Elasticsearch Lab#2 – Bulk indexing document using mget & bulk api

Sample Data Reference Sample Data & Query – https://github.com/devopsschool-demo-labs-projects/elasticsearch

Read more »

Elasticsearch Lab#1 – CRUD

Reference Sample Data & Query – https://github.com/devopsschool-demo-labs-projects/elasticsearch

Read more »

What is an Azure Portal?

Microsoft Azure, one of the second highest names in the Cloud Computing domain, It all because of features it provides to its user, the ease with which Microsoft Azure can…

Read more »

What is Azure Policy?

Hi guys, today in this article we will discuss about “what is Azure Policy?” In this article we will cover all the topics related to Azure policy and we’ll cover…

Read more »

Best Practices of Linux Security

User Security Password Security Securing the root account File System Security System Security User Security Avoid shared accounts Ensure each user is assigned a unique account name and a unique…

Read more »

What is an Azure monitor?

Hi guys, today in this article we will discuss Azure Monitor. The Azure Monitor benefits you maximize the obtainability and performance of your applications and services. It gives you a…

Read more »

What is the Azure lighthouse?

Friends, today we will discuss Azure Lighthouse. The Azure Lighthouse is a service that is made by Microsoft that provides advanced automation on Azure Cloud Services. It makes sure that…

Read more »

What is Azure Backup?

The Azure Backup is an Azure-based service that you can use to back up and restore your data in the Microsoft cloud. The Azure Backup is a consistent, safe, and…

Read more »

Linux Security Tools

Vulnerability Assessment with Nessus Traffic Security with Ethereal Web Proxying with Squid Vulnerability Assessment with Nessus Nessus is a vulnerability assessment tool Comes built-in with most distros More than just…

Read more »

How to Detecting and Stopping Attacks in Linux

System Auditing System Logging Network Intrusion Detection with Snort Host File Integrity with Tripwire System Auditing Auditing can track system activities to warn sysadmin of suspicious activity Allows sysadmin to…

Read more »

Complete Referance of Secure Networking in Linux

OpenSSH Samba NIS NFS Securing FTP and HTTP servers OpenSSH Open source version of SSH that normally comes with OpenBSD Comes with several distros or downloadable Linux ports have ‘p’…

Read more »

Complete Referance of Linux Security Mechanisms

TCP Wrappers etc/hosts allow and deny inted and xinetd PAMs SELinux Unsecure Linux Utilities TCP Wrappers TCP Wrappers is built into most distros Adds IP filtering capability Enables access logging…

Read more »

Complete Referance of Firewalls in Linux Security

Introduction to Firewalls IP Tables Dedicated Linux Firewalls Introduction to Firewalls Firewalls protect network perimeters Not total security solution, but important part of defense in depth strategy Firewalls act as…

Read more »

Complete Referance of Hardening in Linux Security

System Hardening Overview Batille Securing X-Windows Securing Linux Daemons Security patches Security Benchmarks System Hardening Overview Linux, like other operatingsystems, is not secure “out of the box” Security increases as…

Read more »

Complete Referance of Encryption in Linux Security

Introduction to Encryption Using GNU GPG Using SSH Hashing Utilities Using PKI Certificates in Linux Introduction to Ecryption Linux has built-in ability to encrypt files Protects files in storage Protection…

Read more »

What are Azure Blueprints?

The Azure blueprints help us to define a continuous set of Azure resources that tools and follows an organization’s values, patterns, and necessities. The development teams can use this feature…

Read more »

What is Azure Automanage?

Hi guys, today we will discuss about Azure Automanage.  What are the roles and responsibilities of an Azure Automanager? But before moving to the topic, we should know some important…

Read more »

What is Azure Arc?

Hi guys, today we will discuss what Azure Arc is?  What are the roles and responsibilities of an Azure Arc? But before moving to the topic, we should know some…

Read more »

Complete Referance of Linux Security

Course Outline Introduction To Linux Security A Bit About Linux Current Security Problems which is more secure: Windows vs Linux? Requirements of a Secure OS Overview of Linux Security Features…

Read more »

Docker Lab, Excercise & Assignment – 7

Inspect the containers to find out the following information. What environments variables, Env, are available in the containers? What ports are exposed, ExposedPorts, in the containers? What command, Cmd and…

Read more »