Categories

About-Updates

  • What is next in 2023

    In my previous post, I provided a review of 2022 with my professional, personal, and community accomplishments https://captainhyperscaler.github.io/about-updates/2022/12/23/the-year-in-review-twenty-two/.

    In this post, I want to share with you a preview of what to expect in 2023.

    This will include what my goals are professionally, personally, and within the community in 2023. Let’s start with professional goals.

    2023 Professional goals

    In...

  • The Year in Review for 2022

    In this post, I want to share with you a review of accomplishments for 2022 and a preview of what to expect in 2023.

    This will include what took place professionally, personally, and within the community in 2022. In a follow-up post, I will close out the year with some things to come in 2023 in these same areas.

    2022...

  • 2022 - The Year So Far

    We are a third of the way through 2022, so I thought that I’d post an update on what has been going on with me in the community and what is still to come in 2022.

    Let’s take a look at some of the progress from what I expected to be doing at the end of 2021.

    • More video...
  • Migration Complete to GitHub pages from WordPress

    Migration Complete to GitHub pages from WordPress

    Today, I tore off the band aid and redirected http://captainhyperscaler.com to GitHub pages: https://captainhyperscaler.github.io

    I had begun to publish my new blog posts to the GitHub pages site over the last 30 days, but had yet to re-direct to the new site. Mainly because I do still have some formatting on some of...

  • Identity and Access Administrator Associate Exam Prep book information

    Identity and Access Administrator Associate Exam Prep book information

    As I mentioned in my previous post “Becoming an author”, I recently completed my first published book with the Microsoft Identity and Access Administrator Associate (SC-300) exam preparation guide.

    This has been an amazing, yet time consuming experience. I see why people write books because it becomes...

  • Becoming an Author - My Experience

    Becoming an Author - My Experience

    Over the past 12 months, I have had the privilege of working on two certification guides for Packt Publishing.

    The books that I have been authoring are the Microsoft Identity and Access Administrator Associate (SC-300) exam preparation guide and the Microsoft Security Compliance and Identity Fundamentals (SC-900) exam preparation guide.

    My experience started with...

  • 2021 in review. What's in store for 2022

    As 2021 comes to a close, I always like to look back to my successes and challenges from the previous year and look ahead at what is next.

    Here are some of my accomplishments in 2021:

    1. Certifications
    • Microsoft Azure Data Engineer Associate
    • Microsoft Security Compliance and Identity Fundamentals
    • Microsoft Information Protection Associate
    • Microsoft Identity and Access Administrator...
  • Your Brand...Does it help?

    Many of us out on social media create our own brand or “handle” that they use for Twitter and/or blog sites. I, myself, took that step in the fall of 2019 with the creation of Captain Hyper-scaler. It started with this blog site and as the past 18 months...

  • 2021...Let's make some Goals

    2020 was challenging in many ways to many. I’m not going to dwell on that, but I do wish anyone reading this continued health, happiness, and safety to them and their families.

    As I summarized in my last post 2020…a reflection, the year was personally and professionally fulfilling for...

  • 2020...a reflection

    Image result for the year 2020

    At the beginning of the year, I documented within a post my goals for growth in 2020: … 2020 a Year for Growth. Going back and reading that post was interesting. I didn’t necessarily accomplish everything that was laid out within that plan, but it...

  • 2020 - My First Microsoft MVP Award

    Today I was awarded my very first Microsoft MVP award. I am very honored to receive this award and it has been quite a journey the past 18 months, give or take. I have seen many others post their experience getting to this point in their journey, so I would like to...
  • AzureHeroes An Honor to be Recognized, and a Great Way to Recognize Others

    Microsoft has always been great at recognizing those community members that provided value through the Microsoft MVP program. This program is amazing, and a way for Microsoft employees and MVPs to nominate those contributors that stand out within the community.

    For those individuals that are not in one of these two categories, there...

  • 2019 Year in Review...

    After taking a couple of weeks off, I am back, refreshed, and ready for 2020. The past year for me had some very dramatic changes along with creating a tremendous amount of growth and opportunity. I hope that you find the following recap of some of the key professional developments...

  • More About Me

    As I mentioned in my Welcome post, I think of myself as a life-long learner. I have always continued to educate myself in the latest technologies and attempted to gain the most valid certifications. This has included obtaining my Master’s Degree in Business Information Technology, PMP certification, CISSP certification, AWS, and numerous Azure certifications. The latest list of certifications...

  • Welcome! The Journey Begins

    Thanks for joining me! Welcome to my blog. I want this to be a place for knowledge, understanding, and learning.

    Please subscribe and provide your feedback.

    “Good company in a journey makes the way seem shorter.” — Izaak Walton

    post

    Hello, my name is Dwayne.

    I have been dubbed “Captain Hyperscaler” by some...


Certifications


Technical

  • Common Challenges to MFA Adoption and Enforcing Protection With Conditional Access

    Modern authentication utilizing Identity Providers within the cloud creates a unique set of challenges. The most apparent of these is that users are utilizing their personal or work email addresses across multiple websites and applications on the public Internet. This is generally done without a complete understanding of where these identities are stored and who has access to them.

    In...

  • How to Achieve Zero Trust Identity Protection with Microsoft Entra

    Apply Zero Trust to Identity When you apply Zero Trust to your identity and access management strategy, you should have a plan in place. This planning includes the deployment objectives, federation with multi-cloud and on-premises identity providers and systems, applying policies for conditional access, and security operations that will remediate issues and review analytics for gaps in controls.

    Let’s review...

  • How to Protect Multi-Cloud Identities with Zero Trust in Microsoft 365

    The traditional way of securing identities does not provide the business agility, user experiences, and protections needed for a rapidly-evolving digital estate. Many organizations are implementing Zero Trust to alleviate these challenges and enable the new normal of working anywhere, with anyone, at any time.

    However, the expanded ecosystem of remote users with multiple devices creates more attack surfaces to...

  • 5 Common Pitfalls of Migrating to a Cloud-Only Environment

    From the moment that a company makes a business decision to no longer contribute to leases on large and expensive data centers, the plan to migrate and modernize begins. The process of exiting a data center is not one without challenges, however. Most companies require outside assistance from a service provider that specializes in cloud adoption.

    Whether the company is...

  • Five Strategies and Microsoft Solutions that Protect Against Ransomware Attacks

    Five Strategies and Microsoft Solutions that Protect Against Ransomware Attacks

    Ransomware has been in the news too frequently. In this article, “Five Strategies and Microsoft Solutions that Protect Against Ransomware Attacks,” we will address five (5) areas of focus that can decrease the attack surface and make it more difficult for an attacker to gain elevated privileges and take over...

  • Security Operations on Google Cloud Platform

    Security Operations on Google Cloud Platform

    Cybersecurity attacks continue to make headlines in the news. Our personal and business information is located on many different platforms over the cloud. Protecting this information from ransomware, brute force, injection, and man-in-the-middle attacks through proactive hunting, recognition, and resolution are paramount.

    With Google’s announcement of the Siemplify acquisition, Google has strengthened their position...

  • Gimme Shelter Part 2 - M365 Security

    Gimme Shelter Part 2…M365 Security

    This is a continuation of the two (2) part security series titled “Gimme Shelter”. The importance of securing your cloud and hybrid resources never decreases.

    Part 1 of this series concluded on Friday, January 29 with Azure Sentinel, Part 1. The episodes in this series focused on Azure security services, technologies,...

  • Breaking down the Azure Network "Chains" YouTube series

    On Friday, August 7, 2020, I am launching a video series focusing on Azure Networking. On Friday of each week, a new video will be posted in the playlist as I build out descriptions of the Azure network services.

    The list of services and premiere dates and times are provided here....

  • 5 Things that I learned about a Windows Virtual Desktop deployment in Azure

    Back in April, I attended a presentation that explained the architecture. I thought that the ability to leverage your M365 subscription along with the Azure infrastructure was interesting, but the deployment did not, at the time, differentiate itself from a more mature Citrix VDI architecture. This perspective changed this...

  • Skylines blog 3 - Security Center alerts and automation workflows

    Microsoft Azure has a wide range of services built into their cloud ecosystem. These services provide the ability to monitor resources, create and set policies, and identify and mitigate threats within not only the Azure infrastructure, but also to external resources for a consistent security posture across an organization. In the first...

  • Secure Best Practices - Keeping data secure in the public cloud

    I have created a video presentation of the break-out session that I was scheduled to present at Ignite the Tour - Chicago on April 16, 2020. As you know, this was cancelled due to the Covid-19 pandemic, but still wanted to share this information with you.

    Please visit my YouTube page to access this video, and feel free to subscribe...

  • Azure Sentinel Expert Talk

    Thank you for everyone that attended my Virtual Live Expert Talk on Azure Sentinel on April 1, 2020.

    The slides for this presentation can be accessed at this LINK. Skill Me Up is creating on-demand videos of the Expert Talks on their website, so this talk will be available...

  • AZURE SECURITY PART 2 - UNDERSTANDING AZURE POLICIES

    WHAT DOES AZURE PROVIDE FOR SECURITY?

    Microsoft Azure has a wide range of services built into their cloud ecosystem. These services provide the ability to monitor resources, create and set policies, and identify and mitigate threats within not only the Azure infrastructure, but also to external resources for a consistent security posture...

  • 5 CONSIDERATIONS FOR CLOUD TRANSFORMATION

    You are a CIO/IT Director and your CFO has informed you that the organization wants to decrease the amount of capital investment in hardware, software, and real estate required in running data centers. The CFO wants you to transform these capital expenses into operating expenses and show a significant shift in next...

  • 5 PREDICTIONS ON THE FUTURE OF CLOUD USAGE

    The Cloud continues to evolve, and the only constant is how it is ever-changing. How do organizations keep up and make the most out of cloud usage? Where are the key drivers and areas of immediate benefit when adopting a cloud usage model?

    Here are five predictions for the future of cloud...

  • PREPARING FOR THE AZ-500 - AZURE SECURITY ENGINEER ASSOCIATE

    Skylines Academy Approach

    About the AZ-500 and Azure Security Engineer Associate Badge

    Within the Azure cloud infrastructure certifications, there are varying tracks that can be taken depending upon your role or interest.

    Security Engineer Associate is one of those tracks.

    The Security Engineer Associate certification is obtained through passing of a...

  • Demystifying Cloud Platform Services

    Kubernetes, Containers, WebApps, App Services, Docker, DevOps, CI/CD, NoSQL, Cognitive Services, Bot Services, Micro-Services, Serverless computing, etc. The list goes on and on and on when it comes to the number of platform-based services that are available in Azure and other public cloud providers. In this article, I am...


Community


Business

  • PUBLIC CLOUD COST OPTIMIZATION STRATEGIES

    You are an IT Director that is building a case to upper management to move data center resources to a public cloud infrastructure. However, when you looked at the costs associated with moving your current servers, databases, and storage environments, the return on investment did not make the impact that you expected...

  • 4 WAYS A MULTI-CLOUD STRATEGY CAN SHAPE AN ORGANIZATION

    You are a CIO/CTO who has been told that the organization needs to evaluate current infrastructure costs and how to maximize applications availability for your user. As you think about your long-term strategy, the benefits of moving to a cloud infrastructure to decrease capital expenses seem to be a potential option, but...

  • 5 BENEFITS OF USING A CSP FOR MICROSOFT® CLOUD CONSUMPTION

    Your enterprise is building a roadmap to move applications to Microsoft® cloud services, both M365 and Azure. How will you determine whether to utilize an existing (or new) Enterprise Agreement (EA) for licenses, or purchase through a Cloud Solutions Provider (CSP)? This blog provides some questions to ask yourself along with some...


Amazon-Web-Services

  • Architecting an AWS Zero Trust Framework

    Architecting an AWS Zero Trust Framework

    In this article, you will be provided with guidance toward architecting a Zero Trust Framework within your Amazon Web Services (AWS) infrastructure. This will include areas of focus for identity, networking, devices, applications, and data for a defense in depth security design. This article will close with a case study example of how...

  • AWS Service Control Policies (SCP) uses for the Security Specialty Exam

    This is part of a series of posts to use as a study guide for the AWS Security Specialty exam

    What is SCP?

    SCPs are Service control policies. These are types of organization policies to manage permissions in your organization. SCPs provide central control over the maximum available permissions that can be provided for all accounts within the organization. SCPs...

  • What I have learned about Serverless and Lambda on AWS

    This is the twelfth and final post of content for preparing yourself for becoming an AWS Solutions Architect Associate.

    In this post, we are going to focus on serverless and Lambda features within AWS.

    As I have done previously let’s look at the similarities and differences to the closest equivalent in Azure. As I go through...

  • What I have learned about Security on AWS

    This is the eleventh post of content for preparing yourself for becoming an AWS Solutions Architect Associate.

    In this post, we are going to focus on security features within AWS.

    As I have done previously let’s look at the similarities and differences to the closest equivalent in Azure. As I go through this section, I will...

  • What I have learned about Applications on AWS

    This is the tenth post of content for preparing yourself for becoming an AWS Solutions Architect Associate.

    In this post, we are going to focus on application features within AWS.

    As I have done previously let’s look at the similarities and differences to the closest equivalent in Azure. As I go through this section, I will...

  • What I have learned about High Availability on AWS

    This is the ninth post of content for preparing yourself for becoming an AWS Solutions Architect Associate.

    In this post, we are going to focus on High Availability features within AWS.

    As I have done previously let’s look at the similarities and differences to the closest equivalent in Azure. As I go through this section, I...

  • What I have learned about VPC on AWS

    This is the eighth post of content for preparing yourself for becoming an AWS Solutions Architect Associate.

    In this post, we are going to focus on VPCs and networking features within AWS.

    As I have done previously let’s look at the similarities and differences to the closest equivalent in Azure. As I go through this section,...

  • What I have learned about DNS and Route 53 on AWS

    This is the seventh post of content for preparing yourself for becoming an AWS Solutions Architect Associate.

    In this post, we are going to focus on DNS with Route 53 within AWS.

    As I have done previously let’s look at the similarities and differences to the closest equivalent in Azure. As I go through this section,...

  • What I have learned about RDS on AWS

    This is the sixth post of content for preparing yourself for becoming an AWS Solutions Architect Associate.

    In this post, we are going to focus on RDS and Databases on AWS.

    As I have done previously let’s look at the similarities and differences to the closest equivalent in Azure. There are a number of relational and...

  • What I have learned about EC2 on AWS

    This is the third post of content for preparing yourself for becoming an AWS Solutions Architect Associate.

    In this post, we are going to focus on Elastic Cloud Compute, EC2, on AWS.

    As I have done previously let’s look at the similarities and differences to the closest equivalent in Azure. EC2 is the Infrastructure as a...

  • What I have learned about EBS on AWS

    This is the fourth post of content for preparing yourself for becoming an AWS Solutions Architect Associate.

    In this post, we are going to focus on Elastic Block Store, EBS, on AWS.

    As I have done previously let’s look at the similarities and differences to the closest equivalent in Azure. EBS is the disk volume for...

  • What I have learned about CloudWatch on AWS

    This is the fifth post of content for preparing yourself for becoming an AWS Solutions Architect Associate.

    In this post, we are going to focus on CloudWatch on AWS.

    As I have done previously let’s look at the similarities and differences to the closest equivalent in Azure. CloudWatch is the monitoring service for performance on AWS...

  • What I have learned about S3 on AWS

    This is the second post of content for preparing yourself for becoming an AWS Solutions Architect Associate.

    As stated in my AWS IAM post, next up is AWS’ Simple Storage Service, or S3, as it is more commonly known.

    As I did with IAM, let’s look at the differences to the closest equivalent in Azure. S3...

  • What I have learned about IAM on AWS

    This is the first post of content for preparing yourself for becoming an AWS Solutions Architect Associate.

    We are going to start by discussing AWS Identity and Access Management (IAM). As cloud architects and engineers we know already that IAM is extremely important to protecting our cloud infrastructures. That is no different within AWS.

    Microsoft has...


CGRC

  • RMF Monitor

    NIST Risk Management Framework

    RMF Monitor

    This is the series of articles to use as a study guide for the (ISC)2 CGRC exam. In this article, we will discuss the Monitor steps in the Risk Management Framework.

    Monitor Tasks

    • M-1 – System and Environment changes
    • M-2 – Ongoing Assessments
    • M-3 – Ongoing...
  • RMF Authorize

    NIST Risk Management Framework

    RMF Authorize

    This is the series of articles to use as a study guide for the (ISC)2 CGRC exam. In this article, we will discuss the Authorize steps in the Risk Management Framework.

    Authorize Tasks

    • R-1 – Authorization Package
    • R-2 – Risk Analysis and Determination
    • R-3 – Risk...
  • RMF Assess

    NIST Risk Management Framework

    RMF Assess

    This is the series of articles to use as a study guide for the (ISC)2 CGRC exam. In this article, we will discuss the Assess steps in the Risk Management Framework.

    Assess Tasks

    • A-1 – Assessor selection
    • A-2 – Assessment plan
    • A-3 – Control assessment
    • A-4...
  • RMF Implement

    NIST Risk Management Framework

    RMF Implement

    This is the series of articles to use as a study guide for the (ISC)2 CGRC exam. In this article, we will discuss the Implement steps in the Risk Management Framework.

    Implement Tasks

    • I-1 – Control Implementation
    • I-2 – Update Control implementation information
    • Primary roles for...
  • RMF Select

    NIST Risk Management Framework

    RMF Select

    This is the series of articles to use as a study guide for the (ISC)2 CGRC exam. In this article, we will discuss the Select steps in the Risk Management Framework.

    Select Tasks

    • S-1 – Control Selection
    • S-2 – Control Tailoring
    • S-3 – Control Allocation
    • S-4...
  • RMF Categorize

    NIST Risk Management Framework

    RMF Categorize

    This is the series of articles to use as a study guide for the (ISC)2 CGRC exam. In this article, we will discuss the Categorize steps in the Risk Management Framework.

    Categorize Tasks

    FIPS 199

    CMSS 1253

    • C-1 – System Description
    • C-2 – Security Categorization
    • C-3...
  • RMF Prepare

    NIST Risk Management Framework

    RMF Prepare

    This is the series of articles to use as a study guide for the (ISC)2 CGRC exam. In this article, we will discuss the Prepare steps in the Risk Management Framework.

    Organization-level Tasks

    • P-1 – Risk Management Roles
    • P-2 – Risk Management Strategy
    • P-3 – Organization...
  • Governance Risk and Compliance - Risk Management Framework

    CGRC and the NIST Risk Management Framework

    RMF and other standards for the CGRC exam

    This is the first of a series of articles to use as a study guide for the (ISC)2 CGRC exam.

    Primary Roles for Risk Management

    • Authorizing Official (AO)
    • AO DR – can perform Authorizing tasks EXCEPT signing...