Audiences: Candidates who want to prepare for CCIE Data Center (v3.0) Scope: 1.1.b Tagging/Trunking from CCIE Data Center (v3.0) Exam Topics – Practical Exam Inter-VLAN Routing Although we can route between two VLANs with a router 802.1Q trunk (Router-On-A-Stick AKA ROAS), but that is not in the scope of our CCIE Data Center curriculum; instead, […]
Audiences: Candidates who want to prepare for CCIE Data Center (v3.0) Scope: 1.1.b Tagging/Trunking from CCIE Data Center (v3.0) Exam Topics – Practical Exam Virtual Local-Area Network (VLAN) You can take a physical LAN switch which does not break the broadcast domain and logically break it into multiple broadcast domains. You are doing this by […]
How to choose an Esxi version? In the previous post, we discussed virtualization and introduced ESXi as a bare-metal Hypervisor to implement the virtualization abstraction layer. In this post, we will choose and install an ESXi Host version. Before starting the installation process, we should choose a suitable and compatible ESXi version for our virtual […]
In the third part of Sysmon 101 training course, we are going to talk about the events that are used in Sysmon to hunt for threats.Part 1: What Is Threat Hunting?Part 2: What Is Sysmon? And How To Install Sysmon Event ID 1: Process Creation Process creation events give us a variety of information about […]
What is a Shell? We Discussed Linux and windows differences and kernels and distros; now, it is time to talk about what is a shell and how to use a terminal? Let us see this figure once again. Shell is responsible for the interaction between users or applications and the kernel. File management, service management, process management, and running […]
What is Virtualization ? Virtualization is to simulate a virtual version of a physical device -like servers, network devices, and storage- on a physical platform. For this purpose, we need an abstraction layer over the computer hardware ….ok wait! you are right! This kind of definition will not help anyone! Ok, Let us see how […]
The Sysmon tool is part of the Sysinternals software suite provided by Microsoft. The Sysmon tool allows us to analyze, and monitor Windows system events and logs. Through Sysmon, we can analyze and investigate system events and use them to identify threats and respond to incidents … This software has become one of the most […]
In the Sysmon 101 course, we teach Sysmon tool from basic to advanced and This is the first part of the Sysmon 101 training course. In this part, we are going to talk about Threat Hunting. WWhat Is Threat Hunting? The concept of threat hunting refers to the process by which we seek to detect […]
In this article we are going to talk about the differences between Distance Vector and Link State dynamic routing protocols. Link State Routing Protocols In order to understand the major difference of Link-State Routing Protocols compared to Distance Vectors, we want to implement a simple network with four routers. we will run one of the […]
In 2015, when Cisco bought OpenDNS and took a big step in cloud security equipment. Provides a Software As A Service or SaaS to provide security at the DNS protocol level. What Is OpenDNS Platform?Introduced in 2006 to improve and enhance user security using the DNS protocol, it gradually began developing and creating a product […]