who this course is designed for This course is designed for IT Professionals who aspire to deploy and manage cloud services in their organization, or who are simply looking to acquire foundational knowledge on cloud fundamentals. This includes the considerations and benefits of adopting cloud services in general and the Software as a Service (SaaS) cloud model specifically, with a general focus on Microsoft 365 cloud service offerings. [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]]
  18. Hello Friends, This video explains how to upgrade ESXi 6.5/6.7 to ESXi 7.0 with esxcli.
  19. INE - Practical Python Cisco Network Automation (2020) [hide][Hidden Content]]
  20. Hello Friends, This video explains the complete installation and configuration of vcenter server appliance 7.0 (VCSA 7).
  21. Hello Friends, This video explains how to create VM on Esxi 6.7 and install windows-10 on VM
  22. Hello Friends, Below video describes how to clone VM on standalone ESXi Host.
  23. Hello Friends, This video explains how to install and configure the vCenter Server Appliance 6.7.
  24. Hello Friends, This video describes how to install and configure Samba Server on Ubuntu 19.10 and access that Samba share path from Windows system using dedicated user.
  25. Hi All, This video explains how to restore operating system to newly created virtual machine from Image using Clonezilla.
×
×
  • Create New...