TorBT - Torrents and Magnet Links Search Engine

Pluralsight - Managing Microsoft Azure Security by Ned Bellavance

File Name
Size
0. Course Overview/0. Course Overview.mp4
2.9 MB
0. Course Overview/0. Course Overview.srt
2.8 kB
1. Introducing Monitoring Azure Security/0. Introduction.mp4
2.1 MB
1. Introducing Monitoring Azure Security/0. Introduction.srt
3.2 kB
1. Introducing Monitoring Azure Security/1. Course Overview.mp4
4.7 MB
1. Introducing Monitoring Azure Security/1. Course Overview.srt
6.4 kB
1. Introducing Monitoring Azure Security/2. Contoso Scenario.mp4
2.8 MB
1. Introducing Monitoring Azure Security/2. Contoso Scenario.srt
4.1 kB
1. Introducing Monitoring Azure Security/3. Security Challenges and Controls.mp4
4.8 MB
1. Introducing Monitoring Azure Security/3. Security Challenges and Controls.srt
7.4 kB
1. Introducing Monitoring Azure Security/4. Shared Responsibility Model.mp4
4.9 MB
1. Introducing Monitoring Azure Security/4. Shared Responsibility Model.srt
7.0 kB
1. Introducing Monitoring Azure Security/5. Summary.mp4
1.8 MB
1. Introducing Monitoring Azure Security/5. Summary.srt
2.6 kB
2. Understanding Azure Security Center/0. Introduction.mp4
1.2 MB
2. Understanding Azure Security Center/0. Introduction.srt
2.1 kB
2. Understanding Azure Security Center/1. Security Center Management.mp4
2.7 MB
2. Understanding Azure Security Center/1. Security Center Management.srt
4.2 kB
2. Understanding Azure Security Center/2. Exploring the Portal.mp4
6.5 MB
2. Understanding Azure Security Center/2. Exploring the Portal.srt
6.8 kB
2. Understanding Azure Security Center/3. Licensing Tiers and Costs.mp4
4.0 MB
2. Understanding Azure Security Center/3. Licensing Tiers and Costs.srt
5.5 kB
2. Understanding Azure Security Center/4. Summary.mp4
1.5 MB
2. Understanding Azure Security Center/4. Summary.srt
2.4 kB
3. Policies and Data Collection/0. Introduction.mp4
2.8 MB
3. Policies and Data Collection/0. Introduction.srt
4.0 kB
3. Policies and Data Collection/1. Policy and Compliance.mp4
7.6 MB
3. Policies and Data Collection/1. Policy and Compliance.srt
7.8 kB
3. Policies and Data Collection/2. Azure Policies.mp4
10 MB
3. Policies and Data Collection/2. Azure Policies.srt
12 kB
3. Policies and Data Collection/3. Regulatory Compliance.mp4
5.7 MB
3. Policies and Data Collection/3. Regulatory Compliance.srt
4.4 kB
3. Policies and Data Collection/4. Subscription Settings.mp4
14 MB
3. Policies and Data Collection/4. Subscription Settings.srt
14 kB
3. Policies and Data Collection/5. Summary.mp4
1.6 MB
3. Policies and Data Collection/5. Summary.srt
2.3 kB
4. Security Assessments and Threat Prevention/0. Introduction.mp4
2.3 MB
4. Security Assessments and Threat Prevention/0. Introduction.srt
3.3 kB
4. Security Assessments and Threat Prevention/1. Secure Score.mp4
4.2 MB
4. Security Assessments and Threat Prevention/1. Secure Score.srt
4.5 kB
4. Security Assessments and Threat Prevention/2. Compute and Apps.mp4
9.5 MB
4. Security Assessments and Threat Prevention/2. Compute and Apps.srt
10 kB
4. Security Assessments and Threat Prevention/3. Network.mp4
5.9 MB
4. Security Assessments and Threat Prevention/3. Network.srt
6.7 kB
4. Security Assessments and Threat Prevention/4. Data and Storage.mp4
5.0 MB
4. Security Assessments and Threat Prevention/4. Data and Storage.srt
5.5 kB
4. Security Assessments and Threat Prevention/5. Identity and Access.mp4
4.1 MB
4. Security Assessments and Threat Prevention/5. Identity and Access.srt
4.0 kB
4. Security Assessments and Threat Prevention/6. Summary.mp4
1.8 MB
4. Security Assessments and Threat Prevention/6. Summary.srt
2.5 kB
5. Managing Security Solutions/0. Introduction.mp4
2.6 MB
5. Managing Security Solutions/0. Introduction.srt
3.6 kB
5. Managing Security Solutions/1. Security Solutions.mp4
2.0 MB
5. Managing Security Solutions/1. Security Solutions.srt
3.1 kB
5. Managing Security Solutions/2. Connecting a Solution.mp4
4.2 MB
5. Managing Security Solutions/2. Connecting a Solution.srt
3.7 kB
5. Managing Security Solutions/3. Retired Solutions.mp4
2.0 MB
5. Managing Security Solutions/3. Retired Solutions.srt
3.1 kB
5. Managing Security Solutions/4. Data Sources.mp4
2.6 MB
5. Managing Security Solutions/4. Data Sources.srt
4.0 kB
5. Managing Security Solutions/5. Adding a Non-Azure Windows Machine.mp4
8.2 MB
5. Managing Security Solutions/5. Adding a Non-Azure Windows Machine.srt
7.0 kB
5. Managing Security Solutions/6. Adding a Non-Azure Linux Machine.mp4
9.5 MB
5. Managing Security Solutions/6. Adding a Non-Azure Linux Machine.srt
5.8 kB
5. Managing Security Solutions/7. Connecting to a SIEM.mp4
10 MB
5. Managing Security Solutions/7. Connecting to a SIEM.srt
8.7 kB
5. Managing Security Solutions/8. Summary.mp4
1.3 MB
5. Managing Security Solutions/8. Summary.srt
1.9 kB
6. Investigating Threats/0. Introduction.mp4
1.7 MB
6. Investigating Threats/0. Introduction.srt
2.5 kB
6. Investigating Threats/1. Investigating Threats.mp4
3.0 MB
6. Investigating Threats/1. Investigating Threats.srt
4.0 kB
6. Investigating Threats/2. Viewing Security Alerts.mp4
5.1 MB
6. Investigating Threats/2. Viewing Security Alerts.srt
4.3 kB
6. Investigating Threats/3. Working with Security Incidents.mp4
8.0 MB
6. Investigating Threats/3. Working with Security Incidents.srt
8.6 kB
6. Investigating Threats/4. Alert Validation and Remediation.mp4
7.3 MB
6. Investigating Threats/4. Alert Validation and Remediation.srt
7.5 kB
6. Investigating Threats/5. Summary.mp4
1.2 MB
6. Investigating Threats/5. Summary.srt
1.8 kB
7. Automating Security Workflows/0. Introduction.mp4
2.6 MB
7. Automating Security Workflows/0. Introduction.srt
3.6 kB
7. Automating Security Workflows/1. Configuring Workflow Automation.mp4
5.4 MB
7. Automating Security Workflows/1. Configuring Workflow Automation.srt
5.4 kB
7. Automating Security Workflows/2. Creating a New Workflow.mp4
10 MB
7. Automating Security Workflows/2. Creating a New Workflow.srt
8.4 kB
7. Automating Security Workflows/3. Triggering a Logic App from an Alert.mp4
9.4 MB
7. Automating Security Workflows/3. Triggering a Logic App from an Alert.srt
7.8 kB
7. Automating Security Workflows/4. Summary.mp4
1.5 MB
7. Automating Security Workflows/4. Summary.srt
2.2 kB
8. Advanced Cloud Defense/0. Introduction.mp4
2.7 MB
8. Advanced Cloud Defense/0. Introduction.srt
3.5 kB
8. Advanced Cloud Defense/1. Reviewing Just in Time VM Access.mp4
12 MB
8. Advanced Cloud Defense/1. Reviewing Just in Time VM Access.srt
12 kB
8. Advanced Cloud Defense/2. Configuring JIT VM Access.mp4
9.2 MB
8. Advanced Cloud Defense/2. Configuring JIT VM Access.srt
7.2 kB
8. Advanced Cloud Defense/3. Reviewing Adaptive Application Controls.mp4
11 MB
8. Advanced Cloud Defense/3. Reviewing Adaptive Application Controls.srt
11 kB
8. Advanced Cloud Defense/4. Adding a Group to Adaptive Application Controls.mp4
3.6 MB
8. Advanced Cloud Defense/4. Adding a Group to Adaptive Application Controls.srt
3.2 kB
8. Advanced Cloud Defense/5. Using File Integrity Monitoring.mp4
12 MB
8. Advanced Cloud Defense/5. Using File Integrity Monitoring.srt
12 kB
8. Advanced Cloud Defense/6. Adaptive Network Hardening.mp4
1.7 MB
8. Advanced Cloud Defense/6. Adaptive Network Hardening.srt
2.6 kB
8. Advanced Cloud Defense/7. Summary and Next Steps.mp4
3.1 MB
8. Advanced Cloud Defense/7. Summary and Next Steps.srt
4.8 kB
content.txt
2.2 kB
microsoft-azure-security-managing-update.zip
2.6 MB