WEBVTT
00:00:00.000 --> 00:00:00.970
Hello everybody.
00:00:03.370 --> 00:00:05.650
Welcome to master class.
00:00:06.440 --> 00:00:06.980
Goodnight.
00:00:08.050 --> 00:00:12.160
May 18th, 2023.
00:00:15.150 --> 00:00:17.640
And to think about that, I almost wrote 11.
00:00:18.030 --> 00:00:18.670
I'm a week behind.
00:00:21.400 --> 00:00:21.740
I'm OK.
00:00:24.960 --> 00:00:34.780
With all the classes, everything I'm training alright, we have 5 presenters this evening and we have some great topics.
00:00:35.130 --> 00:00:36.520
I'm looking forward to this.
00:00:36.570 --> 00:00:37.130
Let me tell you.
00:00:40.170 --> 00:00:45.130
Let's start with Tiffany Davidson.
00:00:45.140 --> 00:00:45.700
If you are ready.
00:00:53.010 --> 00:00:53.430
Alright.
00:00:50.600 --> 00:00:53.640
Uh, sure, let's do this.
00:00:57.140 --> 00:00:57.440
Awesome.
00:00:57.860 --> 00:00:58.130
OK.
00:01:01.680 --> 00:01:02.090
Whoops.
00:01:06.500 --> 00:01:08.340
Can you see my screen just to check?
00:01:08.150 --> 00:01:09.450
I I can.
00:01:10.000 --> 00:01:10.270
OK.
00:01:16.600 --> 00:01:16.940
Up there.
00:01:21.970 --> 00:01:22.250
OK.
00:01:27.550 --> 00:01:27.980
OK.
00:01:27.990 --> 00:01:30.920
So good evening everyone.
00:01:32.950 --> 00:01:37.820
I will be talking about the evolution of game development this evening.
00:01:38.090 --> 00:01:50.800
I chose this topic because it's always been something I remember being a part of my life from watching my father play Halo to my sister and I playing on our game boys and taking turns on Crash Bandicoot.
00:01:53.680 --> 00:01:55.450
So do you remember your first games?
00:01:57.370 --> 00:02:00.670
You can tell me your first games or put it in the chat.
00:02:02.870 --> 00:02:08.780
I remember the generic solitaire and mahjong I would play on my grandma's computer.
00:02:09.230 --> 00:02:13.150
Another core memory I have is playing Super Mario brothers on my Game Boy Color.
00:02:15.350 --> 00:02:16.050
What is yours?
00:02:21.090 --> 00:02:25.400
I first game, which was actually my sisters, is on floppy disk.
00:02:25.410 --> 00:02:27.190
We had a beauty and the Beast game.
00:02:28.360 --> 00:02:29.820
Ohh wow, that's awesome.
00:02:33.310 --> 00:02:33.880
Any others?
00:02:35.390 --> 00:02:36.090
Pong.
00:02:35.770 --> 00:02:36.190
Umm.
00:02:38.600 --> 00:02:39.370
I'll say that again.
00:02:39.640 --> 00:02:40.090
Tone.
00:02:38.760 --> 00:02:41.700
I remember, yeah.
00:02:40.140 --> 00:02:41.870
Ohh go.
00:02:44.580 --> 00:02:49.770
I remember playing Oregon Trail in probably middle school or grade school.
00:02:49.780 --> 00:02:51.330
That's probably my earliest memory.
00:02:53.760 --> 00:02:54.620
That's awesome.
00:02:54.670 --> 00:02:57.080
I know that's like a mobile game now, so that's funny.
00:02:59.560 --> 00:03:01.030
Uh, yeah, my kids found it.
00:03:01.100 --> 00:03:02.100
I think online too.
00:03:03.140 --> 00:03:03.350
Yeah.
00:03:04.550 --> 00:03:04.730
Yeah.
00:03:06.240 --> 00:03:06.870
OK.
00:03:06.920 --> 00:03:13.930
So, do you know what the first video game I've vented is saying?
00:03:13.940 --> 00:03:14.690
I wanna take a guess.
00:03:17.420 --> 00:03:17.830
Pong.
00:03:16.970 --> 00:03:17.860
I think it was Paul.
00:03:18.670 --> 00:03:20.790
The Tetris, I don't know.
00:03:33.050 --> 00:03:33.400
Ohh.
00:03:24.020 --> 00:03:39.580
Well, actually the first video game was the first time by a British professor, AWS Douglas, making tic Tac toe, but the more well known and acknowledged first game that followed was tennis for two by William.
00:03:39.950 --> 00:03:45.840
I'm gonna botch this name, but Higginbotham, we'll go further into that later.
00:03:45.850 --> 00:03:55.310
But tennis for two then inspired a group of MIT students and Steve Russell for some reason.
00:03:55.320 --> 00:03:56.980
Steve Russell is the relevant one.
00:03:58.540 --> 00:04:00.560
It's just a group to design their own game.
00:04:00.980 --> 00:04:09.950
They gained access to a PDP1 computer under three conditions from the university, according to the Smithsonian.
00:04:09.960 --> 00:04:16.730
These conditions were first to utilize as many computer resources as possible and push the limits.
00:04:17.240 --> 00:04:27.510
Second was to keep this program interesting by changing each run, and the last was to be able to interact with this game like tennis for two, where there were controllers.
00:04:28.600 --> 00:04:37.540
This is how space war the dueling spaceships game was invented in order to play, though you needed access to a research facilities computer.
00:04:43.710 --> 00:04:52.220
Umm, so developing games in the beginning was complex in different aspects than in today's world.
00:04:52.620 --> 00:04:59.230
In the 1940s to 1950s, computers took up entire rooms and were extremely expensive.
00:04:59.240 --> 00:05:05.270
Therefore, only universities, research facilities and larger companies could afford them.
00:05:05.340 --> 00:05:08.970
And this made them less accessible to the public.
00:05:09.020 --> 00:05:14.650
So when the first games were made, they allowed individuals to experience what computers are capable of.
00:05:17.470 --> 00:05:28.640
Tennis for two was inspired by reading the instruction manual for the Donner Model 30 analog computer, which was a computer that could calculate ballistic missile trajectories.
00:05:29.290 --> 00:05:40.870
This was due to the computer's ability to generate different types of curves on the cathode ray tube of an as a skill scope, and this picture right here shows and I'll skill scope.
00:05:40.940 --> 00:05:47.160
The device is a test instrument that uses two different ways to show the electrical voltages of one or more signals.
00:05:48.350 --> 00:05:53.620
The computer had two aluminum controllers that consisted of a knob and a button.
00:05:53.810 --> 00:05:57.920
The button was pressed to hit the ball and knob to control the angle.
00:05:58.710 --> 00:06:00.640
Higginbotham did not do this alone.
00:06:00.650 --> 00:06:04.210
He had help from a technician named Robert B Boric.
00:06:05.270 --> 00:06:13.310
The device took only three weeks to assemble, which amazes me, but this is the image of the PDP1 computer.
00:06:13.320 --> 00:06:18.620
Ohh and here is a video of what tennis for two looked like being played.
00:06:23.200 --> 00:06:23.640
Wow.
00:06:25.770 --> 00:06:26.240
Oops.
00:06:26.560 --> 00:06:26.970
All no.
00:06:34.280 --> 00:06:34.600
There we go.
00:06:43.640 --> 00:06:44.700
There's the controller.
00:07:15.170 --> 00:07:24.720
I'm not sure what that device was that they showed, but it seemed to go with the controllers so I thought that was pretty cool and a fun fact that I learned was that.
00:07:25.890 --> 00:07:36.180
Higginbothan wanted to put it on another knob on the controller, but he didn't wanna make it too complicated, which made me laugh because nowadays controllers.
00:07:36.340 --> 00:07:37.600
But how many buttons?
00:07:42.150 --> 00:07:48.490
OK, so current game development has its own process and steps to go through in order to develop a game properly.
00:07:49.590 --> 00:08:01.180
The steps are a lot like what we learned in project management with the addition of a few extra skills and tools needed to achieve the result in project management, you have steps to design and create your project.
00:08:01.270 --> 00:08:03.300
This is the same with game developing.
00:08:03.430 --> 00:08:04.690
It is a project after all.
00:08:05.650 --> 00:08:07.660
First, you wanna pick a concept.
00:08:08.200 --> 00:08:09.160
You wanna pick something?
00:08:09.170 --> 00:08:10.930
You like that you're interested in?
00:08:11.830 --> 00:08:21.860
You wanna ensure that you look and think about what is currently popular and if that aligns with their interests, you also want to write down as many game ideas as you can.
00:08:21.910 --> 00:08:22.710
These can be.
00:08:22.760 --> 00:08:24.620
This can be called freewriting.
00:08:25.680 --> 00:08:32.880
You just write what comes to your mind and then you can build off of those idit ideas and concepts to make a game.
00:08:34.090 --> 00:08:47.470
Lastly, you can be inspired by many things such as movies, books, music, TV series, how many games have we seen be made from a movie or even now in this day and age a game being made into a TV series?
00:08:49.430 --> 00:08:54.520
Second, you want to gather information on the concept by researching the type of games you're building.
00:08:54.670 --> 00:08:56.900
Are there certain things to be expected?
00:08:56.990 --> 00:08:59.150
These are the questions you want to answer for yourself.
00:09:00.520 --> 00:09:10.600
Filling out a game design document which can also be seen as a project charter, I have included a screenshot of my game design document from Unity in the junior programmer.
00:09:12.200 --> 00:09:15.050
Here you can fill out all aspects of your game idea.
00:09:15.130 --> 00:09:17.970
This will put down on paper what you want your game to be about.
00:09:17.980 --> 00:09:24.450
The concept of goals for what you want to be happening within the game, every detail can be found in your game design document.
00:09:26.150 --> 00:09:41.340
Next, do you wanna start building in order to build, you will need to pick a programming language and honestly, there were quite a few to pick, but the most popular according to Codecademy, is C++, which is followed by a JavaScript.
00:09:42.300 --> 00:09:44.130
Once the language is picked, you can.
00:09:44.340 --> 00:09:49.400
You then need to pick a game engine and the only knowledge I have of game engines is unity.
00:09:50.560 --> 00:09:58.540
There were a lot of game engines to pick from, so it may be dependent upon your level of experience and what you need for your game.
00:09:59.820 --> 00:10:05.890
And then this will be where you start coding for your game, which I know is the fun part.
00:10:08.180 --> 00:10:11.610
And once your game is built, you wanna refine your concept.
00:10:11.860 --> 00:10:14.850
Now you can start looking for any aspects that do not match up.
00:10:14.860 --> 00:10:20.030
This could be the Settings Quest characters, all of the little details.
00:10:20.990 --> 00:10:28.690
Does the concept still stand that you were going for is a story following logic once all the details are worked out, you can test your game.
00:10:30.120 --> 00:10:34.900
You can do this yourself, but a fresh set of eyes would probably be most beneficial.
00:10:35.210 --> 00:10:39.630
This could give you the user experience and that feedback could bring your game to the next level.
00:10:41.090 --> 00:10:44.070
Outsourcing would mean QA or quality assurance.
00:10:44.080 --> 00:10:48.190
Testers will play through your game multiple times and give you the proper feedback.
00:10:48.400 --> 00:10:51.840
This can take a lot of time, but is necessary.
00:10:53.350 --> 00:10:55.940
Lastly, you of course want to market your game.
00:10:55.950 --> 00:11:01.680
You can do this by social media which there are so many platforms that can allow you to reach a large audience.
00:11:06.180 --> 00:11:11.320
Though then and now the difference is amazing with how far technology has come.
00:11:12.340 --> 00:11:16.370
Game development has made leaps and bounds from the first game to now.
00:11:16.380 --> 00:11:32.750
The future holds many amazing things, such as virtual reality, but that is a different beast and I love seeing this picture of Tomb Raider because I remember my father playing that top game and all the noises of her trying to get up over those rocks and stuff.
00:11:34.670 --> 00:11:38.680
And then here's the timeline of the beginning to almost current time of games.
00:11:38.910 --> 00:12:01.940
This probably took me the most time because there was so much to go through, but I found it really interesting and so likes UM space invaders in 1978 is an arcade game and then a 1970 to 1980 PAC Man, which was Japan's most popular game and was released to the United States.
00:12:02.430 --> 00:12:20.810
And then Donkey Kong is where we first met Mario or were introduced to and then in 1989 is when Super Mario brothers, the Legend of Zelda, Metroid, and Tetris, which was only on the Game Boy at that time, were important.
00:12:20.820 --> 00:12:23.020
Video game franchises still around to this day.
00:12:24.460 --> 00:12:35.500
Then, in the 1990s, Street Fighter and Mortal Kombat are the reasons Sega created video game rating council since they were so violent and full of gore.
00:12:36.440 --> 00:12:48.150
And then of course, you can't forget Sonic the Hedgehog and 2011 Skylander brought video games into the physical world by having plastic toy figurines.
00:12:48.360 --> 00:12:53.730
That would be set on an accessory which reads the NFC tags and places them in the game.
00:12:56.140 --> 00:13:01.680
And then, of course, 2012 brought the famous Angry Birds game, the mobile.
00:13:03.790 --> 00:13:08.080
So and of course I put in the Last of Us since I mentioned the TV series.
00:13:09.600 --> 00:13:10.750
Here are my references.
00:13:14.420 --> 00:13:17.760
Thanks for listening to me ramble about games.
00:13:18.430 --> 00:13:20.660
If you guys have any questions, I'll try to answer them.
00:13:28.930 --> 00:13:32.160
Excellent job way to bring us back in time.
00:13:35.040 --> 00:13:35.560
Thank you.
00:13:38.770 --> 00:13:40.500
I'm sure we've all played so many of them.
00:13:43.130 --> 00:13:43.270
Yes.
00:13:43.300 --> 00:13:45.240
Also, it was great.
00:13:48.570 --> 00:13:49.090
All right.
00:13:52.500 --> 00:13:55.330
Antoniette, Are you ready?
00:13:56.740 --> 00:13:58.110
Uh, yes, I'm ready.
00:13:58.350 --> 00:13:58.710
Alright.
00:13:58.180 --> 00:14:00.710
Let me figure out how to share.
00:14:02.830 --> 00:14:03.340
My stuff.
00:14:06.470 --> 00:14:10.050
Do I hit the share button and then umm the PowerPoint?
00:14:11.310 --> 00:14:11.450
Yes.
00:14:12.540 --> 00:14:12.690
OK.
00:14:12.530 --> 00:14:16.730
Share in are you gonna be sharing any sound or anything?
00:14:15.620 --> 00:14:18.070
Ohh not live, no.
00:14:18.760 --> 00:14:19.000
OK.
00:14:20.480 --> 00:14:21.390
OK.
00:14:21.400 --> 00:14:27.420
And then how do I do I change the layout or is this good?
00:14:38.040 --> 00:14:38.560
It looks good.
00:14:31.490 --> 00:14:39.040
Can everybody see the whole content or I've never used Microsoft Teams?
00:14:39.490 --> 00:14:40.100
OK, cool.
00:14:40.110 --> 00:14:41.970
Thank you so much so.
00:14:45.820 --> 00:14:47.280
Why isn't it not showing?
00:14:49.060 --> 00:14:49.730
Ah, there we go.
00:14:49.740 --> 00:14:52.180
OK, so sorry everybody, I got it now.
00:14:56.020 --> 00:15:19.650
Inspired by my day job, so I am not in IT and I'm doing a whole career change, so it's really interesting to me to begin to understand how unprepared and uneducated I guess we are as a society and how we treat our data.
00:15:19.720 --> 00:15:22.250
So like 4 year old play on iPads.
00:15:22.560 --> 00:15:26.910
You know their parents, phones, teenagers are on their phones constantly.
00:15:27.840 --> 00:15:31.530
They bring their own devices to school and hook up to the guest Wi-Fi.
00:15:31.580 --> 00:15:46.530
So like all of this was kind of inspired by my day job, which is a high school teacher, and you can imagine it's it's, uh, it's pretty interesting looking at it from this perspective.
00:15:46.870 --> 00:15:49.120
So we know that.
00:15:49.230 --> 00:15:51.940
I mean, I I don't even know how many papers I wrote.
00:15:51.950 --> 00:16:00.400
Humans are the wincest weakest link and and I just really wanted to understand what that really means.
00:16:00.450 --> 00:16:08.460
So I kind of looked at the data and it was actually really mind boggling to me.
00:16:08.530 --> 00:16:14.210
Umm, there is a little discrepancy on some of the reports that have been published.
00:16:15.540 --> 00:16:27.620
Verizon there are 2022 data Breach Investigations report said that 82% of data breaches are due to the human element, either through like social engineering, misuse, mistake.
00:16:28.370 --> 00:16:32.660
Umm, the World Economic Forum and the IBM cyber security.
00:16:32.670 --> 00:16:39.380
Intelligent index said that 95% of cyber security compromises are due to human error.
00:16:40.350 --> 00:16:40.890
Umm.
00:16:41.410 --> 00:16:45.860
And of course, that is costing millions of dollars per breach.
00:16:46.030 --> 00:16:59.260
And what's what I find really interesting is that you're almost the US almost 44 breaches as opposed to the global average.
00:16:59.470 --> 00:17:16.260
And so I've kind of like looked into this more fully, I guess and try to figure out what could we do as I guess as a society or as IT professionals to help stem this.
00:17:18.010 --> 00:17:24.140
So human error like basically these are all unintentional actions that lead to a security breach.
00:17:24.150 --> 00:17:28.250
So some are just do based on actually being tired, right?
00:17:28.320 --> 00:17:30.370
Like typing in the wrong email address or.
00:17:32.200 --> 00:17:35.830
Accidentally sharing a document we shouldn't have shared.
00:17:36.070 --> 00:17:45.080
Umm, you know, and the only thing that we could really do to maybe stem this is work less, but I don't see that actually happening in in our society.
00:17:45.970 --> 00:17:49.390
But where we can make a difference is decision based errors.
00:17:49.440 --> 00:18:00.680
So these are errors that are coming from employees because they have the lack of knowledge and training, so they do not understand the risks that they're taking or the the like.
00:18:00.730 --> 00:18:05.930
The risks that in action is taken like not password protecting a certain file.
00:18:08.490 --> 00:18:10.790
So I came up with the basics.
00:18:10.800 --> 00:18:16.200
Of course, there's many, many many solutions, but I came up with three solutions or three things to look at.
00:18:16.210 --> 00:18:22.400
Specifically, we can assume the worst so humans aren't gonna be doing better.
00:18:22.410 --> 00:18:30.460
So we are gonna have to be really on top of making policies to ensure our data is protected.
00:18:30.870 --> 00:18:36.380
We can educate and I'm talking about cross the board K through 12 in schools.
00:18:37.030 --> 00:18:42.400
The older generation in our jobs, or we could throw money at it, which is always a solution to everything.
00:18:43.330 --> 00:18:51.350
So when I mean, assume the worst, I mean that employees are gonna have problems with everything that IT professionals do.
00:18:51.570 --> 00:18:53.830
So maybe we are the problem.
00:18:54.110 --> 00:19:01.510
We make it too hard for them to do their jobs and follow these policies that we're creating.
00:19:03.290 --> 00:19:10.680
So I found this study and I thought this was really interesting that 95% of employees have decreased productivity because of IT strategies.
00:19:10.910 --> 00:19:18.390
So our policies are not working for them and of course, you know, all these companies wanna make a lot of money.
00:19:18.540 --> 00:19:24.270
And if we're stemming that productivity, it's gonna be a huge problem.
00:19:24.280 --> 00:19:28.720
So they're not gonna budget the IT department properly.
00:19:29.100 --> 00:19:36.230
And most of these problems are happening approximately 37% because of security policies.
00:19:36.480 --> 00:19:39.590
So maybe the IT department is the problem.
00:19:40.460 --> 00:19:41.550
So what could we do?
00:19:41.840 --> 00:19:47.500
So just of course, there's many, many things we could do, but I just wanted to think about password policies.
00:19:47.510 --> 00:19:51.000
I know like we here in this internship.
00:19:51.010 --> 00:19:52.640
Have you some of these strategies?
00:19:52.650 --> 00:20:03.580
But where I work, we don't, so there's a possibility that we might find ourselves in jobs that don't have the up-to-date password policies.
00:20:04.150 --> 00:20:20.880
So I thought it was really interesting that even though like stolen or compromised, credentialing did not take umm, like are not the highest risk, they are the hardest to identify.
00:20:20.890 --> 00:20:22.940
So like, they took the longest to find.
00:20:22.950 --> 00:20:24.440
So 327 days?
00:20:24.540 --> 00:20:27.690
Which translates into a costly breach.
00:20:28.510 --> 00:20:29.840
So what could we do?
00:20:30.210 --> 00:20:35.190
So the National Institute of Standards and Technology has produced something new.
00:20:35.860 --> 00:20:36.370
Umm.
00:20:36.740 --> 00:20:43.040
And maybe you've seen it before, but they are saying don't require password reset.
00:20:43.050 --> 00:20:50.980
So the human mind works very similar across the board, so people have a hard time remembering passwords.
00:20:53.150 --> 00:20:56.800
So we have a very easy to guess passwords.
00:20:56.810 --> 00:20:57.980
There's a top 1000.
00:20:57.990 --> 00:21:10.820
I mean, I'm sure there's even more of that, and people tend if we make it more difficult or they have to make their password more difficult or reset it a lots of times where they can't use the same one, they write it down also don't increase complexity.
00:21:12.570 --> 00:21:23.640
It actually doesn't show any significant security increases like people are just gonna put the at sign for an A. I mean, I do it, too or for ohh.
00:21:23.650 --> 00:21:40.940
I'd put a 0 or whatever, but a lot of people just change their password by just adding those little little things, and then all of this is causing high cost so people forget their passwords, it causes more resources used in the IT help desk.
00:21:41.370 --> 00:21:46.620
It decreases efficiency and it really has a taxing on the human memory.
00:21:47.560 --> 00:21:52.220
So what we could do, and there's a new approach and like I said, we've I've seen some of them here.
00:21:52.790 --> 00:21:59.250
I'm constantly screening passwords for the most commonly used or those that are present in Word lists.
00:22:00.050 --> 00:22:00.520
Umm.
00:22:01.170 --> 00:22:06.650
Prior passphrases that increase in length and allow spaces, we can eliminate reset.
00:22:06.660 --> 00:22:15.990
So if we are continuously screening these passphrases, then we are stopping kind of these reoccurring breaches.
00:22:16.000 --> 00:22:25.150
So like every time it's breached, they, you know, we gain, umm, more passphrases and passwords that are placed into a word list somewhere.
00:22:25.760 --> 00:23:39.670
And also we can decrease burden on our memory by supporting single sign ONS which we do here I'm supporting multiple authentication methods biometrics one time password devices so that we have a lot of options and this is something being on top of the research is gonna be really important on the other thing is educate which of course I I strongly recommend so got to delete that part but anyways so this week quickly changed our landscape like schools work health all our daily routine like ordering our groceries streaming all of this is now online and it came really fast for a lot of us I know in my District League we weren't ready for any of this to take place and what I find really interesting is that are ranked tenth amongst the whole world on our cyber risk literacy and education index rankings and a part of that is not being properly educated and that our policy is behind some of these other countries.
00:23:40.660 --> 00:23:41.690
The thing is, I'm like.
00:23:41.700 --> 00:23:51.700
Ohh, maybe we don't really know how to use our computers properly, but we do have high digital literacy like our breeches cost more.
00:23:51.710 --> 00:24:02.830
So we understand how or the society understands how to use a computer, and we're literate at it, but we're not understanding the proper security for it.
00:24:05.140 --> 00:24:19.860
So, umm, we really we need to increase cybersecurity awareness training and I think it has to go like starting early education and K through 12 should have some type of security training.
00:24:20.430 --> 00:24:23.830
Teachers are not trained to protect data.
00:24:24.170 --> 00:24:30.640
They're not trained to tell their students how to protect protect data, but we should begin young.
00:24:31.350 --> 00:24:36.130
There should be post high school cyber training.
00:24:37.830 --> 00:25:00.810
We should have action plans, so a lot of these governments that are doing really good with cybersecurity or cyber risk literacy had these programs across the board, all age groups, they have action plans, they look at gold that they want to achieve and they use metrics to track their progress.
00:25:01.080 --> 00:25:03.650
And then I know Switzerland's number one.
00:25:03.740 --> 00:25:12.770
A lot of the ones that are ahead of us and paying less for these breaches, they don't have a diverse society like we do.
00:25:13.640 --> 00:25:17.080
So there is gonna have to be some understanding that we have to.
00:25:17.630 --> 00:25:19.360
Umm, really?
00:25:19.440 --> 00:25:25.290
Tailor our training for a digger diverse group of people.
00:25:26.610 --> 00:25:35.910
Umm, Singapore was actually number one in cyber risk education and everybody had a specific role or job.
00:25:35.920 --> 00:25:43.290
Like if they were in school, they had goals for them on how to protect their data. I think.
00:25:43.300 --> 00:25:49.350
Would another generation like the older generation, the senior citizens are really falling through their track the crack?
00:25:49.360 --> 00:26:08.520
I mean, they're getting easily and they're not being hacked necessarily, but cyber criminals are going after these older generations and playing like these phishing emails, text things like that.
00:26:08.530 --> 00:26:17.820
And they are actually losing hundreds of thousands of dollars because they don't really understand umm cyber risk.
00:26:17.880 --> 00:26:24.390
So when I talk about cyber risk education, I'm talking across the board all age groups and the IT world.
00:26:24.400 --> 00:26:43.620
We really don't control policy and things like that, so we have to be aware, depending on what our role is, that the employees that are coming into us don't have the knowledge that we do and we really need to be Cognizant about it and understanding how to train and keep on training.
00:26:44.850 --> 00:26:48.280
Umm, funny enough, we actually do have and.
00:26:48.290 --> 00:26:50.040
And we're not bad at everything in the United States.
00:26:50.050 --> 00:27:02.460
So we do have an education and training assistance program that is a grant through the CSA that supports K through 12, curriculum development and instruction training.
00:27:02.730 --> 00:27:04.740
It's been around for over a decade.
00:27:04.850 --> 00:27:07.290
I'm actually a stem teacher and I've never heard of this.
00:27:11.200 --> 00:27:31.800
Program, I think they said that they've had over 500,000 teachers or students were were somehow affected by this program, but with the funding that it has now and how many teachers they they are able to give grants to, it would take 95 years to educate all stub teachers.
00:27:32.030 --> 00:27:45.070
So that's obviously way too long and things are just changing way too fast for this to even make a dent and to the K through 12 schooling and then every year they want to eliminate the funding.
00:27:45.080 --> 00:27:47.890
So this successful program, but they wanna eliminate it.
00:27:49.140 --> 00:28:00.840
Umm, the other thing to consider is reteaching, so the 2022 IBM data said that 83% of organizations were repeaters, which I thought was crazy.
00:28:01.230 --> 00:28:11.320
I I would imagine that you really buttoned up your security, you reteach you look at your policies, but apparently that's not the case.
00:28:11.390 --> 00:28:19.220
So we have to constantly reteach and think of proper learning plans for when breaches occur.
00:28:20.870 --> 00:28:21.210
Umm.
00:28:21.550 --> 00:28:44.260
So just to go over kind of the education part, we should probably, I again, we're only in IT industry like we don't make policy but I believe create cybersecurity and cyber risk education for all increase governmental policies and oversight at least with education and maybe providing targets and goals.
00:28:44.270 --> 00:28:49.400
We have a lot of different departments that kind of like throw their hat in the ring.
00:28:49.410 --> 00:28:57.110
So maybe having one department have central like, you know, like a central location for everything would be great.
00:28:57.400 --> 00:29:10.790
And then Reteach job specific cyber security and then the last idea I had was to throw money at it and obviously artificial intelligence and automation is huge and it's still growing.
00:29:11.140 --> 00:29:18.210
And The thing is, the IBM report said that that increase breach detection.
00:29:18.220 --> 00:29:23.550
So we know the faster refined breaches, the less money it costs, the less data that is out there.
00:29:24.140 --> 00:29:34.250
So with AI or automation it was 74 days quicker to uh find a breach which saved about $3 million per breach.
00:29:35.170 --> 00:29:38.190
So they can detect new threats faster.
00:29:38.760 --> 00:29:40.830
We have faster incident response planning.
00:29:41.920 --> 00:29:47.510
Umm can it could process large amounts of data in a short period of time and then find anomalies quicker?
00:29:47.880 --> 00:29:49.530
Of course, it's very costly.
00:29:49.720 --> 00:29:52.260
So you would need more resources to it.
00:29:52.380 --> 00:29:57.830
Umm, not only just financially but umm.
00:29:58.890 --> 00:30:07.180
While financially umm time, the other thing is it's false positives and it can be used by threat actors as well.
00:30:07.310 --> 00:30:23.230
So there's this fine line and I think if we take the whole picture into consideration, a good plan can be in place to help, like, uh, stop all these breaches and the amount of money that it's costing us as a society in the US.
00:30:24.260 --> 00:30:24.570
Umm.
00:30:24.580 --> 00:30:27.870
And it could even be really like a national problem here.
00:30:28.480 --> 00:30:36.300
You know, I'll of the breaches that are happening on Facebook, all the misinformation that's occurring.
00:30:36.310 --> 00:30:45.750
If we were a better trained society, hopefully we could stem some of these big issues and big things that are happening.
00:30:47.550 --> 00:30:57.280
So in summary, humans are the weakest link like we know about that we really need to be on top of the research and it's gonna be constantly changing.
00:30:57.530 --> 00:31:03.060
Educate, educate, educate and we need more money and we need to be aware of research trends.
00:31:04.140 --> 00:31:05.210
Are there any questions?
00:31:10.230 --> 00:31:11.520
Yes, good evening.
00:31:13.220 --> 00:31:13.560
Sure.
00:31:11.530 --> 00:31:21.040
I have one question and I always wanted to ask this of for a while and ohh for the single sign on.
00:31:24.970 --> 00:31:33.700
That it does provide convenience and the sense that if you have 20 different and I don't have a bunch of different websites.
00:31:33.710 --> 00:31:34.630
Amazon, eBay.
00:31:36.520 --> 00:31:38.840
Uh, different scientific websites.
00:31:38.850 --> 00:31:41.250
They they'd school a whole bunch.
00:31:41.660 --> 00:31:45.340
So let's say for example, how does it work?
00:31:45.350 --> 00:31:46.770
How does it get chance to look into it?
00:31:46.780 --> 00:31:58.130
If I use one password, that same password applies, so all of those individual sites, it's like I'm going through it.
00:31:58.140 --> 00:32:00.190
Is it like I'm going through an intermediary?
00:32:03.520 --> 00:32:16.820
Umm, I was as I understand the only single sign on I've ever used is the one we used here for the Microsoft suite of of like the Planner, the Outbox.
00:32:17.060 --> 00:32:19.040
It's umm, I think it really.
00:32:27.190 --> 00:32:27.590
OK.
00:32:20.260 --> 00:32:32.760
That's the only one that I've actually used personally, like at my job we don't use it, so I under as I understand it, it's per probably umm company, right?
00:32:32.770 --> 00:32:35.970
Like the same manufacturer I would imagine.
00:32:41.810 --> 00:32:44.510
Yeah, I could be wrong.
00:32:36.300 --> 00:32:45.960
OK, I understand because I was wondering that always bothered me a if I use one password that's ohh.
00:32:45.970 --> 00:32:46.670
OK.
00:32:47.400 --> 00:32:48.080
I could be wrong.
00:32:46.760 --> 00:32:50.500
Well, maybe, yeah, maybe later on.
00:32:50.510 --> 00:33:01.320
I'll because I always was concerned, but I used one for eBay, the same one for the Department of Education, the same one for the IRS, the same one for something else.
00:33:01.330 --> 00:33:04.580
And then that one, that's one password gets compromised.
00:33:05.950 --> 00:33:20.190
And then I was wondering, uh, does it leave all of the individual sites with a massive vulnerability that that that's what could only thing the uh, it's convenient, very efficient, fast everything.
00:33:20.910 --> 00:33:21.060
Yeah.
00:33:23.120 --> 00:33:23.390
Yeah.
00:33:20.200 --> 00:33:23.430
But that one thing concerned me. Uh.
00:33:23.400 --> 00:33:35.420
And you know, I think a lot of people do that, though they have one password that they use for everything, and they don't even think about breaches that have occurred at all.
00:33:41.840 --> 00:33:42.080
OK.
00:33:35.430 --> 00:33:43.200
And even if they're notified, they don't change it like we just had a breach and a third party vendor for something called school school.
00:33:43.210 --> 00:33:45.740
Dude, which was our maintenance.
00:33:45.750 --> 00:33:46.520
It's just maintenance.
00:33:46.530 --> 00:33:49.840
Like, can you turn down the temperature or bring paper towels?
00:33:56.210 --> 00:33:56.540
Ohh.
00:33:49.850 --> 00:34:03.590
Or I have a link leak in my sink, you know, and those passwords were reached, and a lot of my colleagues didn't change their password, and it was something that, like, you know, it was not even that important to begin with.
00:34:03.600 --> 00:34:06.700
And they don't even think that they've used the same one over and over again.
00:34:07.470 --> 00:34:07.970
Interesting.
00:34:08.180 --> 00:34:08.880
School district.
00:34:08.890 --> 00:34:10.000
Are you or what?
00:34:10.200 --> 00:34:11.250
I'm in Michigan.
00:34:10.010 --> 00:34:11.910
What's that? That's.
00:34:11.420 --> 00:34:14.050
I'm in Michigan, so I'm in Plymouth, Canton.
00:34:14.120 --> 00:34:16.340
It's a pretty big, like fourth biggest in Michigan.
00:34:17.000 --> 00:34:17.540
OK.
00:34:19.250 --> 00:34:19.470
OK.
00:34:22.940 --> 00:34:24.370
I wonder if it's the same thing.
00:34:17.550 --> 00:34:25.120
It's interesting you say that we just had a breach here, but it's had a charter school where I work, so I stopped using my personal email.
00:34:24.520 --> 00:34:25.470
That's weird, yeah.
00:34:25.130 --> 00:34:25.660
Yeah.
00:34:25.720 --> 00:34:27.280
Yeah, it's just interesting.
00:34:27.290 --> 00:34:30.170
I wonder if it's the same Brenda, I don't know, but thank you.
00:34:30.380 --> 00:34:30.970
Yeah.
00:34:31.080 --> 00:34:31.560
Thank you.
00:34:32.640 --> 00:34:33.290
Anybody else?
00:34:39.010 --> 00:34:39.460
Thank you.
00:34:39.610 --> 00:34:40.470
Here are my references.
00:34:47.820 --> 00:34:48.810
I'm good then.
00:34:48.900 --> 00:34:49.840
Thank you so much everybody.
00:34:51.400 --> 00:34:51.890
Excellent.
00:34:52.430 --> 00:34:52.650
Right.
00:34:53.520 --> 00:34:54.810
Brought up a lot of great points.
00:34:54.820 --> 00:34:55.320
Definitely.
00:34:55.330 --> 00:34:58.750
You know, even within schools, they don't think about it, they don't.
00:34:59.820 --> 00:35:00.010
No.
00:35:00.080 --> 00:35:00.530
Ohh it's.
00:35:00.540 --> 00:35:02.200
I mean, it's pretty terrible.
00:35:02.250 --> 00:35:15.450
Like I know, universities probably think about it more, but like the the K through 12, like just looking at my district now from a from, you know, with open eyes like our server room is unlocked.
00:35:17.610 --> 00:35:18.120
Yeah.
00:35:18.130 --> 00:35:18.420
Then it.
00:35:15.460 --> 00:35:20.910
Like really anybody can get in there and we have so much important data, so much sensitive data.
00:35:21.540 --> 00:35:21.880
Wow.
00:35:21.510 --> 00:35:21.980
It's true.
00:35:21.990 --> 00:35:28.560
And you know, and even my kids on their own desktops, you know, they've done whatever and they're like, oh, I think I just got hacked and like, well, you better clean it up now.
00:35:29.530 --> 00:35:30.080
I know.
00:35:28.890 --> 00:35:32.810
And I said and start and you know, because I'm not gonna keep cleaning up your computer.
00:35:32.820 --> 00:35:33.980
You're gonna lose everything.
00:35:34.020 --> 00:35:37.800
Luckily, they don't have anything that's really, you know, that they'll lose.
00:35:37.810 --> 00:35:41.720
That is so bad because everything they have is in steam anyways, but.
00:35:44.220 --> 00:35:49.550
I don't want them on the network and I am secure enough within the network to not worry about it.
00:35:49.820 --> 00:35:53.360
But you know, I've told them you need to use LastPass.
00:35:53.370 --> 00:35:55.160
Just let LastPass have it.
00:35:55.440 --> 00:35:56.980
It'll have something that's secure.
00:35:56.990 --> 00:35:58.150
You won't have to worry about it.
00:35:58.160 --> 00:35:59.090
And then you're all set.
00:35:59.100 --> 00:36:00.030
Use it with your.
00:36:00.140 --> 00:36:02.250
You know, there's so many things now that we can use.
00:36:02.260 --> 00:36:04.140
It just makes things easier.
00:36:05.320 --> 00:36:06.590
Don't try and come up with your own.
00:36:06.600 --> 00:36:07.610
Just use LastPass.
00:36:07.680 --> 00:36:11.590
The only one you need to remember is the password for LastPass.
00:36:11.770 --> 00:36:12.280
That's it.
00:36:14.210 --> 00:36:17.050
Which will probably be in the top like 1000 right most common.
00:36:16.810 --> 00:36:17.700
Right, exactly.
00:36:18.020 --> 00:36:18.180
Yeah.
00:36:18.040 --> 00:36:19.740
It don't make it too hard on yourself, right?
00:36:20.020 --> 00:36:20.470
Right.
00:36:20.540 --> 00:36:22.710
Yeah, the the human mind can't handle it.
00:36:22.720 --> 00:36:23.960
We can't handle the passwords.
00:36:22.980 --> 00:36:24.750
And I know, right?
00:36:25.450 --> 00:36:26.800
I have a little bit contribution.
00:36:26.810 --> 00:36:27.070
Sorry.
00:36:28.660 --> 00:36:30.010
Uh, this is Abimbola.
00:36:31.110 --> 00:36:31.240
Yes.
00:36:35.720 --> 00:36:35.840
Yes.
00:36:31.460 --> 00:36:38.390
Yeah, the issue of training should be taken seriously and I believe it affects everybody.
00:36:38.680 --> 00:36:40.910
I could remember some few weeks back.
00:36:41.480 --> 00:36:52.950
My wife got a pop up on this laptop on her laptop and she accidentally click the pop up and had a Google accounts compromised.
00:36:54.340 --> 00:36:54.520
Yep.
00:36:55.040 --> 00:36:58.190
So I had to like look this is a very big issue.
00:36:58.200 --> 00:37:00.270
We have to find a way out.
00:37:00.660 --> 00:37:03.820
So at first I had to like see what do I do?
00:37:04.970 --> 00:37:11.420
I tried to delete the account first because she has two accounts, 2 Google accounts on the same laptop.
00:37:11.790 --> 00:37:17.690
So I suggested to add that we have to like delete the first one.
00:37:19.150 --> 00:37:23.360
So by the time we go into the other one, we can easily have access.
00:37:23.510 --> 00:37:28.400
So I try to delete the first one to at least limit the impact of the compromise.
00:37:33.780 --> 00:37:34.000
Yep.
00:37:28.410 --> 00:37:35.640
So which simply means that we really need to educate our people more and that should cause the cross.
00:37:36.140 --> 00:37:43.090
Every other organization appearance, our loved ones, our sisters, our brothers and everybody.
00:37:43.250 --> 00:37:43.910
Yeah, everybody.
00:37:43.180 --> 00:37:49.320
So the aspect of training should go far, which I tried actually support until Nets.
00:37:49.760 --> 00:37:50.910
It's very important.
00:37:51.090 --> 00:37:52.940
So just just by contribution.
00:37:52.950 --> 00:37:53.280
Thank you.
00:37:55.080 --> 00:37:55.440
Thank you.
00:37:53.710 --> 00:37:55.620
Yes, you're absolutely right.
00:37:56.030 --> 00:37:57.320
It has to start somewhere.
00:37:57.560 --> 00:37:57.990
That's right.
00:38:00.050 --> 00:38:01.040
Thank you everybody.
00:38:01.050 --> 00:38:02.560
That was that was awesome.
00:38:02.850 --> 00:38:03.310
Antoniette.
00:38:03.320 --> 00:38:04.180
That's very nice.
00:38:04.190 --> 00:38:04.660
Very good one.
00:38:05.250 --> 00:38:05.730
Thank you.
00:38:09.160 --> 00:38:09.730
Yeah.
00:38:09.740 --> 00:38:10.150
Yeah.
00:38:10.240 --> 00:38:11.370
There you go exactly.
00:38:06.540 --> 00:38:13.370
I'll think my teenagers at school for that one, and my own, actually, but mostly them.
00:38:13.900 --> 00:38:17.490
Yep, it helps to get their right because it makes their brain works a different way too.
00:38:17.500 --> 00:38:21.470
If they help you, you know what are, what are the processes, what do we need to do?
00:38:21.480 --> 00:38:22.450
Where do we start from?
00:38:22.460 --> 00:38:24.770
It's really good because it gets the critical thinking going.
00:38:25.570 --> 00:38:26.000
That's right.
00:38:27.780 --> 00:38:29.860
All right, now we've got uh Rabia.
00:38:32.330 --> 00:38:32.850
Yeah.
00:38:33.250 --> 00:38:33.430
Right.
00:38:32.890 --> 00:38:33.860
Hello everyone.
00:38:33.950 --> 00:38:34.920
How is everyone doing today?
00:38:36.070 --> 00:38:36.540
Good.
00:38:36.550 --> 00:38:37.010
How are you?
00:38:36.960 --> 00:38:37.120
Hello.
00:38:38.570 --> 00:38:39.090
I'm good.
00:38:41.640 --> 00:38:43.830
OK, let me share my screen.
00:38:54.920 --> 00:38:56.010
Do you guys see anything?
00:38:59.580 --> 00:38:59.780
No.
00:38:59.620 --> 00:39:00.100
Not yet.
00:39:00.510 --> 00:39:00.760
Nope.
00:39:09.710 --> 00:39:09.970
Umm.
00:39:23.500 --> 00:39:25.530
I'm not sure if I did this right.
00:39:25.890 --> 00:39:26.780
Yep, I see it now.
00:39:26.480 --> 00:39:27.170
We see your.
00:39:28.400 --> 00:39:29.420
Yeah, we're good.
00:39:27.920 --> 00:39:31.230
OK, well it looks so different from my side.
00:39:31.240 --> 00:39:31.590
I don't know.
00:39:31.590 --> 00:39:32.280
Used to this.
00:39:33.150 --> 00:39:33.570
Right.
00:39:33.210 --> 00:39:34.380
Now you know, I thought.
00:39:34.390 --> 00:39:36.200
Always ask can you see my screen?
00:39:35.440 --> 00:39:36.460
Yeah.
00:39:36.690 --> 00:39:36.820
It's.
00:39:36.960 --> 00:39:39.570
Now, I know, Landon, this is so old.
00:39:39.580 --> 00:39:40.280
God, OK.
00:39:43.790 --> 00:39:47.610
Uh, the best part is, I can't see what.
00:39:47.620 --> 00:39:49.480
OK, OK.
00:39:49.550 --> 00:39:59.390
So to begin with, uh, I'm Rabia and I am going to uh, present about DevOps model today.
00:39:59.660 --> 00:40:01.000
It's uh for me.
00:40:01.010 --> 00:40:12.230
Uh, for me to choose this topic, it's a funny story, because whenever I heard the word devolves, I always thought it's like a field of a IT or something.
00:40:12.240 --> 00:40:28.370
But after I did some research on it, I realized it's not a job title, but it's just a methodology that organizations here to list for them to better uh, to better uh, make their teams work.
00:40:28.920 --> 00:40:50.770
So let's see what develops is, uh, the DevOps is a software development methodology approach which is utilized by organizations that combines developments that stuff and operations opts to unite people, process and technology in application planning, development, delivery and operations.
00:40:50.820 --> 00:41:00.360
So develops, enables coordination and collaboration between different departments like development, IT operations, quality engineering and security.
00:41:02.540 --> 00:41:15.310
The introduction of DevOps was done because in traditional software development the development phase was completed 1st and then the deployment operation, especially during the code deployment.
00:41:15.320 --> 00:41:19.110
There have been many interruptions because of the latent problems.
00:41:19.760 --> 00:41:31.050
So for that to fix it, the face was getting so TDM so and they were further disagreements happening between the teams and operations.
00:41:31.530 --> 00:41:32.080
Uh.
00:41:32.350 --> 00:41:42.040
The team, the development teams, would blame the server side and then the operation would the the blame on the server side when the meet.
00:41:42.050 --> 00:41:47.420
So when the need for the updates arose, the persistence of this contention would go at the same rate.
00:41:47.530 --> 00:41:53.410
So that's when the DevOps steps in and that's when the DevOps was developed.
00:41:54.030 --> 00:42:00.720
Teams adopt DevOps culture, practices and tools to increase confidence in applications they build.
00:42:01.170 --> 00:42:07.650
They they are able to respond better to customer needs and they are able to achieve business goals faster.
00:42:08.360 --> 00:42:15.660
DevOps helps teams continually provide value to customers by producing better, more reliable products.
00:42:16.660 --> 00:42:30.680
Umm, some other benefits of DevOps include, umm, the teams are in DevOps responsible for development and operations are no longer siloed.
00:42:30.770 --> 00:42:32.300
Uh, so there?
00:42:32.310 --> 00:42:33.330
Uh, they can.
00:42:33.340 --> 00:42:38.220
They don't under they don't work individually.
00:42:38.270 --> 00:42:49.010
Sometimes two teams are combined to form a single team where the engineers work across the whole application lifecycle, from development to test deployment and operations.
00:42:49.020 --> 00:42:51.420
And they also build varieties of.
00:42:51.470 --> 00:43:06.850
They also work on varieties of abilities that are not restricted to a particular role, so teams employ procedures to speed up the task that were previously labor intensive and manual, and that also decreases the interruptions.
00:43:06.940 --> 00:43:16.600
They employ technological stack tooling, and that's facilitate the speedy, dependable operations and evolution of applications.
00:43:18.190 --> 00:43:31.100
Uh, overall, the use of these tools enables engineers to complete task and that will that previously required assistance from other teams, which further boost the teams velocity.
00:43:31.910 --> 00:43:38.200
So the advantages of develops is the helps in better collaboration between development and operations.
00:43:38.430 --> 00:43:44.080
It improved the quality of products, it reduces the design development and operations.
00:43:44.230 --> 00:43:49.850
It reduces the time to market what the products for customers to consume.
00:43:50.040 --> 00:43:58.310
It increases the profits and there is more frequent releases of the products for consumers to able to use.
00:43:59.520 --> 00:44:10.680
So there are four phases in develops that helps teams to organize their UM way of a operation.
00:44:10.910 --> 00:44:17.580
So the first one is the planning phase, and the waps teams brainstorms.
00:44:17.850 --> 00:44:25.440
They specify the describe the functions and features of the system and application they intend to develop.
00:44:25.450 --> 00:44:36.600
During this phase they the teams monitor task progress on low and high granularity level from single products to many products portfolio.
00:44:36.670 --> 00:44:51.210
They plan the agility and visibility some of the practices they applied during this phase is they create backlogs, they monitor bugs, they utilize scrum to oversee Agile software development.
00:44:51.460 --> 00:44:58.020
The employee can ban bots and they use dash dashboards to visualize the progress.
00:44:59.340 --> 00:45:08.310
Uh, in the next uh phase, the the next one is development phase in which the entire process of writing software code is covered.
00:45:08.580 --> 00:45:18.480
So in the so the DevOps in the development phase, the team is responsible to pick a setting for development.
00:45:18.490 --> 00:45:22.410
The right test review and integrate the code.
00:45:22.480 --> 00:45:33.430
They create IT graphs to from the code to deploy it to different settings and they they collaborate on code and work on it continuously.
00:45:34.140 --> 00:45:38.490
They also innovate in in development phase.
00:45:38.500 --> 00:45:42.350
They also innovate quickly while maintaining quality, stability and productivity.
00:45:43.080 --> 00:45:51.530
Uh, for which they use effective tools, automate, automate tedious and manual processes and.
00:45:53.730 --> 00:45:57.170
The utilize the CI.
00:46:01.600 --> 00:46:04.150
I can't see you on that, sorry.
00:46:07.320 --> 00:46:12.170
They utilize automated testing and continuous integration in small steps.
00:46:15.930 --> 00:46:18.460
Next is the operation phase.
00:46:18.510 --> 00:46:23.000
In face of and no woman did I.
00:46:23.050 --> 00:46:24.320
Yes, I skipped a face.
00:46:24.370 --> 00:46:38.260
So next is the delivery phase in which they practice to retaining and reliably deploy software into production setting, ideally through the continuous delivery throughout the delivery phase.
00:46:38.270 --> 00:46:44.160
This establish a release management procedure that includes distinct manual approval stages.
00:46:44.530 --> 00:46:50.480
They set up an automatic gate to advance applications to different faces until they are released to clients.
00:46:50.730 --> 00:46:56.760
They deploy and configure the basic infrastructure of the delivery environment, which increases the stability.
00:46:57.380 --> 00:47:12.010
Repeat repeatability control and obviously the whole business of delivery operation by automating them they finally create completed or regulated infrastructure setting and the teams leverage technologies like.
00:47:13.410 --> 00:47:15.810
Iac, containers and microservices.
00:47:16.990 --> 00:47:26.600
It is important to remember the safe employment procedures can spot problems before they have an impact on client satisfaction, so this phase is really important.
00:47:26.690 --> 00:47:33.920
This technique support DevOps teams and delivering regularly with comfort assurance and peace in mind before the final phase.
00:47:34.230 --> 00:47:44.100
The final phase is the operation phase in which the application in production environments, including hybrid or public clouds like Azure, are maintained.
00:47:44.370 --> 00:47:45.380
Their watchtower.
00:47:45.390 --> 00:48:23.760
And their troubleshooted and the system, dependability, high availability and solid security and zero down time are the goals of the DevOps team in the final phase in this phase, team can immediately detect the problems, they can address it, they can, they can use the automated delivery for the deployment procedures, they can use the rich telemetry which is uh, visualization, actionable alerting and they can complete insight into applications and underlying system that are all necessary to maintain the vigilance.
00:48:25.020 --> 00:48:37.480
So some of the tools that DevOps use are continuous integration, continuous delivery, microservices, monitoring, logging, communication and most importantly collaboration of the whole team.
00:48:38.250 --> 00:48:46.620
Umm, the importance of DevOps in today's world is that the adoption has nearly doubled in the last five years.
00:48:46.750 --> 00:49:01.670
According to survey 3200 businesses conducted, which is conducted by Redgate Software DevOps have now been embraced in some form by approximately 74% stage of the enterprises.
00:49:01.950 --> 00:49:06.990
And according to according to 2020 DevOps strengths survey, uh, uh.
00:49:07.000 --> 00:49:15.110
It sides that 99% of the respondents say it has a positive impact on their organization, 78% had to learn a new skill.
00:49:15.120 --> 00:49:23.310
48% of the respondents said it helped them get a raise, 61 say it helped them produce higher quality development.
00:49:24.000 --> 00:49:32.790
Deliverables and 49% say they have faster time to market, 49% say it improves their deployment frequency.
00:49:32.840 --> 00:49:37.320
So overall, the survey summarize this why it is important.
00:49:37.820 --> 00:49:42.330
And how effective uh DevOps approach was in today's world?
00:49:43.600 --> 00:49:50.790
In conclusion, the effective tooling is essential in DevOps because it enables teams to develop for their customers.
00:49:51.400 --> 00:49:59.130
Uh develop a products for the customers and they can deploy the software quickly and reliably.
00:49:59.700 --> 00:50:11.630
These solutions led the teams manage complicated system at larger scale and they can automate TDs chores and keeps engineers in charge of the high velocity with no interruptions.
00:50:11.940 --> 00:50:20.920
And due to DevOps, the teams that excel in DevOps can develop a growth attitude which we saw in the survey.
00:50:21.520 --> 00:50:26.590
Uh, they make a quick adjustments after failing and apply their lessons.
00:50:26.650 --> 00:50:40.710
Uh, they all work hard to maintain the correct level of excellence and due to which they raised the client satisfaction and quicken the innovation and market responsiveness and that's it.
00:50:42.260 --> 00:50:42.700
Thank you.
00:50:45.660 --> 00:50:46.370
That was great.
00:50:46.380 --> 00:50:47.050
That's excellent.
00:50:47.060 --> 00:50:49.680
I didn't know that much about DevOps, so thank you.
00:50:49.180 --> 00:50:51.440
And thank you.
00:50:52.080 --> 00:50:55.990
You taught me because I thought like you.
00:50:56.000 --> 00:51:02.760
I thought it was something like, you know, specific direction to go into the field, but now I know that it's a modeling.
00:51:02.770 --> 00:51:03.480
That's pretty cool.
00:51:01.100 --> 00:51:04.490
I know that's all cartoon. Mm-hmm.
00:51:05.710 --> 00:51:06.640
Good way to see things.
00:51:06.650 --> 00:51:07.610
Thank you so much.
00:51:09.350 --> 00:51:11.250
Does anybody have any other questions?
00:51:17.050 --> 00:51:17.280
OK.
00:51:19.300 --> 00:51:19.660
Thank you.
00:51:20.250 --> 00:51:20.870
OK, OK.
00:51:22.450 --> 00:51:23.780
All right, Nicholas.
00:51:24.430 --> 00:51:26.460
Nicholas Wolf, Are you ready?
00:51:27.850 --> 00:51:28.310
Think so?
00:51:31.750 --> 00:51:32.200
Yeah.
00:51:32.250 --> 00:51:33.730
Share my screen.
00:51:41.150 --> 00:51:42.380
Can everybody see that?
00:51:44.820 --> 00:51:44.960
Yes.
00:51:45.100 --> 00:51:45.200
Yes.
00:51:46.220 --> 00:51:46.360
Yes.
00:51:47.630 --> 00:51:47.880
Yes.
00:51:46.730 --> 00:51:49.120
OK, no.
00:52:45.940 --> 00:52:48.450
Are you speaking because we can't hear you if you want.
00:52:50.720 --> 00:52:53.290
Oh, OK, no problem. Alright.
00:52:56.620 --> 00:52:56.960
OK.
00:53:02.730 --> 00:53:03.110
Alright.
00:53:17.440 --> 00:53:37.690
The state of finished, so I wanted to make it super easy for future interns to just grab this project and change it or add or delete questions as the as the websites update without even needing to understand any of the code, they can just go into unity and change.
00:53:59.190 --> 00:54:00.250
I think we lost him again.
00:54:32.820 --> 00:54:33.320
Umm.
00:54:36.210 --> 00:54:39.930
I'm looking to see what you have on you have a lot on in the background that might be.
00:54:42.690 --> 00:54:44.790
Taking resources for for teams.
00:54:45.920 --> 00:54:47.490
Because we're still seeing your screen.
00:54:48.030 --> 00:54:48.270
Yeah.
00:54:51.520 --> 00:54:52.850
Ah, my end.
00:54:52.860 --> 00:54:54.750
It's not showing that I'm sharing it.
00:54:57.320 --> 00:54:59.740
And if you want to shut down some other stuff that you've got on.
00:55:00.750 --> 00:55:06.560
Uh, I don't think I have much on.
00:55:06.570 --> 00:55:07.590
I just have.
00:55:10.240 --> 00:55:11.420
Stuff that I'm showing.
00:55:15.650 --> 00:55:16.810
Ah well, let's try it again.
00:55:23.230 --> 00:55:26.100
OK, so here's the start menu.
00:55:26.200 --> 00:55:26.550
You see the.
00:55:26.710 --> 00:55:29.360
AC logo up here. Uh.
00:55:45.390 --> 00:55:46.190
Yeah, that's funny.
00:55:46.200 --> 00:55:48.460
It does keep kicking you out and see.
00:56:01.980 --> 00:56:05.820
Some of those other icons seems like you need to have them on but.
00:56:33.610 --> 00:56:40.090
What we could do is go to Andrew, let him do it, and if you want to reset your computer, we start it.
00:56:44.680 --> 00:56:45.690
When all else fails.
00:56:47.030 --> 00:56:48.730
Can't turn it off and turn it back on.
00:56:55.730 --> 00:56:57.670
So you want me to just God with my presentation?
00:57:00.090 --> 00:57:01.960
Yes, it sound good, Nicholas.
00:57:01.970 --> 00:57:04.260
I don't know if he's already doing it.
00:57:03.350 --> 00:57:04.460
I don't think he's any right now.
00:57:05.150 --> 00:57:05.370
OK.
00:57:07.170 --> 00:57:10.650
Yeah, go ahead, you, Andrew, and then we'll start him up once, once he gets back in.
00:57:11.580 --> 00:57:12.700
Alright, one second.
00:57:13.020 --> 00:57:13.290
Yeah.
00:57:54.410 --> 00:57:54.830
Not yet.
00:57:54.600 --> 00:57:54.840
No.
00:57:54.480 --> 00:57:55.190
Not at the moment.
00:58:21.520 --> 00:58:22.070
There it is.
00:58:22.760 --> 00:58:22.930
Yep.
00:58:22.790 --> 00:58:23.680
OK, cool.
00:58:23.850 --> 00:58:25.350
Oh, all right.
00:58:25.410 --> 00:58:33.710
So my name is Andrew Pittman and my presentation is going to be on Homelands, Home labs and what are they to me?
00:58:33.720 --> 00:58:34.960
And it's simplest terms.
00:58:34.970 --> 00:58:42.740
A homelab is an environment sandbox that you can build, play and learn technologies with without the fear of consequences of breaking things.
00:58:42.910 --> 00:58:48.360
A homelab is a place that you can experiment safely outside of your normal environment or your work environment.
00:58:48.810 --> 00:58:53.750
You can use a homelab for personal projects, self learning growth or even as a personal hobby for fun.
00:58:58.020 --> 00:58:58.990
Homeo abuses.
00:58:59.000 --> 00:59:12.060
You can use a homelab for self hosting network services such as firewalls and storage servers, game servers, web servers, media servers, infrastructure services with virtualization and containerization, security tools and so much more.
00:59:12.070 --> 00:59:13.900
I mean, the possibilities are just about endless.
00:59:14.960 --> 00:59:30.960
Home labs can make great environments to help study for a certification, or even to set up a mock enterprise environment, much like your work environment, so that you can test changes and develop your skills with the architecture and services without the worry of bringing down the organizational network or being embarrassed by a mistake.
00:59:33.340 --> 00:59:46.930
As far as home labs go, they can be as simple as an old computer or laptop, a low powered Raspberry Pi or similar micro computer device to even a fully clustered server architecture, complete with storage and network services.
00:59:47.400 --> 00:59:51.770
A homelab can literally be as simple or as complex as you want it to be, and that's the benefit.
00:59:52.040 --> 00:59:55.450
Start with whatever you have or can get your hands on and build up from there.
00:59:55.880 --> 01:00:05.460
It's even possible nowadays to build out a homelab environment fully in the cloud with great options such as Linode, Digital Ocean, AWS, Azure and many others.
01:00:06.030 --> 01:00:11.460
All the above will help you to consider the requirements and size of your home lab needs and where you want to start.
01:00:12.980 --> 01:00:20.230
What is your goal prior to starting your homelab, it can be beneficial to consider what are your overall goals that you want to achieve by setting one up.
01:00:20.700 --> 01:00:21.810
What is it you want to do?
01:00:22.120 --> 01:00:23.290
What do you want to accomplish?
01:00:23.620 --> 01:00:24.570
What do you wanna learn?
01:00:24.760 --> 01:00:28.100
Will you architecture run 24/7 or will it only run on demand?
01:00:28.900 --> 01:00:30.170
How many users will you have?
01:00:30.180 --> 01:00:32.080
How deep in the network services will you go?
01:00:32.090 --> 01:00:33.750
Will you have a DHCP server?
01:00:33.760 --> 01:00:39.390
DNS servers and sinkholes, reverse proxies, certificates and domains and fully qualified domain names.
01:00:39.640 --> 01:00:46.540
Publicly hosted servers within a DMZ, services within a DMZ network attached storage, media servers, game servers.
01:00:46.550 --> 01:00:48.310
I mean the possibilities are endless.
01:00:48.320 --> 01:00:49.430
What you can do with the home web?
01:00:50.930 --> 01:00:52.140
The benefits of a home lab?
01:00:52.150 --> 01:01:06.360
A homelab will allow you to build upon skills and a theoretical knowledge that we have all been learning throughout school and college that can also help you by deploying various projects and mock enterprise type networks to help bolster your resume and help you land your dream IT job.
01:01:06.670 --> 01:01:10.900
They also help you learn, develop skills and a sector of it outside of your major.
01:01:11.190 --> 01:01:22.750
A homelab gives the capability to build skills and networking, security, DevOps, infrastructure and virtualization coding, web hosting, databases, automation, and countless others.
01:01:23.700 --> 01:01:33.680
Having experience with so many different aspects of IT will help alleviate the feelings of imposter syndrome and even help develop your confidence in your own abilities and with your IT skills.
01:01:33.690 --> 01:01:37.450
By making you more well rounded and not one dimensional individual.
01:01:40.680 --> 01:01:45.530
On the topic of home my resources, there are many websites, forums, blogs available to help you.
01:01:45.540 --> 01:01:49.590
Every step of the way and to learn new ideas for what to work on and build next.
01:01:49.920 --> 01:01:56.350
Literally any project that you can come up with, you can type it in on Google, go to YouTube, search around on GitHub.
01:01:56.750 --> 01:01:59.680
I mean, there's countless resources out there guides.
01:02:00.400 --> 01:02:03.270
Documentation to help you build upon whatever you want to use.
01:02:03.280 --> 01:02:08.560
Some of my favorite online blogs and resources are the Homelab wiki, various GitHub repositories.
01:02:09.090 --> 01:02:10.350
Reddit is a great option.
01:02:10.360 --> 01:02:14.120
There's two subreddits that I use a lot for homelab and self hosted.
01:02:14.130 --> 01:02:23.660
Where not only do I get ideas and inspiration from seeing other people's home labs and projects, but it also gives me a place when I run into a weird niche problem.
01:02:23.670 --> 01:02:32.950
Problem my homelab and you type it on Google and there's not really much results besides maybe a GitHub pull request that hasn't been answered in like 3 years.
01:02:32.960 --> 01:02:47.730
So it's a great place to post your questions and I honestly been banging my head multiple times getting a certain part of my environment set up or struggling with this and I posted something on there and I actually was able to solve it with the help of the community pie.
01:02:47.740 --> 01:02:49.410
My life up is another good one.
01:02:49.830 --> 01:02:53.950
Docker hub and many many more YouTube is a fantastic resource.
01:02:53.960 --> 01:03:01.350
I'm not gonna go through all those, but those are just some of my more favorite YouTube channels that I've used over the last couple years since I've begun my home Labbing journey.
01:03:01.700 --> 01:03:09.350
And then obviously utilizing various blogs, post Google searches to find great articles, guides, and resources on various sites and GitHub compositores.
01:03:11.000 --> 01:03:12.900
So now getting started with home labs.
01:03:13.050 --> 01:03:16.380
What's the easiest and like the best free way to start?
01:03:16.390 --> 01:03:21.860
The easiest way to start a homelab is to utilize the machine that you are on right now and the form of virtualization.
01:03:22.240 --> 01:03:35.950
Virtualization will allow you to build out complex virtualized networks with Linux and Windows guests and servers networked VMS, and you can even run a ton of containerized services by utilizing Docker desktop within your regular operating system.
01:03:36.140 --> 01:03:47.980
Docker desktop for anybody who's interested in learning dockers, is super easy way to spin out containers and you download it onto like an app onto your machine, just like we do teams or the time clock wizard.
01:03:48.630 --> 01:04:02.400
It's a great way without really needing to understand how to run the commands from the command line, get all that stuff set up and very easily grab images from Docker Hub or Linux server IO and being able to spin them up and run them directly on your local host.
01:04:03.030 --> 01:04:13.810
The best part about this is being able to freely spin up and spin down the infrastructure as needed, and even being able to take snapshots throughout your developments and the event you break something or have an oopsies during deployment configuration.
01:04:14.460 --> 01:04:19.730
Trust me, when you first learning stuff, you're gonna miss configure or set something up wrong or make an error.
01:04:19.740 --> 01:04:24.090
So snapshots are a great way if you don't have backups and everything going.
01:04:24.700 --> 01:04:37.520
Virtualization also gives you the benefit to evaluate exactly what you need to get started or what you actually want to accomplish, and then once you have decided you have outgrown simple local host virtualization, you can begin to buy equipment.
01:04:39.260 --> 01:04:43.530
An alternative easiest star is utilizing the cloud to develop and host your machines.
01:04:43.840 --> 01:04:53.050
Akamai, Linode for example, offers virtual private servers that can be as cheap as $5 per month for a shared CPU VPS, and with this I've tested it myself.
01:04:53.060 --> 01:04:57.850
I've run anywhere from 5 to 15 various Docker containers without needing another server.
01:04:58.100 --> 01:05:05.230
I've used utilized Linode a lot when I was starting because you can easily spend these up and the hourly mark on itself.
01:05:05.240 --> 01:05:08.770
I mean it's fractions of a penny per hour.
01:05:08.780 --> 01:05:25.580
So I mean, if you spend something up for six hours and play around with it, I mean, it literally costs you nothing and a lot of those Youtubers I had in the resources, they often have advertisements with Lennon and I actually signed up twice with two different email accounts where I got $100 in credit for 60 days.
01:05:25.890 --> 01:05:36.160
So I was able to play around with Linode and spin up architecture just like you would with AWS or Azure or something else and just kind of like play around with different systems and spend them down and cost me literally nothing.
01:05:36.530 --> 01:05:46.660
Another benefit of utilizing the cloud is that it also gives you access to firewalls, networking, storage networks, backup and recovery, and even load balancers you can implement within your cloud infrastructure and a home web.
01:05:48.880 --> 01:05:54.410
Additional freeways to get started is by utilizing any old computer or laptop you have lying around.
01:05:54.860 --> 01:06:04.210
A server is not defined by the hardware, but rather by the role of the computer and by definition, a server is literally just a computer that provides services or resources to other computers.
01:06:04.720 --> 01:06:15.010
Even with older, weaker computers, you'd be surprised by the compute power you can get from machine with four less cores as little as 4 to 8 gigs of RAM and some storage.
01:06:15.400 --> 01:06:24.830
Most older computers can run some pretty extensive workloads, and you'd be surprised what you can find online that people are selling for cheap or even throwing away because it's not the fanciest new tech out there.
01:06:25.750 --> 01:06:30.980
My personal homelab begin with two old laptops that had the minimum specs out there, and I was able to deploy a lot.
01:06:31.170 --> 01:06:34.400
Next, I was able to get my hands on some old computers and my job was throwing away.
01:06:34.410 --> 01:06:37.720
More specifically, an HP Elite desk and Dell Optiplex.
01:06:37.730 --> 01:06:40.910
Both of them are like had I54 cores.
01:06:40.920 --> 01:06:51.040
I think they just came like 8 gigs of RAM and mean it was super Basic but they were they taught me a lot and I was able to throw type 1 hypervisor on one, specifically proxmox and then on another one.
01:06:51.050 --> 01:06:55.440
I did bare metal Ubuntu and was able to develop a lot of Linux skills with that.
01:06:55.450 --> 01:07:03.090
So I mean anything that you can get your hands on, so many old computers, people just throw away or get rid of stuff and they make fantastic servers.
01:07:03.930 --> 01:07:10.160
You could take this old hardware and just like I was saying install Linux or Ubuntu bare metal on the infrastructure to learn develop Linux skills.
01:07:10.170 --> 01:07:21.240
You can also install a Windows Server for free to learn about architecture, file sharing and Active Directory among others, and then you can install a free Type 1 hypervisors, such as my favorite is proc box.
01:07:21.550 --> 01:07:34.930
Other good options X P&G TRUENESS and VMware Esxi that will further allow you to deploy various virtual machines on the server and get experience working with firewalls, networking, storage, backups, clustering and more.
01:07:35.460 --> 01:07:41.030
You can even deploy virtualized firewalls such as PF sense, which is what I use or opensense.
01:07:41.040 --> 01:07:55.480
That will allow you to learn networking skills and security skills, including aliases, Vlans, load balancing, VPNs, DHCP management and more to not rule out old computers, they are by hands down the best way to get started with the home lab.
01:07:57.340 --> 01:08:02.590
Another option is upgrading and current computer or using micro computers such as a Raspberry Pi or alternative.
01:08:02.920 --> 01:08:07.870
Unfortunately, when I got started with my homelab journey three years ago, Raspberry pies were $35.
01:08:08.140 --> 01:08:15.950
I haven't looked lately, but I remember like a year ago seeing them like 150 two $100 because of the semiconductor shortages we went through after COVID.
01:08:16.200 --> 01:08:17.060
So they might.
01:08:17.070 --> 01:08:18.710
There is all other alternatives.
01:08:18.720 --> 01:08:28.980
I mainly referenced the Raspberry Pi because it's what I was able to get started with, but even just upgrading the hardware inside of your gaming PC for daily PC, you can have plenty of benefits.
01:08:28.990 --> 01:08:30.840
That was another option that I upgraded to.
01:08:30.850 --> 01:08:44.650
Once I didn't have the laptops or the Raspberry Pi, I took my regular old desktop computer that I used to play video games on, upgraded the RAM in there and got VMware Workstation Pro and was able to spin up a lot of architecture and do exactly what I was talking about in the previous slide.
01:08:45.890 --> 01:09:01.460
The benefits of this is for one, you get to upgrade the machine you use most daily and you get a dedicated computer for homelab and virtualization learning, which is a really good value if you are teetering on the fence about building a homelab or buying other computers to convert into servers and Raspberry Pi or other micro computers.
01:09:01.470 --> 01:09:03.060
A fantastic way to get started.
01:09:03.070 --> 01:09:05.170
You'd be surprised by the hundreds of projects.
01:09:05.180 --> 01:09:14.680
You can use a Raspberry Pi or alternative micro computer for with projects ranging from retro game servers to portable routers and access points to VPNs, to network storage.
01:09:15.030 --> 01:09:25.530
On top of being relatively affordable in micro, computer also utilizes a lower power draw in comparison to a earlier computer, making them a fantastic, fantastically cheap way to get started with the whole lab.
01:09:25.700 --> 01:09:28.430
Another good option is small form factor PCs.
01:09:28.720 --> 01:09:30.830
You can usually find them great deals.
01:09:31.020 --> 01:09:31.750
Craigslist.
01:09:31.760 --> 01:09:36.320
EBay, there's just kind of Google around and they make very good.
01:09:37.760 --> 01:09:48.430
Servers that with the very small power draw, because that's something that you always want to be cautious of once you keep spinning up all this infrastructure and you buy, you know, fully retired enterprise grade servers.
01:09:48.440 --> 01:09:52.690
I mean, there can be no noisy with fan power, and they're gonna have a lot of power draw.
01:09:52.700 --> 01:09:54.620
So those are another good consideration.
01:09:55.570 --> 01:10:00.890
Umm, the next level of home labs to step up is now moving on from the cheap and affordable options of a homelab.
01:10:00.900 --> 01:10:03.940
We have a dedicated server and even enterprise level equipment.
01:10:04.130 --> 01:10:16.020
This can include infrastructure that is rack mounted and complete with the implementation of other physical network infrastructure such as rack mounted managed switches, routers, access points, uninterruptible power supplies, and more.
01:10:16.490 --> 01:10:18.100
There are multiple options at this step.
01:10:18.110 --> 01:10:29.470
For starters, this server can be consumer grade hardware that is converted into a server by upgrading components and putting it into a rack mounting case that will allow you to mount them just like any regular server network equipment.
01:10:29.790 --> 01:10:36.230
This is a great option if you were wanting to rack mount your old computer or upgrade a computer to fit in with the rest of your network and environment equipment.
01:10:37.120 --> 01:10:39.550
This is how the current rendition of my homelab is set up.
01:10:39.560 --> 01:10:55.380
Rather than buying an enterprise grade server that has a ridiculous power draw and noise considerations, I have a clustered together 3 rack and self mounted Dell optiplex small form factor Fifty 50s and upgraded them to 32 gigs of RAM and added multiple SSD's instead of a raid 5 configuration.
01:10:56.140 --> 01:11:01.080
He also took a fourth to host my border firewall PF sounds at the heart of my network doing it this way.
01:11:01.090 --> 01:11:11.060
I was able to save money, breathe new life into older hardware, and what this style of PC conversion servers they wear fantastic or various types of workloads and have small power draw considerations.
01:11:11.330 --> 01:11:15.680
My network racks it's underneath my desk and I don't even hear these computers run.
01:11:15.690 --> 01:11:16.660
I have 4 computers.
01:11:16.670 --> 01:11:29.750
I will see as we get later on, but just a really great consideration is finding older computers and especially if you can get your hands on something small form factor like a Dell optiplex, they are amazing universities, schools all the time are upgrading from them.
01:11:29.760 --> 01:11:35.970
They're constantly getting rid of them, so if you know somebody from there, it's a great option to reach out and see if you can get one off of them.
01:11:36.860 --> 01:11:47.000
These types of PC servers can be used for obviously game servers, web servers, media servers, Cuba identity networks, Docker virtualization, hypervisors and all.
01:11:47.010 --> 01:11:49.720
These things typically work really great on this type of infrastructure.
01:11:51.480 --> 01:12:06.200
The final boss of the Homelab is now we are getting on to the big boys, the enterprise, the dedicated server architecture that supports air correcting RAM, multiple power supplies, over 100 gigabytes of RAM, 10s of hard drives to implement a Nas or ZFS pools for your homelab environment.
01:12:07.240 --> 01:12:13.320
Once you reach a certain point in your homelab adventure, you'll begin to look out for enterprise grade equipment to take your adventure to the Max.
01:12:13.500 --> 01:12:17.110
When talking about enterprise grade, this is about multiple hard drive bays.
01:12:17.180 --> 01:12:18.710
Hot swappable hard drives.
01:12:18.720 --> 01:12:21.040
Dual and Quad Knicks dual power supplies.
01:12:21.050 --> 01:12:34.600
High processing CPUs in a ton of error correcting RAM and the hundreds of gigs and various other enterprise level features for all of your self hosted needs that will guarantee that your infrastructure and services can always stay running without failure.
01:12:34.990 --> 01:12:43.660
At this level you can run lots of virtual machines each outfit with a ton of resources such as CPUs and RAM and lots of ***** disk space.
01:12:44.190 --> 01:12:54.750
Now, while this level is extreme, you can find lots of great value and deals out there as enterprises are always upgrading their equipment and infrastructure, albeit you do not ever need to get to this level.
01:12:54.760 --> 01:13:01.670
Most home labs I see with a ton of services are built out and run on laptops, old PCs, micro computers, and other similar options.
01:13:03.680 --> 01:13:19.610
Some of my homelab projects inside of my homelab I was able to get experience setting up physical infrastructure with buying a rack, mounting in a Cisco 2960 S 48 port, managed switch rack mounting my optiplex CES wiring in multiple ubiquity unify access points.
01:13:19.880 --> 01:13:22.930
I eventually added a Synology Nas and my Raspberry Pi.
01:13:23.180 --> 01:13:34.780
I ended up adding another Netgear managed switch which is pretty cheap from Best Buy to get my security training grounds internal network from my production network that the rest of my family uses inside of my homelab.
01:13:34.790 --> 01:13:39.510
I was able to gain experience implementing Vlans and ACL physically on my switches command line.
01:13:39.520 --> 01:13:48.120
More specifically, Cisco IOS and inside of my pfsense border firewall within pfsense I was able to learn about DHCP management.
01:13:48.130 --> 01:14:02.480
I even set up multiple VPNs for remote access back into my home network when I'm away, and I also set up a site to site VPN from my physical pfsense box to another virtualized instance of pfsense to securely access the security Internet from a.
01:14:03.040 --> 01:14:12.820
It's a Ubuntu uh VM jump box to play around with malware and real compromise machines safely on a private internal network within my hypervisor choice proxmox.
01:14:12.830 --> 01:14:18.150
I was able to deploy various virtual machines for media servers, local file sharing and network attached storage.
01:14:18.310 --> 01:14:29.230
A DNS server and sync hole for network wide ad blocking a reverse proxy and domain for fully qualified domain names and inside my network without having to use IP addresses to even LinkedIn.
01:14:29.240 --> 01:14:41.380
Clustered networking between my servers with load balancing and failover and if further enabled me to learn about containerization by utilizing I can containers where I can not only save on compute power but also develop new skills.
01:14:42.280 --> 01:14:42.990
I was office.
01:14:43.120 --> 01:14:49.420
I was also able to get experience with Wi-Fi configurations and control through my unified AP access points.
01:14:49.430 --> 01:14:57.380
I also added two APC uninterruptible power supplies that give me the ability to gracefully shut down and keep my network up in the event of a power outage.
01:14:58.990 --> 01:15:00.960
My journey so far with my home labs.
01:15:00.970 --> 01:15:08.960
I started homelab being 3 1/2 years ago when I started down in my college journey because I had always read and learned that it was a great way to develop skills.
01:15:08.970 --> 01:15:13.970
And honestly, I, uh, kind of got tired of only learning theoretical knowledge.
01:15:13.980 --> 01:15:16.260
I feel like for at least for me, it's a lot harder to.
01:15:17.340 --> 01:15:21.010
Uh, keep track of everything that we're learning over the years.
01:15:21.020 --> 01:15:23.710
If you just learn about it, read about it and you become the expert that day.
01:15:23.720 --> 01:15:26.370
But you never actually physically set it up in your own environment.
01:15:26.680 --> 01:15:32.270
I always found it was hard to withhold that information, so this is what helped me begin my journey.
01:15:32.620 --> 01:16:05.360
As I mentioned previously, I started with old cheap laptops and a dummy neck gear switch, which means that it's unmanaged to where I couldn't set up Vlans or anything, just basically plug and play, eventually upgrading to old desktop PC's that were being thrown out to obtaining to obtaining a cheap Cisco Switch from eBay to adding Wi-Fi and control through my unify access points and controller to adding uninterruptible power supply systems to buying a 15 U rack to add it all into to adding an internal secure network for testing to deploying all sorts of containers and services that my family could take advantage of within our home network.
01:16:06.290 --> 01:16:18.140
The joy of homelands is that they could start so simple and continually grow as you get new ideas or projects to implement or infrastructure to add to the network as your needs change and grow, so too will your homelab to mixing and matching parts.
01:16:18.150 --> 01:16:19.460
Pieces, brands.
01:16:19.470 --> 01:16:22.060
Servers, gear racks, networking.
01:16:22.120 --> 01:16:23.110
Literally you name it.
01:16:23.470 --> 01:16:28.180
There is no wrong way to build out a home app, and they are truly, and they truly are.
01:16:28.230 --> 01:16:41.460
In my opinion, the best way to develop IT, skills and all disciplines of it, that's the best thing about homelands is that No2 homelands are the same and it becomes really fun to browse online and see what other people have implemented and with what resources.
01:16:41.730 --> 01:16:45.690
Home labs are truly unique and can be just as unique as the individual setting them up.
01:16:46.390 --> 01:16:50.640
A homelab allows you to do so much in my homelab I'm the security architect.
01:16:50.690 --> 01:16:51.920
I'm the dev OPS engineer.
01:16:52.130 --> 01:16:53.420
I'm the System Administrator.
01:16:53.470 --> 01:16:54.760
I'm the network administrator.
01:16:54.790 --> 01:17:00.760
On the cloud engineer and all this for my own custom and tailored environment that I have full reign on.
01:17:00.770 --> 01:17:06.250
What I want to do and implement without the fear of destroying someone else's environment or you're work environment.
01:17:07.210 --> 01:17:10.280
This presentation is only scratched the surface on what a home lab is.
01:17:10.290 --> 01:17:12.060
How to build one and what you can do with them?
01:17:12.120 --> 01:17:20.330
Literally, the possibilities are endless, and once you build out your own homelab, go ahead and share your experiences online at your job, with your friends, or create a blog.
01:17:20.530 --> 01:17:30.700
A home lab is the best place to get your footing with it, and in this industry, without my own, without my homeland, I would only have the security skills game from my classes and occasional outside learning.
01:17:30.990 --> 01:17:45.540
Now, with my home lab, I have a greater understanding of what different practices and disciplines are within an enterprise and organizational environment that will only help to make me a more well rounded security and IT professional who understands deep down how the different parts work together within the environment.
01:17:47.240 --> 01:17:49.550
This was some of my progress on the top.
01:17:49.560 --> 01:17:52.150
This is when I first got the rack mount to go into.
01:17:52.490 --> 01:17:56.270
Uh, the picture in the top left, you can see the three optiplex is down below.
01:17:56.280 --> 01:18:00.810
I hadn't gotten a third one to do a fully clustered network with failover options.
01:18:00.820 --> 01:18:03.030
One all the way to the left was my pfsense box.
01:18:03.360 --> 01:18:07.850
Above that you could see the two dummy neck your switches and to the right of them was my Raspberry Pi.
01:18:08.180 --> 01:18:16.680
This is when I got those Cisco switches, but at the time I didn't know how to use Cisco IOS command line, nor did I feel confident in my abilities to do that.
01:18:17.180 --> 01:18:22.140
Eventually upgraded as you could see three of them flipped sideways, so that's my proxmox cluster.
01:18:22.370 --> 01:18:25.530
And then the PDF sends border firewall to the left of it.
01:18:26.450 --> 01:18:34.840
I eventually added a Synology DS920 plus outfitted with 16 terabytes of storage and two 500 gigs.
01:18:34.850 --> 01:18:49.180
So one terabyte and total of m.two caching for even faster access to my storage or different containerized services I have running on there, eventually was able to learn Cisco IOS, which was fantastic.
01:18:49.190 --> 01:18:56.600
I'm a big terminal person, so I prefer to work in those instead of a gooey and I I thought it was really great learning environment and then to the right.
01:18:56.610 --> 01:18:58.840
It was just like another angle of that.
01:18:58.850 --> 01:19:01.200
And then there was just like a night time picture of like my setup.
01:19:01.210 --> 01:19:05.030
Just kind of showing my desk you could see with the green lights over on the left hand.
01:19:05.040 --> 01:19:13.920
That's my 15 U rack mount desk on top and then you can see my old gaming PC that I eventually outfit the middle picture in the bottom row.
01:19:14.150 --> 01:19:18.340
It's not the best zoomed in, but you can see I use Velcro.
01:19:18.350 --> 01:19:20.030
Zip ties are a game changer.
01:19:20.460 --> 01:19:33.330
Don't let anybody tell you different if you're gonna get into this path, get some Velcro, zip ties, or, like, a couple bucks on Amazon and you save yourself so many, like headaches of hafting to try to get scissors in and try to clip off normal ties.
01:19:33.340 --> 01:19:45.510
And the benefit of doing your wiring and keeping track of everything is you always know where stuff goes and then event the you have a fail or something messes up or you need to do perform maintenance on part of your servers and stuff.
01:19:45.520 --> 01:19:48.780
I even got a label gun so I was able to.
01:19:49.090 --> 01:19:51.090
You might be able to see some of the white tags on the cables.
01:19:51.100 --> 01:19:58.490
I was able to label exactly where everything went, so if I were to tear apart this whole server and actually this rack and everything, I actually moved a couple weeks ago.
01:19:58.500 --> 01:20:04.340
So I did have to tear all this down and it was super easy to put it all back together cuz everything was already labeled and super easy to go.
01:20:04.650 --> 01:20:08.550
The final picture on the bottom right was just an example of one of my unified access points.
01:20:08.560 --> 01:20:12.280
That one specifically is the unified use 6 Pro.
01:20:12.430 --> 01:20:13.720
Amazing access points.
01:20:13.730 --> 01:20:17.420
I suggest them and then another picture of just some more examples.
01:20:17.720 --> 01:20:21.210
Top left is the dashboard called Heimdall.
01:20:21.280 --> 01:20:38.670
You can add the links to all your different services and infrastructure, whether it be quick links to your hypervisor, to your Raspberry Pi dashboard, to your unified network, to all your various Docker containers and services, wikis, media servers, all that stuff, the picture next to it is an example of pie hole.
01:20:38.680 --> 01:20:41.390
I specifically use adguard.
01:20:41.480 --> 01:20:45.970
I did use pinhole for a little bit, but essentially how that works is that the DNS sinkhole.
01:20:46.140 --> 01:20:55.880
So when you get ads so it has a a list that it goes through and let's say like ads kind of get slipped through as your network and your browsing traffic.
01:20:56.170 --> 01:21:05.120
Most companies and stuff will be able to detect if you're blocking those packets and then argue at you and not allow you to continue without getting rid of your ad blocker.
01:21:05.360 --> 01:21:11.540
The best thing about a DNS sync hole is that it's not actually denying the packets, it's just sending them to a sink hole.
01:21:11.550 --> 01:21:18.840
So from their side it looks like you're getting fed the ads, but really your network's not feeding you the ads because there are meeting the DNS sync.
01:21:19.190 --> 01:21:20.020
Super amazing.
01:21:20.030 --> 01:21:21.830
I recommend an ad blocker to everybody.
01:21:22.270 --> 01:21:30.540
The next picture to the right of that is an example of the Unify controller where you can view your access points, VPNs, controllers.
01:21:30.770 --> 01:21:34.620
They even offer routers, switches, firewalls, all that good jazz.
01:21:35.070 --> 01:21:38.020
The picture to the right of that was when I was performing maintenance on all of them.
01:21:38.030 --> 01:22:10.380
So you can see my 4 Dell optiplex servers there and my old department used to get dusty a lot and I always worried about the health of my computers, so that was just an example of tearing them down, performing maintenance, bottom left pictures and example of proxmox proxmox which is a Type 1 hypervisor which the long list to the left is all the different virtual machines and infrastructure you can run and then that becomes fully equipped with so many different things you could do between networking, storage, firewalls, backups, configurations, failovers, clustering and you name it.
01:22:10.640 --> 01:22:12.180
The next picture is an example of.
01:22:12.190 --> 01:22:33.940
Once you get logging and monitoring all that stuff set up, you can forward your syslogs over to Loki and Grafana, which is that what an example is and get a really deep dive analysis into what is happening on your network and what all your various machines are doing, and then the two pictures to the right were the up some more upgrades I made to my computer on top of these basic computers.
01:22:33.950 --> 01:22:36.960
Some of the main equipment that I upgraded was RAM.
01:22:37.510 --> 01:22:42.400
I added a m.two boot drive for each of them was just like 250 gigs.
01:22:42.590 --> 01:22:54.420
I was able to buy attachments and be able to fit three SSD's in them for and it's running raidz one which is what Proxmox uses, but it's pretty much like using RAID 5 and then obviously upgrading your NICs.
01:22:54.430 --> 01:22:54.680
NICs.
01:22:54.690 --> 01:22:57.710
I originally started with the one on the left, which is a 2 port Nic.
01:22:57.980 --> 01:23:03.400
Huge waste of money because I quickly outgrew them, especially when I wanted failover options and direct connect.
01:23:03.410 --> 01:23:09.310
Network storage is everything backs up to my NASA system and then all my different servers communicate with each other.
01:23:09.440 --> 01:23:14.400
So the example on the right was a four port Intel 1 Gigabit Nic and I love that thing.
01:23:15.830 --> 01:23:16.120
Yeah.
01:23:16.130 --> 01:23:21.550
Other than that, home labs are just a really great way to get started for learning just about anything and developing your skills.
01:23:22.850 --> 01:23:23.560
Anyone have questions?
01:23:44.920 --> 01:23:46.700
This way, one quick question.
01:23:47.610 --> 01:23:47.850
Yeah.
01:23:47.860 --> 01:23:48.220
Go for it.
01:23:48.420 --> 01:23:49.550
Hello this is real quick.
01:23:49.560 --> 01:23:52.040
Was it the Ohh that home that?
01:23:53.160 --> 01:23:55.300
Experience do you put that on your resume?
01:23:56.290 --> 01:23:57.130
All for sure.
01:23:57.200 --> 01:23:58.690
It's a huge talking point.
01:23:58.700 --> 01:24:01.170
I mean, obviously a homelab isn't necessary.
01:24:31.070 --> 01:24:31.470
God.
01:24:01.380 --> 01:24:32.470
You don't have to have a homelab do anything but more times than not, especially have my employer and other various employers and people I've met in the industry and connect to having a home lab to talk about just shows your drive and passion about it and it shows that you're willing to learn and take the steps and actually dive into these tools and you have experience setting them up rather than just watching the video listening to a lecture or reading a textbook because it's it's really a different level of it being able to turn the theoretical knowledge that you gain into actual skills by developing and setting stuff up.
01:24:32.480 --> 01:24:36.510
And that's why I'm a big proponent or fan of setting them up.
01:24:37.400 --> 01:24:37.920
Got it.
01:24:37.620 --> 01:24:38.490
Not necessarily though.
01:24:38.500 --> 01:24:42.390
But yeah, if you ever do man throw that on your resume, shout it to the world, man.
01:24:42.400 --> 01:24:44.110
Everybody loves to learn about home labs.
01:24:44.120 --> 01:24:45.050
It'll only make you look better.
01:24:46.300 --> 01:24:47.090
OK, great.
01:24:47.100 --> 01:24:47.520
Thank you.
01:24:48.060 --> 01:24:48.780
Yeah, no problem.
01:24:52.930 --> 01:24:55.650
Alright, if nobody else has any questions, that was the end of my presentation.
01:25:57.520 --> 01:25:58.310
OK, I don't know.
01:26:08.820 --> 01:26:10.650
Nick did come back at one point.
01:26:10.660 --> 01:26:11.940
I don't know if he's still on here.
01:26:13.400 --> 01:26:14.470
Yeah, I'm still here.
01:26:14.480 --> 01:26:16.980
I can try it again, see if it works.
01:26:17.630 --> 01:26:18.530
Yeah, go ahead and try.
01:26:19.330 --> 01:26:19.700
OK.
01:26:19.710 --> 01:26:20.210
Yep, go ahead.
01:26:20.870 --> 01:26:21.170
OK.
01:26:27.200 --> 01:26:29.160
Excellent job, Andrew, definitely.
01:26:43.470 --> 01:26:45.190
It's not letting me show my screen now.
01:26:48.810 --> 01:26:50.770
Going all types of problems with teams.
01:27:05.820 --> 01:27:09.810
I could try to quickly leave and come back, see if the share options come up.
01:27:14.030 --> 01:27:15.810
You're not getting the share options at the top.
01:27:15.820 --> 01:27:20.320
Are you coming through the desktop or the web version?
01:27:20.950 --> 01:27:21.760
Desktop.
01:27:21.850 --> 01:27:24.490
Yeah, when I click share it's not showing any of the options.
01:27:25.740 --> 01:27:26.060
2.
01:27:38.250 --> 01:27:39.430
I can't think of what would work.
01:27:41.770 --> 01:27:42.220
I don't know.
01:27:44.180 --> 01:27:46.480
I mean, since it's getting so late, I can.
01:27:48.850 --> 01:27:50.420
My mother says 25th.
01:27:49.020 --> 01:27:53.450
Uh, yeah, I I guess I could do that.
01:27:53.460 --> 01:27:54.000
Either that or.
01:27:53.650 --> 01:27:56.820
Or what you what you could do too is if you want to.
01:28:03.710 --> 01:28:07.200
So you could send it and then we could actually play it for you.
01:28:08.620 --> 01:28:12.610
The other thing is, uh, uh, my presentation is in at me.
01:28:12.620 --> 01:28:15.090
It's in unity and uh, Visual Studio.
01:28:15.100 --> 01:28:16.730
It's not really a PowerPoint, so.
01:28:17.250 --> 01:28:22.560
So can you can you show that instead of showing teams as much, you can't share anything?
01:28:23.090 --> 01:28:30.400
No, I can't share any the when I click the share button it won't let me click any of the options like the options don't show up.
01:28:34.600 --> 01:28:35.080
Strange.
01:28:38.110 --> 01:28:39.840
I can quickly leave and come back.
01:28:39.850 --> 01:28:40.480
Maybe that'll work.
01:28:44.100 --> 01:28:44.930
Try it one more time.
01:29:02.230 --> 01:29:04.360
No, still not giving me any options.
01:29:09.920 --> 01:29:10.040
Yes.
01:29:07.090 --> 01:29:11.110
And Nicholas, are you using the desktop app? OK.
01:29:12.670 --> 01:29:13.540
But yeah, I don't.
01:29:13.550 --> 01:29:15.420
I don't understand why it's giving me so many problems.
01:29:15.430 --> 01:29:17.190
Maybe I have to reinstall teams or something?
01:29:18.070 --> 01:29:18.810
Right, yeah.
01:29:20.620 --> 01:29:26.890
Yeah, I can either move my presentation to next week or I can just make a recording and send it in to you.
01:29:28.470 --> 01:29:29.150
Either way, it's fine.
01:29:30.240 --> 01:29:30.870
Yeah, do that.
01:29:30.880 --> 01:29:35.490
Send recording and and yeah, record it and then send it in.
01:29:35.700 --> 01:29:36.580
We'll try that way too.
01:29:35.950 --> 01:29:38.270
OK, alright, sorry about that.
01:29:38.280 --> 01:29:39.800
I don't know why I'm having so many problems.
01:29:38.600 --> 01:29:40.270
No problem, it happens.
01:29:40.280 --> 01:29:41.690
You know, computers are computers.
01:29:41.700 --> 01:29:42.140
That's IT.
01:29:42.800 --> 01:29:43.060
Yep.
01:29:44.920 --> 01:29:45.810
Alright, everybody.
01:29:45.820 --> 01:29:48.150
Well, everybody, you did a great job.
01:29:48.200 --> 01:29:48.860
Absolutely.
01:29:49.810 --> 01:29:51.290
Thank you for all that you have done.
01:29:52.980 --> 01:29:59.390
Excellent, excellent presentations and umm, does anybody have any questions for anybody that presented this evening?
01:30:05.890 --> 01:30:06.600
OK.
01:30:06.680 --> 01:30:11.960
Well, then we will say goodnight to everybody and thank you for coming.
01:30:13.130 --> 01:30:14.090
Thank you for presenting.
01:30:16.800 --> 01:30:17.520
Thank you.
01:30:19.600 --> 01:30:19.980
Thank you.
01:30:23.050 --> 01:30:24.000
Thank you.
01:30:24.050 --> 01:30:25.130
Have a good night everyone.