{"id":1276,"date":"2025-10-29T14:04:11","date_gmt":"2025-10-29T14:04:11","guid":{"rendered":"https:\/\/carlostech.com\/?page_id=1276"},"modified":"2026-02-06T18:40:23","modified_gmt":"2026-02-06T18:40:23","slug":"projects","status":"publish","type":"page","link":"https:\/\/carlostech.com\/?page_id=1276","title":{"rendered":"Labs"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Miscellaneous Labs<\/h2>\n\n\n\n<div class=\"wp-block-stackable-posts stk-block-posts stk-block stk-c744f2f is-style-default\" data-v=\"2\" data-block-id=\"c744f2f\"><style>.stk-c744f2f .stk-img-wrapper{width:100% !important;}<\/style><div class=\"stk-inner-blocks stk-content-align stk-c744f2f-column\"><div class=\"stk-block-posts__items\"><div class=\"stk-block-posts__item\"><div class=\"stk-container stk-c744f2f-container stk--no-background stk--no-padding\"><article><h3 class=\"stk-block-posts__title\"><a href='https:\/\/carlostech.com\/?p=1849'>Managing Cloud Identity and Endpoints with Microsoft Entra ID and Intune<\/a><\/h3><a href=\"https:\/\/carlostech.com\/?p=1849\" class=\"stk-block-posts__image-link\"><figure class=\"stk-img-wrapper stk-image--shape-stretch\"><img loading=\"lazy\" decoding=\"async\" width=\"1757\" height=\"1000\" src=\"https:\/\/carlostech.com\/wp-content\/uploads\/2026\/01\/image-41.png\" class=\"attachment-full size-full wp-post-image\" alt=\"\" srcset=\"https:\/\/carlostech.com\/wp-content\/uploads\/2026\/01\/image-41.png 1757w, https:\/\/carlostech.com\/wp-content\/uploads\/2026\/01\/image-41-300x171.png 300w, https:\/\/carlostech.com\/wp-content\/uploads\/2026\/01\/image-41-1024x583.png 1024w, https:\/\/carlostech.com\/wp-content\/uploads\/2026\/01\/image-41-768x437.png 768w, https:\/\/carlostech.com\/wp-content\/uploads\/2026\/01\/image-41-1536x874.png 1536w\" sizes=\"auto, (max-width: 1757px) 100vw, 1757px\" \/><\/figure><\/a><div class=\"stk-block-posts__excerpt\"><p>Modern workloads require modern solutions. In previous projects, I built Active Directory environments across Azure and VMware &#8211; but both were traditional on-premises configurations. In this project, we are going to focus on Microsoft&#8217;s cloud identity platform instead: Entra ID (which was called Azure Active Directory before) and Intune for centralized endpoint management. Since I&#8217;ve&hellip;<\/p>\n<\/div><a class=\"stk-block-posts__readmore\" href=\"https:\/\/carlostech.com\/?p=1849\">Continue Reading<\/a><\/article><\/div><\/div><div class=\"stk-block-posts__item\"><div class=\"stk-container stk-c744f2f-container stk--no-background stk--no-padding\"><article><h3 class=\"stk-block-posts__title\"><a href='https:\/\/carlostech.com\/?p=1552'>Introduction to Linux<\/a><\/h3><a href=\"https:\/\/carlostech.com\/?p=1552\" class=\"stk-block-posts__image-link\"><figure class=\"stk-img-wrapper stk-image--shape-stretch\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"168\" src=\"https:\/\/carlostech.com\/wp-content\/uploads\/2026\/02\/ubugrg.png\" class=\"attachment-full size-full wp-post-image\" alt=\"\" \/><\/figure><\/a><div class=\"stk-block-posts__excerpt\"><p>What is Linux? Linux is an open-source operating system that rivals Microsoft Windows and Apple&#8217;s macOS. I mean, 70% of ALL servers worldwide utilize Linux. Linux does not have as much bloat or extra baggage compared to the other two operating systems, which in turn saves precious hardware resources on the machine you are running&hellip;<\/p>\n<\/div><a class=\"stk-block-posts__readmore\" href=\"https:\/\/carlostech.com\/?p=1552\">Continue Reading<\/a><\/article><\/div><\/div><div class=\"stk-block-posts__item\"><div class=\"stk-container stk-c744f2f-container stk--no-background stk--no-padding\"><article><h3 class=\"stk-block-posts__title\"><a href='https:\/\/carlostech.com\/?p=1698'>Ticketing Systems &#8211; Using ServiceNow<\/a><\/h3><a href=\"https:\/\/carlostech.com\/?p=1698\" class=\"stk-block-posts__image-link\"><figure class=\"stk-img-wrapper stk-image--shape-stretch\"><img loading=\"lazy\" decoding=\"async\" width=\"1757\" height=\"992\" src=\"https:\/\/carlostech.com\/wp-content\/uploads\/2026\/01\/image-30.png\" class=\"attachment-full size-full wp-post-image\" alt=\"\" srcset=\"https:\/\/carlostech.com\/wp-content\/uploads\/2026\/01\/image-30.png 1757w, https:\/\/carlostech.com\/wp-content\/uploads\/2026\/01\/image-30-300x169.png 300w, https:\/\/carlostech.com\/wp-content\/uploads\/2026\/01\/image-30-1024x578.png 1024w, https:\/\/carlostech.com\/wp-content\/uploads\/2026\/01\/image-30-768x434.png 768w, https:\/\/carlostech.com\/wp-content\/uploads\/2026\/01\/image-30-1536x867.png 1536w\" sizes=\"auto, (max-width: 1757px) 100vw, 1757px\" \/><\/figure><\/a><div class=\"stk-block-posts__excerpt\"><p>One of the most vital tools necessary to run a seamless, supportive and successful IT department is a proper ticketing system. Without one, there would be complete chaos. Issues would be reported through scattered emails, phone calls and hallway conversations with no central tracking. There also would be no paper trails, no priority management and&hellip;<\/p>\n<\/div><a class=\"stk-block-posts__readmore\" href=\"https:\/\/carlostech.com\/?p=1698\">Continue Reading<\/a><\/article><\/div><\/div><\/div><div class=\"stk-inner-blocks\"><\/div><\/div><\/div>\n\n\n\n<div style=\"height:8px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading mobile-network-labs\">Network Labs<\/h2>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-stackable-posts alignfull stk-block-posts has-text-align-center has-text-align-center-mobile stk-block stk-7b87027 is-style-default\" data-v=\"2\" data-block-id=\"7b87027\"><style>.stk-7b87027 {--stk-columns:3 !important;--stk-column-gap:1px !important;margin-bottom:41px !important;}.stk-7b87027 .stk-img-wrapper{width:100% !important;}@media screen and (max-width: 767px){.stk-7b87027 {--stk-columns:1 !important;--stk-column-gap:1px !important;min-height:var(--stk--preset--block-height--xxx-large, 40rem) !important;align-items:flex-start !important;max-width:1500px !important;min-width:auto !important;padding-top:var(--stk--preset--spacing--none, 0px) !important;padding-right:var(--stk--preset--spacing--none, 0px) !important;padding-bottom:var(--stk--preset--spacing--none, 0px) !important;padding-left:var(--stk--preset--spacing--none, 0px) !important;margin-top:var(--stk--preset--spacing--none, 0px) !important;margin-right:var(--stk--preset--spacing--none, 0px) !important;margin-bottom:var(--stk--preset--spacing--none, 0px) !important;margin-left:auto !important;display:flex !important;}}<\/style><div class=\"stk-inner-blocks stk-content-align stk-7b87027-column alignfull\"><div class=\"stk-block-posts__items\"><div class=\"stk-block-posts__item\"><div class=\"stk-container stk-7b87027-container stk--no-background stk--no-padding\"><article><h3 class=\"stk-block-posts__title\"><a href='https:\/\/carlostech.com\/?p=364'>Network Lab 3 &#8211; Advanced Security and Redundancy<\/a><\/h3><a href=\"https:\/\/carlostech.com\/?p=364\" class=\"stk-block-posts__image-link\"><figure class=\"stk-img-wrapper stk-image--shape-stretch\"><img loading=\"lazy\" decoding=\"async\" width=\"1075\" height=\"773\" src=\"https:\/\/carlostech.com\/wp-content\/uploads\/2025\/10\/image-205.png\" class=\"attachment-full size-full wp-post-image\" alt=\"\" srcset=\"https:\/\/carlostech.com\/wp-content\/uploads\/2025\/10\/image-205.png 1075w, https:\/\/carlostech.com\/wp-content\/uploads\/2025\/10\/image-205-300x216.png 300w, https:\/\/carlostech.com\/wp-content\/uploads\/2025\/10\/image-205-1024x736.png 1024w, https:\/\/carlostech.com\/wp-content\/uploads\/2025\/10\/image-205-768x552.png 768w\" sizes=\"auto, (max-width: 1075px) 100vw, 1075px\" \/><\/figure><\/a><div class=\"stk-block-posts__excerpt\"><p>This lab implements a collapsed-core enterprise network with emphasis on security, redundancy, and high availability. Key technologies include HSRP, EtherChannel, Rapid-PVST+, OSPF, stateful firewalls, a DMZ zone, wireless controller integration, and comprehensive Layer 2 security.<\/p>\n<\/div><a class=\"stk-block-posts__readmore\" href=\"https:\/\/carlostech.com\/?p=364\">Continue Reading<\/a><\/article><\/div><\/div><div class=\"stk-block-posts__item\"><div class=\"stk-container stk-7b87027-container stk--no-background stk--no-padding\"><article><h3 class=\"stk-block-posts__title\"><a href='https:\/\/carlostech.com\/?p=37'>Network Lab 2 &#8211; VLANs, Subnetting, Advanced Configuration<\/a><\/h3><a href=\"https:\/\/carlostech.com\/?p=37\" class=\"stk-block-posts__image-link\"><figure class=\"stk-img-wrapper stk-image--shape-stretch\"><img loading=\"lazy\" decoding=\"async\" width=\"1582\" height=\"651\" src=\"https:\/\/carlostech.com\/wp-content\/uploads\/2025\/10\/PacketTracer_tbxFsvfBOH.png\" class=\"attachment-full size-full wp-post-image\" alt=\"\" srcset=\"https:\/\/carlostech.com\/wp-content\/uploads\/2025\/10\/PacketTracer_tbxFsvfBOH.png 1582w, https:\/\/carlostech.com\/wp-content\/uploads\/2025\/10\/PacketTracer_tbxFsvfBOH-300x123.png 300w, https:\/\/carlostech.com\/wp-content\/uploads\/2025\/10\/PacketTracer_tbxFsvfBOH-1024x421.png 1024w, https:\/\/carlostech.com\/wp-content\/uploads\/2025\/10\/PacketTracer_tbxFsvfBOH-768x316.png 768w, https:\/\/carlostech.com\/wp-content\/uploads\/2025\/10\/PacketTracer_tbxFsvfBOH-1536x632.png 1536w\" sizes=\"auto, (max-width: 1582px) 100vw, 1582px\" \/><\/figure><\/a><div class=\"stk-block-posts__excerpt\"><p>Network segmentation using VLANs. Router-on-a-stick method, remote management configuration. DHCP server and PAT configuration. <\/p>\n<\/div><a class=\"stk-block-posts__readmore\" href=\"https:\/\/carlostech.com\/?p=37\">Continue Reading<\/a><\/article><\/div><\/div><div class=\"stk-block-posts__item\"><div class=\"stk-container stk-7b87027-container stk--no-background stk--no-padding\"><article><h3 class=\"stk-block-posts__title\"><a href='https:\/\/carlostech.com\/?p=9'>Network Lab 1- Device Hardening and Initial Configurations<\/a><\/h3><a href=\"https:\/\/carlostech.com\/?p=9\" class=\"stk-block-posts__image-link\"><figure class=\"stk-img-wrapper stk-image--shape-stretch\"><img loading=\"lazy\" decoding=\"async\" width=\"1566\" height=\"622\" src=\"https:\/\/carlostech.com\/wp-content\/uploads\/2025\/10\/PacketTracer_DHJ2XeCpVW.png\" class=\"attachment-full size-full wp-post-image\" alt=\"\" srcset=\"https:\/\/carlostech.com\/wp-content\/uploads\/2025\/10\/PacketTracer_DHJ2XeCpVW.png 1566w, https:\/\/carlostech.com\/wp-content\/uploads\/2025\/10\/PacketTracer_DHJ2XeCpVW-300x119.png 300w, https:\/\/carlostech.com\/wp-content\/uploads\/2025\/10\/PacketTracer_DHJ2XeCpVW-1024x407.png 1024w, https:\/\/carlostech.com\/wp-content\/uploads\/2025\/10\/PacketTracer_DHJ2XeCpVW-768x305.png 768w, https:\/\/carlostech.com\/wp-content\/uploads\/2025\/10\/PacketTracer_DHJ2XeCpVW-1536x610.png 1536w\" sizes=\"auto, (max-width: 1566px) 100vw, 1566px\" \/><\/figure><\/a><div class=\"stk-block-posts__excerpt\"><p>Focus on device hardening and initial configurations of new devices within a network. <\/p>\n<\/div><a class=\"stk-block-posts__readmore\" href=\"https:\/\/carlostech.com\/?p=9\">Continue Reading<\/a><\/article><\/div><\/div><\/div><div class=\"stk-inner-blocks\"><\/div><\/div><\/div>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Active Directory Labs<\/h2>\n\n\n\n<div style=\"height:11px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-stackable-posts stk-block-posts stk-block stk-7aabcf0 is-style-default\" data-v=\"2\" data-block-id=\"7aabcf0\"><style>.stk-7aabcf0 {--stk-columns:3 !important;--stk-column-gap:2px !important;}.stk-7aabcf0 .stk-img-wrapper{width:100% !important;}@media screen and (max-width: 767px){.stk-7aabcf0 {--stk-columns:1 !important;}}<\/style><div class=\"stk-inner-blocks stk-content-align stk-7aabcf0-column\"><div class=\"stk-block-posts__items\"><div class=\"stk-block-posts__item\"><div class=\"stk-container stk-7aabcf0-container stk--no-background stk--no-padding\"><article><h3 class=\"stk-block-posts__title\"><a href='https:\/\/carlostech.com\/?p=553'>Active Directory Lab 3 &#8211; GPOs, Service Accounts, Permissions<\/a><\/h3><a href=\"https:\/\/carlostech.com\/?p=553\" class=\"stk-block-posts__image-link\"><figure class=\"stk-img-wrapper stk-image--shape-stretch\"><img loading=\"lazy\" decoding=\"async\" width=\"1928\" height=\"1082\" src=\"https:\/\/carlostech.com\/wp-content\/uploads\/2025\/10\/vmware_9SDjNNMOOb.png\" class=\"attachment-full size-full wp-post-image\" alt=\"\" srcset=\"https:\/\/carlostech.com\/wp-content\/uploads\/2025\/10\/vmware_9SDjNNMOOb.png 1928w, https:\/\/carlostech.com\/wp-content\/uploads\/2025\/10\/vmware_9SDjNNMOOb-300x168.png 300w, https:\/\/carlostech.com\/wp-content\/uploads\/2025\/10\/vmware_9SDjNNMOOb-1024x575.png 1024w, https:\/\/carlostech.com\/wp-content\/uploads\/2025\/10\/vmware_9SDjNNMOOb-768x431.png 768w, https:\/\/carlostech.com\/wp-content\/uploads\/2025\/10\/vmware_9SDjNNMOOb-1536x862.png 1536w\" sizes=\"auto, (max-width: 1928px) 100vw, 1928px\" \/><\/figure><\/a><div class=\"stk-block-posts__excerpt\"><p>Showcasing the power of GPOs and enterprise file management. Setting up shared network drives deployed through Group Policy, using File Server Resource Manager to control storage, configure folder permissions, implement access-based enumeration. Create service accounts.<\/p>\n<\/div><a class=\"stk-block-posts__readmore\" href=\"https:\/\/carlostech.com\/?p=553\">Continue Reading<\/a><\/article><\/div><\/div><div class=\"stk-block-posts__item\"><div class=\"stk-container stk-7aabcf0-container stk--no-background stk--no-padding\"><article><h3 class=\"stk-block-posts__title\"><a href='https:\/\/carlostech.com\/?p=95'>Active Directory Lab 2 &#8211; VMWare<\/a><\/h3><a href=\"https:\/\/carlostech.com\/?p=95\" class=\"stk-block-posts__image-link\"><figure class=\"stk-img-wrapper stk-image--shape-stretch\"><img loading=\"lazy\" decoding=\"async\" width=\"1928\" height=\"1082\" src=\"https:\/\/carlostech.com\/wp-content\/uploads\/2025\/10\/vmware_9SDjNNMOOb.png\" class=\"attachment-full size-full wp-post-image\" alt=\"\" srcset=\"https:\/\/carlostech.com\/wp-content\/uploads\/2025\/10\/vmware_9SDjNNMOOb.png 1928w, https:\/\/carlostech.com\/wp-content\/uploads\/2025\/10\/vmware_9SDjNNMOOb-300x168.png 300w, https:\/\/carlostech.com\/wp-content\/uploads\/2025\/10\/vmware_9SDjNNMOOb-1024x575.png 1024w, https:\/\/carlostech.com\/wp-content\/uploads\/2025\/10\/vmware_9SDjNNMOOb-768x431.png 768w, https:\/\/carlostech.com\/wp-content\/uploads\/2025\/10\/vmware_9SDjNNMOOb-1536x862.png 1536w\" sizes=\"auto, (max-width: 1928px) 100vw, 1928px\" \/><\/figure><\/a><div class=\"stk-block-posts__excerpt\"><p>Active Directory using VMWare. Creating Group Policies, establishing organizational unit structures and exploring features such as security filtering.<\/p>\n<\/div><a class=\"stk-block-posts__readmore\" href=\"https:\/\/carlostech.com\/?p=95\">Continue Reading<\/a><\/article><\/div><\/div><div class=\"stk-block-posts__item\"><div class=\"stk-container stk-7aabcf0-container stk--no-background stk--no-padding\"><article><h3 class=\"stk-block-posts__title\"><a href='https:\/\/carlostech.com\/?p=202'>Active Directory Lab 1 &#8211; Azure<\/a><\/h3><a href=\"https:\/\/carlostech.com\/?p=202\" class=\"stk-block-posts__image-link\"><figure class=\"stk-img-wrapper stk-image--shape-stretch\"><img loading=\"lazy\" decoding=\"async\" width=\"794\" height=\"446\" src=\"https:\/\/carlostech.com\/wp-content\/uploads\/2025\/09\/image-85.png\" class=\"attachment-full size-full wp-post-image\" alt=\"\" srcset=\"https:\/\/carlostech.com\/wp-content\/uploads\/2025\/09\/image-85.png 794w, https:\/\/carlostech.com\/wp-content\/uploads\/2025\/09\/image-85-300x169.png 300w, https:\/\/carlostech.com\/wp-content\/uploads\/2025\/09\/image-85-768x431.png 768w\" sizes=\"auto, (max-width: 794px) 100vw, 794px\" \/><\/figure><\/a><div class=\"stk-block-posts__excerpt\"><p>Using Active Directory with Microsoft Azure machines. Showcasing the landscape of Azure, initial installment of Active Directory, and some Powershell automation. <\/p>\n<\/div><a class=\"stk-block-posts__readmore\" href=\"https:\/\/carlostech.com\/?p=202\">Continue Reading<\/a><\/article><\/div><\/div><\/div><div class=\"stk-inner-blocks\"><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Miscellaneous Labs Managing Cloud Identity and Endpoints with Microsoft Entra ID and Intune Modern workloads require modern solutions. In previous projects, I built Active Directory environments across Azure and VMware &#8211; but both were traditional on-premises configurations. In this project,<\/p>\n<p><a href=\"https:\/\/carlostech.com\/?page_id=1276\" class=\"awp-btn awp-btn-secondary awp-btn-bubble\"><span class=\"screen-reader-text\">Labs<\/span><i class=\"fa fa-arrow-right\"><\/i><span class=\"bubble_effect\"><span class=\"circle top-left\"><\/span><span class=\"circle top-left\"><\/span><span class=\"circle top-left\"><\/span>\t<span class=\"button effect-button\"><\/span><span class=\"circle bottom-right\"><\/span>\t<span class=\"circle bottom-right\"><\/span><span class=\"circle bottom-right\"><\/span><\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1276","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/carlostech.com\/index.php?rest_route=\/wp\/v2\/pages\/1276","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/carlostech.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/carlostech.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/carlostech.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/carlostech.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1276"}],"version-history":[{"count":19,"href":"https:\/\/carlostech.com\/index.php?rest_route=\/wp\/v2\/pages\/1276\/revisions"}],"predecessor-version":[{"id":1910,"href":"https:\/\/carlostech.com\/index.php?rest_route=\/wp\/v2\/pages\/1276\/revisions\/1910"}],"wp:attachment":[{"href":"https:\/\/carlostech.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1276"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}