
Exploring Microsoft Defender for Office 365 – Phishing Emails
Protecting your email system from cyberthreats like phishing, ransomware, and business email compromise is crucial in today’s digital landscape. With...

Microsoft Defender For Endpoint Part 2
Vulnerability Discovery and Remediation with Microsoft Defender & Intune Overview: Last time, we installed Microsoft Defender, identified vulnerabilities, and viewed...

Microsoft Defender For Endpoint Part 1
Installing Windows Defender and Examining Vulnerabilities Overview : Defender for Endpoint, Microsoft’s enterprise security platform, integrates endpoint behavioral sensors within...

Vulnerability Management Labs Review
Contents: Lab 1 : Setting up Metasploitable 2 & Scanning Using Nmap Lab 2 : Vulnerability Scanning Using Nessus Lab...

How to Build Your Microsoft AD/Configuration Manager + Pentesting Lab in 30 Minutes
This lab kit from Microsoft contains evaluation software designed for IT professionals interested in assessing Windows 10 deployment and management...

The Pentester BluePrint: Starting a Career as an Ethical HackerĀ Book Review
According to the Cambridge dictionary, a blueprint means an early plan or design that explains how something .might be achieved....

Surviving IT Book Review
Sept 24, 2023 I highly recommend Mr. Paul Cunningham’s book to anyone seeking career advice in the IT industry. Whether...

Cyber Career Master Plan Book Review:
August 26, 2023 Sharing notes from Mr. Gerald Auger’s book. This book has inspired me to start a blog as...