Topics that don't fit in to the other categories
Course Suggestion - Email Security


Please submit this by clicking on Course Request link in our Course Library. This is the official way that ITProTV tracks these requests. It makes sure that I don't forget to mention it. Thanks for suggestion!

read more
A+, Network+, Strata IT Fundamentals
Mac Table and Arp table

Great question @Robert when it comes to switching, the layer 2 information is going to be MAC address to port mappings. Switches can contain an ARP table for management. However, if the managed switch operates at layer 3, then it will also have an ARP table (Layer 3) to map MAC addresses to IP addresses, like routers do.

read more
CCENT, CCNA Routing & Switching, CCNA Security
Network Address Translation and VPN covered?


CCENT (2018) Infrastructure Services Configure NAT

CCNA Security (2018) VPN

read more
MTA, MCSA Windows 8, MCSE Windows Server 2012
MTA 98-365 - server fundamentals - Is the test still using windows 2008 R2 or does it go into newer versions of windows Server?

Took the test today. It currently is based off of Server 2016 and will be updating January 2018.

read more
Security+, CASP, CEH, SSCP and CISSP
Privileged account management and compliance


Great issue to raise, and a challenge for many organizations today, whether the cloud is in the picture or not. Without having visibility into the specifics of the issue(s) that you would want to address, there are provisions made for these exact scenarios, or many of them anyway, in all of the major cloud service providers PAM / IAM stacks today. Whether it is Microsoft Azure, Amazon AWS, or even Google GCP, all of them offer approximate compliance solutions along similar lines.

Since you mentioned Azure specifically, perhaps taking a look at the link below will give you a better idea of the large number of roles that are available, as well as descriptions, and if you continue down the list below the roles, a detailed permission breakdown for every role.

I have had many of these exact conversations about this issue in the filed, and in classrooms, and there are solutions that will stand up to scrutiny for auditability and validation, but you do need to plan carefully and document thoroughly as well as implement relentlessly through standardized models across the enterprise to ensure that things turn out as required.

Cloud vendors, especially the big 3, have come a long way with regards to security and compliance alignment in the PAM / IAM area in the last few years. Gone are the days of the "random role" that used to plague us as auditors and cause havoc for customers vis-à-vis compliance. If you pay attention to the details and guidance that the vendor makes available, typically via the security and compliance center, or whatever it may be called, you will have a great place to start from, and the resources that you need to craft a successful outcome.

I would be happy to discuss specifics with you if you have a scenario in mind, or are looking for advice about a certain approach. Feel free to contact me directly if that is of interest to you, my email is:

Be in touch if you feel that I can help further. I look forward to hearing from you.

Good Luck !!



read more
First Aid Not able to fix disk

Try an Ubuntu Live Boot CD or USB drive. You can read the file system and copy your data off the drive.

read more

IT Service Managment

ITIL Practitioner Worksheets Still not Resolved 3 months later


I'm waiting to here some information on what has occurred here, hopefully it will be resolved soon.

read more