Guides

Cyber Security Guides

Find Out how or what

Welcome to our guides section full of what is and how to guides to help you!

Cybersecurity and Information Technology are vast and ever-expanding areas. I can see a time where anyone knows everything about Cyber Security. 

As a result of this, there are many times each week when I will come across issues, questions or situations that I have not encountered before. In these situations, I always try to take notes and document what I have done to help others who may encounter the same problems.

So In this section, I will be documenting the two types of guides that I generally keep How to and What is. 

  • SC-200 Exam Guide ( & Recertification Guide)

    This article will share how I successfully prepared for and passed the SC-200: Microsoft Security Operations Analyst certification exam. It has been two years since I wrote this article, and since then, I’ve passed (just) the SC-200 Microsoft security Operations … Read more

    Find Out More
  • Best Cyber security certifications for beginners

    Best Cyber security certifications for beginners – NI Cyber Guy Best Cybersecurity Certification for Beginners “What are the best beginners cyber security certifications?” is probably the question that most people I have spoken to ask. Those who are interested in … Read more

    Find Out More
  • How Can I Fix an 0x0 0x0 Error Permanently?

    If you have found this article, it probably means that you have encountered the 0x0 0x0 error code and are looking to fix it. In that is the case, you’ve found the right place as we’ll cover everything you need … Read more

    Find Out More
  • Ways to Check A Website is Legit

    Ways to Check if a Website is Legit The internet, like many other technological advances, has made the way we lead our lives much easier. It does however at the same time expose us to many dangers that lurk in … Read more

    Find Out More
  • Small Business Cyber Security

    What You Need To Know About Small Business Cyber Security It’s critically important for you to protect your business against cyber-attacks, irrespective of whether you’re a bigger company with employees or a sole trader. In this article, we’ll discuss why … Read more

    Find Out More
  • How to Spot A Fake Email

    7 Essential Tips to Spot a Fake Email Along with the advent of new technologies today, online threats such as cybercrime became prominent. Cybercriminals use email as a platform to continuously do their unlawful activities. Since emails are used for … Read more

    Find Out More
  • Blocking Users By Country Using Azure Conditional Access

    As many of us will have been reading about and hearing about in the news, online and in our feeds. Due to the situation in eastern Europe at the minute, many governments and their agencies are warning of an increase … Read more

    Find Out More
  • Microsoft SC-900 Exam Guide

    Exam Prep Guide SC-900: Microsoft Security, Compliance, and Identity Fundamentals Exam from the number of DMs I got when I posted about passing the SC-900 exam on LinkedIn, there are quite a few planning to take the SC-900 exam shortly. So I … Read more

    Find Out More
  • Step-by-Step Guide to Easily Cancel a Microsoft Subscription

    Need to cancel a Microsoft subscription? Whether you’re reassessing your software needs or ending a trial, our guide provides a simple, straightforward path to help you terminate your Microsoft subscription promptly. Here, you’ll find a step-by-step approach to navigate your … Read more

    Find Out More
  • What is Identity and Access Management: A Comprehensive Overview

    What is Identity and Access Management (IAM)? It’s the backbone of IT security, a systematic approach that ensures only authorized individuals have the right to access certain information and resources in your organization. In the world where digital threats lurk … Read more

    Find Out More
  • Mastering the Azure Hierarchy: A Comprehensive Guide to Organizing Your Cloud Resources

    The ‘azure hierarchy’ is the backbone for managing cloud operations, incorporating management groups, subscriptions, resource groups, and individual resources. This article cuts through the complexity, providing you actionable steps on how to organize these components for optimal control over your … Read more

    Find Out More
  • Maximizing Security: How Conditional Access Enhances Your Data Protection

    What is conditional access and how does it tighten security around your data? In the landscape of cybersecurity, conditional access acts as a dynamic barrier, filtering user access to company resources based on conditions like user location, device compliance, and … Read more

    Find Out More
  • Essential Guide to Role-Based Access Control

    What is RBAC and how can it secure your organization’s data? Role-Based Access Control (RBAC) is a straightforward approach to managing access across your enterprise, ensuring individuals have only the necessary rights to perform their roles effectively. Our comprehensive guide … Read more

    Find Out More
  • Mastering Email Safety: A Simple Guide to Whitelist Domain Office 365

    To keep vital emails flowing smoothly to your inbox in Office 365, knowing how to whitelist domain Office 365 is essential. Our guide plainly explains the steps to whitelist domains, securing your email communications from being wrongly caught by spam … Read more

    Find Out More
  • Mastering the Kusto Query Language: Your Essential Guide to Powerful Data Analysis

    The Kusto Query Language (KQL) stands as a cornerstone of data analytics within the Azure platform. Our guide delves into KQL’s utility for parsing and dissecting structured and semi-structured data across Azure services. You’ll understand how KQL streamlines data analysis, … Read more

    Find Out More
  • Encrypting Emails IN Outlook

    Looking to encrypt email Outlook? This article delivers a practical roadmap for securing your electronic communications within minutes. You’ll learn not only the steps to encrypt emails but also how to handle certificates and troubleshoot common issues. Secure your Outlook … Read more

    Find Out More
  • Schedule an Email Outlook

    Need to schedule an email Outlook? Whether you’re planning ahead or managing your time more efficiently, scheduling emails is a key feature of Outlook. In this guide, we dive directly into how to schedule an email Outlook across different platforms, … Read more

    Find Out More
  • Recall Email Outlook

    Mishaps happen — you click ‘send’ in Outlook and immediately wish you hadn’t. The ‘recall email Outlook’ feature can be your undo button. This article swiftly navigates you through the process for a rapid fix, clarifying when email recall is … Read more

    Find Out More