cyber security

  • VMwareLearn How to Create a VLAN in the ESXI for Your Firepower Threat Defense (FTD) | #networkershome

    Learn How to Create a VLAN in the ESXI for Your Firepower Threat Defense (FTD) | #networkershome

    Join Live Networking Trainings with Lab Access at Networkers Home – This guide provides step-by-step instructions for creating a Virtual Local Area Network (VLAN) in VMware ESXi to improve network segmentation for your Firepower Threat Defense (FTD). By isolating traffic, you enhance security and performance. Follow these steps to optimize your network configuration for better management and protection against threats.…

    Read More »
  • VMwareHow to Install Security Onion – Step-by-Step Guide for Beginners (2024)

    How to Install Security Onion – Step-by-Step Guide for Beginners (2024)

    Learn how to install Security Onion with this straightforward guide, perfect for beginners looking to enhance their network security skills. In this video we are starting a playlist covering various topics all related to Security Onion. Starting with the installation. Security Onion is a free, open-source Linux distribution for network security monitoring, intrusion detection, and log management. It combines powerful…

    Read More »
  • workstationCybersecurity Home Lab Setup (2025) | VMware, Essential Tools & Blue Team Practice

    Cybersecurity Home Lab Setup (2025) | VMware, Essential Tools & Blue Team Practice

    Get hands-on with setting up your own cybersecurity lab for Blue Team practice! In this video, I guide you through creating a lab environment using VMware, featuring Kali Linux, a Windows VM, and the Elastic Stack. Perfect for Blue Teamers and cybersecurity enthusiasts, this setup allows you to build essential skills in log analysis, threat detection, and network security. Follow…

    Read More »
  • workstationCreating a Windows 10 Victim Machine (for Hackers) – Lec 09

    Creating a Windows 10 Victim Machine (for Hackers) – Lec 09

    Join me as I challenge myself to create a Kali Linux victim machine running Windows 10 on VMware and see if I can pull it off without any hiccups! Learn how to create a Kali Linux victim machine with Windows 10 on VMware in this step-by-step tutorial. This video is perfect for ethical hackers, penetration testers, and cybersecurity enthusiasts who…

    Read More »
  • LinuxArch Linux Setup – Part 2 – Post installation configuration and Setup | In Hindi

    Arch Linux Setup – Part 2 – Post installation configuration and Setup | In Hindi

    After installing Arch Linux that was covered in Part 1, we will now see how to work with initial configuration. We will also cover software / package installation in the next part. Join FossTip’s Social Media channels – ————————————— Facebook – Twitter – Website – [ad_2] source

    Read More »
  • WindowsDebloat Windows 11: The Ultimate Guide

    Debloat Windows 11: The Ultimate Guide

    How to debloat Windows 11 using a variety of approaches, this video is a guide to custom distros, powershell scripts and tools like Windows 11 Debloat based on ChrisTitusTech and others. I will even show you how to uninstall Microsoft Edge! Automate with Pulseway: (sponsor) Tools shown: Based of: Buy the best antivirus: Join the discussion on Discord: Get your…

    Read More »
Back to top button