Magnetic link has been copied to the cutting board

Name Pluralsight - Managing Microsoft Azure Security by Ned Bellavance

File Type video

Size 271.78MB

UpdateDate 2024-12-22

hash *****583780E4015304010B9C3BEFD9EE7EB487

Hot 1

Files 0. Course Overview/0. Course Overview.mp4 | 2.92MB 0. Course Overview/0. Course Overview.srt | 2.82KB 1. Introducing Monitoring Azure Security/0. Introduction.mp4 | 2.14MB 1. Introducing Monitoring Azure Security/0. Introduction.srt | 3.23KB 1. Introducing Monitoring Azure Security/1. Course Overview.mp4 | 4.71MB 1. Introducing Monitoring Azure Security/1. Course Overview.srt | 6.41KB 1. Introducing Monitoring Azure Security/2. Contoso Scenario.mp4 | 2.80MB 1. Introducing Monitoring Azure Security/2. Contoso Scenario.srt | 4.07KB 1. Introducing Monitoring Azure Security/3. Security Challenges and Controls.mp4 | 4.77MB 1. Introducing Monitoring Azure Security/3. Security Challenges and Controls.srt | 7.36KB 1. Introducing Monitoring Azure Security/4. Shared Responsibility Model.mp4 | 4.91MB 1. Introducing Monitoring Azure Security/4. Shared Responsibility Model.srt | 7.00KB 1. Introducing Monitoring Azure Security/5. Summary.mp4 | 1.78MB 1. Introducing Monitoring Azure Security/5. Summary.srt | 2.64KB 2. Understanding Azure Security Center/0. Introduction.mp4 | 1.22MB 2. Understanding Azure Security Center/0. Introduction.srt | 2.14KB 2. Understanding Azure Security Center/1. Security Center Management.mp4 | 2.73MB 2. Understanding Azure Security Center/1. Security Center Management.srt | 4.22KB 2. Understanding Azure Security Center/2. Exploring the Portal.mp4 | 6.51MB 2. Understanding Azure Security Center/2. Exploring the Portal.srt | 6.75KB 2. Understanding Azure Security Center/3. Licensing Tiers and Costs.mp4 | 4.03MB 2. Understanding Azure Security Center/3. Licensing Tiers and Costs.srt | 5.53KB 2. Understanding Azure Security Center/4. Summary.mp4 | 1.54MB 2. Understanding Azure Security Center/4. Summary.srt | 2.39KB 3. Policies and Data Collection/0. Introduction.mp4 | 2.78MB 3. Policies and Data Collection/0. Introduction.srt | 4.05KB 3. Policies and Data Collection/1. Policy and Compliance.mp4 | 7.57MB 3. Policies and Data Collection/1. Policy and Compliance.srt | 7.79KB 3. Policies and Data Collection/2. Azure Policies.mp4 | 10.39MB 3. Policies and Data Collection/2. Azure Policies.srt | 11.72KB 3. Policies and Data Collection/3. Regulatory Compliance.mp4 | 5.69MB 3. Policies and Data Collection/3. Regulatory Compliance.srt | 4.42KB 3. Policies and Data Collection/4. Subscription Settings.mp4 | 14.52MB 3. Policies and Data Collection/4. Subscription Settings.srt | 13.95KB 3. Policies and Data Collection/5. Summary.mp4 | 1.64MB 3. Policies and Data Collection/5. Summary.srt | 2.33KB 4. Security Assessments and Threat Prevention/0. Introduction.mp4 | 2.31MB 4. Security Assessments and Threat Prevention/0. Introduction.srt | 3.31KB 4. Security Assessments and Threat Prevention/1. Secure Score.mp4 | 4.16MB 4. Security Assessments and Threat Prevention/1. Secure Score.srt | 4.50KB 4. Security Assessments and Threat Prevention/2. Compute and Apps.mp4 | 9.48MB 4. Security Assessments and Threat Prevention/2. Compute and Apps.srt | 10.54KB 4. Security Assessments and Threat Prevention/3. Network.mp4 | 5.87MB 4. Security Assessments and Threat Prevention/3. Network.srt | 6.70KB 4. Security Assessments and Threat Prevention/4. Data and Storage.mp4 | 4.99MB 4. Security Assessments and Threat Prevention/4. Data and Storage.srt | 5.45KB 4. Security Assessments and Threat Prevention/5. Identity and Access.mp4 | 4.13MB 4. Security Assessments and Threat Prevention/5. Identity and Access.srt | 3.99KB 4. Security Assessments and Threat Prevention/6. Summary.mp4 | 1.75MB 4. Security Assessments and Threat Prevention/6. Summary.srt | 2.46KB 5. Managing Security Solutions/0. Introduction.mp4 | 2.63MB 5. Managing Security Solutions/0. Introduction.srt | 3.62KB 5. Managing Security Solutions/1. Security Solutions.mp4 | 2.02MB 5. Managing Security Solutions/1. Security Solutions.srt | 3.10KB 5. Managing Security Solutions/2. Connecting a Solution.mp4 | 4.17MB 5. Managing Security Solutions/2. Connecting a Solution.srt | 3.72KB 5. Managing Security Solutions/3. Retired Solutions.mp4 | 2.01MB 5. Managing Security Solutions/3. Retired Solutions.srt | 3.12KB 5. Managing Security Solutions/4. Data Sources.mp4 | 2.60MB 5. Managing Security Solutions/4. Data Sources.srt | 3.96KB 5. Managing Security Solutions/5. Adding a Non-Azure Windows Machine.mp4 | 8.19MB 5. Managing Security Solutions/5. Adding a Non-Azure Windows Machine.srt | 6.96KB 5. Managing Security Solutions/6. Adding a Non-Azure Linux Machine.mp4 | 9.50MB 5. Managing Security Solutions/6. Adding a Non-Azure Linux Machine.srt | 5.84KB 5. Managing Security Solutions/7. Connecting to a SIEM.mp4 | 10.36MB 5. Managing Security Solutions/7. Connecting to a SIEM.srt | 8.68KB 5. Managing Security Solutions/8. Summary.mp4 | 1.26MB 5. Managing Security Solutions/8. Summary.srt | 1.86KB 6. Investigating Threats/0. Introduction.mp4 | 1.67MB 6. Investigating Threats/0. Introduction.srt | 2.47KB 6. Investigating Threats/1. Investigating Threats.mp4 | 2.99MB 6. Investigating Threats/1. Investigating Threats.srt | 4.00KB 6. Investigating Threats/2. Viewing Security Alerts.mp4 | 5.15MB 6. Investigating Threats/2. Viewing Security Alerts.srt | 4.35KB 6. Investigating Threats/3. Working with Security Incidents.mp4 | 8.03MB 6. Investigating Threats/3. Working with Security Incidents.srt | 8.56KB 6. Investigating Threats/4. Alert Validation and Remediation.mp4 | 7.28MB 6. Investigating Threats/4. Alert Validation and Remediation.srt | 7.49KB 6. Investigating Threats/5. Summary.mp4 | 1.20MB 6. Investigating Threats/5. Summary.srt | 1.78KB 7. Automating Security Workflows/0. Introduction.mp4 | 2.56MB 7. Automating Security Workflows/0. Introduction.srt | 3.59KB 7. Automating Security Workflows/1. Configuring Workflow Automation.mp4 | 5.40MB 7. Automating Security Workflows/1. Configuring Workflow Automation.srt | 5.35KB 7. Automating Security Workflows/2. Creating a New Workflow.mp4 | 10.22MB 7. Automating Security Workflows/2. Creating a New Workflow.srt | 8.41KB 7. Automating Security Workflows/3. Triggering a Logic App from an Alert.mp4 | 9.42MB 7. Automating Security Workflows/3. Triggering a Logic App from an Alert.srt | 7.75KB 7. Automating Security Workflows/4. Summary.mp4 | 1.48MB 7. Automating Security Workflows/4. Summary.srt | 2.21KB 8. Advanced Cloud Defense/0. Introduction.mp4 | 2.68MB 8. Advanced Cloud Defense/0. Introduction.srt | 3.49KB 8. Advanced Cloud Defense/1. Reviewing Just in Time VM Access.mp4 | 12.11MB 8. Advanced Cloud Defense/1. Reviewing Just in Time VM Access.srt | 11.62KB 8. Advanced Cloud Defense/2. Configuring JIT VM Access.mp4 | 9.23MB 8. Advanced Cloud Defense/2. Configuring JIT VM Access.srt | 7.17KB 8. Advanced Cloud Defense/3. Reviewing Adaptive Application Controls.mp4 | 10.61MB 8. Advanced Cloud Defense/3. Reviewing Adaptive Application Controls.srt | 10.73KB 8. Advanced Cloud Defense/4. Adding a Group to Adaptive Application Controls.mp4 | 3.60MB 8. Advanced Cloud Defense/4. Adding a Group to Adaptive Application Controls.srt | 3.22KB 8. Advanced Cloud Defense/5. Using File Integrity Monitoring.mp4 | 12.39MB 8. Advanced Cloud Defense/5. Using File Integrity Monitoring.srt | 11.52KB 8. Advanced Cloud Defense/6. Adaptive Network Hardening.mp4 | 1.74MB 8. Advanced Cloud Defense/6. Adaptive Network Hardening.srt | 2.61KB 8. Advanced Cloud Defense/7. Summary and Next Steps.mp4 | 3.12MB 8. Advanced Cloud Defense/7. Summary and Next Steps.srt | 4.83KB content.txt | 2.20KB microsoft-azure-security-managing-update.zip | 2.56MB

Recommend

Magnetic link has been copied to the cutting board