lcbuilt12's profile picture. Cybersecurity. InfoSec. Threat modeling. Security Architecture. IAM. 
#InformationSecurity #AZ900 #CC

Erik K

@lcbuilt12

Cybersecurity. InfoSec. Threat modeling. Security Architecture. IAM. #InformationSecurity #AZ900 #CC

Join me on TradingView, this place is awesome. If you eventually grab a paid plan, we each get up to $15 as a bonus! Use this link to sign up: tradingview.com/black-friday/?…


$AMD ATH 🌱💰

lcbuilt12's tweet image. $AMD ATH 🌱💰

Erik K reposted

🎉 New Year, New Skills! 🚀 We're excited to kick off our #NewYearGiveaway! Get the chance to level up your #CloudSecurity expertise with hands-on #cloudsecurity training courses! 📚✨ To Enter: 👍 Like, 🔁 Share this tweet 💬 Comment below Check out our Training Courses &…

Cloud_Breach's tweet image. 🎉 New Year, New Skills! 🚀 We're excited to kick off our #NewYearGiveaway! Get the chance to level up your #CloudSecurity expertise with hands-on #cloudsecurity training courses! 📚✨

To Enter: 👍 Like, 🔁 Share this tweet 💬 Comment below

Check out our Training Courses &…

TryHackMe | Advent of Cyber 2024


Erik K reposted

In the fourth report of our ongoing Cyberattack series, a credential phishing and smishing cyberattack was used to target a privileged user with social engineering. Learn how we detected the incident and responded to it: msft.it/6013iPjLl #IncidentResponse


Erik K reposted

Microsoft just released their updated Microsoft Cybersecurity Reference Architectures (MCRA). A slide deck full of high-level guidance on securing one's organisation. Very handy for orgs starting out or already on the way. learn.microsoft.com/en-us/security…

david_obrien's tweet image. Microsoft just released their updated Microsoft Cybersecurity Reference Architectures (MCRA). A slide deck full of high-level guidance on securing one's organisation. Very handy for orgs starting out or already on the way.

learn.microsoft.com/en-us/security…

Erik K reposted

It seems to me that the personal evolutionary process takes place in five distinct steps. If you can do those five things well, you will almost certainly be successful. Together, these five steps make up a loop, like the one here. #principleoftheday

RayDalio's tweet image. It seems to me that the personal evolutionary process takes place in five distinct steps. If you can do those five things well, you will almost certainly be successful. Together, these five steps make up a loop, like the one here. #principleoftheday
RayDalio's tweet image. It seems to me that the personal evolutionary process takes place in five distinct steps. If you can do those five things well, you will almost certainly be successful. Together, these five steps make up a loop, like the one here. #principleoftheday

Called the help desk for the first time ever and they replaced my laptop. I lost all my stickers 👀😭


Sara Saves Space. Official launch is today October 18, 2023! icewahl.com

lcbuilt12's tweet image. Sara Saves Space. Official launch is today October 18, 2023!

icewahl.com

Erik K reposted

Microsoft has been published a #TokenTheft playbook which includes investigation checklist, hunting queries, response/recovery task list but also accompanying decision tree. A must read for every #AzureAD, #Entra, #SecOps admin and architect. learn.microsoft.com/en-us/security…


back to studying


United States Trends

Loading...

Something went wrong.


Something went wrong.