Incident Response: Azure Log Analysis

22:05
Learn Active Directory Kerberoasting

1:43:03
Cybersecurity IDR: Incident Detection & Response | Google Cybersecurity Certificate

21:11
How Hackers Hide From Memory Scanners

25:40
I Took Over a Microsoft Cloud Account. Again.

13:49
7 Cybersecurity Tips NOBODY Tells You (but are EASY to do)

13:48
How To Learn Any Skill So Fast It Feels Illegal

12:30
SOC 101: Real-time Incident Response Walkthrough

23:19