Top Five Security Tips
1:10:42
PASSKEYS - What they are, why we want them and how to use them!
24:03
Leveraging Microsoft Defender for Identity
17:34
Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)
52:32
Protecting Against Credential and Token Theft
28:46
How Much Money Can You Make As An ONLINE Personal Trainer
1:01:08
Deep Dive on Microsoft Entra Private Access
57:11
Understanding and Getting Started with ZERO TRUST
56:26