My portfolio
Cybersecurity content
-
How to recognize phishing
-
What is cybersecurity compliance?
-
What is proactive cybersecurity?
-
Top cybersecurity threats in 2023
-
5 cyber hygiene best practices
-
(Webinar) Cybersecurity content
-
Making cyber accessible for women
-
(2022) The state of the dark web
-
(2021) A journey through the dark web
-
How to catch a phish
-
Lessons learned from ProxyShell
-
What is the zero trust security model?
-
Why persistence is a staple for hackers
-
Lessons learned from Colonial Pipeline
-
How to prioritize vulnerabilities
-
How to conduct a vulnerability assessment
-
What is a vulnerability scanner?
-
Patch management vs. vulnerability management
Technical content
-
How to manage Windows updates
-
How to deploy Office 365
-
How to silently uninstall PuTTY
-
Active Directory vs. Microsoft Entra ID
Everything else :)
-
Sysadmins vs. AI: 5 ways humans beat the bots
-
Reference computer options for Windows imaging
-
How to build an IT resume
-
What is the 3-2-1 backup rule?
-
Guide to the different types of Microsoft and Office 365 licenses
-
What is Microsoft Volume Licensing?
-
The State of Sysadmin: Women in IT