Level up your cyber security assessments with this framework
26:22
How to Protect against Token Theft | Conditional Access
27:25
Getting started with email security in Microsoft 365 | Phishing protections
36:32
Manage Local Admin Accounts Securely | Top Tips
17:34
Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)
46:05
Phishing 2.0 - Detecting Evilginx, EvilnoVNC, Muraena and Modlishka
1:23:37
CIPP vs Microsoft 365 Lighthouse | Deep Dive
53:49
Exploring the NIST Cybersecurity Framework 2.0: What You Need to Know
41:07