Archive for September, 2021

Review Buku : VMware Disaster Recovery

September 30, 2021

If you are Systems Engineer and Administrator, and want to read about VMWare Disaster Recovery, check it out this book:

Title : Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager Second Edition
Author : Abhilash GB
ISBN-10 ‏ : ‎ 1785886096
ISBN-13 ‏ : ‎ 978-1785886096
Publisher : Packt
Pages : 208
Year : 2016

Here is the details of this book.

  1. Installing and Configuring vCenter Site Recovery Manager (SRM) 6.1
    Introduction
    So what exactly are RPO and RTO?
    What is Site Recovery Manager?
    Site Recovery Manager(SRM) architecture
    Array manager
    Storage Replication Adapter (SRA)
    Laying the groundwork for an SRM environment
    Preparing storage for array-based replication
    Host presentation (Zoning) at the protected and the recovery sites
    Installing SRM on both the protected and recovery sites
    Performing the SRM installation
    Pairing SRM sites
    Installing the Storage Replication Adapters
    Downloading the SRAs
    Installing the SRA
    Adding array managers and enabling array pairs
    Configuring placeholder datastores
    Creating resource, folder, and network mappings
    Resource mappings
    Folder mappings
    Network mappings
    Virtual machine swap file location
    Design choice 1: Separate datastore for the swap files
    Design choice 2: Store the swap files in the VM’s working directory
    Summary
  2. Creating Protection Groups and Recovery Plans
    Understanding datastore groups
    Understanding protection groups
    Storage policy-based protection groups
    Creating a protection group
    What happens when you create a protection group?
    Understanding recovery plans
    Creating a recovery plan
    Summary
  3. Testing and Performing a Failover and Failback
    Testing a recovery plan
    Test workflow
    Running the test
    Testing a recovery plan – background
    Performing the cleanup after a test
    Performing a planned migration
    Performing a disaster recovery (failover)
    Performing a forced recovery
    Enabling forced recovery for a site
    Running a forced recovery
    Reprotecting an SRM site
    Performing a failback to an SRM protected site
    IPv4 customization rules
    Creating an IPv4 customization rule
    How does SRM use IP customization rules?
    Configuring VM recovery properties
    IP customization
    Recovery properties
    Priority group
    VM dependencies
    Shutdown action
    Startup action
    Pre-power on and post-power on steps
    Summary
  4. Deploying vSphere Replication
    Introduction
    New features in vSphere Replication 6.1
    Understanding the vSphere Replication architecture
    Downloading the vSphere Replication bundle
    Deploying the vSphere Replication Appliance
    How does it work
    Setting the VRA hostname and a VRM site name for the VRA
    VRA hostname
    VRM site name
    Configuring a SQL database for VRMS
    Deploying a vSphere Replication Server
    Registering vSphere Replication Servers
    Summary
  5. Configuring and Using vSphere Replication 6.1
    Adding a remote site as a target
    Configuring replication for a VM to the local/remote site
    How does replication work?
    Using replication seeds
    Monitoring replication
    Reconfiguring replication
    Changing the target datastore
    Pausing an Ongoing replication
    Synchronize Data Immediately
    Stopping replication on a VM
    Moving replication to another VR Server
    Recovering virtual machines
    Configuring failback for VMs
    Using SRM with vSphere Replication
    Creating a vSphere Replication protection group
    Creating a vSphere Replication recovery plan
    Testing a vSphere Replication recovery plan
    Performing a recovery or a planned migration
    Preforming a failback (re-protect and failover)
    Summary
  6. Using vRealize Orchestrator (vRO) to Automate SRM and vSphere
    Replication
    Deploying and configuring vRealize Orchestrator
    Downloading vRealize Orchestrator
    Deploying vRealize Orchestrator
    Using the vRealize Orchestrator client
    Configuring vRealize Orchestrator
    Configure vRO database
    Configure authentication provider
    Enabling vRealize Orchestration for a vCenter
    Adding a vCenter Server instance to vRO
    Registering vRO as a vCenter Server extension
    Install vRealize Orchestrator plugins for SRM and vSphere
    Replication
    Downloading the vRO plugins for SRM and vSphere Replication
    Installing vRO plugins
    Troubleshooting SRM and vSphere Replication
    Getting to the logs
    Analyzing vSphere Replication logs
    Analyzing SRM logs
    Increasing the logging level for SRM
    Troubleshooting references
    Summary
    Index

Abhilash (@abhilashgb) is a virtualization specialist, author, designer, and a VMware vExpert for seven consecutive years (2014-2020) who specializes in the areas of data center virtualization and cloud computing. He is a VMware Certified Implementation Expert (VCIX6-DCV).
He also holds other VMware certifications, including VCAP4-DCA, VCAP5-DCA, VCAP6-DCD, VCP3, VCP4, VCP5, VCP6-DCV, VCP-Cloud and VCP6-NV.

You can buy this book from online bookstores in the Internet such as Amazon, Barnes and Nobles, and others.

For any other IT Tutorial, you can check it here :

Cloud Computing : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-cloud.html
Web : https://bukutrainingns.blogspot.com/2020/02/kumpulan-tutorial-belajar-web.html
Server Hardware : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-server.html
Data Center : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-data-center.html
Veritas Backup Exec : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-veritas.html
Windows Server 2012R2 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows.html
Windows Server 2016 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows_6.html
Windows Server 2019 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows_19.html
Active Directory : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-active.html
Exchange Server 2013 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange.html
Exchange Server 2016 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange_9.html
Exchange Server 2019 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange_20.html
Linux Ubuntu : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-ubuntu.html
Linux RedHat : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-redhat.html
Linux CEntOS : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-centos.html
Cisco : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-cisco.html
Mikrotik : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-router.html
Hyper-V : https://bukutrainingns.blogspot.com/2019/12/belajar-hyper-v-kumpulan-tutorial.html
SQL Server 2014 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-sql-server.html
Jobs dan Career : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-karir-dunia-teknologi.html
Microsoft Office Word : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-microsoft.html
VMWare VSphere : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-vmware-vsphere.html

For any other IT Certification, you can check it here :
CompTIA : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi.html
Cisco : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_8.html
Oracle : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_9.html
Microsoft : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_10.html
MikroTik : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_11.html
VMWare : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_12.html
FortiNet : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_16.html
EC Council : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_17.html
Juniper : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_22.html
RedHat : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-sertifikasi-linux.html

For IT Tutorial visit here:

https://bukutrainingns.blogspot.com/

For IT Tutorial video watch here:

https://www.youtube.com/c/NanangSadikinOfficial

See you again.

Regards

Nanang

Buku Hyper-V Windows 10 Virtualization

September 29, 2021

Buat teman-teman yang mau belajar Hyper-V Virtualization, ini ada buku terbaru terbit bulan Maret 2021. Tebal buku 102 halaman dan Harga Rp 60.000,- (enam puluh ribu rupiah) belum termasuk ongkos kirim. Pemesanan bisa WA ke +62 812 64354263.

Title : Windows 10 Virtualization
Author : Marliana Sari dan Nanang Sadikin
ISBN-13 : 9786239569839

Publisher : Polmed Press
Pages : 102
Year : 2021

Windows 10 Virtualization
Kata Pengantar
Daftar Isi
Bab 1. Pengenalan Windows 10 Virtualization
Bab 2. Instalasi Hyper-V
2.1 Verifikasi Hyper-V
2.2 Mengenal Hyper-V Manager
2.2.1 Membuat Virtual Machine Secara Cepat
2.2.2 Membuat Virtual Machine
2.2.3 Membuat Virtual Hard Disks
2.2.4 Membuat Virtual Floppy
2.2.5 Import Virtual Machine
2.2.6 Hyper-V Settings
2.2.7 Virtual SAN Manager
2.2.8 Edit Disks
2.2.9 Inspect Disks
2.2.10 Stop Service
2.2.11 Remove Server
2.2.12 Refresh
2.2.13 View
2.2.14 Help
Bab 3. Pembuatan Virtual Machine
3.1 Membuat Virtual Machine
3.2 Instalasi Sistem Operasi Virtual Machine
3.3 Menu Virtual Machine Connections
3.3.1 File
3.3.1.1 Settings
3.3.1.2 Exit
3.3.2 Action
3.3.2.1 Ctrl + Alt + Del
3.3.2.2 Start
3.3.2.3 Shutdown
3.3.2.4 Save
3.3.2.5 Turn Off
3.3.2.6 Pause
3.3.2.7 Reset
3.3.2.8 Checkpoint
3.3.2.9 Revert
3.3.2.10 Share
3.3.3 Media
3.3.3.1 DVD Drive
3.3.3.2 Diskette Drive
3.3.4 View
3.3.4.1 Full Screen Mode
3.3.4.2 Toolbar
3.3.4.3 Enhanced Session
3.3.4.4 Zoom Level
3.3.5 Help
3.3.5.1 Help Topics
3.3.5.2 About Virtual Machine Connection
Bab 4. Konfigurasi Virtual Machine
4.1. Konfigurasi Virtual Machine
4.2. Menambahkan Virtual Hard Disk
4.3. Menambahkan Network Card
Bab 5. Jaringan di Hyper-V
5.1. Skenario Jaringan
5.2. Menghubungkan Virtual Machine ke LAN
5.3. Menghubungkan Virtual Machine Ke Internet
Tentang Penulis

For any other IT Tutorial, you can check it here :

Cloud Computing : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-cloud.html
Web : https://bukutrainingns.blogspot.com/2020/02/kumpulan-tutorial-belajar-web.html
Server Hardware : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-server.html
Data Center : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-data-center.html
Veritas Backup Exec : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-veritas.html
Windows Server 2012R2 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows.html
Windows Server 2016 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows_6.html
Windows Server 2019 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows_19.html
Active Directory : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-active.html
Exchange Server 2013 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange.html
Exchange Server 2016 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange_9.html
Exchange Server 2019 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange_20.html
Linux Ubuntu : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-ubuntu.html
Linux RedHat : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-redhat.html
Linux CEntOS : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-centos.html
Cisco : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-cisco.html
Mikrotik : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-router.html
Hyper-V : https://bukutrainingns.blogspot.com/2019/12/belajar-hyper-v-kumpulan-tutorial.html
SQL Server 2014 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-sql-server.html
Jobs dan Career : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-karir-dunia-teknologi.html
Microsoft Office Word : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-microsoft.html
VMWare VSphere : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-vmware-vsphere.html

For any other IT Certification, you can check it here :
CompTIA : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi.html
Cisco : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_8.html
Oracle : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_9.html
Microsoft : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_10.html
MikroTik : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_11.html
VMWare : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_12.html
FortiNet : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_16.html
EC Council : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_17.html
Juniper : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_22.html
RedHat : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-sertifikasi-linux.html

For IT Tutorial visit here:

https://bukutrainingns.blogspot.com/

For IT Tutorial video watch here:

https://www.youtube.com/c/NanangSadikinOfficial

See you again.

Regards

Nanang

Book Review : Python Data Cleaning Cookbook

September 27, 2021

If you are Data Analyst and want to read about Python, check it out this book:

Title : Python Data Cleaning Cookbook
Author : Michael Walker
ISBN-10 ‏ : 1800565666
ISBN-13 ‏ : ‎978-1800565661 ‎
Publisher : Packt
Pages : 436
Year : 2020

Here is the details of this book.

Chapter 1 Tabular Data into pandas
Technical requirements
Importing CSV files
Getting ready
How to do it…
How it works…
There’s more…
Importing Excel files
Getting ready
How to do it…
How it works…
There’s more…
Importing data from SQL databases
Getting ready
How to do it…
How it works…
There’s more…
Importing SPSS, Stata, and SAS data
Getting ready
How to do it…
How it works…
There’s more…
Importing R data
Getting ready
How to do it…
How it works…
There’s more…
Persisting tabular data
Getting ready
How to do it…
How it works…
There’s more…

Chapter 2: Anticipating Data
Cleaning Issues when Importing
HTML and JSON into pandas
Technical requirements
Importing simple JSON data
Getting ready
How to do it…
How it works…
There’s more…
Importing more complicated JSON
data from an API
Getting ready
How to do it…
How it works…
There’s more…
Importing data from web pages
Getting ready
How to do it…
How it works…
There’s more…
Persisting JSON data
Getting ready
How to do it…
How it works…
There’s more…

Chapter 3: Taking the Measure of
Your Data
Technical requirements
Getting a first look at your data
Getting ready…
How to do it…
How it works…
There’s more…
Selecting and organizing columns
Getting ready…
How to do it…
How it works…
There’s more…
Selecting rows
Getting ready…
How to do it…
How it works…
There’s more…
Generating frequencies for
categorical variables
Getting ready…
How to do it…
How it works…
There’s more…
Generating summary statistics for
continuous variables
Getting ready…
How to do it…
How it works…

Chapter 4: Identifying Missing
Values and Outliers in Subsets of Data
Technical requirements
Finding missing values
Getting ready
How to do it…
How it works…
Identifying outliers with one variable
Getting ready
How to do it…
How it works…
There’s more…
Identifying outliers and unexpected
values in bivariate relationships
Getting ready
How to do it…
How it works…
There’s more…
Using subsetting to examine logical inconsistencies in variable relationships
Getting ready
How to do it…
How it works…
Using linear regression to identify data points with significant influence
Getting ready
How to do it…
How it works…
There’s more…
Using k-nearest neighbor to find outliers
Getting ready
How to do it…
How it works…
There’s more…
Using Isolation Forest to find anomalies
Getting ready
How to do it…
How it works…
There’s more…

Chapter 5: Using Visualizations
for the Identification of
Unexpected Values
Technical requirements
Using histograms to examine the
distribution of continuous variables
Getting ready
How to do it…
How it works…
There’s more…
Using boxplots to identify outliers for continuous variables
Getting ready
How to do it…
How it works…
There’s more…
Using grouped boxplots to uncover
unexpected values in a particular group
Getting ready
How to do it…
How it works…
There’s more…
Examining both the distribution
shape and outliers with violin plots
Getting ready
How to do it…
How it works…
There’s more…
Using scatter plots to view
bivariate relationships
Getting ready
How to do it…
How it works…
There’s more…
Using line plots to examine trends in continuous variables
Getting ready
How to do it…
How it works…
There’s more…
Generating a heat map based on a correlation matrix
Getting ready
How to do it…
How it works…
There’s more…

Chapter 6: Cleaning and
Exploring Data with Series
Operations
Technical requirements
Getting values from a pandas series
Getting ready
How to do it…
How it works…
Showing summary statistics for a
pandas series
Getting ready
How to do it…
How it works…
There’s more…
Changing series values
Getting ready
How to do it…
How it works…
There’s more…
Changing series values conditionally
Getting ready
How to do it…
How it works…
There’s more…
Evaluating and cleaning string series data
Getting ready
How to do it…
How it works…
There’s more…
Working with dates
Getting ready
How to do it…
How it works…
Identifying and cleaning missing data
Getting ready
How to do it…
How it works…
There’s more…
Missing value imputation with Knearest neighbor
Getting ready
How to do it…
How it works…
There’s more…

Chapter 7: Fixing Messy Data
when Aggregating
Technical requirements
Looping through data with
itertuples (an anti-pattern)
Getting ready
How to do it…
How it works…
There’s more…
Calculating summaries by group
with NumPy arrays
Getting ready
How to do it…
How it works…
There’s more…
Using groupby to organize data by
groups
Getting ready
How to do it…
How it works…
There’s more…
Using more complicated
aggregation functions with groupby
Getting ready
How to do it…
How it works…
There’s more…
Using user-defined functions and apply with groupby
Getting ready
How to do it…
How it works…
There’s more…
Using groupby to change the unit of
analysis of a DataFrame
Getting ready
How to do it…
How it works…

Chapter 8: Addressing Data
Issues When Combining
DataFrames
Technical requirements
Combining DataFrames vertically
Getting ready
How to do it…
How it works…
Doing one-to-one merges
Getting ready
How to do it…
How it works…
There’s more…
Using multiple merge-by columns
Getting ready
How to do it…
How it works…
There’s more…
Doing one-to-many merges
Getting ready
How to do it…
How it works…
There’s more…
Doing many-to-many merges
Getting ready
How to do it…
How it works…
There’s more…
Developing a merge routine
Getting ready
How to do it…
How it works…

Chapter 9: Tidying and Reshaping Data
Technical requirements
Removing duplicated rows
Getting ready…
How to do it…
How it works…
There’s more…
Fixing many-to-many relationships
Getting ready…
How to do it…
How it works…
There’s more…
Using stack and melt to reshape
data from wide to long format
Getting ready…
How to do it…
How it works…
Melting multiple groups of columns
Getting ready…
How to do it…
How it works…
There’s more…
Using unstack and pivot to reshape
data from long to wide
Getting ready…
How to do it…
How it works…

Chapter 10: User-Defined
Functions and Classes to
Automate Data Cleaning
Technical requirements
Functions for getting a first look at
our data
Getting ready…
How to do it…
How it works…
There’s more…
Functions for displaying summary
statistics and frequencies
Getting ready
How to do it…
How it works…
There’s more…
Functions for identifying outliers
and unexpected values
Getting ready
How to do it…
How it works…
There’s more…
Functions for aggregating or
combining data
Getting ready
How to do it…
How it works…
There’s more…
Classes that contain the logic for
updating series values
Getting ready
How to do it…
How it works…
There’s more…
Classes that handle non-tabular data
structures
Getting ready
How to do it…
How it works…
There’s more…

Michael Walker has worked as a data analyst for over 30 years at a variety of educational institutions. He has also taught data science, research methods, statistics, and computer programming to undergraduates since 2006. He generates public sector and foundation reports and conducts analyses for publication in academic journals.

You can buy this book from online bookstores in the Internet such as Amazon, Barnes and Nobles, and others.

For any other IT Tutorial, you can check it here :

Cloud Computing : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-cloud.html
Web : https://bukutrainingns.blogspot.com/2020/02/kumpulan-tutorial-belajar-web.html
Server Hardware : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-server.html
Data Center : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-data-center.html
Veritas Backup Exec : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-veritas.html
Windows Server 2012R2 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows.html
Windows Server 2016 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows_6.html
Windows Server 2019 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows_19.html
Active Directory : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-active.html
Exchange Server 2013 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange.html
Exchange Server 2016 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange_9.html
Exchange Server 2019 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange_20.html
Linux Ubuntu : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-ubuntu.html
Linux RedHat : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-redhat.html
Linux CEntOS : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-centos.html
Cisco : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-cisco.html
Mikrotik : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-router.html
Hyper-V : https://bukutrainingns.blogspot.com/2019/12/belajar-hyper-v-kumpulan-tutorial.html
SQL Server 2014 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-sql-server.html
Jobs dan Career : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-karir-dunia-teknologi.html
Microsoft Office Word : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-microsoft.html
VMWare VSphere : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-vmware-vsphere.html

For any other IT Certification, you can check it here :
CompTIA : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi.html
Cisco : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_8.html
Oracle : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_9.html
Microsoft : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_10.html
MikroTik : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_11.html
VMWare : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_12.html
FortiNet : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_16.html
EC Council : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_17.html
Juniper : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_22.html
RedHat : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-sertifikasi-linux.html

For IT Tutorial visit here:

https://bukutrainingns.blogspot.com/

For IT Tutorial video watch here:

https://www.youtube.com/c/NanangSadikinOfficial

See you again.

Regards

Nanang

Book Review : Mastering Docker

September 22, 2021

If you are Cloud Engineer, Administrator, and Analyst and want to read about Container, check it out this book:

Title : Mastering Docker 3rd Edition
Author : Russ McKendrick and Scott Gallagher
ISBN-13 : 978-1789616606
ISBN-10 : 1789616603
Publisher : Packt
Pages : 426
Year : 2018

Here is the details of this book.

Chapter 1: Docker Overview
Technical requirement
Understanding Docker
Developers
The problem
The Docker solution 8
Operators 8
The problem 8
The Docker solution 9
Enterprise 10
The problem 10
The Docker solution 10
The differences between dedicated hosts, virtual machines, and Docker 11
Docker installation 13
Installing Docker on Linux (Ubuntu 18.04) 14
Installing Docker on macOS 15
Installing Docker on Windows 10 Professional 18
Older operating systems 20
The Docker command-line client 22
Docker and the container ecosystem 26
Open source projects 27
Docker CE and Docker EE 27
Docker, Inc. 29
Summary 29
Questions 30
Further reading 30

Chapter 2: Building Container Images 32
Technical requirements 32
Introducing the Dockerfile 33
Reviewing the Dockerfile in depth 34
FROM 34
LABEL 35
RUN 35
COPY and ADD 36
EXPOSE 38
ENTRYPOINT and CMD 38
Other Dockerfile instructions 39
USER 39
WORKDIR 39
ONBUILD 40
ENV 40
Dockerfiles – best practices 40
Building container images 41
Using a Dockerfile to build a container image 42
Using an existing container 46
Building a container image from scratch 49
Using environmental variables 52
Using multi-stage builds 59

Chapter 3: Storing and Distributing Images 65
Technical requirements 65
Docker Hub 66
Dashboard 66
Explore 68
Organizations 69
Create 70
Profile and settings 70
Other menu options 72
Creating an automated build 72
Setting up your code 73
Setting up Docker Hub 74
Pushing your own image 82
Docker Store 85
Docker Registry 87
An overview of Docker Registry 87
Deploying your own registry 88
Docker Trusted Registry 90
Third-party registries 90
Microbadger 91

Chapter 4: Managing Containers 96
Technical requirements 97
Docker container commands 97
The basics 97
Interacting with your containers 102
attach 102
exec 103
Logs and process information 105
logs 105
top 107
stats 108
Resource limits 108
Container states and miscellaneous commands 110
Pause and unpause 112
Stop, start, restart, and kill 113
Removing containers 114
Miscellaneous commands 115
Docker networking and volumes 117
Docker networking 117
Docker volumes 125

Chapter 5: Docker Compose 134
Technical requirements 134
Introducing Docker Compose 135
Our first Docker Compose application 136
Docker Compose YAML file 138
Moby counter application 139
Example voting application 140
Docker Compose commands 150
Up and PS 150
Config 151
Pull, build, and create 152
Start, stop, restart, pause, and unpause 153
Top, logs, and events 153
Scale 156
Kill, rm, and down 157
Docker App 159

Chapter 6: Windows Containers 167
Technical requirements 167
An introduction to Windows containers 168
Setting up your Docker host for Windows containers 171
Windows 10 Professional 171
macOS and Linux 173
Running Windows containers 174
A Windows container Dockerfile 177
Windows containers and Docker Compose 179

Chapter 7: Docker Machine 183
Technical requirements 183
An introduction to Docker Machine 184
Deploying local Docker hosts with Docker Machine 184
Launching Docker hosts in the cloud 191
Using other base operating systems 195

Chapter 8: Docker Swarm 199
Technical requirements 199
Introducing Docker Swarm 200
Roles within a Docker Swarm cluster 201
Swarm manager 201
Swarm worker 202
Creating and managing a Swarm 202
Creating a cluster 203
Adding a Swarm manager to the cluster 205
Joining Swarm workers to the cluster 206
Listing nodes 207
Managing a cluster 207
Finding information on the cluster 208
Promoting a worker node 211
Demoting a manager node 211
Draining a node 212
Docker Swarm services and stacks 214
Services 215
Stacks 220
Deleting a Swarm cluster 222
Load balancing, overlays, and scheduling 222
Ingress load balancing 222
Network overlays 223
Scheduling 225

Chapter 9: Docker and Kubernetes 227
Technical requirements 227
An introduction to Kubernetes 227
A brief history of containers at Google 228
An overview of Kubernetes 229
Kubernetes and Docker 231
Enabling Kubernetes 232
Using Kubernetes 236
Kubernetes and other Docker tools 243

Chapter 10: Running Docker in Public Clouds 253
Technical requirements 253
Docker Cloud 254
Docker on-cloud 254
Docker Community Edition for AWS 255
Docker Community Edition for Azure 262
Docker for Cloud summary 268
Amazon ECS and AWS Fargate 268
Microsoft Azure App Services 273
Kubernetes in Microsoft Azure, Google Cloud, and Amazon Web Services 276
Azure Kubernetes Service 276
Google Kubernetes Engine 281
Amazon Elastic Container Service for Kubernetes 283
Kubernetes summary 286

Chapter 11: Portainer – A GUI for Docker 290
Technical requirements 290
The road to Portainer 291
Getting Portainer up and running 291
Using Portainer 293
The Dashboard 294
Application templates 295
Containers 298
Stats 301
Logs 302
Console 303
Images 304
Networks and volumes 306
Networks 306
Volumes 306
Events 306
Engine 307
Portainer and Docker Swarm 307
Creating the Swarm 308
The Portainer service 308
Swarm differences 310
Endpoints 310
Dashboard and Swarm 311
Stacks 312
Services 313
Adding endpoints 316

Chapter 12: Docker Security 319
Technical requirements 319
Container considerations 319
The advantages 320
Your Docker host 321
Image trust 321
Docker commands 322
run command 322
diff command 323
Best practices 324
Docker best practices 325
The Center for Internet Security benchmark 325
Host configuration 326
Docker daemon configuration 326
Docker daemon configuration files 326
Container images/runtime and build files 327
Container runtime 327
Docker security operations 327
The Docker Bench Security application 327
Running the tool on Docker for macOS and Docker for Windows 328
Running on Ubuntu Linux 330
Understanding the output 331
Host configuration 332
Docker daemon configuration 332
Docker daemon configuration files 334
Container images and build files 334
Container runtime 335
Docker security operations 338
Docker Swarm configuration 338
Summing up Docker Bench 339
Third-party security services 339
Quay 339
Clair 340
Anchore 341

Chapter 13: Docker Workflows 347
Technical requirements 347
Docker for development 348
Monitoring 361
Extending to external platforms 371
Heroku 371
What does production look like? 372
Docker hosts 372
Mixing of processes 373
Multiple isolated Docker hosts 373
Routing to your containers 373

Russ McKendrick is an experienced system administrator who has been working in IT and related industries for over 25 years. During his career, he has had varied responsibilities, from looking after an entire IT infrastructure to providing first-line, second-line, and senior support in both client-facing and internal teams for large organizations. Russ supports open source systems and tools on public and private clouds at Node4 Limited, where he is the Practice Manager (SRE and DevOps).

Scott Gallagher has been fascinated with technology since he played Oregon Trail in elementary school. His love for it continued through middle school as he worked on more Apple IIe computers. In high school, he learned how to build computers and program in BASIC. His college years were all about server technologies such as Novell, Microsoft, and Red Hat. After college, he continued to work on Novell, all the while maintaining an interest in all technologies. He then moved on to manage Microsoft environments and, eventually, what he was most passionate about Linux environments. Now, his focus is on Docker and cloud environments.

You can buy this book from online bookstores in the Internet such as Amazon, Barnes and Nobles, and others.

For any other IT Tutorial, you can check it here :

Cloud Computing : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-cloud.html
Web : https://bukutrainingns.blogspot.com/2020/02/kumpulan-tutorial-belajar-web.html
Server Hardware : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-server.html
Data Center : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-data-center.html
Veritas Backup Exec : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-veritas.html
Windows Server 2012R2 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows.html
Windows Server 2016 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows_6.html
Windows Server 2019 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows_19.html
Active Directory : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-active.html
Exchange Server 2013 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange.html
Exchange Server 2016 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange_9.html
Exchange Server 2019 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange_20.html
Linux Ubuntu : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-ubuntu.html
Linux RedHat : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-redhat.html
Linux CEntOS : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-centos.html
Cisco : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-cisco.html
Mikrotik : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-router.html
Hyper-V : https://bukutrainingns.blogspot.com/2019/12/belajar-hyper-v-kumpulan-tutorial.html
SQL Server 2014 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-sql-server.html
Jobs dan Career : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-karir-dunia-teknologi.html
Microsoft Office Word : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-microsoft.html
VMWare VSphere : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-vmware-vsphere.html

For any other IT Certification, you can check it here :
CompTIA : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi.html
Cisco : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_8.html
Oracle : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_9.html
Microsoft : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_10.html
MikroTik : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_11.html
VMWare : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_12.html
FortiNet : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_16.html
EC Council : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_17.html
Juniper : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_22.html
RedHat : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-sertifikasi-linux.html

For IT Tutorial visit here:

https://bukutrainingns.blogspot.com/

For IT Tutorial video watch here:

https://www.youtube.com/c/NanangSadikinOfficial

See you again.

Regards

Nanang

Buku Terbaru Nanang Sadikin September 2021

September 17, 2021

Buat teman-teman yang mau belajar Active Directory Domain Services, ini ada buku terbaru terbit bulan September 2021. Tebal buku 150 halaman dan Harga Rp 70.000,- (tujuh puluh ribu rupiah) belum termasuk ongkos kirim. Pemesanan bisa WA ke +62 812 64354263.

Title : Praktik Jaringan Komputer: Infrastruktur Teknologi Informasi Jaringan LAN dengan Active Directory
Author : Marliana Sari dan Nanang Sadikin
ISBN-13 : 978-6239569884
Publisher : Polmed Press
Pages : 150
Year : 2021

Isi buku adalah sebagai berikut:
Kata Pengantar
Daftar Isi
Bab 1. Pengenalan Infrastruktur TI
Tugas Bab 1
Bab 2. Instalasi Active Directory
2.1. Konfigurasi TCP/IP Address
2.2. Instalasi Active Directory Forest Root Domain
2.3. Memverifikasi Instalasi Active Directory
2.3.1. Verifikasi terhadap folder Sysvol
2.3.2. Verifikasi terhadap Database Active Directory
2.3.3. Verifikasi terhadap Struktur Active Directory
2.3.4. Verifikasi terhadap Event Log
2.4. Menonaktifkan Password Policy
Tugas Bab 2
Bab 3. Join Domain
Tugas Bab 3
Bab 4. Organizational Unit
4.1. Membuat OU menggunakan Active Directory Administrative Center
4.2. Membuat OU dengan Active Directory Users and Computers
4.3. Membuat OU dengan PowerShell
4.4. Membuat OU menggunakan Directory Services Tools
4.5. Membuat OU menggunakan LDIFDE
4.6. Membuat OU menggunakan CSVDE
4.7. Membuat OU menggunakan WSH
4.8. Delegasi Pengelolaan OU 62
4.9. Menghapus Organizational Unit
4.10. Memindahkan Organizational Unit
Tugas Bab 4
Bab 5. Implementasi User, Group dan Contact
5.1. Membuat User
5.1.1. Membuat User Menggunakan AD Administrative Center
5.1.2. Membuat User menggunakan Active Directory Users and Computers
5.1.3. Membuat User Menggunakan PowerShell
5.1.4. Membuat User Menggunakan DS Tools
5.1.5. Membuat User Menggunakan CSVDE
5.1.6. Membuat User Menggunakan LDIFDE
5.1.7. Membuat User Menggunakan Windows Scripting Host (WSH)
5.2. Membuat Group
5.2.1. Membuat Group Menggunakan AD Administrative Center
5.2.2. Membuat Group Menggunakan Active Directory Users and Computers
5.2.3. Membuat Group Menggunakan PowerShell
5.2.4. Membuat Group Menggunakan DS Tools
5.2.5. Membuat Group Menggunakan CSVDE
5.2.6. Membuat Group Menggunakan LDIFDE
5.2.7. Membuat Group Menggunakan WSH
5.3. Membuat Contact
5.3.1. Membuat Contact Menggunakan AD Users and Computers
5.3.2. Membuat Contact Menggunakan PowerShell
5.3.3. Membuat Contact Menggunakan Directory Services Tools
5.3.4. Membuat Contact Menggunakan CSVDE
5.3.5. Membuat Contact Menggunakan LDIFDE
5.3.6. Membuat Contact Menggunakan WSH
5.4. AD Recycle Bin
Tugas Bab 5
Bab 6. Implementasi Group Policy
6.1. Software Installation GPO
6.2. Desktop Management GPO
6.3. Login Script GPO
Tugas Bab 6
Tentang Penulis

For any other IT Tutorial, you can check it here :

Cloud Computing : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-cloud.html
Web : https://bukutrainingns.blogspot.com/2020/02/kumpulan-tutorial-belajar-web.html
Server Hardware : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-server.html
Data Center : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-data-center.html
Veritas Backup Exec : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-veritas.html
Windows Server 2012R2 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows.html
Windows Server 2016 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows_6.html
Windows Server 2019 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows_19.html
Active Directory : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-active.html
Exchange Server 2013 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange.html
Exchange Server 2016 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange_9.html
Exchange Server 2019 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange_20.html
Linux Ubuntu : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-ubuntu.html
Linux RedHat : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-redhat.html
Linux CEntOS : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-centos.html
Cisco : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-cisco.html
Mikrotik : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-router.html
Hyper-V : https://bukutrainingns.blogspot.com/2019/12/belajar-hyper-v-kumpulan-tutorial.html
SQL Server 2014 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-sql-server.html
Jobs dan Career : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-karir-dunia-teknologi.html
Microsoft Office Word : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-microsoft.html
VMWare VSphere : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-vmware-vsphere.html

For any other IT Certification, you can check it here :
CompTIA : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi.html
Cisco : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_8.html
Oracle : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_9.html
Microsoft : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_10.html
MikroTik : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_11.html
VMWare : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_12.html
FortiNet : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_16.html
EC Council : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_17.html
Juniper : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_22.html
RedHat : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-sertifikasi-linux.html

For IT Tutorial visit here:

https://bukutrainingns.blogspot.com/

For IT Tutorial video watch here:

https://www.youtube.com/c/NanangSadikinOfficial

See you again.

Regards

Nanang

Book Review : Windows Server and PowerShell

September 15, 2021

If you are Systems Administrator and Systems Engineer and want to read about Windows Server, check it out this book:

Title : Windows Server 2019 and PowerShell All in One for Dummies
Author : Sara Perrott
ISBN-10 ‏ :‎ 1119560713
ISBN-13 : 978-1119560715
Publisher : John Wiley and Sons
Pages : 768
Year : 2019

Here is the details of this book.

Book 1: Installing and Setting Up Windows Server 2019
Chapter 1: An Overview of Windows Server 2019
Extra! Extra! Read All About It! Seeing What’s New in Windows Server 2019
Deciding Which Windows Server 2019 Edition Is Right for You
Walking the Walk: Windows Server 2019 User Experiences
Seeing What Server Manager Has to Offer
Windows Admin Center: Your New Best Friend
Chapter 2: Using Boot Diagnostics
Accessing Boot Diagnostics
Telegram Channel @nettrain
Using a Special Boot Mode
Performing a Memory Test
Using the Command Prompt
Working with Third-Party Boot Utilities
Chapter 3: Performing the Basic Installation
Making Sure You Have What It Takes
Performing a Clean Install
Upgrading Windows
Performing a Network Install with Windows Deployment Services
Chapter 4: Performing Initial Configuration Tasks
Understanding Default Settings
Getting an Overview of the Configuration Process
Providing Computer Information
Updating Windows Server 2019
Customizing Windows Server 2019
Configuring Startup Options with BCDEdit

Book 2: Configuring Windows Server 2019
Chapter 1: Configuring Server Roles and Features
Using Server Manager
Understanding Server Roles
Understanding Server Features
Chapter 2: Configuring Server Hardware
Working with Device Manager
Using the Add Hardware Wizard
Performing Hard-Drive-Related Tasks
Performing Printer-Related Tasks
Performing Other Configuration Tasks
Chapter 3: Using the Control Panel
Accessing the Control Panel
Configuring the Control Panel
Understanding Control Panel Items
Chapter 4: Working with Workgroups
Knowing What a Workgroup Is
Telegram Channel @nettrain
Knowing If a Workgroup Is Right for You
Comparing Centralized and Group Sharing
Configuring a Server for a Workgroup
Managing Workgroups
Examining the Peer Name Resolution Protocol
Chapter 5: Promoting Your Server to Domain Controller
Understanding Domains
Preparing to Create a Domain
Performing Domain Configuration Prerequisites
Configuring the Server as a Domain Controller
Wrapping Things Up
Chapter 6: Managing DNS and DHCP with IP Address
Management
Installing IP Address Management
Configuring IP Address Management
Using IP Address Management

Book 3: Administering Windows Server 2019
Chapter 1: An Overview of the Tools Menu in Server
Manager
Accessing the Server Manager Tools Menu
Working with Common Administrative Tools
Installing and Using Remote Server Administration Tools
Chapter 2: Setting Group Policy
Understanding How Group Policy Works
Starting the Group Policy Editor
Performing Computer Management
Performing User Configuration
Viewing Resultant Set of Policy
Chapter 3: Configuring the Registry
Starting Registry Editor
Importing and Exporting Registry Elements
Finding Registry Elements
Understanding Registry Data Types
Telegram Channel @nettrain
Understanding the Hives
Loading and Unloading Hives
Connecting to Network Registries
Setting Registry Security
Chapter 4: Working with Active Directory
Active Directory 101
Configuring Objects in Active Directory
Chapter 5: Performing Standard Maintenance
Activating Windows
Configuring the User Interface
Understanding How User Access Control Affects Maintenance Tasks
Adding and Removing Standard Applications
Measuring Reliability and Performance
Protecting the Data on Your Server
Performing Disk Management Tasks
Automating Diagnostic Tasks with Task Scheduler
Working with Remote Desktop
Working with Remote Server Administration Tools
Working with Admin Center
Creating a Windows Recovery Drive
Chapter 6: Working at the Command Line
Opening an Administrative Command Prompt
Configuring the Command Line
Setting Environmental Variables
Getting Help at the Command Line
Understanding Command Line Symbols
Chapter 7: Working with PowerShell
Opening an Administrative PowerShell Window
Configuring PowerShell
Using a Profile Script
Setting Environmental Variables
Getting Help in PowerShell
Understanding PowerShell Punctuation
Telegram Channel @nettrain

Book 4: Configuring Networking in Windows Server 2019
Chapter 1: Overview of Windows Server 2019
Networking
Getting Acquainted with the Network and Sharing Center
Using the Network Connections Tools
Configuring TCP/IP
Understanding DHCP
Defining DNS
Chapter 2: Performing Basic Network Tasks
Viewing Network Properties
Connecting to Another Network
Managing Network Connections
Chapter 3: Accomplishing Advanced Network Tasks
Working with Remote Desktop Services
Working with Network Policy and Access Services
Troubleshooting at the Command Line
Chapter 4: Diagnosing and Repairing Network
Connection Problems
Using Windows Network Diagnostics
Repairing Individual Connections
Network Troubleshooting at the Command Line
Working with Windows Firewall
Making Sense of Common Configuration Errors
Working with Other Troubleshooting Tools

Book 5: Managing Security with Windows Server 2019
Chapter 1: Understanding Windows Server 2019
Security
Understanding Basic Windows Server Security
Working with Files and Folders
Creating a Local Security Policy
Paying Attention to Windows Security
Chapter 2: Configuring Shared Resources
Comparing Share Security with File System Security
Telegram Channel @nettrain
Sharing Resources
Configuring Access with Federated Rights Management
Working with Active Directory Rights Management Services
Chapter 3: Configuring Operating System Security
Understanding and Using User Account Control
Managing User Passwords
Understanding Credential Guard
Configuring Startup and Recovery Options
Chapter 4: Working with the Internet
Firewall Basics
Configuring Windows Defender Firewall with Advanced Security
Chapter 5: Understanding Digital Certificates
Certificates in Windows Server 2019
Types of Certificates in Active Directory Certificate Services
Chapter 6: Installing and Configuring AD CS
Introducing Certificate Authority Architecture
Installing a Certificate Authority
Configuring Certificate Auto-Enrollment
Chapter 7: Securing Your DNS Infrastructure
Understanding DNSSEC
Understanding DANE

Book 6: Working with Windows PowerShell
Chapter 1: Introducing PowerShell
Understanding the Basics of PowerShell
Using PowerShell
Running PowerShell Remotely
Getting Help in PowerShell
Identifying Security Issues with PowerShell
Chapter 2: Understanding the .NET Framework
Introducing the Various Versions of .NET Framework
Focusing on New Features in .NET 4.7
Viewing the Global Assembly Cache
Understanding .NET Standard and .NET Core
Telegram Channel @nettrain
Chapter 3: Working with Scripts and Cmdlets
Introducing Common Scripts and Cmdlets
Executing Scripts or Cmdlets
Working from Another Location
Performing Simple Administrative Tasks with PowerShell Scripts
Chapter 4: Creating Your Own Scripts and Advanced
Functions
Creating a PowerShell Script
Defining a Script Policy
Signing a PowerShell Script
Creating a PowerShell Advanced Function
Chapter 5: PowerShell Desired State Configuration
Getting an Overview of PowerShell Desired State Configuration
Creating a PowerShell Desired State Configuration Script
Applying the PowerShell Desired State Configuration Script
Push and Pull: Using PowerShell Desired State Configuration at Scale

Book 7: Installing and Administering Hyper-V
Chapter 1: What Is Hyper-V?
Introduction to Virtualization
Type 1 and Type 2 Hypervisors
Installing and Configuring Hyper-V
Chapter 2: Virtual Machines
Creating a Virtual Machine
Configuring a Virtual Machine
Shielded Virtual Machines
Chapter 3: Virtual Networking
Identifying the Types of Virtual Switches
Creating a Virtual Switch
Getting into Advanced Hyper-V Networking
Chapter 4: Virtual Storage
Understanding Virtual Disk Formats
Considering Types of Disks
Adding Storage to the Host
Telegram Channel @nettrain
Adding Storage to the Virtual Machine
Chapter 5: High Availability in Hyper-V
Hyper-V Replica
Live Migration
Storage Migration
Failover Clustering

Book 8: Installing, Configuring, and Using Containers
Chapter 1: Introduction to Containers in Windows Server
2019
Understanding Containers
Considering Use Cases for Containers
Deciding What Type of Containers You Want to Use
Managing Containers at Scale
Chapter 2: Docker and Docker Hub
Introduction to Docker
Introduction to Docker Hub
Chapter 3: Installing Containers on Windows Server
2019
Installing Windows Containers
Installing Hyper-V Containers
Installing Docker
Testing Your Container Installation
Chapter 4: Configuring Docker and Containers on
Windows Server 2019
Working with Dockerfile
Applying Custom Metadata to Containers and Other Objects
Configuring Containers
Configuring the Docker Daemon with daemon.json
Chapter 5: Managing Container Images
Making Changes to Images and Saving the Changes You Make
Pushing Images to Docker Hub
Pulling Images from Docker Hub
Handling Image Versioning
Telegram Channel @nettrain
Chapter 6: Container Networking
Considering the Different Types of Network Connections
Viewing Your Network Adapters and Virtual Switches
Configuring a Network Address Translation Network Connection
Configuring a Transparent Network Connection
Configuring an Overlay Network Connection
Configuring an l2bridge Network Connection
Configuring an l2tunnel Network Connection
Connecting to a Network
Chapter 7: Container Storage
Getting Acquainted with Container Storage
Creating a Volume Inside of a Container
Working with Persistent Volumes

Sara Perrott is an information security professional with a systems and network engineering background. She shares her passion for all things information technology by teaching classes related to Windows Server, Amazon Web Services (AWS), and networking and virtualization, as well as other classes when needed at a local community college. She enjoys speaking at public events and presented most recently at the AWS Imagine conference in 2018. Sara also enjoys technical editing and technical proofreading and has had the pleasure to work on a few projects doing this type of work. When Sara is not working or writing, she enjoys spending time with her husband playing World of Warcraft, building robots, and playing with her ham radio. She also loves playing with her two pugs. Sara has a website where you can see some of the things she has been up to at http://www.saraperrott.com. You can also follow her on Twitter (@PerrottSara) and Facebook (@PerrottSara).

You can buy this book from online bookstores in the Internet such as Amazon, Barnes and Nobles, and others.

For any other IT Tutorial, you can check it here :

Cloud Computing : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-cloud.html
Web : https://bukutrainingns.blogspot.com/2020/02/kumpulan-tutorial-belajar-web.html
Server Hardware : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-server.html
Data Center : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-data-center.html
Veritas Backup Exec : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-veritas.html
Windows Server 2012R2 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows.html
Windows Server 2016 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows_6.html
Windows Server 2019 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows_19.html
Active Directory : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-active.html
Exchange Server 2013 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange.html
Exchange Server 2016 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange_9.html
Exchange Server 2019 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange_20.html
Linux Ubuntu : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-ubuntu.html
Linux RedHat : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-redhat.html
Linux CEntOS : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-centos.html
Cisco : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-cisco.html
Mikrotik : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-router.html
Hyper-V : https://bukutrainingns.blogspot.com/2019/12/belajar-hyper-v-kumpulan-tutorial.html
SQL Server 2014 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-sql-server.html
Jobs dan Career : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-karir-dunia-teknologi.html
Microsoft Office Word : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-microsoft.html
VMWare VSphere : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-vmware-vsphere.html

For any other IT Certification, you can check it here :
CompTIA : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi.html
Cisco : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_8.html
Oracle : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_9.html
Microsoft : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_10.html
MikroTik : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_11.html
VMWare : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_12.html
FortiNet : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_16.html
EC Council : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_17.html
Juniper : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_22.html
RedHat : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-sertifikasi-linux.html

For IT Tutorial visit here:

https://bukutrainingns.blogspot.com/

For IT Tutorial video watch here:

https://www.youtube.com/c/NanangSadikinOfficial

See you again.

Regards

Nanang

Book Review : Cloud Essential

September 12, 2021

If you are Cloud Engineer, Administrator, and Analyst and want to read about Cloud+ Exam, check it out this book:

Title : CompTIA Cloud Essentials+ Certification Study Guide
Author : Daniel Lachance
ISBN-10 ‏ : ‎1260461785
ISBN-13 ‏ : ‎978-1260461787
Publisher : McGrawHill
Pages : 304
Year : 2020

Here is the details of this book.

Part I Cloud Computing Introduction
1 The Principles of Cloud Computing
Identifying Cloud Computing Characteristics
Elasticity and Scalability
Self-service
Broad Network Access
Pay-as-You-Go
Availability
Identifying Cloud Service Models
Software as a Service (SaaS)
Infrastructure as a Service (IaaS)
Platform as a Service (PaaS)
Other Cloud Service Models
Identifying Cloud Deployment Models
Understanding Cloud Shared Responsibility
Shared Responsibility Examples
Exercise 1-1: Sign Up for a Free Microsoft
Azure Cloud Subscription
Certification Summary
Two-Minute Drill
Q&A Self Test
Self Test Answers

2 The Business Side of Cloud Computing
The Business Case for Cloud Computing
Ongoing Operating Expenses (OPEX)
Information Technology Infrastructure
Library (ITIL) and the Cloud
Service Level Agreements
Chargeback
Managing Cloud Costs
Reserved and Spot Instances
Cloud Subscription Types
Licensing
Exercise 2-1: Microsoft Azure Pricing
Calculator
Exercise 2-2: Microsoft Azure Budgets and
Alerts
Certification Summary
Two-Minute Drill

Part II Cloud Design Requirements
3 Cloud Planning
Cloud Feasibility
Feasibility Study
Cloud Pilot Program
Solving Business Problems with the Cloud
Map Computing Requirements to Cloud
Services
Data Sovereignty and Privacy
Cloud Migration Strategies
Lift and Shift
Rip and Replace
Exercise 3-1: Run an On-Premises Cloud
Migration Assessment for Microsoft SQL
Server
Certification Summary
Two-Minute Drill
Q&A Self Test
Self Test Answers

4 Compliance and the Cloud
Laws, Regulations, and Security Standards
Legal and Regulatory Compliance
Cloud Service Provider Compliance
NIST SP 800-53
ISO/IEC 27017:2015
FedRAMP
Sarbanes-Oxley Act
Business Requirements and Cloud Solutions
Data Artifacts
Cloud Service Provider Security Control
Implementation
Exercise 4-1: Review Amazon Web Services
Regulatory Compliance
Certification Summary
Two-Minute Drill
Q&A Self Test
Self Test Answers
Part III
Cloud Infrastructure

5 Cloud Storage Infrastructure
Storage Media
Drive Types
IOPS
Cloud Storage Configuration
File and Object Storage
Hot and Cold Storage
Replication and Encryption
Databases in the Cloud
Database Types
Content Delivery Networks
Exercise 5-1: Create a Microsoft Azure
Storage Account
Exercise 5-2: Upload Content to a Microsoft
Azure Storage Account
Certification Summary
Two-Minute Drill
Q&A Self Test
Self Test Answers

6 Cloud Network Infrastructure
Cloud Network Components
Connecting to Cloud Environments
Site-to-Site VPNs
Client-to-Site VPNs
Cloud Virtual Networks
Network Protocols
Cloud Load Balancing
Exercise 6-1: Create a Microsoft Azure
Virtual Network
Exercise 6-2: Configure a Microsoft Azure
ExpressRoute Circuit
Certification Summary
Two-Minute Drill
Q&A Self Test
Self Test Answers

7 Cloud Compute Infrastructure
Virtualization in the Cloud
Virtual Machine Sizing
Cloud Virtual Machine Components
Operating System Selection
Virtual Network Interface Cards
Routing Table Entries
High-Performance Computing
Exercise 7-1: Deploy a Windows-Based
Virtual Machine in the Cloud
Exercise 7-2: Remotely Manage a Cloud
Windows Virtual Machine
Certification Summary
Two-Minute Drill
Q&A Self Test
Self Test Answers

8 Applications and Big Data in the Cloud
Service-Oriented Architecture
Microservices
Content Management Systems
Blockchain
Cryptocurrency Miners
Cryptocurrency Implementations
Application Containers
Container Images
Containers
Big Data Analytics
Internet of Things
Machine Learning
Exercise 8-1: Create a Microsoft Azure
Queue
Exercise 8-2: Create a Microsoft Azure
Container Registry
Certification Summary
Two-Minute Drill
Q&A Self Test
Self Test Answers

9 Cloud DevOps
Software Development in the Cloud
Application Programming Interfaces
Data Exchange Formats
Software Testing
Sandboxing
Testing Types
Continuous Integration and Delivery
Code Repositories
How CI/CD Works
Cloud Resource Deployment
Cloud Automation
Technet24
Cloud Orchestration
Exercise 9-1: Deploy Cloud Virtual Machines
Using Templates
Certification Summary
Two-Minute Drill
Q&A Self Test
Self Test Answers
Part IV
Securing the Cloud

10 Security and the Cloud
Confidentiality
Encryption
Transport Layer Security
Data Integrity and Message Authentication
Hashing
Digital Signatures
Availability
Identity and Access Management
Identity Providers
Single Sign-On
Multifactor Authentication
Exercise 10-1: Check Virtual Machine Disk
Encryption Compliance
Exercise 10-2: Create a Microsoft Azure
Active Directory Tenant
Certification Summary
Two-Minute Drill
Q&A Self Test
Self Test Answers

11 Managing Cloud Risk
Risk Management
Risk Assessments
Risk Treatments
Assets and Threats
Asset Inventory
Threat Prioritization
Threat Mitigation
Security Policies
Control Objectives and Security Controls
Disaster Recovery
Continuous Monitoring
Security Testing and Auditing
Vulnerability Scanning
Penetration Testing
Exercise 11-1: Secure Data at Rest
Certification Summary
Two-Minute Drill
Q&A Self Test
Self Test Answers

Part V
Appendix and Glossary
A About the Online Content
System Requirements
Your Total Seminars Training Hub Account
Privacy Notice
Single User License Terms and Conditions
TotalTester Online
Ebook PDF
Technical Support
Glossary
Index

Daniel Lachance, CompTIA Cloud Essentials+, CompTIA Cloud+, CompTIA Server+, CompTIA A+, CompTIA Network+, CompTIA Security+, MCT, MCSA,MCITP, MCTS, is the owner of Lachance IT Consulting, Inc., based in Halifax, Nova Scotia. Dan has delivered technical IT training for a wide variety of products for more than 20 years. He has recorded IT support videos related to security and various cloud-computing platforms. Dan has developed custom applications and planned, implemented, troubleshot, and documented various network configurations and conducted network security audits. Dan has worked as a technical editor on a number of certification titles and has authored titles including CompTIA Server+ Certification All-in-One Exam Guide (Exam SK0-004) and CompTIA Security+ Certification Practice Exams, Third Edition (Exam SY0-501). Dan is an avid reader of nonfiction, loves family gatherings, and enjoys tinkering around with guitars.

You can buy this book from online bookstores in the Internet such as Amazon, Barnes and Nobles, and others.

For any other IT Tutorial, you can check it here :

Cloud Computing : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-cloud.html
Web : https://bukutrainingns.blogspot.com/2020/02/kumpulan-tutorial-belajar-web.html
Server Hardware : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-server.html
Data Center : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-data-center.html
Veritas Backup Exec : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-veritas.html
Windows Server 2012R2 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows.html
Windows Server 2016 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows_6.html
Windows Server 2019 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows_19.html
Active Directory : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-active.html
Exchange Server 2013 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange.html
Exchange Server 2016 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange_9.html
Exchange Server 2019 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange_20.html
Linux Ubuntu : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-ubuntu.html
Linux RedHat : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-redhat.html
Linux CEntOS : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-centos.html
Cisco : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-cisco.html
Mikrotik : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-router.html
Hyper-V : https://bukutrainingns.blogspot.com/2019/12/belajar-hyper-v-kumpulan-tutorial.html
SQL Server 2014 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-sql-server.html
Jobs dan Career : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-karir-dunia-teknologi.html
Microsoft Office Word : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-microsoft.html
VMWare VSphere : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-vmware-vsphere.html

For any other IT Certification, you can check it here :
CompTIA : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi.html
Cisco : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_8.html
Oracle : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_9.html
Microsoft : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_10.html
MikroTik : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_11.html
VMWare : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_12.html
FortiNet : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_16.html
EC Council : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_17.html
Juniper : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_22.html
RedHat : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-sertifikasi-linux.html

For IT Tutorial visit here:

https://bukutrainingns.blogspot.com/

For IT Tutorial video watch here:

https://www.youtube.com/c/NanangSadikinOfficial

See you again.

Regards

Nanang

Book Review : Security Plus Certification Guide

September 9, 2021

If you are Security Engineer, Administrator, and Analyst and want to read about Security+ Exam, check it out this book:

Title : Security Plus SY0 601 Certification Guide
Author : Ian Neil
ISBN-13 : 978-1800564244
ISBN-10 : 1800564244
Publisher : Packt
Pages : 516
Year : 2020

Here is the details of this book.

Chapter 1: Understanding
Security Fundamentals
CIA Triad
Security Fundamentals
CIA Triad Concept
Least Privilege
Defense in Depth Model
Comparing Control Types
Managerial Controls
Operational Controls
Technical Controls
Deterrent Controls
Detective Controls
Corrective Controls
Compensating Controls
Preventative Controls
Access Controls
Discretionary Access Control
Mandatory Access Control
Role-Based Access Control
Rule-Based Access Control
Attribute-Based Access Control
Group-Based Access Control
Linux-Based Access Control
Physical Security Controls
Perimeter Security
Building Security
Device Protection
Understanding Digital Forensics
Five-Minute Practical
Collection of Evidence
Cloud Forensics
Review Questions

Chapter 2: Implementing Public
Key Infrastructure
PKI Concepts
Certificate Hierarchy
Certificate Trust
Certificate Validity
Certificate Management Concepts
Types of Certificates
Asymmetric and Symmetric
Encryption
Encryption Explained
Digital Signatures Explained
Cryptography Algorithms and Their
Characteristics
Symmetric Algorithms
Asymmetric Algorithms
Symmetric versus Asymmetric
Analogy
XOR Encryption
Key Stretching Algorithms
Cipher Modes
Stream versus Block Cipher
Analogy
Modes of Operation
Quantum Computing
Blockchain and the Public Ledger
Hashing and Data Integrity
Comparing and Contrasting the
Basic Concepts of Cryptography
Asymmetric – PKI
Symmetric Algorithm – Modes of
Operation
Hashing Algorithms
Crypto Service Provider
Crypto Module
Protecting Data
Basic Cryptographic Terminologies
Obfuscation
Pseudo-Random Number Generator
Nonce
Perfect Forward Secrecy
Security through Obscurity

Collision
Steganography
Homomorphic Encryption
Diffusion
Implementation Decisions
Common Use Cases for
Cryptography
Supporting Confidentiality
Supporting Integrity
Supporting Non-Repudiation
Supporting Obfuscation
Low-Power Devices
High Resiliency
Supporting Authentication
Resource versus Security
Constraints
Practical Exercises
Practical Exercise 1 – Building a
Certificate Server
Practical Exercise 2 – Encrypting
Data with EFS and Stealing Certificates
Practical Exercise 3 – Revoking the EFS Certificate
Review Questions

Chapter 3: Investigating Identity
and Access Management
Understanding Identity and Access
Management Concepts
Identity Types
Account Types
Authentication Types
Security Tokens and Devices
Certification-Based Authentication
Implementing Authentication and
Authorization Solutions
Authentication Management
Authentication Protocols
Authentication, Authorization, and
Accounting (AAA) Servers
Access Control Schemes
Summarizing Authentication and
Authorization Design Concepts
Directory Services
Cloud Versus On-Premises
Authentication
On-Premises
In the Cloud
Common Account Management
Policies
Account Creation
Employees Moving Departments
Account Recertification
Account Maintenance
Account Monitoring
Security Information and Event
Management
Group-Based Access Control
Practical Exercise – Password
Policy
Review Questions

Chapter 4: Exploring
Virtualization and Cloud
Concepts
Overview of Cloud Computing
Implementing Different Cloud
Deployment Models
Understanding Cloud Service
Models
Infrastructure as a Service (IaaS)
Software as a Service (SaaS)
Platform as a Service (PaaS)
Security as a Service (SECaaS)
Anything as a Service (XaaS)
Understanding Cloud Computing
Concepts
Understanding Cloud Storage
Concepts
Selecting Cloud Security Controls
High Availability Access Zones
Resource Policies
Secret Management
Integration and Auditing
Storage
Networks
Compute
Solutions
Exploring the Virtual Network
Environments
Review Questions
Section 2: Monitoring the
Security Infrastructure

Chapter 5: Monitoring, Scanning,
and Penetration Testing
Penetration Testing Concepts
Rules of Engagement (ROE)
Network Exploitation Techniques
Passive and Active Reconnaissance
Reconnaissance Tools
Exercise Types
Vulnerability Scanning Concepts
Credentialed versus Non-
Credentialed Scans
Intrusive versus Non-Intrusive
Vulnerability Scans
Other Types of Scans That Can Be
Performed
Penetration Testing versus
Vulnerability Scanning
Syslog/Security Information and
Event Management
Security Orchestration, Automation,
and Response
Threat Hunting
Practical Exercise – Running a
Credentialed Vulnerability Scanner
Review Questions

Chapter 6: Understanding Secure
and Insecure Protocols
Introduction to Protocols
Insecure Protocols and Their Use
Cases
Secure Protocols and Their Use
Cases
Additional Use Cases and Their
Protocols
Subscription Services and Their
Protocols
Routing and Its Protocols
Switching and Its Protocols
Active Directory (Directory
Services) and Its Protocols
Review Questions

Chapter 7: Delving into Network
and Security Concepts
Installing and Configuring Network Components
Firewall
Network Address Translation
Gateway
Router
Access Control List – Network
Devices
Switch
Tap/Port Mirror
Aggregation Switches
Honeypot
Proxy Server
Jump Servers
Load Balancer
Remote Access Capabilities
IPSec
VPN Concentrator
Split Tunneling
Remote Support
Secure Network Architecture
Concepts
Software-Defined Network
Network Segmentation
Intrusion Prevention System
Intrusion Detection System
Modes of Operation
Sensor/Collector
Monitoring Data
Network Access Control
The Domain Name System
DNS Poisoning
Network Reconnaissance and
Discovery
Exploitation Frameworks
Forensic Tools
IP Addressing
IP Version 4
Subnet Mask
CIDR Mask
DHCP
IP Version 6 Addressing
Review Questions

Chapter 8: Securing Wireless and
Mobile Solutions
Implementing Wireless Security
Wireless Access Point Controllers
Securing Access to Your WAP
Wireless Bandwidth/Band Selection
Wireless Channels
Wireless Antenna Types
Wireless Coverage
Wireless – Open System
Authentication
Wireless Encryption
Wireless Captive Portals
Wireless Attacks
Wireless Authentication Protocols
Deploying Mobile Devices Securely
Mobile Device Management
Bring Your Own Device
Choose Your Own Device
Corporate-Owned Personally-Enabled
Mobile Device Connection Methods
Mobile Device Management Concepts
Device Management
Device Protection
Device Data
Mobile Device Enforcement and
Monitoring
Review Questions
Section 3: Protecting the Security
Environment

Chapter 9: Identifying Threats, Attacks, and Vulnerabilities
Virus and Malware Attacks
Social Engineering Attacks
Threat Actors
Advanced Attacks
Password Attacks
Physical Attacks
On-Path Attacks
Network Attacks
Application/Programming Attacks
Hijacking-Related Attacks
Driver Manipulation
Cryptographic Attacks
Review Questions

Chapter 10: Governance, Risk,
and Compliance
Risk Management Processes and
Concepts
Risk Types
Risk Management Strategies
Risk Analysis
Calculating Loss
Disasters
Business Impact Analysis Concepts
Threat Actors, Vectors, and
Intelligence Concepts
Threat Actors
Attack Vectors
Threat Intelligence Sources
Research Sources
The Importance of Policies for
Organizational Security
Personnel
Diversity of Training Techniques
Third-Party Risk Management
Data
Credential Policies
Organizational Policies
Regulations, Standards, and Legislation
Key Frameworks
Benchmarks/Secure Configuration Guides
Privacy and Sensitive Data Concepts
Organizational Consequences of Privacy Breaches
Notifications of Breaches
Data Types
Privacy-Enhancing Technologies
Data Roles and Responsibilities
Information Life Cycle
Impact Assessment
Terms of Agreement
Privacy Notice
Review Questions

Chapter 11: Managing Application Security
Implementing Host or Application Security
Boot Integrity
Endpoint Protection
Databases
Application Security
Hardening
Full Disk Encryption (FDE)
Self-Encrypting Drives (SEDs)
Understanding the Security
Implications of Embedded and
Specialist Systems
Internet of Things (IoT)
Real-Time Operating System (RTOS)
Multifunctional Printers (MFPs)
Surveillance Systems
System on a Chip (SoC)
Heating, Ventilation, and Air
Conditioning (HVAC)
Specialized Devices
Embedded Systems
Supervisory Control and Data
Acquisition (SCADA)
Industrial Control System
Communication Considerations
Constraints
Understanding Secure Application
Development, Deployment, and
Automation
Software Diversity
Elasticity
Scalability
Environment
Automation/Scripting
Provisioning and Deprovisioning
Integrity Measurement
Secure Coding Techniques
Open Web Application Security
Project (OWASP)
Review Questions

Chapter 12: Dealing with Incident
Response Procedures
Incident Response Procedures
Disaster Recovery Exercises
Attack Frameworks
Stakeholder Management
Continuity of Operations Planning
(COOP)
Utilizing Data Sources to Support
Investigations
Vulnerability Scan Output
SIEM Dashboards
Log Files
Log Managers
Journalctl
Nxlog
Bandwidth Monitors
Metadata
Network Monitoring
Protocol Analyzer Output

Knowing How to Apply Mitigation
Techniques or Controls to Secure
an Environment
Application Approved List
Application Block List/Deny List
Quarantine
Configuration Changes
Isolation
Containment
Segmentation
Security Orchestration, Automation,
and Response (SOAR)
Implementing Cybersecurity
Resilience
Redundancy
Review Questions
Section 4: Mock Tests

What this book covers
Chapter 1, Understanding Security Fundamentals, covers some security fundamentals that will be expanded upon in later chapters. Chapter 2, Implementing Public Key Infrastructure, goes into the different encryption types and teaches how certificates are issued and used. Chapter 3, Investigating Identity and Access Management, looks at different types of authentication. We will look at the concepts of identity and access management.
Chapter 4, Exploring Virtualization and Cloud Concepts, gets you acquainted with various cloud models and cloud security, looking at their deployment and storage environments. Chapter 5, Monitoring, Scanning, and Penetration Testing, looks at penetration testing, exercise types, scanning, threat hunting, and SIEM systems. Chapter 6, Understanding Secure and Insecure Protocols, looks at when to use certain secure protocols. Chapter 7, Delving into Network and Security Concepts, looks at network components, remote access, and network reconnaissance tools. Chapter 8, Securing Wireless and Mobile Solutions, looks at wireless solutions and secure mobile solutions.

Chapter 9, Identifying Threats, Attacks, and Vulnerabilities, explores attacks and vulnerabilities, taking each type of attack in turn and its unique characteristics. This chapter is probably the most heavily tested module in the Security+ exam. Chapter 10, Governance, Risk, and Compliance, looks at risk management and regulations and frameworks. Chapter 11, Managing Application Security, looks at application development and security. Chapter 12, Dealing with Incident Response Procedures, looks at preparing for disaster recovery incidents and how to recover. Chapter 13, Mock Exam 1, includes mock questions, along with explanations, which will help assess whether you’re ready for the test. Chapter 14, Mock Exam 2, includes more mock questions, along with explanations, which will help assess whether you’re ready for the test.

Ian Neil is one of the world’s top trainers of Security+. He has the ability to break down the information into manageable chunks so that people with no background knowledge can gain the skills required to become certified. He has recently worked for the US Army in Europe and designed a Security+ course that catered for people from all backgrounds (not just the IT professional), with an extremely successful pass rate. He is an MCT, MCSE, A+, Network+, Security+, CASP, and RESILIA practitioner. Over the past 23 years Ian has worked with high-end training providers and was one of the first technical trainers to train Microsoft internal staff when they opened their Bucharest Office in 2006.

You can buy this book from online bookstores in the Internet such as Amazon, Barnes and Nobles, and others.

For any other IT Tutorial, you can check it here :

Cloud Computing : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-cloud.html
Web : https://bukutrainingns.blogspot.com/2020/02/kumpulan-tutorial-belajar-web.html
Server Hardware : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-server.html
Data Center : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-data-center.html
Veritas Backup Exec : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-veritas.html
Windows Server 2012R2 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows.html
Windows Server 2016 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows_6.html
Windows Server 2019 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows_19.html
Active Directory : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-active.html
Exchange Server 2013 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange.html
Exchange Server 2016 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange_9.html
Exchange Server 2019 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange_20.html
Linux Ubuntu : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-ubuntu.html
Linux RedHat : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-redhat.html
Linux CEntOS : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-centos.html
Cisco : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-cisco.html
Mikrotik : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-router.html
Hyper-V : https://bukutrainingns.blogspot.com/2019/12/belajar-hyper-v-kumpulan-tutorial.html
SQL Server 2014 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-sql-server.html
Jobs dan Career : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-karir-dunia-teknologi.html
Microsoft Office Word : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-microsoft.html
VMWare VSphere : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-vmware-vsphere.html

For any other IT Certification, you can check it here :
CompTIA : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi.html
Cisco : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_8.html
Oracle : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_9.html
Microsoft : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_10.html
MikroTik : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_11.html
VMWare : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_12.html
FortiNet : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_16.html
EC Council : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_17.html
Juniper : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_22.html
RedHat : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-sertifikasi-linux.html

For IT Tutorial visit here:

https://bukutrainingns.blogspot.com/

For IT Tutorial video watch here:

https://www.youtube.com/c/NanangSadikinOfficial

See you again.

Regards

Nanang

Book Review : Machine Learning for Everyone

September 6, 2021

If you are Data Analyst and want to read about Machine Learning, check it out this book:

Title : Machine Learning with Python for Everyone
Author : Mark Fenner
ISBN-13 : 978-0134845623
ISBN-10 : 0134845625
Publisher : Addison Wesley
Pages : 592
Year : 2020

Here is the details of this book.

I First Steps
1 Let’s Discuss Learning
1.1 Welcome
1.2 Scope, Terminology, Prediction, and Data
1.2.1 Features
1.2.2 Target Values and Predictions
1.3 Putting the Machine in Machine Learning
1.4 Examples of Learning Systems
1.4.1 Predicting Categories: Examples of Classifiers
1.4.2 Predicting Values: Examples of Regressors
1.5 Evaluating Learning Systems
1.5.1 Correctness
1.5.2 Resource Consumption
1.6 A Process for Building Learning Systems
1.7 Assumptions and Reality of Learning
1.8 End-of-Chapter Material
1.8.1 The Road Ahead
1.8.2 Notes

2 Some Technical Background
2.1 About Our Setup
2.2 The Need for Mathematical Language
2.3 Our Software for Tackling Machine Learning
2.4 Probability
2.4.1 Primitive Events
2.4.2 Independence
2.4.3 Conditional Probability
2.4.4 Distributions
2.5 Linear Combinations, Weighted Sums, and Dot Products
2.5.1 Weighted Average
2.5.2 Sums of Squares
2.5.3 Sum of Squared Errors
2.6 A Geometric View: Points in Space
2.6.1 Lines
2.6.2 Beyond Lines
2.7 Notation and the Plus-One Trick
2.8 Getting Groovy, Breaking the Straight-Jacket, and Nonlinearity
2.9 NumPy versus “All the Maths”
2.9.1 Back to 1D versus 2D 49
2.10 Floating-Point Issues
2.11 EOC
2.11.1 Summary
2.11.2 Notes

3 Predicting Categories: Getting Started with Classification
3.1 Classification Tasks
3.2 A Simple Classification Dataset
3.3 Training and Testing: Don’t Teach to the Test
3.4 Evaluation: Grading the Exam
3.5 Simple Classifier #1: Nearest Neighbors, Long Distance Relationships, and Assumptions
3.5.1 Defining Similarity
3.5.2 The k in k-NN
3.5.3 Answer Combination
3.5.4 k-NN, Parameters, and Nonparametric Methods
3.5.5 Building a k-NN Classification Model
3.6 Simple Classifier #2: Naive Bayes, Probability, and Broken Promises
3.7 Simplistic Evaluation of Classifiers
3.7.1 Learning Performance
3.7.2 Resource Utilization in Classification
3.7.3 Stand-Alone Resource Evaluation
3.8 EOC
3.8.1 Sophomore Warning: Limitations and Open Issues
3.8.2 Summary
3.8.3 Notes
3.8.4 Exercises

4 Predicting Numerical Values: Getting Started with Regression
4.1 A Simple Regression Dataset
4.2 Nearest-Neighbors Regression and Summary Statistics
4.2.1 Measures of Center: Median and Mean
4.2.2 Building a k-NN Regression Model
4.3 Linear Regression and Errors
4.3.1 No Flat Earth: Why We Need Slope
4.3.2 Tilting the Field
4.3.3 Performing Linear Regression
4.4 Optimization: Picking the Best Answer
4.4.1 Random Guess
4.4.2 Random Step
4.4.3 Smart Step
4.4.4 Calculated Shortcuts
4.4.5 Application to Linear Regression
4.5 Simple Evaluation and Comparison of Regressors
4.5.1 Root Mean Squared Error
4.5.2 Learning Performance
4.5.3 Resource Utilization in Regression
4.6 EOC
4.6.1 Limitations and Open Issues
4.6.2 Summary
4.6.3 Notes
4.6.4 Exercises

II Evaluation

5 Evaluating and Comparing Learners
5.1 Evaluation and Why Less Is More
5.2 Terminology for Learning Phases
5.2.1 Back to the Machines
5.2.2 More Technically Speaking
5.3 Major Tom, There’s Something Wrong: Overfitting and Underfitting
5.3.1 Synthetic Data and Linear Regression
5.3.2 Manually Manipulating Model Complexity
5.3.3 Goldilocks: Visualizing Overfitting, Underfitting, and “Just Right”
5.3.4 Simplicity
5.3.5 Take-Home Notes on Overfitting
5.4 From Errors to Costs
5.4.1 Loss
5.4.2 Cost
5.5 (Re)Sampling: Making More from Less
5.5.1 Cross-Validation
5.5.2 Stratification
5.5.3 Repeated Train-Test Splits
5.5.4 A Better Way and Shuffling
5.5.5 Leave-One-Out Cross-Validation
5.6 Break-It-Down: Deconstructing Error into Biasand Variance
5.6.1 Variance of the Data
5.6.2 Variance of the Model
5.6.3 Bias of the Model
5.6.4 All Together Now
5.6.5 Examples of Bias-Variance Tradeoffs
5.7 Graphical Evaluation and Comparison
5.7.1 Learning Curves: How Much Data Do We Need?
5.7.2 Complexity Curves
5.8 Comparing Learners with Cross-Validation
5.9 EOC
5.9.1 Summary
5.9.2 Notes
5.9.3 Exercises

6 Evaluating Classifiers
6.1 Baseline Classifiers
6.2 Beyond Accuracy: Metrics for Classification
6.2.1 Eliminating Confusion from the Confusion Matrix
6.2.2 Ways of Being Wrong
6.2.3 Metrics from the Confusion Matrix
6.2.4 Coding the Confusion Matrix
6.2.5 Dealing with Multiple Classes: Multiclass Averaging
6.2.6 F1
6.3 ROC Curves
6.3.1 Patterns in the ROC
6.3.2 Binary ROC
6.3.3 AUC: Area-Under-the-(ROC)-Curve
6.3.4 Multiclass Learners,One-versus-Rest, and ROC
6.4 Another Take on Multiclass: One-versus-One 181
6.4.1 Multiclass AUC Part Two: The Quest for a Single Value
6.5 Precision-Recall Curves 185
6.5.1 A Note on Precision-Recall Tradeoff
6.5.2 Constructing a Precision-Recall Curve
6.6 Cumulative Response and Lift Curves
6.7 More Sophisticated Evaluation of Classifiers: Take Two
6.7.1 Binary
6.7.2 A Novel Multiclass Problem
6.8 EOC
6.8.1 Summary
6.8.2 Notes
6.8.3 Exercises

7 Evaluating Regressors
7.1 Baseline Regressors
7.2 Additional Measures for Regression
7.2.1 Creating Our Own Evaluation Metric
7.2.2 Other Built-in Regression Metrics
7.2.3 R2
7.3 Residual Plots
7.3.1 Error Plots
7.3.2 Residual Plots
7.4 A First Look at Standardization
7.5 Evaluating Regressors in a More Sophisticated Way: Take Two
7.5.1 Cross-Validated Results on Multiple Metrics
7.5.2 Summarizing Cross-Validated Results
7.5.3 Residuals
7.6 EOC
7.6.1 Summary
7.6.2 Notes
7.6.3 Exercises

III More Methods and Fundamentals
8 More Classification Methods
8.1 Revisiting Classification
8.2 Decision Trees
8.2.1 Tree-Building Algorithms
8.2.2 Let’s Go: Decision Tree Time
8.2.3 Bias and Variance in Decision Trees
8.3 Support Vector Classifiers
8.3.1 Performing SVC
8.3.2 Bias and Variance in SVCs
8.4 Logistic Regression
8.4.1 Betting Odds
8.4.2 Probabilities, Odds, and Log-Odds
8.4.3 Just Do It: Logistic Regression Edition
8.4.4 A Logistic Regression: A Space Oddity
8.5 Discriminant Analysis
8.5.1 Covariance
8.5.2 The Methods
8.5.3 Performing DA
8.6 Assumptions, Biases, and Classifiers
8.7 Comparison of Classifiers: Take Three
8.7.1 Digits
8.8 EOC
8.8.1 Summary
8.8.2 Notes
8.8.3 Exercises

9 More Regression Methods
9.1 Linear Regression in the Penalty Box: Regularization
9.1.1 Performing Regularized Regression
9.2 Support Vector Regression
9.2.1 Hinge Loss
9.2.2 From Linear Regression to Regularized Regression to Support Vector Regression
9.2.3 Just Do It — SVR Style
9.3 Piecewise Constant Regression
9.3.1 Implementing a Piecewise Constant Regressor
9.3.2 General Notes on Implementing Models
9.4 Regression Trees
9.4.1 Performing Regression with Trees
9.5 Comparison of Regressors: Take Three
9.6 EOC
9.6.1 Summary
9.6.2 Notes
9.6.3 Exercises

10 Manual Feature Engineering: Manipulating Data for Fun and Profit
10.1 Feature Engineering Terminology and Motivation
10.1.1 Why Engineer Features?
10.1.2 When Does Engineering Happen?
10.1.3 How Does Feature Engineering Occur?
10.2 Feature Selection and Data Reduction:Taking out the Trash
10.3 Feature Scaling
10.4 Discretization
10.5 Categorical Coding
10.5.1 Another Way to Code and the Curious Case of the Missing Intercept
10.6 Relationships and Interactions
10.6.1 Manual Feature Construction
10.6.2 Interactions
10.6.3 Adding Features with Transformers
10.7 Target Manipulations
10.7.1 Manipulating the Input Space
10.7.2 Manipulating the Target
10.8 EOC
10.8.1 Summary
10.8.2 Notes
10.8.3 Exercises

11 Tuning Hyperparameters and Pipelines
11.1 Models, Parameters, Hyperparameters
11.2 Tuning Hyperparameters
11.2.1 A Note on Computer Science and Learning Terminology
11.2.2 An Example of Complete Search
11.2.3 Using Randomness to Search for a Needle in a Haystack
11.3 Down the Recursive Rabbit Hole: Nested Cross-Validation
11.3.1 Cross-Validation, Redux
11.3.2 GridSearch as a Model
11.3.3 Cross-Validation Nested within Cross-Validation
11.3.4 Comments on Nested CV
11.4 Pipelines
11.4.1 A Simple Pipeline
11.4.2 A More Complex Pipeline
11.5 Pipelines and Tuning Together
11.6 EOC
11.6.1 Summary
11.6.2 Notes
11.6.3 Exercises
IV Adding Complexity

12 Combining Learners
12.1 Ensembles
12.2 Voting Ensembles
12.3 Bagging and Random Forests
12.3.1 Bootstrapping
12.3.2 From Bootstrapping to Bagging
12.3.3 Through the Random Forest
12.4 Boosting
12.4.1 Boosting Details
12.5 Comparing the Tree-Ensemble Methods
12.6 EOC
12.6.1 Summary
12.6.2 Notes
12.6.3 Exercises

13 Models That Engineer Features for Us
13.1 Feature Selection
13.1.1 Single-Step Filtering with Metric-Based Feature Selection
13.1.2 Model-Based Feature Selection
13.1.3 Integrating Feature Selection with a Learning Pipeline
13.2 Feature Construction with Kernels
13.2.1 A Kernel Motivator
13.2.2 Manual Kernel Methods
13.2.3 Kernel Methods and Kernel Options
13.2.4 Kernelized SVCs: SVMs
13.2.5 Take-Home Notes on SVM and an Example
13.3 Principal Components Analysis: An Unsupervised Technique
13.3.1 A Warm Up: Centering
13.3.2 Finding a Different Best Line
13.3.3 A First PCA
13.3.4 Under the Hood of PCA
13.3.5 A Finale: Comments on General PCA
13.3.6 Kernel PCA and Manifold Methods
13.4 EOC
13.4.1 Summary
13.4.2 Notes
13.4.3 Exercises

14 Feature Engineering for Domains: Domain-Specific Learning
14.1 Working with Text
14.1.1 Encoding Text
14.1.2 Example of Text Learning
14.2 Clustering
14.2.1 k-Means Clustering
14.3 Working with Images
14.3.1 Bag of Visual Words
14.3.2 Our Image Data
14.3.3 An End-to-End System
14.3.4 Complete Code of BoVW Transformer
14.4 EOC
14.4.1 Summary
14.4.2 Notes
14.4.3 Exercises

15 Connections, Extensions, and Further Directions
15.1 Optimization
15.2 Linear Regression from Raw Materials
15.2.1 A Graphical View of Linear Regression
15.3 Building Logistic Regression from Raw Materials
15.3.1 Logistic Regression with Zero-One Coding
15.3.2 Logistic Regression with Plus-One Minus-One Coding
15.3.3 A Graphical View of Logistic Regression
15.4 SVM from Raw Materials
15.5 Neural Networks
15.5.1 A NN View of Linear Regression
15.5.2 A NN View of Logistic Regression
15.5.3 Beyond Basic Neural Networks
15.6 Probabilistic Graphical Models
15.6.1 Sampling
15.6.2 A PGM View of Linear Regression
15.6.3 A PGM View of Logistic Regression
15.7 EOC
15.7.1 Summary
15.7.2 Notes
15.7.3 Exercises

In Part I, we establish a foundation. I’ll give you some verbal and conceptual introductions to machine learning in Chapter 1. In Chapter 2 we introduce and take a slightly different approach to some mathematical and computational topics that show up repeatedly in machine learning. Chapters 3 and 4 walk you through your first steps in building, training, and evaluating learning systems that classify examples (classifiers) and
quantify examples (regressors).

Part II shifts our focus to the most important aspect of applied machine learning systems: evaluating the success of our system in a realistic way. Chapter 5 talks about general evaluation techniques that will apply to all of our learning systems. Chapters 6 and 7 take those general techniques and add evaluation capabilities for classifiers and regressors.

Part III broadens our toolbox of learning techniques and fills out the components of a practical learning system. Chapters 8 and 9 give us additional classification and regression techniques. Chapter 10 describes feature engineering: how we smooth the edges of rough data into forms that we can use for learning. Chapter 11 shows how to chain multiple steps together as a single learner and how to tune a learner’s inner workings for better performance.

Part IV takes us beyond the basics and discusses more recent techniques that are driving machine learning forward.We look at learners that are made up of multiple little learners in Chapter 12. Chapter 13 discusses learning techniques that incorporate automated feature engineering. Chapter 14 is a wonderful capstone because it takes the techniques we describe throughout the book and applies them to two particularly interesting types of data: images and text. Chapter 15 both reviews many of the techniques we discuss and shows how they relate to more advanced learning architectures—neural networks and graphical models.

Our main focus is on the techniques of machine learning.We will investigate a number of learning algorithms and other processing methods along the way. However, completeness is not our goal. We’ll discuss the most common techniques and only glance briefly at the two large subareas of machine learning: graphical models and neural, or deep, networks. However, we will see how the techniques we focus on relate to these more advanced methods.

Another topic we won’t cover is implementing specific learning algorithms. We’ll build on top of the algorithms that are already available in scikit-learn and friends; we’ll create larger solutions using them as components. Still, someone has to implement the gears and cogs inside the black-box we funnel data into. If you are really interested in implementation aspects, you are in good company: I love them! Have all your friends buy a copy of this book, so I can argue I need to write a follow-up that dives into these lower-level details.

Mark Fenner, PhD, has been teaching computing and mathematics to adult audiences—from first-year college students to grizzled veterans of industry—since 1999. In that time, he has also done research in machine learning, bioinformatics, and computer security. His projects have addressed design, implementation, and performance of machine learning and numerical algorithms; security analysis of software repositories; learning
systems for user anomaly detection; probabilistic modeling of protein function; and analysis and visualization of ecological and microscopy data. He has a deep love of computing and mathematics, history, and adventure sports. When he is not actively engaged in writing, teaching, or coding, he can be found launching himself, with abandon, through the woods on his mountain bike or sipping a post-ride beer at a swimming hole. Mark holds a nidan rank in judo and is a certified Wilderness First Responder. He and his wife are graduates of Allegheny College and the University of Pittsburgh. Mark holds a PhD in computer science. He lives in northeastern Pennsylvania with his family and works through his company, Fenner Training and Consulting, LLC.

You can buy this book from online bookstores in the Internet such as Amazon, Barnes and Nobles, and others.

For any other IT Tutorial, you can check it here :

Cloud Computing : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-cloud.html
Web : https://bukutrainingns.blogspot.com/2020/02/kumpulan-tutorial-belajar-web.html
Server Hardware : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-server.html
Data Center : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-data-center.html
Veritas Backup Exec : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-veritas.html
Windows Server 2012R2 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows.html
Windows Server 2016 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows_6.html
Windows Server 2019 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows_19.html
Active Directory : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-active.html
Exchange Server 2013 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange.html
Exchange Server 2016 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange_9.html
Exchange Server 2019 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange_20.html
Linux Ubuntu : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-ubuntu.html
Linux RedHat : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-redhat.html
Linux CEntOS : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-centos.html
Cisco : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-cisco.html
Mikrotik : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-router.html
Hyper-V : https://bukutrainingns.blogspot.com/2019/12/belajar-hyper-v-kumpulan-tutorial.html
SQL Server 2014 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-sql-server.html
Jobs dan Career : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-karir-dunia-teknologi.html
Microsoft Office Word : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-microsoft.html
VMWare VSphere : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-vmware-vsphere.html

For any other IT Certification, you can check it here :
CompTIA : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi.html
Cisco : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_8.html
Oracle : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_9.html
Microsoft : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_10.html
MikroTik : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_11.html
VMWare : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_12.html
FortiNet : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_16.html
EC Council : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_17.html
Juniper : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_22.html
RedHat : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-sertifikasi-linux.html

For IT Tutorial visit here:

https://bukutrainingns.blogspot.com/

For IT Tutorial video watch here:

https://www.youtube.com/c/NanangSadikinOfficial

See you again.

Regards

Nanang

Book Review : Implementing and Administering Cisco Solution

September 1, 2021

If you are Network Engineer and want to read about Cisco CCNA Certification, check it out this book:

Title : Implementing and Administering Cisco Solutions: 200-301 CCNA Exam Guide
Author : Glen D. Singh
ISBN-10 ‏ :‎ 180020809X
ISBN-13 ‏ : 978-1800208094
Publisher : Packt
Pages : 764
Year : 2020

Here is the details of this book.

Chapter 1: Introduction to Networking
Understanding the evolution of networking and the internet
Understanding network sizes – SOHO, LAN, and WAN
Learning about network protocol suites
OSI reference model
Understanding the TCP/IP protocol suite
Understanding the functions of network devices
Hubs
Layer 2 switches
Layer 3 switches
Routers
Next-generation firewalls and IPS
Access Points
Cisco Wireless LAN Controller (WLC)
Endpoints and servers
Cisco DNA
Network topology architectures
2 Tier
3 Tier

Chapter 2: Getting Started with Cisco IOS Devices
Technical requirements
Building a Cisco lab environment
Cisco Packet Tracer
Virtual CCNA Lab
Physical labs
Getting started with Cisco IOS devices
Boot process
Accessing a Cisco IOS device
Configuring the Cisco IOS
Setting up a small Cisco network
Performing troubleshooting procedures

Chapter 3: IP Addressing and Subnetting
Technical requirements
The need for IP addressing
Characteristics of IPv4
Composition of an IPv4 packet
Converting binary into decimal
Converting decimal into binary
Transmission types
Classes of IPv4 addresses
Public IPv4 address space
Private IPv4 address space
Special IPv4 addresses
Loopback address
Test-Net
Link Local
Subnet mask
Network prefix
Identifying the Network ID
Subnetting
Step 1 – Determining the appropriate IP address
Step 2 – Creating new subnets (subnetworks)
Step 3 – Assigning subnets to each network
Step 4 – Performing Variable-Length Subnet
Masking (VLSM)
IPv6
Types of IPv6 addresses
Lab – Configuring IPv6 on a Cisco IOS router
Lab – Configuring IPv6 on a Windows computer
Testing end-to-end connectivity

Chapter 4: Detecting Physical Issues, Wireless Architectures, and Virtualization
Technical requirements
Understanding network switch functions
Detecting physical issues
Wireless technologies
2.4 GHz versus 5 GHz
Wireless bands
SSID, BSSID, and ESS
Cisco wireless architectures
Autonomous
Cloud-based
Split-MAC
AP modes
Wireless components and management
Lab – accessing a Cisco WLC GUI
Lab – configuring a wireless network using a Cisco WLC
Virtualization fundamentals
Type 1 hypervisor
Type 2 hypervisor
Cloud computing
Cloud services
SaaS
PaaS
IaaS
Cloud delivery models
Summary
Questions
Further reading

Chapter 5: Implementing VLANs, Layer 2
Discovery Protocols, and EtherChannels
Technical requirements
Understanding VLANs
VLAN ranges
Types of VLANs
Trunk interfaces
Inter-VLAN routing
Lab – implementing VLANs
Lab – creating trunk interfaces
Lab – configuring inter-VLAN routing
Layer 2 Discovery Protocols
Cisco Discovery Protocol (CDP)
Link-Layer Discovery Protocol (LLDP)
Understanding and configuring EtherChannels
Lab – implementing EtherChannels
Summary
Questions
Further reading

Chapter 6: Understanding and Configuring Spanning-Tree
Technical requirements
What is Spanning-Tree Protocol?
Bridge Protocol Data Unit
Root bridge and secondary root bridge
Spanning-tree standards
Port roles and states
Determining the root bridge and port roles
PVST+
Rapid-PVST+
Lab – implementing Rapid-PVST+ on a Cisco network
Lab – configuring PortFast and BPDUguard

Chapter 7: Interpreting Routing
Components
Technical requirements
Understanding IP routing
Components of the routing table
Routing protocol codes
Prefix and network mask
Next hop
Administrative Distance
Routing metrics
Gateway of last resort
Summary
Questions
Further reading

Chapter 8: Understanding First Hop
Redundancy, Static and Dynamic Routing
Technical requirements
Understanding static routing
Do we need static routing?
Types of static routes
Lab – configuring static routing using IPv4
Lab – configuring an IPv4 default route
Lab – configuring static routing using IPv6
Understanding dynamic routing
Types of dynamic routing protocols
Open Shortest Path First
Lab – configuring OSPFv2
Validating OSPF configurations
Understanding first hop redundancy
Various FHRPs
Summary
Questions
Further reading
Section 4: IP Services

Chapter 9: Configuring Network Address
Translation (NAT)
Technical requirements
The challenge of using IPv4 on the internet
Understanding NAT
Understanding NAT operation and terminology
Types of NAT
Static NAT
Dynamic NAT
Configuring PAT
Lab – implementing NAT overload (PAT)
Lab – implementing static NAT with port forwarding
Lab – implementing dynamic NAT
Summary
Questions
Further reading

Chapter 10: Implementing Network
Services and IP Operations
Technical requirements
Understanding NTP
Lab – configuring NTP
Understanding DHCP
DHCP operations
Cisco’s DHCP configurations
DHCP relay
Lab – configuring DHCP and DHCP relay
Domain Name System
DNS root servers
DNS record types
Lab – configuring DNS
Understanding the benefits of using Syslog
Syslog severity levels
Lab – configuring Syslog
Simple Network Management Protocol
SNMP versions
Management information base
Lab – configuring SNMP
QoS traffic classification
QoS terminologies
Traffic type characteristics
QoS queuing algorithms
QoS policy models
QoS implementation methods
Summary
Questions
Further reading

Section 5: Security Fundamentals

Chapter 11: Exploring Network Security
Technical requirements
Security concepts
The CIA triad
Threats
Vulnerabilities
Exploits
Attacks
Authentication, Authorization, and Accounting
Lab – Implementing AAA
Elements of a security program
Wireshark 101
Lab – Analyzing packets

Chapter 12: Configuring Device Access
Control and VPNs
Technical requirements
Device access control
Securing console access
Securing an AUX line
VTY line access
Securing Privilege Exec mode
Encrypting all plaintext passwords
Virtual Private Networks
Site-to-Site VPNs
Remote access VPNs
IPsec
Lab – Configuring a site-to-site VPN
Lab – Configuring a remote access VPN

Chapter 13: Implementing Access Control Lists
Technical requirements
What are ACLs?
Benefits of using ACLs
ACL operation
ACL wildcard masks
Calculating the wildcard mask
ACL guidelines and best practices
Working with standard ACLs
Creating a numbered standard ACL
Implementing a named standard ACL
Deleting an ACL
Lab – implementing a standard numbered ACL
Lab – configuring a standard named ACL
Lab – securing VTY lines using ACLs
Working with extended ACLs
Creating a numbered extended ACL
Implementing a named extended ACL
Lab – implementing extended ACLs

Chapter 14: Implementing Layer 2 and Wireless Security
Technical requirements
Types of Layer 2 attacks on a network
Network attacks
Defense in depth
Layer 2 threats
Protecting against Layer 2 threats
Port security
DHCP snooping
Dynamic ARP inspection
Wireless network security
Authentication methods
Lab – implementing wireless security using a WLC

Chapter 15: Network Automation and
Programmability Techniques
Understanding automation
Understanding data formats
eXtensible Markup Language
JavaScript Object Notation
YAML Ain’t Markup Language
Understanding APIs
Types of APIs
RESTful APIs
Understanding network configuration
management
Fabric, overlay, and underlay
Cisco DNA Center

Chapter 16: Mock Exam 1

Chapter 17: Mock Exam 2

This book contains 17 Chapters. What this book covers. Chapter 1, Introduction to Networking, introduces various network protocols, devices, and components, and network topology architectures. Chapter 2, Getting Started with Cisco IOS Devices, introduces Cisco Internetwork Operating System (Cisco IOS). You will learn how to access the device, perform initial configurations, and learn how to verify the device’s settings. Additionally, you will learn how to build your personal learning environment to reduce your expenditure in terms of purchasing expensive equipment. Chapter 3, IP Addressing and Subnetting, covers different classes of IP addresses and their assignments. The second half of the chapter will teach you how to use subnetting to break down a large network into smaller subnetworks. Chapter 4, Detecting Physical Issues, Wireless Architectures, and Virtualization, covers various Layer 1 issues and takes a deep dive into understanding Cisco Wireless Architectures and deployment models. Additionally, this chapter covers the concept of virtualization and virtual machines. Chapter 5, Implementing VLANs, Layer 2 Discovery Protocols, and EtherChannels, introduces you to Virtual Local Area Networks (VLANs), configuring and troubleshooting VLANs on a Cisco network, setting up interswitch connectivity by configuring Trunk links, and configuring inter-VLAN routing to allow multiple VLANs to inter-communicate. Additionally, you will learn how to use various Layer 2 discovery protocols to map devices on a network and use EtherChannels to perform link aggregation.

Chapter 6, Understanding and Configuring Spanning-Tree, covers the importance of designing a proper switch network showing devices should be interconnected to ensure redundancy. Furthermore, the chapter introduces you to a Layer 2 loop prevention mechanism known as the Spanning-Tree Protocol (STP). You will learn about the operations, configurations, and troubleshooting of STP in a Cisco environment. Chapter 7, Interpreting Routing Components, focuses on the importance of routing and discusses how routers make their forwarding decisions. You will learn all about the components of the routing table and the factors that help a router to choose a preferred path for forwarding packets to their destination. Chapter 8, Understanding First Hop Redundancy, Static and Dynamic Routing, continues the discussion on routing but takes a more technical approach, such as
demonstrating how to implement static and dynamic routing protocols to ensure IP connectivity between multiple networks in a Cisco environment. Chapter 9, Configuring Network Address Translation (NAT), focuses primarily
on Network Address Translation (NAT). The chapter will take you from an introduction to use cases onto the configuration of various types of NAT and troubleshooting techniques. Chapter 10, Implementing Network Services and IP Operations, introduces you to various network and IP services that are required on almost all enterprise
networks and are required knowledge for network engineers. This chapter covers technologies such as NTP, DHCP, DNS, Syslog, and QoS. Chapter 11, Exploring Network Security, discusses various topics, such as
cybersecurity threats and issues many professionals face each day, such as threats, vulnerabilities, exploits, user training, security awareness, and countermeasures.

Chapter 12, Configuring Device Access Control and VPNs, focuses on securing your Cisco switches and routers and configuring secure device access. Additionally, this chapter introduces you to remote access and how to configure Virtual Private Networks (VPNs). Chapter 13, Implementing Access Control Lists, covers ACLs, which are a mandatory topic for everyone who is starting or is already in the field of networks or security. ACLs are Layer 3 security controls. When implemented on a route, they create a firewall-centric device to filter unwanted traffic. Chapter 14, Implementing Layer 2 and Wireless Security, introduces you to various Layer 2 attacks on an enterprise network and explains how to implement countermeasures to create a secure network environment.
Chapter 15, Network Automation and Programmability Techniques, broaches the fact that the world of networking is moving toward automation and network engineers will now need to learn how automation can improve efficiency in network deployment and management. This chapter introduces you to network automation techniques and programmability.

Chapter 16, Mock Exam 1, includes a simple mock test containing questions that will help you to prepare for the Cisco CCNA 200-301 examination and will help you identify any topics you need to spend additional time learning about and practicing. Chapter 17, Mock Exam 2, includes another mock test containing questions that will help you to prepare for the Cisco CCNA 200-301 examination and will help you identify any topics you need to spend additional time learning about and practicing.

Glen D. Singh is a cybersecurity and networking instructor, InfoSec author, and consultant. His areas of expertise are penetration testing, digital forensics, network security, and enterprise networking. He has many certifications, including CEH, CHFI, and 3xCCNA (cyber ops, security, and routing and switching). He loves teaching and mentoring others, and sharing his wealth of knowledge and experience as an author. He has written books on Kali Linux, Kali NetHunter, and CCNA Security. Glen has trained many professionals in various sectors ranging from ISPs to government agencies in the field of cybersecurity. As an aspiring game-changer,
Glen is passionate about increasing cybersecurity awareness in his homeland, Trinidad and Tobago.

You can buy this book from online bookstores in the Internet such as Amazon, Barnes and Nobles, and others.

For any other IT Tutorial, you can check it here :

Cloud Computing : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-cloud.html
Web : https://bukutrainingns.blogspot.com/2020/02/kumpulan-tutorial-belajar-web.html
Server Hardware : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-server.html
Data Center : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-data-center.html
Veritas Backup Exec : https://bukutrainingns.blogspot.com/2020/01/kumpulan-tutorial-belajar-veritas.html
Windows Server 2012R2 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows.html
Windows Server 2016 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows_6.html
Windows Server 2019 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-windows_19.html
Active Directory : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-active.html
Exchange Server 2013 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange.html
Exchange Server 2016 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange_9.html
Exchange Server 2019 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-exchange_20.html
Linux Ubuntu : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-ubuntu.html
Linux RedHat : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-redhat.html
Linux CEntOS : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-linux-centos.html
Cisco : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-cisco.html
Mikrotik : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-router.html
Hyper-V : https://bukutrainingns.blogspot.com/2019/12/belajar-hyper-v-kumpulan-tutorial.html
SQL Server 2014 : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-sql-server.html
Jobs dan Career : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-karir-dunia-teknologi.html
Microsoft Office Word : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-microsoft.html
VMWare VSphere : https://bukutrainingns.blogspot.com/2019/12/kumpulan-tutorial-belajar-vmware-vsphere.html

For any other IT Certification, you can check it here :
CompTIA : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi.html
Cisco : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_8.html
Oracle : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_9.html
Microsoft : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_10.html
MikroTik : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_11.html
VMWare : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_12.html
FortiNet : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_16.html
EC Council : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_17.html
Juniper : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-belajar-sertifikasi_22.html
RedHat : https://bukutrainingns.blogspot.com/2020/06/kumpulan-tutorial-sertifikasi-linux.html

For IT Tutorial visit here:

https://bukutrainingns.blogspot.com/

For IT Tutorial video watch here:

https://www.youtube.com/c/NanangSadikinOfficial

See you again.

Regards

Nanang