Mohamed Abdalla Ibrahim's Blog

Mohamed Abdalla Ibrahim's Blog

Follow
homebadges
How to deploy a Win-32 app with Microsoft Intune

How to deploy a Win-32 app with Microsoft Intune

How to deploy a Win-32 app with Microsoft Intune **Before we start our deployment process, we must prepare the installation file using the Microsoft Win32 tool as the following snaps: ** 1 –Download Microsoft Win32 Content Prep Tool from Microsoft: h...

Mohamed Abdalla Ibrahim
Mohamed Abdalla Ibrahim

2 min read

Keeping Your Azure Cloud Safe: Best Practices for Securing Resources (3. Apply system updates)

Keeping Your Azure Cloud Safe: Best Practices for Securing Resources (3. Apply system updates)

Mohamed Abdalla Ibrahim
Mohamed Abdalla Ibrahim

4 min read

Keeping Your Azure Cloud Safe: Best Practices for Securing Resources (2 .Secure management ports)

Keeping Your Azure Cloud Safe: Best Practices for Securing Resources (2 .Secure management ports)

Mohamed Abdalla Ibrahim
Mohamed Abdalla Ibrahim

5 min read

Keeping Your Azure Cloud Safe: Best Practices for Securing Resources (1 .MFA)

Keeping Your Azure Cloud Safe: Best Practices for Securing Resources (1 .MFA)

Mohamed Abdalla Ibrahim

4 min read

The Benefits of Using Chat.openai in Ethical Hacking

The Benefits of Using Chat.openai in Ethical Hacking

Mohamed Abdalla Ibrahim

2 min read

Splunk Basics

Splunk Basics

Mohamed Abdalla Ibrahim

4 min read

Security & Risk Management

Security & Risk Management

Mohamed Abdalla Ibrahim

23 min read

CYBER SECURITY (Penetration Testing Prerequisites) 1.9 DNS

CYBER SECURITY (Penetration Testing Prerequisites) 1.9 DNS

Mohamed Abdalla Ibrahim

3 min read

Microsoft 365 Defender

Microsoft 365 Defender

Mohamed Abdalla Ibrahim

4 min read

Microsoft Azure Fundamentals AZ-900

Microsoft Azure Fundamentals AZ-900

Mohamed Abdalla Ibrahim

15 min read

Chief Information Security Officer (CISO) responsibilities

Chief Information Security Officer (CISO) responsibilities

Mohamed Abdalla Ibrahim

4 min read

CYBER SECURITY (Penetration Testing Prerequisites) 1.8 Firewall and Network defense

CYBER SECURITY (Penetration Testing Prerequisites) 1.8 Firewall and Network defense

Mohamed Abdalla Ibrahim

4 min read