搜索
Pluralsight - Microsoft Azure Security Engineer series 2020 (AZ-500)
磁力链接/BT种子名称
Pluralsight - Microsoft Azure Security Engineer series 2020 (AZ-500)
磁力链接/BT种子简介
种子哈希:
c80b95f9bc94bb5c36dad285793acd03821ac8e6
文件大小:
1.53G
已经下载:
389
次
下载速度:
极快
收录时间:
2021-03-08
最近下载:
2024-12-01
移花宫入口
移花宫.com
邀月.com
怜星.com
花无缺.com
yhgbt.icu
yhgbt.top
磁力链接下载
magnet:?xt=urn:btih:C80B95F9BC94BB5C36DAD285793ACD03821AC8E6
推荐使用
PIKPAK网盘
下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看
下载BT种子文件
磁力链接
迅雷下载
PIKPAK在线播放
91视频
含羞草
欲漫涩
逼哩逼哩
成人快手
51品茶
抖阴破解版
暗网禁地
91短视频
TikTok成人版
PornHub
草榴社区
乱伦社区
少女初夜
萝莉岛
最近搜索
堕とし
beauty+极品反差
搭讪极品气质
对大白兔
+美国+狂插
小马拉大车
美依
+宾馆偷拍
ariana shaine 19.07.31
mibd-826
arthur christmas 2011 1080p
marks+super
気中出
女大生三翠
sieunhan
chocoletmilkk
模特1080p
性感+辣
1960
约啪+对白
十季【那些崇拜黑人讨好黑人喜欢被黑人大驴屌肏的国人反差妹】
16.17
『水水水』
小马拉大车++
眼镜学妹
希崎ジ
两面人生
smooth
按摩制服
gay+anal
文件列表
Configure Security for Storage/1. Authenticate to Azure Storage using Azure AD/2. Demo Azure AD Authentication with Azure Storage.mp4
48.8 MB
Configure Security for Databases/0. Authenticating to Azure SQL/4. SQL AAD Authentication Using Code.mp4
42.4 MB
Manage Azure Active Directory Identities/2. Transfer Microsoft Azure Resources/0. Overview.mp4
32.4 MB
Monitor Security Using Azure Monitor/1. Configure Diagnostic Logging/3. Setup Diagnostic Logging.mp4
31.5 MB
Monitor Security Using Azure Monitor/0. Manage Alerts/4. Examine Security Alerts Using Azure Monitor.mp4
31.4 MB
Manage Access Control/1. Define Custom RBAC Roles in Microsoft Azure/3. Demo Create Azure Custom Resource Roles.mp4
31.3 MB
Monitor Security Using Azure Monitor/1. Configure Diagnostic Logging/4. Azure Monitor and Diagnostic Logging.mp4
28.4 MB
Configure Security for Databases/1. Auditing SQL Server/3. Analyze Audit Logs.mp4
26.1 MB
Monitor Security Using Azure Sentinel/1. Evaluate Results/3. Analytics Rules.mp4
23.8 MB
Configure and Manage Key Vault/3. Using Key Vault Objects/1. Configuring Storage Key Management.mp4
23.7 MB
Configure Secure Access Using Azure AD/0. Monitor Privileged Access in Microsoft Azure/3. Demo - Configure PIM Role Activation.mp4
23.1 MB
Manage Access Control/0. Implement RBAC in Microsoft Azure/7. Demo Implement RBAC in Azure.mp4
22.5 MB
Configure Security Policies/1. Configuring Azure Blueprints for Security/4. Adding Artifacts to the Blueprint.mp4
22.1 MB
Monitor Security Using Azure Monitor/0. Manage Alerts/3. Create a Metric Alert.mp4
22.1 MB
Manage Application Access/0. Configure App Registrations in Microsoft Azure/4. Demo Register an App with Azure AD.mp4
20.8 MB
Monitor Security Using Azure Sentinel/1. Evaluate Results/2. Custom Alerts.mp4
20.2 MB
Configure and Manage Key Vault/3. Using Key Vault Objects/3. Recovering a Delete Item in Key Vault.mp4
19.7 MB
Configure Secure Access Using Azure AD/1. Conduct Access Reviews in Microsoft Azure/2. Demo - Perform an Azure AD PIM Access Review.mp4
18.2 MB
Configure Security for Databases/3. Using SQL with Advanced Threat Protection (ATP)/3. Demo Vulnerability Assessment.mp4
16.3 MB
Configure and Manage Key Vault/0. Managing Access to Key Vault/7. Creating a Custom Role.mp4
16.3 MB
Configure Secure Access Using Azure AD/2. Implement Conditional Access and Azure AD Identity Protection/5. Demo - Configure Azure AD Conditional Access.mp4
15.6 MB
Manage Azure Active Directory Identities/1. Manage Azure AD Authentication/5. Demo Implement Azure AD Connect.mp4
15.5 MB
Configure and Manage Key Vault/3. Using Key Vault Objects/5. Restoring a Secret in Key Vault.mp4
15.1 MB
Configure Security Policies/1. Configuring Azure Blueprints for Security/3. Creating a Blueprint Demonstration.mp4
14.6 MB
Configure Security for Storage/1. Authenticate to Azure Storage using Azure AD/3. Azure Files Authentication with AADDS.mp4
14.4 MB
Configure Secure Access Using Azure AD/0. Monitor Privileged Access in Microsoft Azure/2. Demo - Tour the Azure AD PIM Interface.mp4
14.2 MB
Manage Azure Active Directory Identities/0. Manage Azure AD Users and Groups/10. Demo Service Principals and Managed Identities.mp4
14.1 MB
Monitor Security Using Azure Monitor/2. Configure Log Retention/2. Configure Log Retention.mp4
13.9 MB
Monitor Security Using Azure Sentinel/2. Use Automation/3. Author a Logic App.mp4
13.7 MB
Configure Security Policies/0. Configuring Azure Policy for Security/15. Assigning the Policy to a Resource Group.mp4
13.5 MB
Manage Access Control/1. Define Custom RBAC Roles in Microsoft Azure/5. Demo Create Custom Azure AD Roles.mp4
13.5 MB
Configure Security Policies/0. Configuring Azure Policy for Security/14. Creating a Modify Effect Policy.mp4
13.5 MB
Configure Security Policies/0. Configuring Azure Policy for Security/8. Creating a New Policy Definition.mp4
13.2 MB
Configure and Manage Key Vault/2. Managing Key Vault Objects/6. Creating a Certificate in Key Vault.mp4
12.7 MB
Manage Azure Active Directory Identities/0. Manage Azure AD Users and Groups/6. Demo Create Azure AD Users and Groups.mp4
12.5 MB
Configure and Manage Key Vault/0. Managing Access to Key Vault/3. Creating an Azure Key Vault.mp4
12.5 MB
Configure Secure Access Using Azure AD/2. Implement Conditional Access and Azure AD Identity Protection/3. Demo - Configure Azure AD IdP.mp4
12.4 MB
Configure and Manage Key Vault/2. Managing Key Vault Objects/4. Creating a Secret in Key Vault.mp4
11.9 MB
Configure Security for Storage/2. Encrypt Azure Storage/3. Encrypt Data at Rest.mp4
11.9 MB
Configure Security for Databases/3. Using SQL with Advanced Threat Protection (ATP)/5. Information Protection.mp4
11.9 MB
Manage Application Access/0. Configure App Registrations in Microsoft Azure/5. Demo Connect to API Permission Scopes.mp4
11.6 MB
Configure Security for Storage/0. Configuring Azure Storage Security/4. Shared Access Signature Security.mp4
11.2 MB
Configure Security Policies/2. Using Playbooks in Azure Sentinel/3. Creating an Alert Rule.mp4
10.7 MB
Manage Access Control/0. Implement RBAC in Microsoft Azure/8. Demo Test RBAC Assignments.mp4
10.5 MB
Configure Security Policies/1. Configuring Azure Blueprints for Security/8. Updating the Assignment.mp4
10.5 MB
Configure Security for Storage/0. Configuring Azure Storage Security/5. Manage SAS based security for Azure Storage.mp4
10.3 MB
Configure Security Policies/2. Using Playbooks in Azure Sentinel/4. Creating a Playbook.mp4
10.2 MB
Configure Security Policies/2. Using Playbooks in Azure Sentinel/5. Adding the Playbook to an Alert Rule.mp4
9.9 MB
Manage Application Access/1. Manage API Access to Microsoft Azure Resources/2. Demo Expose an API in Azure AD.mp4
9.9 MB
Configure and Manage Key Vault/1. Using Key Vault Access Policies/4. Using Key Vault Firewall Rules.mp4
9.9 MB
Configure Security for Storage/0. Configuring Azure Storage Security/7. Demo Manage Keys with Keyvault.mp4
9.8 MB
Monitor Security Using Azure Sentinel/2. Use Automation/5. Test the Playbook.mp4
9.6 MB
Configure Security Policies/0. Configuring Azure Policy for Security/6. Preparing the Scenario Environment.mp4
9.4 MB
Configure Security Policies/1. Configuring Azure Blueprints for Security/7. Reviewing Assignment Results.mp4
9.2 MB
Configure Security for Storage/1. Authenticate to Azure Storage using Azure AD/1. Secure Azure Storage Using Azure AD.mp4
9.1 MB
Configure Security Policies/1. Configuring Azure Blueprints for Security/6. Creating the Assignment.mp4
9.0 MB
Monitor Security Using Azure Security Center/2. Configuring Just in Time VM Access/5. Validating JIT VM Access.mp4
8.9 MB
Manage Azure Active Directory Identities/1. Manage Azure AD Authentication/7. Demo Test Password Writeback.mp4
8.9 MB
Configure Security Policies/0. Configuring Azure Policy for Security/9. Adding a Policy to an Initiative.mp4
8.9 MB
Configure Security Policies/0. Configuring Azure Policy for Security/3. Management Group and Policy Demo.mp4
8.2 MB
Manage Azure Active Directory Identities/1. Manage Azure AD Authentication/4. Local AD Account Synchronization Methods.mp4
8.1 MB
Configure Security for Databases/1. Auditing SQL Server/2. Setup Auditing.mp4
8.0 MB
Configure Security for Databases/0. Authenticating to Azure SQL/1. Azure SQL Authentication Mechanisms.mp4
7.8 MB
Monitor Security Using Azure Sentinel/2. Use Automation/2. Create a Playbook.mp4
7.8 MB
Configure Security Policies/0. Configuring Azure Policy for Security/10. Assign the Initiative to a Subscription.mp4
7.8 MB
Monitor Security Using Azure Security Center/0. Managing Policies in Azure Security Center/3. Assigning Policies through Security Center.mp4
7.8 MB
Monitor Security Using Azure Security Center/3. Evaluating Vulnerability Scans/5. Viewing the Assessment Results.mp4
7.4 MB
Configure and Manage Key Vault/2. Managing Key Vault Objects/2. Creating a Key in Key Vault.mp4
7.4 MB
Configure Secure Access Using Azure AD/2. Implement Conditional Access and Azure AD Identity Protection/4. Azure AD Conditional Access.mp4
7.2 MB
Configure Security Policies/1. Configuring Azure Blueprints for Security/0. Reviewing Azure Blueprints.mp4
7.2 MB
Configure Security for Databases/0. Authenticating to Azure SQL/3. Use SSMS with AAD Authentication.mp4
7.2 MB
Monitor Security Using Azure Sentinel/0. Explore Data Sources/5. Connect Azure Sentinel to Azure Active Directory.mp4
6.9 MB
Monitor Security Using Azure Sentinel/2. Use Automation/1. What Is Automation.mp4
6.9 MB
Manage Azure Active Directory Identities/1. Manage Azure AD Authentication/1. Preliminary Information.mp4
6.7 MB
Configure Security for Databases/2. Encrypting SQL/4. Always Encrypted.mp4
6.7 MB
Configure Security Policies/0. Configuring Azure Policy for Security/13. Policy Effects and Remediation.mp4
6.7 MB
Monitor Security Using Azure Security Center/0. Managing Policies in Azure Security Center/5. Assigning a Custom Initiative.mp4
6.7 MB
Configure Secure Access Using Azure AD/0. Monitor Privileged Access in Microsoft Azure/6. Demo - Enable Azure AD Elevated Access.mp4
6.7 MB
Configure Security Policies/0. Configuring Azure Policy for Security/12. Review Policy Compliance in the Portal.mp4
6.6 MB
Manage Application Access/1. Manage API Access to Microsoft Azure Resources/3. Demo Consume an API Scope in Azure AD.mp4
6.6 MB
Monitor Security Using Azure Security Center/1. Managing Compliance in Azure Security Center/5. Reviewing Compliance Assessment.mp4
6.6 MB
Configure and Manage Key Vault/1. Using Key Vault Access Policies/1. Permissions for Object Types.mp4
6.5 MB
Configure Security for Storage/0. Configuring Azure Storage Security/3. Demo Configure and Manage Storage Keys.mp4
6.5 MB
Configure Secure Access Using Azure AD/2. Implement Conditional Access and Azure AD Identity Protection/2. Azure AD Identity Protection.mp4
6.3 MB
Configure Security for Databases/3. Using SQL with Advanced Threat Protection (ATP)/4. Threat Protection.mp4
6.3 MB
Configure and Manage Key Vault/3. Using Key Vault Objects/2. Understanding Key Vault Protection and Recovery.mp4
6.3 MB
Monitor Security Using Azure Sentinel/1. Evaluate Results/1. Detecting Problems.mp4
6.3 MB
Configure and Manage Key Vault/0. Managing Access to Key Vault/6. Assinging a Role to a User.mp4
6.2 MB
Configure and Manage Key Vault/1. Using Key Vault Access Policies/3. Applying an Access Policy in the Portal.mp4
6.2 MB
Monitor Security Using Azure Monitor/1. Configure Diagnostic Logging/1. What Is Diagnostic Logging.mp4
6.1 MB
Monitor Security Using Azure Sentinel/0. Explore Data Sources/4. Onboard Azure Sentinel.mp4
6.1 MB
Configure Secure Access Using Azure AD/0. Monitor Privileged Access in Microsoft Azure/1. Azure AD Privileged Identity Management.mp4
6.0 MB
Monitor Security Using Azure Sentinel/2. Use Automation/4. Connect Playbook to an Analytics Rule.mp4
6.0 MB
Monitor Security Using Azure Security Center/2. Configuring Just in Time VM Access/3. Enabling JIT VM Access.mp4
5.9 MB
Monitor Security Using Azure Security Center/1. Managing Compliance in Azure Security Center/4. Adding a Compliance Standard to a Subscription.mp4
5.9 MB
Configure Secure Access Using Azure AD/1. Conduct Access Reviews in Microsoft Azure/1. Why Conduct Access Reviews.mp4
5.8 MB
Manage Application Access/0. Configure App Registrations in Microsoft Azure/1. Preliminary Information.mp4
5.7 MB
Configure Security for Databases/0. Authenticating to Azure SQL/2. Setup AAD Authentication for SQL.mp4
5.5 MB
Manage Azure Active Directory Identities/2. Transfer Microsoft Azure Resources/5. Demo Move Resources Between Resource Groups.mp4
5.4 MB
Manage Application Access/0. Configure App Registrations in Microsoft Azure/0. Overview.mp4
5.3 MB
Monitor Security Using Azure Security Center/0. Managing Policies in Azure Security Center/0. Certification Coverage.mp4
5.3 MB
Manage Application Access/1. Manage API Access to Microsoft Azure Resources/1. Understand REST APIs.mp4
5.3 MB
Configure and Manage Key Vault/1. Using Key Vault Access Policies/2. Applying an Access Policy with PowerShell.mp4
5.2 MB
Configure Security for Databases/1. Auditing SQL Server/1. Overview of Auditing.mp4
5.2 MB
Configure Secure Access Using Azure AD/0. Monitor Privileged Access in Microsoft Azure/0. Overview.mp4
5.0 MB
Configure and Manage Key Vault/2. Managing Key Vault Objects/5. Understanding Key Vault Certificates.mp4
5.0 MB
Configure Security Policies/0. Configuring Azure Policy for Security/2. Creating and Assigning Policies.mp4
4.9 MB
Monitor Security Using Azure Security Center/3. Evaluating Vulnerability Scans/1. Deploying Demo Resources.mp4
4.9 MB
Monitor Security Using Azure Monitor/0. Manage Alerts/2. Alerts.mp4
4.9 MB
Manage Azure Active Directory Identities/2. Transfer Microsoft Azure Resources/3. Azure Resource Move Process.mp4
4.8 MB
Configure and Manage Key Vault/0. Managing Access to Key Vault/5. Reviewing Role Based Access Control.mp4
4.7 MB
Manage Access Control/0. Implement RBAC in Microsoft Azure/0. Overview.mp4
4.7 MB
Manage Azure Active Directory Identities/2. Transfer Microsoft Azure Resources/8. Demo Transfer an Azure Subscription to Another Tenant.mp4
4.7 MB
Manage Application Access/0. Configure App Registrations in Microsoft Azure/3. Cloud App Permissions and Consent.mp4
4.7 MB
Configure and Manage Key Vault/3. Using Key Vault Objects/4. Backing up Items in Key Vault.mp4
4.6 MB
Configure Security for Storage/2. Encrypt Azure Storage/1. Understand Azure Storage Encryption.mp4
4.6 MB
Manage Access Control/1. Define Custom RBAC Roles in Microsoft Azure/1. Azure RBAC Role Structure.mp4
4.5 MB
Manage Azure Active Directory Identities/1. Manage Azure AD Authentication/2. Hybrid Identity and Azure AD Connect.mp4
4.5 MB
Configure Security for Databases/2. Encrypting SQL/3. Encryption at Rest.mp4
4.4 MB
Manage Access Control/1. Define Custom RBAC Roles in Microsoft Azure/4. Custom Azure AD Roles.mp4
4.4 MB
Configure and Manage Key Vault/0. Managing Access to Key Vault/0. Course Introduction.mp4
4.4 MB
Monitor Security Using Azure Security Center/0. Managing Policies in Azure Security Center/2. Reviewing the Default Security Policy.mp4
4.3 MB
Monitor Security Using Azure Monitor/1. Configure Diagnostic Logging/2. Azure Monitor and App Service Logs.mp4
4.2 MB
Configure Security Policies/2. Using Playbooks in Azure Sentinel/0. Reviewing Azure Sentinel.mp4
4.1 MB
Manage Access Control/0. Implement RBAC in Microsoft Azure/6. Programmatic RBAC Role Assignment.mp4
4.1 MB
Manage Azure Active Directory Identities/2. Transfer Microsoft Azure Resources/1. Azure Resource Management Scopes.mp4
4.1 MB
Configure Security Policies/0. Configuring Azure Policy for Security/11. Review Policies in the Portal.mp4
4.1 MB
Monitor Security Using Azure Security Center/2. Configuring Just in Time VM Access/2. Checking JIT VM Access.mp4
4.1 MB
Manage Azure Active Directory Identities/0. Manage Azure AD Users and Groups/0. Overview.mp4
4.0 MB
Configure Security for Databases/2. Encrypting SQL/5. Dynamic Data Masking.mp4
4.0 MB
Configure and Manage Key Vault/2. Managing Key Vault Objects/1. Understanding Key Vault Keys.mp4
3.9 MB
Manage Azure Active Directory Identities/microsoft-azure-security-engineer-manage-azure-active-directory-identities.zip
3.8 MB
Manage Azure Active Directory Identities/2. Transfer Microsoft Azure Resources/6. Demo Move Resources Between Subscriptions.mp4
3.8 MB
Monitor Security Using Azure Sentinel/0. Explore Data Sources/3. Data Sources.mp4
3.8 MB
Configure and Manage Key Vault/0. Managing Access to Key Vault/2. Management Plane vs. Data Plane.mp4
3.8 MB
Manage Azure Active Directory Identities/0. Manage Azure AD Users and Groups/8. App Registrations and Service Principals.mp4
3.8 MB
Manage Azure Active Directory Identities/0. Manage Azure AD Users and Groups/2. Azure AD User Security Options.mp4
3.7 MB
Monitor Security Using Azure Security Center/3. Evaluating Vulnerability Scans/3. Deploy the Assessment Agent.mp4
3.7 MB
Configure Security for Databases/microsoft-azure-security-engineer-configure-security-databases.zip
3.7 MB
Configure and Manage Key Vault/3. Using Key Vault Objects/0. Reviewing Storage Key Management.mp4
3.7 MB
Configure Security for Storage/0. Configuring Azure Storage Security/1. Manage Azure Storage Authentication.mp4
3.6 MB
Configure Security Policies/0. Configuring Azure Policy for Security/0. Certification Coverage.mp4
3.6 MB
Configure Secure Access Using Azure AD/0. Monitor Privileged Access in Microsoft Azure/5. Azure AD Elevated Access.mp4
3.6 MB
Manage Access Control/0. Implement RBAC in Microsoft Azure/3. Built-in Azure RBAC Roles.mp4
3.6 MB
Configure Security for Storage/2. Encrypt Azure Storage/2. Encrypt Data in Transit.mp4
3.6 MB
Configure and Manage Key Vault/0. Managing Access to Key Vault/4. Exploring an Azure Key Vault.mp4
3.5 MB
Configure Security Policies/0. Configuring Azure Policy for Security/5. Assigning a Policy Scenario.mp4
3.4 MB
Manage Access Control/0. Implement RBAC in Microsoft Azure/2. Azure Management Scopes.mp4
3.4 MB
Monitor Security Using Azure Security Center/1. Managing Compliance in Azure Security Center/3. Enabling Azure Defender Plan.mp4
3.4 MB
Configure Security Policies/2. Using Playbooks in Azure Sentinel/2. Connecting Azure Activity to Sentinel.mp4
3.3 MB
Monitor Security Using Azure Security Center/3. Evaluating Vulnerability Scans/2. Reviewing Vulnerability Assessments.mp4
3.3 MB
Manage Azure Active Directory Identities/2. Transfer Microsoft Azure Resources/7. Inter-Azure AD Tenant Move Process.mp4
3.1 MB
Monitor Security Using Azure Security Center/1. Managing Compliance in Azure Security Center/1. Reviewing Regulatory Compliance Settings.mp4
3.1 MB
Monitor Security Using Azure Security Center/2. Configuring Just in Time VM Access/0. Introducing Just in Time VM Access.mp4
3.1 MB
Configure and Manage Key Vault/2. Managing Key Vault Objects/3. Understanding Key Vault Secrets.mp4
3.1 MB
Manage Application Access/0. Configure App Registrations in Microsoft Azure/2. App Registrations vs. Service Principals.mp4
3.0 MB
Manage Access Control/0. Implement RBAC in Microsoft Azure/4. Effective Permissions.mp4
3.0 MB
Monitor Security Using Azure Monitor/0. Manage Alerts/1. Azure Monitor.mp4
3.0 MB
Manage Azure Active Directory Identities/0. Manage Azure AD Users and Groups/3. Azure AD Domain Services Integration.mp4
3.0 MB
Configure and Manage Key Vault/1. Using Key Vault Access Policies/0. Reviewing Access Policies.mp4
2.9 MB
Configure Security for Databases/3. Using SQL with Advanced Threat Protection (ATP)/1. Azure Defender.mp4
2.9 MB
Configure Security Policies/1. Configuring Azure Blueprints for Security/5. Assigning Blueprints.mp4
2.9 MB
Configure Security Policies/0. Configuring Azure Policy for Security/4. Azure Security Benchmark Policies.mp4
2.8 MB
Monitor Security Using Azure Monitor/2. Configure Log Retention/1. What Is Log Retention.mp4
2.8 MB
Configure and Manage Key Vault/0. Managing Access to Key Vault/1. Azure Key Vault Review.mp4
2.8 MB
Monitor Security Using Azure Security Center/0. Managing Policies in Azure Security Center/1. Azure Policies Reviewed.mp4
2.8 MB
Configure Security Policies/0. Configuring Azure Policy for Security/7. Review the Policy Structure.mp4
2.7 MB
Manage Azure Active Directory Identities/0. Manage Azure AD Users and Groups/1. Azure AD User Types.mp4
2.7 MB
Configure Security for Storage/microsoft-azure-security-engineer-configure-security-storage.zip
2.7 MB
Configure Secure Access Using Azure AD/microsoft-azure-security-engineer-manage-configure-secure-access-using-azure-ad.zip
2.7 MB
Manage Azure Active Directory Identities/0. Manage Azure AD Users and Groups/7. Demo Test Azure AD User Access.mp4
2.7 MB
Monitor Security Using Azure Sentinel/0. Explore Data Sources/1. Azure Sentinel.mp4
2.6 MB
Manage Azure Active Directory Identities/1. Manage Azure AD Authentication/3. Azure AD Passwordless Sign-In.mp4
2.6 MB
Monitor Security Using Azure Security Center/1. Managing Compliance in Azure Security Center/0. Compliance Policies in Azure Security Center.mp4
2.6 MB
Manage Application Access/microsoft-azure-security-engineer-manage-manage-application-access.zip
2.5 MB
Configure and Manage Key Vault/microsoft-azure-security-engineer-configure-manage-key-vault.zip
2.5 MB
Monitor Security Using Azure Security Center/2. Configuring Just in Time VM Access/1. Deploying Demo Resources.mp4
2.5 MB
Configure Security for Databases/2. Encrypting SQL/2. Encryption in Transit.mp4
2.5 MB
Configure Secure Access Using Azure AD/2. Implement Conditional Access and Azure AD Identity Protection/6. Summary.mp4
2.4 MB
Monitor Security Using Azure Security Center/microsoft-azure-security-engineer-monitor-security-using-center.zip
2.4 MB
Monitor Security Using Azure Security Center/0. Managing Policies in Azure Security Center/4. Policy Hierarchy and Assignment.mp4
2.3 MB
Monitor Security Using Azure Security Center/1. Managing Compliance in Azure Security Center/2. Compliance Policy Lifecycle.mp4
2.3 MB
Configure and Manage Key Vault/1. Using Key Vault Access Policies/5. Reviewing Key Vault Private Endpoints.mp4
2.2 MB
Configure Security for Databases/2. Encrypting SQL/1. Overview of Encryption.mp4
2.2 MB
Configure Secure Access Using Azure AD/2. Implement Conditional Access and Azure AD Identity Protection/1. Azure Multi-Factor Authentication (MFA).mp4
2.2 MB
Configure Security for Storage/0. Configuring Azure Storage Security/2. Key Based Security.mp4
2.2 MB
Manage Access Control/microsoft-azure-security-engineer-manage-manage-access-control.zip
2.1 MB
Configure Security Policies/1. Configuring Azure Blueprints for Security/1. Azure Blueprint Lifecycle.mp4
2.1 MB
Manage Azure Active Directory Identities/0. Manage Azure AD Users and Groups/11. Summary.mp4
2.1 MB
Manage Application Access/1. Manage API Access to Microsoft Azure Resources/4. Summary.mp4
2.0 MB
Manage Access Control/0. Implement RBAC in Microsoft Azure/1. Preliminary Terminology.mp4
2.0 MB
Manage Azure Active Directory Identities/0. Manage Azure AD Users and Groups/9. Managed Identities.mp4
1.9 MB
Manage Azure Active Directory Identities/2. Transfer Microsoft Azure Resources/2. Azure Identifiers.mp4
1.9 MB
Manage Application Access/0. Configure App Registrations in Microsoft Azure/6. Summary.mp4
1.9 MB
Monitor Security Using Azure Security Center/2. Configuring Just in Time VM Access/4. Reviewing the JIT Process.mp4
1.9 MB
Configure Security for Databases/0. Authenticating to Azure SQL/0. Introduction.mp4
1.9 MB
Monitor Security Using Azure Security Center/3. Evaluating Vulnerability Scans/0. Introducing Vulnerability Scans.mp4
1.8 MB
Configure Security Policies/1. Configuring Azure Blueprints for Security/2. Creating a Blueprint Scenario.mp4
1.8 MB
Manage Azure Active Directory Identities/0. Manage Azure AD Users and Groups/4. Azure AD Group Types.mp4
1.7 MB
Configure Security Policies/microsoft-azure-security-engineer-configure-policies.zip
1.7 MB
Configure Secure Access Using Azure AD/0. Monitor Privileged Access in Microsoft Azure/7. Summary.mp4
1.7 MB
Manage Azure Active Directory Identities/0. Manage Azure AD Users and Groups/5. Administrative Units.mp4
1.6 MB
Manage Azure Active Directory Identities/2. Transfer Microsoft Azure Resources/9. Summary.mp4
1.6 MB
Configure Security for Databases/1. Auditing SQL Server/4. Limitations of Auditing.mp4
1.6 MB
Monitor Security Using Azure Sentinel/microsoft-azure-security-engineer-monitor-security-using-azure-sentinel.zip
1.6 MB
Configure Security for Storage/0. Configuring Azure Storage Security/0. Introduction.mp4
1.6 MB
Configure Security for Databases/3. Using SQL with Advanced Threat Protection (ATP)/2. Vulnerability Assessment.mp4
1.5 MB
Configure Secure Access Using Azure AD/1. Conduct Access Reviews in Microsoft Azure/3. Summary.mp4
1.5 MB
Manage Access Control/1. Define Custom RBAC Roles in Microsoft Azure/6. Summary.mp4
1.5 MB
Monitor Security Using Azure Security Center/3. Evaluating Vulnerability Scans/4. Review the Assessment Process.mp4
1.5 MB
Monitor Security Using Azure Sentinel/2. Use Automation/6. Summary.mp4
1.5 MB
Manage Access Control/0. Implement RBAC in Microsoft Azure/9. Summary.mp4
1.4 MB
Manage Azure Active Directory Identities/2. Transfer Microsoft Azure Resources/4. Azure Resource Mover.mp4
1.4 MB
Manage Access Control/0. Implement RBAC in Microsoft Azure/5. Resource Locks.mp4
1.4 MB
Configure Secure Access Using Azure AD/0. Monitor Privileged Access in Microsoft Azure/4. Azure AD PIM Monitoring Scopes.mp4
1.4 MB
Configure Security for Storage/1. Authenticate to Azure Storage using Azure AD/0. Introduction.mp4
1.4 MB
Manage Azure Active Directory Identities/1. Manage Azure AD Authentication/8. Summary.mp4
1.3 MB
Configure Security Policies/0. Configuring Azure Policy for Security/1. Reviewing Azure Policies.mp4
1.3 MB
Configure Security Policies/2. Using Playbooks in Azure Sentinel/1. Collect and Detect Data.mp4
1.3 MB
Monitor Security Using Azure Sentinel/0. Explore Data Sources/0. Introduction.mp4
1.3 MB
Manage Azure Active Directory Identities/1. Manage Azure AD Authentication/6. Demo Configure Azure AD Connect Password Writeback.mp4
1.2 MB
Monitor Security Using Azure Monitor/microsoft-azure-security-engineer-monitor-security-using-azure-monitor.zip
1.2 MB
Monitor Security Using Azure Monitor/0. Manage Alerts/0. Introduction.mp4
1.2 MB
Configure Security for Storage/2. Encrypt Azure Storage/0. Introduction.mp4
1.2 MB
Configure and Manage Key Vault/2. Managing Key Vault Objects/0. Reviewing Key Vault Objects.mp4
1.2 MB
Configure Security for Databases/0. Authenticating to Azure SQL/5. Summary.mp4
1.1 MB
Monitor Security Using Azure Sentinel/2. Use Automation/0. Introduction.mp4
1.1 MB
Configure Security for Databases/3. Using SQL with Advanced Threat Protection (ATP)/0. Introduction.mp4
1.1 MB
Monitor Security Using Azure Sentinel/1. Evaluate Results/0. Introduction.mp4
1.0 MB
Configure Security for Databases/2. Encrypting SQL/0. Introduction.mp4
970.9 kB
Configure Secure Access Using Azure AD/2. Implement Conditional Access and Azure AD Identity Protection/0. Overview.mp4
956.6 kB
Monitor Security Using Azure Sentinel/0. Explore Data Sources/2. Layout of This Course.mp4
927.3 kB
Monitor Security Using Azure Sentinel/0. Explore Data Sources/6. Summary.mp4
908.2 kB
Manage Azure Active Directory Identities/1. Manage Azure AD Authentication/0. Overview.mp4
887.6 kB
Configure Security for Databases/1. Auditing SQL Server/0. Introduction.mp4
882.6 kB
Configure Security for Storage/0. Configuring Azure Storage Security/6. Manage Keys Using Keyvault.mp4
846.7 kB
Configure Security for Databases/2. Encrypting SQL/6. Summary.mp4
839.9 kB
Configure Security for Storage/0. Configuring Azure Storage Security/8. Summary.mp4
828.9 kB
Monitor Security Using Azure Monitor/1. Configure Diagnostic Logging/5. Summary.mp4
770.0 kB
Monitor Security Using Azure Monitor/1. Configure Diagnostic Logging/0. Introduction.mp4
766.6 kB
Configure Security for Databases/3. Using SQL with Advanced Threat Protection (ATP)/6. Summary.mp4
743.1 kB
Manage Access Control/1. Define Custom RBAC Roles in Microsoft Azure/2. Custom Role Creation Process.mp4
691.9 kB
Monitor Security Using Azure Sentinel/1. Evaluate Results/4. Summary.mp4
672.1 kB
Configure Secure Access Using Azure AD/1. Conduct Access Reviews in Microsoft Azure/0. Overview.mp4
666.3 kB
Monitor Security Using Azure Monitor/2. Configure Log Retention/0. Introduction.mp4
633.4 kB
Monitor Security Using Azure Monitor/2. Configure Log Retention/3. Summary.mp4
615.2 kB
Manage Access Control/1. Define Custom RBAC Roles in Microsoft Azure/0. Overview.mp4
611.3 kB
Configure Security for Databases/1. Auditing SQL Server/5. Summary.mp4
541.8 kB
Manage Application Access/1. Manage API Access to Microsoft Azure Resources/0. Overview.mp4
526.7 kB
Monitor Security Using Azure Monitor/0. Manage Alerts/5. Summary.mp4
470.4 kB
Configure Security for Storage/1. Authenticate to Azure Storage using Azure AD/4. Summary.mp4
433.6 kB
Manage Access Control/1. Define Custom RBAC Roles in Microsoft Azure/3. Demo Create Azure Custom Resource Roles.srt
18.3 kB
Configure Security for Databases/0. Authenticating to Azure SQL/4. SQL AAD Authentication Using Code.srt
17.9 kB
Configure Security for Storage/1. Authenticate to Azure Storage using Azure AD/2. Demo Azure AD Authentication with Azure Storage.srt
17.2 kB
content.txt
16.8 kB
Manage Access Control/0. Implement RBAC in Microsoft Azure/7. Demo Implement RBAC in Azure.srt
16.0 kB
Configure Secure Access Using Azure AD/0. Monitor Privileged Access in Microsoft Azure/3. Demo - Configure PIM Role Activation.srt
15.7 kB
Configure Security for Storage/1. Authenticate to Azure Storage using Azure AD/3. Azure Files Authentication with AADDS.srt
14.1 kB
Monitor Security Using Azure Monitor/0. Manage Alerts/4. Examine Security Alerts Using Azure Monitor.srt
13.7 kB
Configure and Manage Key Vault/3. Using Key Vault Objects/1. Configuring Storage Key Management.srt
12.3 kB
Configure Secure Access Using Azure AD/1. Conduct Access Reviews in Microsoft Azure/2. Demo - Perform an Azure AD PIM Access Review.srt
12.1 kB
Configure Security for Storage/2. Encrypt Azure Storage/3. Encrypt Data at Rest.srt
12.1 kB
Monitor Security Using Azure Monitor/1. Configure Diagnostic Logging/4. Azure Monitor and Diagnostic Logging.srt
11.4 kB
Configure Security for Storage/0. Configuring Azure Storage Security/4. Shared Access Signature Security.srt
11.1 kB
Monitor Security Using Azure Sentinel/1. Evaluate Results/3. Analytics Rules.srt
10.8 kB
Configure Security Policies/1. Configuring Azure Blueprints for Security/4. Adding Artifacts to the Blueprint.srt
10.6 kB
Configure Secure Access Using Azure AD/0. Monitor Privileged Access in Microsoft Azure/2. Demo - Tour the Azure AD PIM Interface.srt
10.6 kB
Monitor Security Using Azure Monitor/1. Configure Diagnostic Logging/3. Setup Diagnostic Logging.srt
10.6 kB
Configure Security for Databases/3. Using SQL with Advanced Threat Protection (ATP)/5. Information Protection.srt
10.5 kB
Configure Security for Databases/1. Auditing SQL Server/3. Analyze Audit Logs.srt
10.3 kB
Monitor Security Using Azure Monitor/0. Manage Alerts/3. Create a Metric Alert.srt
10.3 kB
Configure Secure Access Using Azure AD/2. Implement Conditional Access and Azure AD Identity Protection/5. Demo - Configure Azure AD Conditional Access.srt
10.2 kB
Manage Access Control/1. Define Custom RBAC Roles in Microsoft Azure/5. Demo Create Custom Azure AD Roles.srt
10.1 kB
Monitor Security Using Azure Sentinel/1. Evaluate Results/2. Custom Alerts.srt
9.9 kB
Configure Security for Storage/1. Authenticate to Azure Storage using Azure AD/1. Secure Azure Storage Using Azure AD.srt
9.8 kB
Configure and Manage Key Vault/3. Using Key Vault Objects/3. Recovering a Delete Item in Key Vault.srt
9.3 kB
Configure Security for Databases/0. Authenticating to Azure SQL/1. Azure SQL Authentication Mechanisms.srt
9.0 kB
Configure Security Policies/2. Using Playbooks in Azure Sentinel/3. Creating an Alert Rule.srt
8.9 kB
Configure Security Policies/1. Configuring Azure Blueprints for Security/0. Reviewing Azure Blueprints.srt
8.8 kB
Configure and Manage Key Vault/0. Managing Access to Key Vault/7. Creating a Custom Role.srt
8.6 kB
Configure Security Policies/0. Configuring Azure Policy for Security/13. Policy Effects and Remediation.srt
8.5 kB
Configure Security Policies/2. Using Playbooks in Azure Sentinel/4. Creating a Playbook.srt
8.3 kB
Configure and Manage Key Vault/3. Using Key Vault Objects/5. Restoring a Secret in Key Vault.srt
8.2 kB
Configure and Manage Key Vault/3. Using Key Vault Objects/2. Understanding Key Vault Protection and Recovery.srt
8.0 kB
Configure Security for Databases/2. Encrypting SQL/4. Always Encrypted.srt
8.0 kB
Configure Security Policies/1. Configuring Azure Blueprints for Security/3. Creating a Blueprint Demonstration.srt
7.9 kB
Configure Security Policies/0. Configuring Azure Policy for Security/15. Assigning the Policy to a Resource Group.srt
7.9 kB
Configure Secure Access Using Azure AD/2. Implement Conditional Access and Azure AD Identity Protection/3. Demo - Configure Azure AD IdP.srt
7.9 kB
Configure Security for Storage/0. Configuring Azure Storage Security/7. Demo Manage Keys with Keyvault.srt
7.8 kB
Configure Security Policies/0. Configuring Azure Policy for Security/14. Creating a Modify Effect Policy.srt
7.8 kB
Configure and Manage Key Vault/0. Managing Access to Key Vault/3. Creating an Azure Key Vault.srt
7.7 kB
Configure Security Policies/0. Configuring Azure Policy for Security/8. Creating a New Policy Definition.srt
7.7 kB
Configure Secure Access Using Azure AD/0. Monitor Privileged Access in Microsoft Azure/1. Azure AD Privileged Identity Management.srt
7.7 kB
Configure and Manage Key Vault/1. Using Key Vault Access Policies/1. Permissions for Object Types.srt
7.5 kB
Configure Security for Databases/3. Using SQL with Advanced Threat Protection (ATP)/4. Threat Protection.srt
7.5 kB
Configure and Manage Key Vault/1. Using Key Vault Access Policies/4. Using Key Vault Firewall Rules.srt
7.5 kB
Configure Secure Access Using Azure AD/2. Implement Conditional Access and Azure AD Identity Protection/4. Azure AD Conditional Access.srt
7.5 kB
Monitor Security Using Azure Sentinel/2. Use Automation/1. What Is Automation.srt
7.5 kB
Configure Security Policies/1. Configuring Azure Blueprints for Security/6. Creating the Assignment.srt
7.4 kB
Monitor Security Using Azure Monitor/1. Configure Diagnostic Logging/1. What Is Diagnostic Logging.srt
7.4 kB
Configure Security Policies/1. Configuring Azure Blueprints for Security/8. Updating the Assignment.srt
7.3 kB
Monitor Security Using Azure Sentinel/1. Evaluate Results/1. Detecting Problems.srt
7.3 kB
Monitor Security Using Azure Security Center/0. Managing Policies in Azure Security Center/3. Assigning Policies through Security Center.srt
7.3 kB
Manage Access Control/0. Implement RBAC in Microsoft Azure/8. Demo Test RBAC Assignments.srt
7.1 kB
Configure Security Policies/2. Using Playbooks in Azure Sentinel/5. Adding the Playbook to an Alert Rule.srt
7.0 kB
Configure and Manage Key Vault/2. Managing Key Vault Objects/4. Creating a Secret in Key Vault.srt
6.9 kB
Configure Security for Databases/3. Using SQL with Advanced Threat Protection (ATP)/3. Demo Vulnerability Assessment.srt
6.9 kB
Monitor Security Using Azure Sentinel/2. Use Automation/3. Author a Logic App.srt
6.6 kB
Configure and Manage Key Vault/2. Managing Key Vault Objects/5. Understanding Key Vault Certificates.srt
6.6 kB
Configure Security Policies/0. Configuring Azure Policy for Security/2. Creating and Assigning Policies.srt
6.6 kB
Configure Secure Access Using Azure AD/2. Implement Conditional Access and Azure AD Identity Protection/2. Azure AD Identity Protection.srt
6.5 kB
Configure and Manage Key Vault/2. Managing Key Vault Objects/6. Creating a Certificate in Key Vault.srt
6.5 kB
Configure Security Policies/0. Configuring Azure Policy for Security/3. Management Group and Policy Demo.srt
6.4 kB
Configure Security Policies/0. Configuring Azure Policy for Security/6. Preparing the Scenario Environment.srt
6.2 kB
Manage Access Control/0. Implement RBAC in Microsoft Azure/3. Built-in Azure RBAC Roles.srt
6.1 kB
Configure Security for Databases/1. Auditing SQL Server/1. Overview of Auditing.srt
6.1 kB
Monitor Security Using Azure Monitor/2. Configure Log Retention/2. Configure Log Retention.srt
6.1 kB
Configure and Manage Key Vault/0. Managing Access to Key Vault/5. Reviewing Role Based Access Control.srt
5.9 kB
Configure Security for Databases/0. Authenticating to Azure SQL/3. Use SSMS with AAD Authentication.srt
5.7 kB
Manage Access Control/0. Implement RBAC in Microsoft Azure/6. Programmatic RBAC Role Assignment.srt
5.6 kB
Monitor Security Using Azure Sentinel/2. Use Automation/5. Test the Playbook.srt
5.6 kB
Configure Secure Access Using Azure AD/1. Conduct Access Reviews in Microsoft Azure/1. Why Conduct Access Reviews.srt
5.5 kB
Configure Security Policies/0. Configuring Azure Policy for Security/9. Adding a Policy to an Initiative.srt
5.5 kB
Configure Security Policies/1. Configuring Azure Blueprints for Security/7. Reviewing Assignment Results.srt
5.5 kB
Configure and Manage Key Vault/3. Using Key Vault Objects/4. Backing up Items in Key Vault.srt
5.4 kB
Monitor Security Using Azure Security Center/2. Configuring Just in Time VM Access/5. Validating JIT VM Access.srt
5.3 kB
Monitor Security Using Azure Security Center/0. Managing Policies in Azure Security Center/0. Certification Coverage.srt
5.2 kB
Configure Security Policies/0. Configuring Azure Policy for Security/5. Assigning a Policy Scenario.srt
5.1 kB
Monitor Security Using Azure Monitor/0. Manage Alerts/2. Alerts.srt
5.0 kB
Monitor Security Using Azure Security Center/3. Evaluating Vulnerability Scans/5. Viewing the Assessment Results.srt
5.0 kB
Monitor Security Using Azure Security Center/0. Managing Policies in Azure Security Center/5. Assigning a Custom Initiative.srt
4.9 kB
Monitor Security Using Azure Monitor/1. Configure Diagnostic Logging/2. Azure Monitor and App Service Logs.srt
4.9 kB
Configure Secure Access Using Azure AD/0. Monitor Privileged Access in Microsoft Azure/5. Azure AD Elevated Access.srt
4.8 kB
Configure and Manage Key Vault/3. Using Key Vault Objects/0. Reviewing Storage Key Management.srt
4.7 kB
Configure and Manage Key Vault/2. Managing Key Vault Objects/2. Creating a Key in Key Vault.srt
4.6 kB
Configure Security for Storage/2. Encrypt Azure Storage/1. Understand Azure Storage Encryption.srt
4.6 kB
Configure Security for Storage/0. Configuring Azure Storage Security/5. Manage SAS based security for Azure Storage.srt
4.6 kB
Configure Security Policies/0. Configuring Azure Policy for Security/4. Azure Security Benchmark Policies.srt
4.5 kB
Configure Secure Access Using Azure AD/0. Monitor Privileged Access in Microsoft Azure/0. Overview.srt
4.5 kB
Configure and Manage Key Vault/2. Managing Key Vault Objects/1. Understanding Key Vault Keys.srt
4.4 kB
Monitor Security Using Azure Security Center/1. Managing Compliance in Azure Security Center/5. Reviewing Compliance Assessment.srt
4.4 kB
Configure and Manage Key Vault/1. Using Key Vault Access Policies/3. Applying an Access Policy in the Portal.srt
4.4 kB
Configure Secure Access Using Azure AD/0. Monitor Privileged Access in Microsoft Azure/6. Demo - Enable Azure AD Elevated Access.srt
4.4 kB
Manage Access Control/0. Implement RBAC in Microsoft Azure/0. Overview.srt
4.4 kB
Configure Security Policies/0. Configuring Azure Policy for Security/10. Assign the Initiative to a Subscription.srt
4.4 kB
Monitor Security Using Azure Security Center/2. Configuring Just in Time VM Access/3. Enabling JIT VM Access.srt
4.3 kB
Configure and Manage Key Vault/0. Managing Access to Key Vault/2. Management Plane vs. Data Plane.srt
4.3 kB
Configure and Manage Key Vault/0. Managing Access to Key Vault/0. Course Introduction.srt
4.2 kB
Configure Security Policies/2. Using Playbooks in Azure Sentinel/0. Reviewing Azure Sentinel.srt
4.2 kB
Manage Access Control/0. Implement RBAC in Microsoft Azure/4. Effective Permissions.srt
4.2 kB
Manage Access Control/0. Implement RBAC in Microsoft Azure/2. Azure Management Scopes.srt
4.2 kB
Configure and Manage Key Vault/2. Managing Key Vault Objects/3. Understanding Key Vault Secrets.srt
4.1 kB
Monitor Security Using Azure Security Center/0. Managing Policies in Azure Security Center/1. Azure Policies Reviewed.srt
4.1 kB
Configure Security for Storage/2. Encrypt Azure Storage/2. Encrypt Data in Transit.srt
4.1 kB
Configure Security Policies/0. Configuring Azure Policy for Security/0. Certification Coverage.srt
4.0 kB
Configure Security Policies/0. Configuring Azure Policy for Security/12. Review Policy Compliance in the Portal.srt
4.0 kB
Monitor Security Using Azure Security Center/2. Configuring Just in Time VM Access/0. Introducing Just in Time VM Access.srt
4.0 kB
Manage Access Control/1. Define Custom RBAC Roles in Microsoft Azure/1. Azure RBAC Role Structure.srt
4.0 kB
Monitor Security Using Azure Security Center/1. Managing Compliance in Azure Security Center/4. Adding a Compliance Standard to a Subscription.srt
3.9 kB
Configure Security for Databases/2. Encrypting SQL/3. Encryption at Rest.srt
3.9 kB
Configure Security for Storage/0. Configuring Azure Storage Security/1. Manage Azure Storage Authentication.srt
3.9 kB
Monitor Security Using Azure Sentinel/0. Explore Data Sources/3. Data Sources.srt
3.8 kB
Manage Access Control/1. Define Custom RBAC Roles in Microsoft Azure/4. Custom Azure AD Roles.srt
3.7 kB
Monitor Security Using Azure Monitor/0. Manage Alerts/1. Azure Monitor.srt
3.7 kB
Configure Security for Storage/0. Configuring Azure Storage Security/3. Demo Configure and Manage Storage Keys.srt
3.7 kB
Monitor Security Using Azure Security Center/1. Managing Compliance in Azure Security Center/2. Compliance Policy Lifecycle.srt
3.7 kB
Configure Security Policies/1. Configuring Azure Blueprints for Security/5. Assigning Blueprints.srt
3.6 kB
Configure Security for Databases/2. Encrypting SQL/5. Dynamic Data Masking.srt
3.6 kB
Configure Secure Access Using Azure AD/2. Implement Conditional Access and Azure AD Identity Protection/6. Summary.srt
3.6 kB
Monitor Security Using Azure Sentinel/2. Use Automation/2. Create a Playbook.srt
3.5 kB
Monitor Security Using Azure Security Center/3. Evaluating Vulnerability Scans/2. Reviewing Vulnerability Assessments.srt
3.4 kB
Configure Security for Databases/1. Auditing SQL Server/2. Setup Auditing.srt
3.4 kB
Monitor Security Using Azure Security Center/1. Managing Compliance in Azure Security Center/0. Compliance Policies in Azure Security Center.srt
3.4 kB
Monitor Security Using Azure Sentinel/2. Use Automation/4. Connect Playbook to an Analytics Rule.srt
3.3 kB
Monitor Security Using Azure Security Center/0. Managing Policies in Azure Security Center/4. Policy Hierarchy and Assignment.srt
3.2 kB
Configure and Manage Key Vault/0. Managing Access to Key Vault/1. Azure Key Vault Review.srt
3.2 kB
Configure Security Policies/0. Configuring Azure Policy for Security/7. Review the Policy Structure.srt
3.2 kB
Configure and Manage Key Vault/1. Using Key Vault Access Policies/2. Applying an Access Policy with PowerShell.srt
3.1 kB
Configure and Manage Key Vault/1. Using Key Vault Access Policies/5. Reviewing Key Vault Private Endpoints.srt
3.1 kB
Configure Security Policies/1. Configuring Azure Blueprints for Security/1. Azure Blueprint Lifecycle.srt
3.1 kB
Configure and Manage Key Vault/0. Managing Access to Key Vault/6. Assinging a Role to a User.srt
3.1 kB
Monitor Security Using Azure Security Center/2. Configuring Just in Time VM Access/2. Checking JIT VM Access.srt
3.1 kB
Configure and Manage Key Vault/1. Using Key Vault Access Policies/0. Reviewing Access Policies.srt
3.1 kB
Configure Security for Databases/3. Using SQL with Advanced Threat Protection (ATP)/1. Azure Defender.srt
3.1 kB
Monitor Security Using Azure Sentinel/0. Explore Data Sources/5. Connect Azure Sentinel to Azure Active Directory.srt
3.0 kB
Configure Security for Databases/2. Encrypting SQL/1. Overview of Encryption.srt
3.0 kB
Configure Security Policies/2. Using Playbooks in Azure Sentinel/2. Connecting Azure Activity to Sentinel.srt
2.9 kB
Monitor Security Using Azure Security Center/0. Managing Policies in Azure Security Center/2. Reviewing the Default Security Policy.srt
2.9 kB
Monitor Security Using Azure Security Center/3. Evaluating Vulnerability Scans/1. Deploying Demo Resources.srt
2.9 kB
Manage Access Control/0. Implement RBAC in Microsoft Azure/1. Preliminary Terminology.srt
2.8 kB
Configure Security for Databases/2. Encrypting SQL/2. Encryption in Transit.srt
2.8 kB
Monitor Security Using Azure Security Center/3. Evaluating Vulnerability Scans/0. Introducing Vulnerability Scans.srt
2.7 kB
Configure Security Policies/0. Configuring Azure Policy for Security/11. Review Policies in the Portal.srt
2.7 kB
Monitor Security Using Azure Security Center/3. Evaluating Vulnerability Scans/3. Deploy the Assessment Agent.srt
2.7 kB
Configure Secure Access Using Azure AD/2. Implement Conditional Access and Azure AD Identity Protection/1. Azure Multi-Factor Authentication (MFA).srt
2.7 kB
Monitor Security Using Azure Sentinel/0. Explore Data Sources/4. Onboard Azure Sentinel.srt
2.6 kB
Configure Security for Databases/0. Authenticating to Azure SQL/2. Setup AAD Authentication for SQL.srt
2.6 kB
Monitor Security Using Azure Monitor/2. Configure Log Retention/1. What Is Log Retention.srt
2.6 kB
Configure Security Policies/1. Configuring Azure Blueprints for Security/2. Creating a Blueprint Scenario.srt
2.5 kB
Monitor Security Using Azure Sentinel/0. Explore Data Sources/1. Azure Sentinel.srt
2.5 kB
Configure Security for Storage/0. Configuring Azure Storage Security/2. Key Based Security.srt
2.3 kB
Configure Secure Access Using Azure AD/0. Monitor Privileged Access in Microsoft Azure/7. Summary.srt
2.2 kB
Configure Security Policies/0. Configuring Azure Policy for Security/1. Reviewing Azure Policies.srt
2.2 kB
Monitor Security Using Azure Security Center/2. Configuring Just in Time VM Access/4. Reviewing the JIT Process.srt
2.1 kB
Manage Access Control/1. Define Custom RBAC Roles in Microsoft Azure/6. Summary.srt
2.1 kB
Configure Secure Access Using Azure AD/1. Conduct Access Reviews in Microsoft Azure/3. Summary.srt
2.0 kB
Manage Access Control/0. Implement RBAC in Microsoft Azure/9. Summary.srt
1.9 kB
Configure Secure Access Using Azure AD/0. Monitor Privileged Access in Microsoft Azure/4. Azure AD PIM Monitoring Scopes.srt
1.9 kB
Configure and Manage Key Vault/0. Managing Access to Key Vault/4. Exploring an Azure Key Vault.srt
1.9 kB
Monitor Security Using Azure Security Center/3. Evaluating Vulnerability Scans/4. Review the Assessment Process.srt
1.9 kB
Manage Access Control/0. Implement RBAC in Microsoft Azure/5. Resource Locks.srt
1.9 kB
Monitor Security Using Azure Security Center/1. Managing Compliance in Azure Security Center/3. Enabling Azure Defender Plan.srt
1.8 kB
Monitor Security Using Azure Security Center/2. Configuring Just in Time VM Access/1. Deploying Demo Resources.srt
1.8 kB
Configure Security for Databases/3. Using SQL with Advanced Threat Protection (ATP)/2. Vulnerability Assessment.srt
1.7 kB
Configure and Manage Key Vault/2. Managing Key Vault Objects/0. Reviewing Key Vault Objects.srt
1.7 kB
Monitor Security Using Azure Security Center/1. Managing Compliance in Azure Security Center/1. Reviewing Regulatory Compliance Settings.srt
1.7 kB
Monitor Security Using Azure Sentinel/2. Use Automation/6. Summary.srt
1.7 kB
Configure Security Policies/2. Using Playbooks in Azure Sentinel/1. Collect and Detect Data.srt
1.7 kB
Configure Security for Databases/0. Authenticating to Azure SQL/0. Introduction.srt
1.6 kB
Monitor Security Using Azure Monitor/0. Manage Alerts/0. Introduction.srt
1.4 kB
Configure Security for Storage/0. Configuring Azure Storage Security/0. Introduction.srt
1.4 kB
Configure Security for Storage/1. Authenticate to Azure Storage using Azure AD/0. Introduction.srt
1.4 kB
Monitor Security Using Azure Sentinel/0. Explore Data Sources/0. Introduction.srt
1.4 kB
Configure Security for Databases/1. Auditing SQL Server/4. Limitations of Auditing.srt
1.3 kB
Configure Security for Databases/3. Using SQL with Advanced Threat Protection (ATP)/0. Introduction.srt
1.3 kB
Monitor Security Using Azure Sentinel/2. Use Automation/0. Introduction.srt
1.3 kB
Configure Security for Storage/2. Encrypt Azure Storage/0. Introduction.srt
1.2 kB
Monitor Security Using Azure Sentinel/1. Evaluate Results/0. Introduction.srt
1.1 kB
Configure Security for Databases/0. Authenticating to Azure SQL/5. Summary.srt
1.1 kB
Configure Secure Access Using Azure AD/2. Implement Conditional Access and Azure AD Identity Protection/0. Overview.srt
1.1 kB
Monitor Security Using Azure Sentinel/0. Explore Data Sources/6. Summary.srt
1.0 kB
Configure Security for Databases/2. Encrypting SQL/0. Introduction.srt
1.0 kB
Manage Access Control/1. Define Custom RBAC Roles in Microsoft Azure/2. Custom Role Creation Process.srt
1.0 kB
Configure Security for Databases/1. Auditing SQL Server/0. Introduction.srt
948 Bytes
Monitor Security Using Azure Sentinel/0. Explore Data Sources/2. Layout of This Course.srt
942 Bytes
Configure Security for Databases/2. Encrypting SQL/6. Summary.srt
938 Bytes
Monitor Security Using Azure Monitor/1. Configure Diagnostic Logging/5. Summary.srt
934 Bytes
Configure Security for Storage/0. Configuring Azure Storage Security/8. Summary.srt
898 Bytes
Configure Security for Databases/3. Using SQL with Advanced Threat Protection (ATP)/6. Summary.srt
880 Bytes
Configure Secure Access Using Azure AD/1. Conduct Access Reviews in Microsoft Azure/0. Overview.srt
857 Bytes
Monitor Security Using Azure Sentinel/1. Evaluate Results/4. Summary.srt
851 Bytes
Monitor Security Using Azure Monitor/2. Configure Log Retention/3. Summary.srt
809 Bytes
Monitor Security Using Azure Monitor/1. Configure Diagnostic Logging/0. Introduction.srt
793 Bytes
Manage Access Control/1. Define Custom RBAC Roles in Microsoft Azure/0. Overview.srt
730 Bytes
Monitor Security Using Azure Monitor/2. Configure Log Retention/0. Introduction.srt
713 Bytes
Configure Security for Storage/0. Configuring Azure Storage Security/6. Manage Keys Using Keyvault.srt
662 Bytes
Monitor Security Using Azure Monitor/0. Manage Alerts/5. Summary.srt
628 Bytes
Configure Security for Databases/1. Auditing SQL Server/5. Summary.srt
570 Bytes
Configure Security for Storage/1. Authenticate to Azure Storage using Azure AD/4. Summary.srt
423 Bytes
随机展示
相关说明
本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!
>