Quantcast
Channel: K Alliance Blog
Browsing latest articles
Browse All 147 View Live

Image may be NSFW.
Clik here to view.

Configuring and Using MailTips in Exchange 2013

In this demonstration we are going to look at configuring, and using, the MailTips feature that we have here in Exchange 2013. Actually let’s start here over in the shell. We’ll go get organization...

View Article



Image may be NSFW.
Clik here to view.

Configuring Claims Provider and Relying Party Trusts in Windows Server 2012

In this brief demo, I wanna show you how you can configure an ADFS, the claims provider trusts, and the relying party trusts. Let’s bring up, in server manager. Now that we’ve installed ADFS that we...

View Article

Image may be NSFW.
Clik here to view.

Configuring NLB Affinity and Port Rules in Windows Server 2012

In this brief demo I want to show you how you can configure port rules in your NLB cluster. So once you’ve configured a cluster, you’ve added servers into there, we can define which ports are going to...

View Article

Image may be NSFW.
Clik here to view.

Examining Transport Components in Exchange Server 2013

So now, let’s take a graphical look at the various transport components that we have in Exchange 2013. I pulled up a good image here from Microsoft that can help us to see this. This is an...

View Article

Image may be NSFW.
Clik here to view.

Configuring Domain Security in Exchange Server 2013

Let’s walk through that configuration of domain security that we’ve been talking about. We’re going to go into the EAC. Of course here is where we would configure the certificates, do the initial...

View Article


Image may be NSFW.
Clik here to view.

Leading the Future for the Cloud Security Profession

David Shearer: I’m here with Jim Reavis, Cloud Security Alliance, the Chief Executive Officer there. It’s very obvious from this conversation that Jim’s a deep thought leader on this topic, and I...

View Article

Image may be NSFW.
Clik here to view.

The Need for HCISPPs

Hord Tripton: After a long period of deliberation and research into the health care industry, and with a great number of health care professionals and organizations, it came to us that it was actually...

View Article

Image may be NSFW.
Clik here to view.

Ask (ISC)² about SSCP

Graham: The difference is that the CISSP is a management level, top-down view. It looks at security across the entire environment. It takes in all aspects of security. The SSEP is a bottom-up approach....

View Article


Image may be NSFW.
Clik here to view.

Certified Ethical Hacker Version 7

Hello. I am EC-Council Master Instructor, Eric Reed, and I am stoked to be bringing you CEH version 7. We’ve been waiting for this course for quite a while, and let me tell you, it was worth the wait....

View Article


Image may be NSFW.
Clik here to view.

Introduction to CompTIA SY0-401 Security+ Certification

Hello, everyone. Welcome to Professor Messer’s CompTIA SY0-401 Security+ training course. I’m James Messer, and I’ll be your host through all of these videos that we’ve made available for you –...

View Article
Browsing latest articles
Browse All 147 View Live


Latest Images