Cyber Security – Personal checklist to be followed
In this article we are discussing our personal security checklist which we should follow to be SAFE, SECURE
BE SAFE, BE SECURE !!!!
In this article we are discussing our personal security checklist which we should follow to be SAFE, SECURE
BE SAFE, BE SECURE !!!!
In this article we will discuss how to navigate to Microsoft Purview compliance portal
HAVE A FANTASTIC LEARNING AHEAD !!!
Implementing security continues. In this article we will discuss – how to enable two factor authentication for Facebook
STAY SECURED !!! STAY SAFE !!! HAVE A FANTASTIC TIME AHEAD!!!
Azure Active Directory – New capability – Tenant Creation Control / Tenant Lockdown – New feature
HAVE A GREAT TIME AHEAD ! LIFE IS BEAUTIFUL 🙂
Ethical Hacking – 10 commands in Kali Linux – Part 2
Hi all,
Today in this series of ethical hacking we are going to explore the commands of Kali Linux.
Microsoft 365 – Where to start with Security implementation for my tenant – part 1 – Is MFA enabled?
Hi All,
Greetings for the day!!!
Keep exploring security concepts. Today – lets discuss about – Privileged Identity Management – PIM
HAVE A GREAT DAY AHEAD!!! LIFE IS BEAUTIFUL 🙂
Exploring Microsoft 365 Defender – part 3 – Microsoft 365 Defender for Endpoint – Exploring cloud security concepts continues
Ethical Hacking : Basics of Malware – Virus vs Worm vs Trojan
Hi all,
Today we are going to discuss the basics of malware – Virus vs Worm vs Trojan. We are going to see the what damage is done by malware.
Ethical Hacking – 15 commands in Kali Linux
Hi all,
Today in this article we are going to explore 15 commands in Kali Linux. It is necessary to some basic commands in Kali Linux before starting ethical hacking