Expanding your organizations Active Directory environment is a crucial task to ensure high availability, redundancy, and load balancing. It is best practice to have at least 2 domain controllers in a production environment. Depending on the size and geographical distribution of your organization, you might need more. I will walk […]
Setting up Private Access to PaaS Resources in Azure
Securing access to PaaS resources such as Storage Accounts in Azure can be a valid concern for IT professionals as more and more services are moved to the Azure public cloud. Here I will walk you through how to set up private access to a storage account by setting up […]
Configuring Cisco Switch with VLANs
Let’s say you want multiple LANs, but only have one switch? Or maybe you want to separate your networks into smaller sections, with each one having a different purpose? One for your trusted devices, one for Guest access, one for management, etc. How can you do this? This can be […]
Setting up DHCP with Dynamic DNS (Linux Servers)
Throughout my time tinkering in home lab, I have come across a problem. I am having trouble remembering all these IP Addresses. But thankfully, a solution to this already exists. DNS. However, How can I get my home labs DNS records to update automatically with our DHCP server? We can […]
Deploying Azure Resources using a Bicep Template
In today’s day and age where a lot of companies are migrating to the cloud or having a mix of on-prem and cloud deployments, automating the deployment of infrastructure is essential. Not only does it speed up the time of deployment because you don’t have to waste time clicking around […]
Capturing a Password with Wireshark
In a digital landscape where data breaches and cyber threats are at every corner, the importance of robust cybersecurity practices has never been more important. Today, I will show you how I captured a password using Wiresahrk, a powerful and widely-used network analysis tool. Wireshark, is an open-source packet analyzer […]
Installing PfSense with Virtual Box
In today’s digital landscape, cybersecurity is more important than ever. Cybersecurity has become an increasingly more important concern for organizations and individuals. With cyber threats and new constantly changing vulnerabilities, it is important for you to have a firewall set up if you value your network safety. That’s where PfSense […]
Packet Tracer – Setting up A SOHO Network with 3 Subnets
I made a YouTube video about this. Click here to check it out. If you’d rather read an article, continue below. Networking is a fundamental aspect of modern day technology. Understanding how a network functions is essential for any IT professional. One of the best ways to gain practical experience […]
File Integrity Monitoring – With PowerShell
File Integrity Monitoring is a process of ensuring files are maintaining their integrity. This is to ensure that they have not been changed or tampered with in an unauthorized way. For example, with FIM, you could have alerts sent to you if critical system files have been changed without your […]
Vulnerability Management – Running a Nessus Scan
Today, I used a tool called “Nessus” which is a Vulnerability Management tool. What is Vulnerability Management? Vulnerability Management is a process that involves identifying, assessing, prioritizing, and reducing vulnerabilities in systems, networks, etc. The goal of this is to lower the chances of a security breach or attack by […]