Microsoft
Office 365 Threat Hunting
Switching from Google Workspace to M365
Generating Software Bills of Materials (SBOM)
Windows Update Compliance Workbook Community Edition
Ransomware Resiliency with Azure and Microsoft 365
Hacking AD Connect
API Graph Permission Explorer
Incident Response Playbooks
Active Directory
Securing Active Directory
Recovery after Compromise
Penetration Testing
OWASP Amass Tutorial
Burpsuite Tutorial
Hacking Tutorials
Best Practice Guides
Microsoft Azure
Amazon AWS
Microsoft Office 365
NIST Publications
Security Operations
Blue Team Cheat Sheet
10 Types of Common Cyber Attacks
Windows Hardening
Installing Sysmon for monitoring attacks
Local Admin Password Solution (LAPS)
Microsoft Security Baselines
Windows Update Polices
Updating best practices for Domain Controllers
Security Awareness
Personal Security Checklist
Phishing Quiz