Great video, I work in as an IT Support Engineer and we regularly do patch management, finding end users that haven’t rebooted their PC over a month, very common.
This is great Kevin. Your explaining is so straightforward. I would like to watch more of your security videos. One I would find interesting is what happens when you detect that a hacker has been on one of the endpoints or the company network. What would happen after this.
Hi Kev, first off wanted to say a huge thank you because you’re the reason why I’m excelling in my current help desk position. I’m trying to break into IAM and was wondering if you have any recommendations on courses ? Or if you have a course that touches base on IAM🙏🏾