Skip to content

Stephen Hackers Blog

Infrastructure & Cyber Security Technical Architect

  • Home
  • Stephen Hackers

Category Technology U.G

  • Home
  • Archive by category "Technology U.G"
30/04/2018

Email Phishing

By Steve in Technology U.G

Phishing email will contain a link to a web site, typically to get the user to launch an action or input some details...... For more information and live example demos, join…

Read More

05/08/2017

Bulk Virtual Machines Deployment and Zero Clicks Part 1

By Steve in Automation, ESXi, PowerCli, Powershell, Technology U.G, vCenter, VMware Tag Automate, Automation, Bulk task, Bulk Virtual Machines, CSV, PowerCli, PowerShell, vExpert, Virtual Machine, vSphere

A recent project revisited deploying virtual machines via PowerCli. Its fair to say this isn’t a new tool but sometimes over looked. Part 1 /  Part 2 My requirements were…

Read More

17/12/2015

TechUG Newcastle – 22nd September 2016- Time: 09:00 – 16:30

By Steve in Technology U.G

Technology User Group - Newcastle "As an industry leader of user groups, we hold many local events throughout the year to create a buzzing community where like-minded IT professionals can…

Read More

Recent Posts

  • Safeguarding Your Business: Combating EvilGinx and MFA Bypass with Conditional Access Phishing Resistance
  • Mastering Microsoft’s SC-400 Exam: Your Ultimate Guide
  • Navigating the SC-200 Exam: Your Comprehensive Guide
  • Get ACL Permissions for a specific OU
  • Query Active Directory – Security Script
  • Purview – eDiscovery, and Investigations – How to guide
  • EoL Software, Cyber Security, or a Business Issue?
  • Microsoft SC-200 Security Operations Analyst – Study Notes
  • Import Reg Key To Remote Computer
  • NIST Cyber Security Professional.. things to remember
  • Setup a Microsoft 365 Developer subscription with E5 License – 90 days Rolling
  • Join the Developer 365 Program – Includes E5 License – 90 days Rolling
  • Azure Conditional Access Integration with Google Chrome
  • Block Downloads In MS TEAMS Thick Client For Non Managed Computers
  • Block Access From Unmanaged Devices To SharePoint or Specific Sites

Categories

VMware vExpert Security 2020

Microsoft Certified Azure Security Engineer Associate

VMware vExpert (5 years)

Certified Ethical Hacker

Microsoft Certified Azure Administrator Associate

VMware vExpert 2020

MCP 365 Mobility and Security

Symantec Certified Specialist

MCP 365 Identity and Services