BorisGigovic
Executive VP and owner of Eccentrix, a firm providing technological skills improvement solutions to businesses.
ECCENTRIXMontreal
Pinned Repositories
20-Useful-Ways-to-Use-Copilot-in-Your-Day-to-Day-Productivity
ChatGPT This guide clarifies Microsoft 365 Groups, covering their definition, uses, differences from legacy groups, and integration with other Microsoft 365 services.
Azure-Lighthouse-Capabilities-Uses-and-Strategies-for-Maximum-Efficiency-
Azure-Private-Endpoints
CCSP-and-CCSE-Certifications-A-Complete-Guide-for-IT-Professionals-
Comprehensive-Guide-to-Security-and-CISSP-Trainings-and-Certification-Paths-
Differences-Between-Power-BI-Desktop-and-Power-BI-for-the-Web-
Exploring-Active-Directory-Domain-and-Forest-Levels-
Exploring-the-Relationship-Between-Microsoft-Graph-and-Microsoft-Copilot-
Guide-to-Operator-Connect-in-Microsoft-Teams-
Implementing-BYOD-Devices-in-the-Workplace-
BorisGigovic's Repositories
BorisGigovic/20-Useful-Ways-to-Use-Copilot-in-Your-Day-to-Day-Productivity
ChatGPT This guide clarifies Microsoft 365 Groups, covering their definition, uses, differences from legacy groups, and integration with other Microsoft 365 services.
BorisGigovic/Azure-Lighthouse-Capabilities-Uses-and-Strategies-for-Maximum-Efficiency-
BorisGigovic/Azure-Private-Endpoints
BorisGigovic/CCSP-and-CCSE-Certifications-A-Complete-Guide-for-IT-Professionals-
BorisGigovic/Comprehensive-Guide-to-Security-and-CISSP-Trainings-and-Certification-Paths-
BorisGigovic/Differences-Between-Power-BI-Desktop-and-Power-BI-for-the-Web-
BorisGigovic/Exploring-Active-Directory-Domain-and-Forest-Levels-
BorisGigovic/Exploring-the-Relationship-Between-Microsoft-Graph-and-Microsoft-Copilot-
BorisGigovic/Guide-to-Operator-Connect-in-Microsoft-Teams-
BorisGigovic/Implementing-BYOD-Devices-in-the-Workplace-
BorisGigovic/IT-Governance-in-Azure-
IT governance in Azure plays a critical role in ensuring that cloud resources are managed effectively, securely, and in compliance with regulatory requirements.
BorisGigovic/Log-Types-in-Computer-Systems
This guide covers log types, implementation, management tips, examples, and ensuring full functionality.
BorisGigovic/Session-Border-Controllers-in-IP-Telephony-
BorisGigovic/The-Application-Proxy-in-Azure-
BorisGigovic/The-Role-of-OSINT-in-Computer-Security-
BorisGigovic/Understanding-the-Cyber-Kill-Chain-
Lockheed Martin's Cyber Kill Chain aids in cybersecurity defense strategies.
BorisGigovic/Understanding-the-Difference-Between-VPN-and-VNet-Peering-in-Azure
BorisGigovic/Containers-vs-Virtual-Machines-Technical-Migration-Analysis
BorisGigovic/Unlocking-Hidden-Gems-in-Microsoft-365-The-Most-Exciting-Productivity-Tools-You-May-Not-Know-About-
BorisGigovic/Web-Application-Firewalls