Forem

Boris Gigovic profile picture

Boris Gigovic

Involved in corporate training for more than fifteen years with a highly technical knowledge background.

Work

Executive VP at Eccentrix

ITIL & PRINCE2: Making Service Management and Project Success Work Together
Cover image for ITIL & PRINCE2: Making Service Management and Project Success Work Together

ITIL & PRINCE2: Making Service Management and Project Success Work Together

1
Comments 1
2 min read

Want to connect with Boris Gigovic?

Create an account to connect with Boris Gigovic. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
Azure DevOps Implementation Patterns That Actually Work
Cover image for Azure DevOps Implementation Patterns That Actually Work

Azure DevOps Implementation Patterns That Actually Work

Comments
2 min read
CRM vs ERP: A Real-world Guide to Business Applications
Cover image for CRM vs ERP: A Real-world Guide to Business Applications

CRM vs ERP: A Real-world Guide to Business Applications

Comments 3
2 min read
CISSP: Developing Strategic Security Leadership
Cover image for CISSP: Developing Strategic Security Leadership

CISSP: Developing Strategic Security Leadership

Comments 2
2 min read
BI: Real-world Advanced Data Modeling Techniques
Cover image for BI: Real-world Advanced Data Modeling Techniques

BI: Real-world Advanced Data Modeling Techniques

Comments
3 min read
Windows Server 2025: Real-world Security in Hybrid Environments
Cover image for Windows Server 2025: Real-world Security in Hybrid Environments

Windows Server 2025: Real-world Security in Hybrid Environments

2
Comments 1
2 min read
Real-world Microsoft 365 Copilot Implementation
Cover image for Real-world Microsoft 365 Copilot Implementation

Real-world Microsoft 365 Copilot Implementation

Comments
2 min read
Microsoft Entra ID: Implementing Advanced Rights Management
Cover image for Microsoft Entra ID: Implementing Advanced Rights Management

Microsoft Entra ID: Implementing Advanced Rights Management

Comments
2 min read
Microsoft Fabric: Real-time Analytics Implementation Patterns
Cover image for Microsoft Fabric: Real-time Analytics Implementation Patterns

Microsoft Fabric: Real-time Analytics Implementation Patterns

Comments
2 min read
CISA: Real-world Information Systems Auditing
Cover image for CISA: Real-world Information Systems Auditing

CISA: Real-world Information Systems Auditing

Comments
2 min read
Azure Arc: Real-World Success Patterns in Hybrid Cloud Implementation
Cover image for Azure Arc: Real-World Success Patterns in Hybrid Cloud Implementation

Azure Arc: Real-World Success Patterns in Hybrid Cloud Implementation

Comments
2 min read
Microsoft Loop: Technical Patterns in Modern Collaboration
Cover image for Microsoft Loop: Technical Patterns in Modern Collaboration

Microsoft Loop: Technical Patterns in Modern Collaboration

1
Comments
2 min read
Azure Container Apps: Technical Insights from Production Deployments
Cover image for Azure Container Apps: Technical Insights from Production Deployments

Azure Container Apps: Technical Insights from Production Deployments

Comments
2 min read
Windows Server 2025: Technical Evolution in Enterprise

Windows Server 2025: Technical Evolution in Enterprise

Comments
2 min read
Azure OpenAI in Production: Technical Insights from the Trenches
Cover image for Azure OpenAI in Production: Technical Insights from the Trenches

Azure OpenAI in Production: Technical Insights from the Trenches

Comments
3 min read
Dynamics 365: Patterns in Modern Customer Experience Platforms Perspective
Cover image for Dynamics 365: Patterns in Modern Customer Experience Platforms Perspective

Dynamics 365: Patterns in Modern Customer Experience Platforms Perspective

Comments
2 min read
Microsoft Copilot: First 90 Days - A Developer's Perspective

Microsoft Copilot: First 90 Days - A Developer's Perspective

Comments
2 min read
Microsoft Copilot: First 90 Days - A Developer's Perspective

Microsoft Copilot: First 90 Days - A Developer's Perspective

Comments
2 min read
CEH: Advanced Penetration Testing Guide
Cover image for CEH: Advanced Penetration Testing Guide

CEH: Advanced Penetration Testing Guide

Comments
3 min read
CompTIA Network+: Implementation Guide

CompTIA Network+: Implementation Guide

Comments
2 min read
VMware vSphere 8: High Availability Design
Cover image for VMware vSphere 8: High Availability Design

VMware vSphere 8: High Availability Design

Comments
3 min read
Solving Complex Network Issues: A Network Engineer's Journey
Cover image for Solving Complex Network Issues: A Network Engineer's Journey

Solving Complex Network Issues: A Network Engineer's Journey

1
Comments
3 min read
Containers vs Virtual Machines: A Developer's Migration Journey
Cover image for Containers vs Virtual Machines: A Developer's Migration Journey

Containers vs Virtual Machines: A Developer's Migration Journey

Comments
3 min read
Mobile Security: Challenges, Solutions, and Best Practices
Cover image for Mobile Security: Challenges, Solutions, and Best Practices

Mobile Security: Challenges, Solutions, and Best Practices

3
Comments
6 min read
Azure Lighthouse: Capabilities, Uses, and Strategies for Maximum Efficiency
Cover image for Azure Lighthouse: Capabilities, Uses, and Strategies for Maximum Efficiency

Azure Lighthouse: Capabilities, Uses, and Strategies for Maximum Efficiency

1
Comments
5 min read
Windows 365 Desktop and Azure Desktop Virtualization
Cover image for Windows 365 Desktop and Azure Desktop Virtualization

Windows 365 Desktop and Azure Desktop Virtualization

Comments
3 min read
The Concept of DMZ in Computer Networks
Cover image for The Concept of DMZ in Computer Networks

The Concept of DMZ in Computer Networks

Comments
3 min read
Microsoft Copilot Security
Cover image for Microsoft Copilot Security

Microsoft Copilot Security

Comments
5 min read
Implementing PIM and PAM Security in Azure: A Comprehensive Guide
Cover image for Implementing PIM and PAM Security in Azure: A Comprehensive Guide

Implementing PIM and PAM Security in Azure: A Comprehensive Guide

Comments
4 min read
How Microsoft Dynamics 365 and Power Platform Work Together
Cover image for How Microsoft Dynamics 365 and Power Platform Work Together

How Microsoft Dynamics 365 and Power Platform Work Together

1
Comments 2
6 min read
Exploring the Relationship Between Microsoft Graph and Microsoft Copilot
Cover image for Exploring the Relationship Between Microsoft Graph and Microsoft Copilot

Exploring the Relationship Between Microsoft Graph and Microsoft Copilot

6
Comments
4 min read
Computer Incident Handling: Steps, Expertise, and Best Practices
Cover image for Computer Incident Handling: Steps, Expertise, and Best Practices

Computer Incident Handling: Steps, Expertise, and Best Practices

Comments
5 min read
Boosting Your Knowledge with Microsoft SC-900, AZ-900, and MS-900 Fundamentals Trainings
Cover image for Boosting Your Knowledge with Microsoft SC-900, AZ-900, and MS-900 Fundamentals Trainings

Boosting Your Knowledge with Microsoft SC-900, AZ-900, and MS-900 Fundamentals Trainings

1
Comments 5
5 min read
The Application Proxy in Azure
Cover image for The Application Proxy in Azure

The Application Proxy in Azure

7
Comments
3 min read
Session Border Controllers in IP Telephony
Cover image for Session Border Controllers in IP Telephony

Session Border Controllers in IP Telephony

Comments
4 min read
The Use of OATH in Authentication
Cover image for The Use of OATH in Authentication

The Use of OATH in Authentication

2
Comments
4 min read
Microsoft 365 Groups: A Comprehensive Guide
Cover image for Microsoft 365 Groups: A Comprehensive Guide

Microsoft 365 Groups: A Comprehensive Guide

1
Comments
5 min read
Balancing Security and Usability: Ensuring Effective Information Security without Overburdening Employees
Cover image for Balancing Security and Usability: Ensuring Effective Information Security without Overburdening Employees

Balancing Security and Usability: Ensuring Effective Information Security without Overburdening Employees

Comments
3 min read
Information Classification in Microsoft Purview: A Step-by-Step Guide
Cover image for Information Classification in Microsoft Purview: A Step-by-Step Guide

Information Classification in Microsoft Purview: A Step-by-Step Guide

10
Comments
5 min read
Deep Dive into Web Session and Network Hijacking: Intercepting Data on Networks
Cover image for Deep Dive into Web Session and Network Hijacking: Intercepting Data on Networks

Deep Dive into Web Session and Network Hijacking: Intercepting Data on Networks

Comments
2 min read
Secrets management with Azure Key Vault
Cover image for Secrets management with Azure Key Vault

Secrets management with Azure Key Vault

6
Comments
4 min read
Hub Sites in SharePoint Online
Cover image for Hub Sites in SharePoint Online

Hub Sites in SharePoint Online

4
Comments 1
4 min read
Monoalphabetic and Polyalphabetic Ciphers in Cryptography
Cover image for Monoalphabetic and Polyalphabetic Ciphers in Cryptography

Monoalphabetic and Polyalphabetic Ciphers in Cryptography

2
Comments
3 min read
Kubernetes in Azure: Core Components and Practical Use Cases
Cover image for Kubernetes in Azure: Core Components and Practical Use Cases

Kubernetes in Azure: Core Components and Practical Use Cases

Comments
3 min read
The New Normal: COVID-19’s Enduring Impact on Remote Work and Cloud Technologies
Cover image for The New Normal: COVID-19’s Enduring Impact on Remote Work and Cloud Technologies

The New Normal: COVID-19’s Enduring Impact on Remote Work and Cloud Technologies

Comments
3 min read
Understanding How Cloud Hosting Functions
Cover image for Understanding How Cloud Hosting Functions

Understanding How Cloud Hosting Functions

Comments
2 min read
Understanding the Differences Between Cloud Hosting and VPS Hosting
Cover image for Understanding the Differences Between Cloud Hosting and VPS Hosting

Understanding the Differences Between Cloud Hosting and VPS Hosting

Comments
2 min read
A Comprehensive Comparison of Cisco Routing Protocols: Making the Right Choice for Your Network

A Comprehensive Comparison of Cisco Routing Protocols: Making the Right Choice for Your Network

Comments
3 min read
Demystifying Access Control Models: RBAC, MAC, and DAC Explained
Cover image for Demystifying Access Control Models: RBAC, MAC, and DAC Explained

Demystifying Access Control Models: RBAC, MAC, and DAC Explained

Comments
4 min read
Unraveling the Art of Phishing: Understanding the Threat to Companies
Cover image for Unraveling the Art of Phishing: Understanding the Threat to Companies

Unraveling the Art of Phishing: Understanding the Threat to Companies

Comments
4 min read
Mastering Incident Response: A Guide to Protecting Your Company
Cover image for Mastering Incident Response: A Guide to Protecting Your Company

Mastering Incident Response: A Guide to Protecting Your Company

Comments
4 min read
IPv4 and IPv6: The protocol differences
Cover image for IPv4 and IPv6: The protocol differences

IPv4 and IPv6: The protocol differences

Comments
2 min read
Revolutionizing Device Deployment: The Power and Precision of Windows Zero-Touch Deployment
Cover image for Revolutionizing Device Deployment: The Power and Precision of Windows Zero-Touch Deployment

Revolutionizing Device Deployment: The Power and Precision of Windows Zero-Touch Deployment

Comments
3 min read
CISSP vs. CCSP: Choosing the Right Certification Path for Your Cybersecurity Career
Cover image for CISSP vs. CCSP: Choosing the Right Certification Path for Your Cybersecurity Career

CISSP vs. CCSP: Choosing the Right Certification Path for Your Cybersecurity Career

Comments
3 min read
Securing Your Secrets: An In-Depth Guide to Azure Key Vault
Cover image for Securing Your Secrets: An In-Depth Guide to Azure Key Vault

Securing Your Secrets: An In-Depth Guide to Azure Key Vault

5
Comments
3 min read
Ensuring Security and Compliance in Microsoft Teams Cloud Telephony
Cover image for Ensuring Security and Compliance in Microsoft Teams Cloud Telephony

Ensuring Security and Compliance in Microsoft Teams Cloud Telephony

Comments
3 min read
Interesting statistics for cybersecurity breaches in the recent years
Cover image for Interesting statistics for cybersecurity breaches in the recent years

Interesting statistics for cybersecurity breaches in the recent years

Comments
3 min read
Social Engineering: Unveiling the Manipulative Tactics and Safeguarding Against Attacks
Cover image for Social Engineering: Unveiling the Manipulative Tactics and Safeguarding Against Attacks

Social Engineering: Unveiling the Manipulative Tactics and Safeguarding Against Attacks

Comments
3 min read
Risk management frameworks
Cover image for Risk management frameworks

Risk management frameworks

Comments
8 min read
The Role of Artificial Intelligence in Cybersecurity: Enhancing Threat Detection and Response
Cover image for The Role of Artificial Intelligence in Cybersecurity: Enhancing Threat Detection and Response

The Role of Artificial Intelligence in Cybersecurity: Enhancing Threat Detection and Response

Comments
3 min read
loading...