Skip to content
  • Home
  • Blog
  • Network Wizkid Services
  • Tech Dialogue Podcast
  • About
  • Contact
  • Study
    • Register
    • My Dashboard
    • All Courses
    • Downloadable Content
    • Become an Instructor
    • My Account
  • Toggle website search
Menu Close
  • Home
  • Blog
  • Network Wizkid Services
  • Tech Dialogue Podcast
  • About
  • Contact
  • Study
    • Register
    • My Dashboard
    • All Courses
    • Downloadable Content
    • Become an Instructor
    • My Account
  • Toggle website search
Read more about the article Microsoft Identity Access Management Options for Cloud and Hybrid Deployments
Kelvin / Microsoft Azure / Technical Articles / Windows Server OS

Microsoft Identity Access Management Options for Cloud and Hybrid Deployments

I engage in numerous conversations with customers on a daily basis, a significant majority of whom currently possess a hybrid infrastructure. While that is great, hybrid approaches also introduce the…

0 Comments
21/07/2023
Read more about the article Quantitative Risk Analysis Examples & Exercises
ISC2 / Kelvin / Technical Articles

Quantitative Risk Analysis Examples & Exercises

Change Log LogDateAdded cost/benefit analysis example updates and also added a cost/benefit analysis exercise17/04/23Added definitions for 'safeguards' and 'countermeasures' and included links for reference17/04/23Added more examples12/05/23 NoteThe word Safeguard and…

0 Comments
14/04/2023
Read more about the article Why Educational Institutes Should Leverage Passwordless Authentication
Cisco / Duo / Kelvin / Technical Articles

Why Educational Institutes Should Leverage Passwordless Authentication

Educational institutes play a fundamental part in society and produce assist in producing the great minds of the future. From Nursery right the way through to University, these educational institutes…

0 Comments
12/04/2023
Read more about the article Demultiplexing and How It Works
General Networking / Technical Articles

Demultiplexing and How It Works

In this article I will explain demultiplexing and how it works by walking through a .pcap file taken from the lab in the screenshot below. We will focus on the data…

0 Comments
03/01/2017
Read more about the article Overview of the CIA Triad
General Cybersecurity / Kelvin / Technical Articles

Overview of the CIA Triad

C.I.A: Important letters in the world of information security and you will find it in many books and articles when studying for certifications. So what is the CIA triad and…

0 Comments
29/12/2016
Read more about the article Lightning Talk: UTM’s
General Cybersecurity / General Firewalls / Kelvin / Technical Articles

Lightning Talk: UTM’s

Earlier this week I delivered a presentation about UTM's to businesses on the Isle of Man. This lightning presentation was aimed to give a brief overview of Unified Threat Management…

0 Comments
03/12/2016
Read more about the article Exploring DHCP Requests
Kelvin / Technical Articles / Training

Exploring DHCP Requests

In this article I would like to explore DHCP requests so that we can understand what happens when a device sends a request to a DHCP server. Lets start by listing…

0 Comments
25/08/2015
×
0
YOUR CART
  • No products in the cart.
Subtotal:
£0.00
CHECKOUT
BEST SELLING PRODUCTS
Network Wizkids CCIE Security Lab Tracker
Network Wizkids CCIE Security Lab Tracker
£0.00
Network Wizkids CCIE Security v6.1 Lab Tracker
Network Wizkids CCIE Security v6.1 Lab Tracker
£1.99
Weekly, Monthly & Yearly Goals Tracker
Weekly, Monthly & Yearly Goals Tracker
£0.00
Cisco Umbrella Deep Dive Course
Cisco Umbrella Deep Dive Course
£54.99
802.1X .PCAP Files
802.1X .PCAP Files
£0.00
 

Loading Comments...