TorBT - Torrents and Magnet Links Search Engine

Pluralsight - Microsoft Azure Security Engineer series 2020 (AZ-500)

File Name
Size
Configure Advanced Security for Compute/0. Configuring Monitoring and Updates for Virtual Machines/2. Demonstration Configuring Virtual Machine Update Automation.mp4
24 MB
Configure Advanced Security for Compute/0. Configuring Monitoring and Updates for Virtual Machines/1. Configuring Virtual Machine Update Management.mp4
9.3 MB
Configure Advanced Security for Compute/0. Configuring Monitoring and Updates for Virtual Machines/4. Demo Working with Azure Automation Desired State Configuration (DSC).mp4
8.3 MB
Configure Advanced Security for Compute/0. Configuring Monitoring and Updates for Virtual Machines/3. Configuring Azure Automation Desired State Configuration (DSC).mp4
7.0 MB
Configure Advanced Security for Compute/0. Configuring Monitoring and Updates for Virtual Machines/0. Course Introduction.mp4
2.5 MB
Configure Advanced Security for Compute/0. Configuring Monitoring and Updates for Virtual Machines/2. Demonstration Configuring Virtual Machine Update Automation.srt
17 kB
Configure Advanced Security for Compute/0. Configuring Monitoring and Updates for Virtual Machines/1. Configuring Virtual Machine Update Management.srt
14 kB
Configure Advanced Security for Compute/0. Configuring Monitoring and Updates for Virtual Machines/3. Configuring Azure Automation Desired State Configuration (DSC).srt
9.7 kB
Configure Advanced Security for Compute/0. Configuring Monitoring and Updates for Virtual Machines/4. Demo Working with Azure Automation Desired State Configuration (DSC).srt
7.4 kB
Configure Advanced Security for Compute/0. Configuring Monitoring and Updates for Virtual Machines/0. Course Introduction.srt
3.4 kB
Configure Advanced Security for Compute/1. Configuring Endpoint Protection and Vulnerability Management for Virtual Machines/1. Demonstration Deploying Endpoint Protection.mp4
12 MB
Configure Advanced Security for Compute/1. Configuring Endpoint Protection and Vulnerability Management for Virtual Machines/2. Implementing Vulnerability Management for Azure Virtual Machines.mp4
9.5 MB
Configure Advanced Security for Compute/1. Configuring Endpoint Protection and Vulnerability Management for Virtual Machines/0. Configuring Endpoint Protection for Azure Virtual Machines.mp4
4.5 MB
Configure Advanced Security for Compute/1. Configuring Endpoint Protection and Vulnerability Management for Virtual Machines/1. Demonstration Deploying Endpoint Protection.srt
8.8 kB
Configure Advanced Security for Compute/1. Configuring Endpoint Protection and Vulnerability Management for Virtual Machines/2. Implementing Vulnerability Management for Azure Virtual Machines.srt
8.5 kB
Configure Advanced Security for Compute/1. Configuring Endpoint Protection and Vulnerability Management for Virtual Machines/0. Configuring Endpoint Protection for Azure Virtual Machines.srt
6.0 kB
Configure Advanced Security for Compute/2. Configuring Encryption in Azure/2. Demonstration Configuring Azure Disk Encryption and Server Side Encryption.mp4
16 MB
Configure Advanced Security for Compute/2. Configuring Encryption in Azure/0. Working with Certificates in Azure.mp4
5.3 MB
Configure Advanced Security for Compute/2. Configuring Encryption in Azure/1. Implementing Azure Disk Encryption.mp4
4.9 MB
Configure Advanced Security for Compute/2. Configuring Encryption in Azure/2. Demonstration Configuring Azure Disk Encryption and Server Side Encryption.srt
13 kB
Configure Advanced Security for Compute/2. Configuring Encryption in Azure/0. Working with Certificates in Azure.srt
8.5 kB
Configure Advanced Security for Compute/2. Configuring Encryption in Azure/1. Implementing Azure Disk Encryption.srt
6.7 kB
Configure Advanced Security for Compute/3. Configuring Authentication and Security for Azure App Services/1. Demonstration Implementing Azure App Services Security.mp4
14 MB
Configure Advanced Security for Compute/3. Configuring Authentication and Security for Azure App Services/0. Working with Azure App Service Security.mp4
9.5 MB
Configure Advanced Security for Compute/3. Configuring Authentication and Security for Azure App Services/0. Working with Azure App Service Security.srt
14 kB
Configure Advanced Security for Compute/3. Configuring Authentication and Security for Azure App Services/1. Demonstration Implementing Azure App Services Security.srt
8.4 kB
Configure Advanced Security for Compute/4. Configuring Authentication and Security for Azure Containers/1. Demonstration Deploying Azure Container Registry and Azure Kubernetes Service.mp4
19 MB
Configure Advanced Security for Compute/4. Configuring Authentication and Security for Azure Containers/0. Understanding Authentication for the Azure Container Registry and Kubernetes Services.mp4
12 MB
Configure Advanced Security for Compute/4. Configuring Authentication and Security for Azure Containers/2. Demonstration Azure Kubernetes Service Authentication.mp4
4.8 MB
Configure Advanced Security for Compute/4. Configuring Authentication and Security for Azure Containers/0. Understanding Authentication for the Azure Container Registry and Kubernetes Services.srt
18 kB
Configure Advanced Security for Compute/4. Configuring Authentication and Security for Azure Containers/1. Demonstration Deploying Azure Container Registry and Azure Kubernetes Service.srt
15 kB
Configure Advanced Security for Compute/4. Configuring Authentication and Security for Azure Containers/2. Demonstration Azure Kubernetes Service Authentication.srt
4.5 kB
Configure Advanced Security for Compute/5. Configuring Security for Azure Kubernetes Service/0. Configuring Security for Azure Kubernetes Service and Azure Container Registry.mp4
14 MB
Configure Advanced Security for Compute/5. Configuring Security for Azure Kubernetes Service/1. Demonstration Configuring Isolation for Azure Kubernetes Service.mp4
6.4 MB
Configure Advanced Security for Compute/5. Configuring Security for Azure Kubernetes Service/2. Course Summery.mp4
5.6 MB
Configure Advanced Security for Compute/5. Configuring Security for Azure Kubernetes Service/0. Configuring Security for Azure Kubernetes Service and Azure Container Registry.srt
20 kB
Configure Advanced Security for Compute/5. Configuring Security for Azure Kubernetes Service/2. Course Summery.srt
8.6 kB
Configure Advanced Security for Compute/5. Configuring Security for Azure Kubernetes Service/1. Demonstration Configuring Isolation for Azure Kubernetes Service.srt
6.7 kB
Configure Advanced Security for Compute/microsoft-azure-security-engineer-configure-advanced-security-compute.zip
5.2 MB
Configure and Manage Key Vault/0. Managing Access to Key Vault/7. Creating a Custom Role.mp4
16 MB
Configure and Manage Key Vault/0. Managing Access to Key Vault/3. Creating an Azure Key Vault.mp4
12 MB
Configure and Manage Key Vault/0. Managing Access to Key Vault/6. Assinging a Role to a User.mp4
5.9 MB
Configure and Manage Key Vault/0. Managing Access to Key Vault/5. Reviewing Role Based Access Control.mp4
4.5 MB
Configure and Manage Key Vault/0. Managing Access to Key Vault/0. Course Introduction.mp4
4.2 MB
Configure and Manage Key Vault/0. Managing Access to Key Vault/2. Management Plane vs. Data Plane.mp4
3.6 MB
Configure and Manage Key Vault/0. Managing Access to Key Vault/4. Exploring an Azure Key Vault.mp4
3.3 MB
Configure and Manage Key Vault/0. Managing Access to Key Vault/1. Azure Key Vault Review.mp4
2.7 MB
Configure and Manage Key Vault/0. Managing Access to Key Vault/7. Creating a Custom Role.srt
8.4 kB
Configure and Manage Key Vault/0. Managing Access to Key Vault/3. Creating an Azure Key Vault.srt
7.5 kB
Configure and Manage Key Vault/0. Managing Access to Key Vault/5. Reviewing Role Based Access Control.srt
5.8 kB
Configure and Manage Key Vault/0. Managing Access to Key Vault/2. Management Plane vs. Data Plane.srt
4.2 kB
Configure and Manage Key Vault/0. Managing Access to Key Vault/0. Course Introduction.srt
4.1 kB
Configure and Manage Key Vault/0. Managing Access to Key Vault/1. Azure Key Vault Review.srt
3.1 kB
Configure and Manage Key Vault/0. Managing Access to Key Vault/6. Assinging a Role to a User.srt
3.1 kB
Configure and Manage Key Vault/0. Managing Access to Key Vault/4. Exploring an Azure Key Vault.srt
1.8 kB
Configure and Manage Key Vault/1. Using Key Vault Access Policies/4. Using Key Vault Firewall Rules.mp4
9.4 MB
Configure and Manage Key Vault/1. Using Key Vault Access Policies/1. Permissions for Object Types.mp4
6.2 MB
Configure and Manage Key Vault/1. Using Key Vault Access Policies/3. Applying an Access Policy in the Portal.mp4
5.9 MB
Configure and Manage Key Vault/1. Using Key Vault Access Policies/2. Applying an Access Policy with PowerShell.mp4
5.0 MB
Configure and Manage Key Vault/1. Using Key Vault Access Policies/0. Reviewing Access Policies.mp4
2.8 MB
Configure and Manage Key Vault/1. Using Key Vault Access Policies/5. Reviewing Key Vault Private Endpoints.mp4
2.1 MB
Configure and Manage Key Vault/1. Using Key Vault Access Policies/1. Permissions for Object Types.srt
7.4 kB
Configure and Manage Key Vault/1. Using Key Vault Access Policies/4. Using Key Vault Firewall Rules.srt
7.3 kB
Configure and Manage Key Vault/1. Using Key Vault Access Policies/3. Applying an Access Policy in the Portal.srt
4.3 kB
Configure and Manage Key Vault/1. Using Key Vault Access Policies/2. Applying an Access Policy with PowerShell.srt
3.1 kB
Configure and Manage Key Vault/1. Using Key Vault Access Policies/5. Reviewing Key Vault Private Endpoints.srt
3.1 kB
Configure and Manage Key Vault/1. Using Key Vault Access Policies/0. Reviewing Access Policies.srt
3.0 kB
Configure and Manage Key Vault/2. Managing Key Vault Objects/6. Creating a Certificate in Key Vault.mp4
12 MB
Configure and Manage Key Vault/2. Managing Key Vault Objects/4. Creating a Secret in Key Vault.mp4
11 MB
Configure and Manage Key Vault/2. Managing Key Vault Objects/2. Creating a Key in Key Vault.mp4
7.0 MB
Configure and Manage Key Vault/2. Managing Key Vault Objects/5. Understanding Key Vault Certificates.mp4
4.8 MB
Configure and Manage Key Vault/2. Managing Key Vault Objects/1. Understanding Key Vault Keys.mp4
3.7 MB
Configure and Manage Key Vault/2. Managing Key Vault Objects/3. Understanding Key Vault Secrets.mp4
2.9 MB
Configure and Manage Key Vault/2. Managing Key Vault Objects/0. Reviewing Key Vault Objects.mp4
1.1 MB
Configure and Manage Key Vault/2. Managing Key Vault Objects/4. Creating a Secret in Key Vault.srt
6.7 kB
Configure and Manage Key Vault/2. Managing Key Vault Objects/5. Understanding Key Vault Certificates.srt
6.4 kB
Configure and Manage Key Vault/2. Managing Key Vault Objects/6. Creating a Certificate in Key Vault.srt
6.4 kB
Configure and Manage Key Vault/2. Managing Key Vault Objects/2. Creating a Key in Key Vault.srt
4.5 kB
Configure and Manage Key Vault/2. Managing Key Vault Objects/1. Understanding Key Vault Keys.srt
4.3 kB
Configure and Manage Key Vault/2. Managing Key Vault Objects/3. Understanding Key Vault Secrets.srt
4.0 kB
Configure and Manage Key Vault/2. Managing Key Vault Objects/0. Reviewing Key Vault Objects.srt
1.7 kB
Configure and Manage Key Vault/3. Using Key Vault Objects/1. Configuring Storage Key Management.mp4
23 MB
Configure and Manage Key Vault/3. Using Key Vault Objects/3. Recovering a Delete Item in Key Vault.mp4
19 MB
Configure and Manage Key Vault/3. Using Key Vault Objects/5. Restoring a Secret in Key Vault.mp4
14 MB
Configure and Manage Key Vault/3. Using Key Vault Objects/2. Understanding Key Vault Protection and Recovery.mp4
6.0 MB
Configure and Manage Key Vault/3. Using Key Vault Objects/4. Backing up Items in Key Vault.mp4
4.4 MB
Configure and Manage Key Vault/3. Using Key Vault Objects/0. Reviewing Storage Key Management.mp4
3.5 MB
Configure and Manage Key Vault/3. Using Key Vault Objects/1. Configuring Storage Key Management.srt
12 kB
Configure and Manage Key Vault/3. Using Key Vault Objects/3. Recovering a Delete Item in Key Vault.srt
9.1 kB
Configure and Manage Key Vault/3. Using Key Vault Objects/5. Restoring a Secret in Key Vault.srt
8.0 kB
Configure and Manage Key Vault/3. Using Key Vault Objects/2. Understanding Key Vault Protection and Recovery.srt
7.8 kB
Configure and Manage Key Vault/3. Using Key Vault Objects/4. Backing up Items in Key Vault.srt
5.2 kB
Configure and Manage Key Vault/3. Using Key Vault Objects/0. Reviewing Storage Key Management.srt
4.6 kB
Configure and Manage Key Vault/microsoft-azure-security-engineer-configure-manage-key-vault.zip
2.4 MB
Configure Secure Access Using Azure AD/0. Monitor Privileged Access in Microsoft Azure/3. Demo - Configure PIM Role Activation.mp4
22 MB
Configure Secure Access Using Azure AD/0. Monitor Privileged Access in Microsoft Azure/2. Demo - Tour the Azure AD PIM Interface.mp4
14 MB
Configure Secure Access Using Azure AD/0. Monitor Privileged Access in Microsoft Azure/6. Demo - Enable Azure AD Elevated Access.mp4
6.4 MB
Configure Secure Access Using Azure AD/0. Monitor Privileged Access in Microsoft Azure/1. Azure AD Privileged Identity Management.mp4
5.7 MB
Configure Secure Access Using Azure AD/0. Monitor Privileged Access in Microsoft Azure/0. Overview.mp4
4.8 MB
Configure Secure Access Using Azure AD/0. Monitor Privileged Access in Microsoft Azure/5. Azure AD Elevated Access.mp4
3.4 MB
Configure Secure Access Using Azure AD/0. Monitor Privileged Access in Microsoft Azure/7. Summary.mp4
1.6 MB
Configure Secure Access Using Azure AD/0. Monitor Privileged Access in Microsoft Azure/4. Azure AD PIM Monitoring Scopes.mp4
1.4 MB
Configure Secure Access Using Azure AD/0. Monitor Privileged Access in Microsoft Azure/3. Demo - Configure PIM Role Activation.srt
15 kB
Configure Secure Access Using Azure AD/0. Monitor Privileged Access in Microsoft Azure/2. Demo - Tour the Azure AD PIM Interface.srt
10 kB
Configure Secure Access Using Azure AD/0. Monitor Privileged Access in Microsoft Azure/1. Azure AD Privileged Identity Management.srt
7.5 kB
Configure Secure Access Using Azure AD/0. Monitor Privileged Access in Microsoft Azure/5. Azure AD Elevated Access.srt
4.6 kB
Configure Secure Access Using Azure AD/0. Monitor Privileged Access in Microsoft Azure/0. Overview.srt
4.4 kB
Configure Secure Access Using Azure AD/0. Monitor Privileged Access in Microsoft Azure/6. Demo - Enable Azure AD Elevated Access.srt
4.3 kB
Configure Secure Access Using Azure AD/0. Monitor Privileged Access in Microsoft Azure/7. Summary.srt
2.1 kB
Configure Secure Access Using Azure AD/0. Monitor Privileged Access in Microsoft Azure/4. Azure AD PIM Monitoring Scopes.srt
1.9 kB
Configure Secure Access Using Azure AD/1. Conduct Access Reviews in Microsoft Azure/2. Demo - Perform an Azure AD PIM Access Review.mp4
17 MB
Configure Secure Access Using Azure AD/1. Conduct Access Reviews in Microsoft Azure/1. Why Conduct Access Reviews.mp4
5.6 MB
Configure Secure Access Using Azure AD/1. Conduct Access Reviews in Microsoft Azure/3. Summary.mp4
1.4 MB
Configure Secure Access Using Azure AD/1. Conduct Access Reviews in Microsoft Azure/0. Overview.mp4
651 kB
Configure Secure Access Using Azure AD/1. Conduct Access Reviews in Microsoft Azure/2. Demo - Perform an Azure AD PIM Access Review.srt
12 kB
Configure Secure Access Using Azure AD/1. Conduct Access Reviews in Microsoft Azure/1. Why Conduct Access Reviews.srt
5.4 kB
Configure Secure Access Using Azure AD/1. Conduct Access Reviews in Microsoft Azure/3. Summary.srt
1.9 kB
Configure Secure Access Using Azure AD/1. Conduct Access Reviews in Microsoft Azure/0. Overview.srt
857 B
Configure Secure Access Using Azure AD/2. Implement Conditional Access and Azure AD Identity Protection/5. Demo - Configure Azure AD Conditional Access.mp4
15 MB
Configure Secure Access Using Azure AD/2. Implement Conditional Access and Azure AD Identity Protection/3. Demo - Configure Azure AD IdP.mp4
12 MB
Configure Secure Access Using Azure AD/2. Implement Conditional Access and Azure AD Identity Protection/4. Azure AD Conditional Access.mp4
6.9 MB
Configure Secure Access Using Azure AD/2. Implement Conditional Access and Azure AD Identity Protection/2. Azure AD Identity Protection.mp4
6.1 MB
Configure Secure Access Using Azure AD/2. Implement Conditional Access and Azure AD Identity Protection/6. Summary.mp4
2.3 MB
Configure Secure Access Using Azure AD/2. Implement Conditional Access and Azure AD Identity Protection/1. Azure Multi-Factor Authentication (MFA).mp4
2.1 MB
Configure Secure Access Using Azure AD/2. Implement Conditional Access and Azure AD Identity Protection/0. Overview.mp4
934 kB
Configure Secure Access Using Azure AD/2. Implement Conditional Access and Azure AD Identity Protection/5. Demo - Configure Azure AD Conditional Access.srt
10 kB
Configure Secure Access Using Azure AD/2. Implement Conditional Access and Azure AD Identity Protection/3. Demo - Configure Azure AD IdP.srt
7.7 kB
Configure Secure Access Using Azure AD/2. Implement Conditional Access and Azure AD Identity Protection/4. Azure AD Conditional Access.srt
7.3 kB
Configure Secure Access Using Azure AD/2. Implement Conditional Access and Azure AD Identity Protection/2. Azure AD Identity Protection.srt
6.4 kB
Configure Secure Access Using Azure AD/2. Implement Conditional Access and Azure AD Identity Protection/6. Summary.srt
3.5 kB
Configure Secure Access Using Azure AD/2. Implement Conditional Access and Azure AD Identity Protection/1. Azure Multi-Factor Authentication (MFA).srt
2.6 kB
Configure Secure Access Using Azure AD/2. Implement Conditional Access and Azure AD Identity Protection/0. Overview.srt
1.0 kB
Configure Secure Access Using Azure AD/microsoft-azure-security-engineer-manage-configure-secure-access-using-azure-ad.zip
2.6 MB
Configure Security for Databases/0. Authenticating to Azure SQL/4. SQL AAD Authentication Using Code.mp4
40 MB
Configure Security for Databases/0. Authenticating to Azure SQL/1. Azure SQL Authentication Mechanisms.mp4
7.5 MB
Configure Security for Databases/0. Authenticating to Azure SQL/3. Use SSMS with AAD Authentication.mp4
6.8 MB
Configure Security for Databases/0. Authenticating to Azure SQL/2. Setup AAD Authentication for SQL.mp4
5.3 MB
Configure Security for Databases/0. Authenticating to Azure SQL/0. Introduction.mp4
1.8 MB
Configure Security for Databases/0. Authenticating to Azure SQL/5. Summary.mp4
1.1 MB
Configure Security for Databases/0. Authenticating to Azure SQL/4. SQL AAD Authentication Using Code.srt
18 kB
Configure Security for Databases/0. Authenticating to Azure SQL/1. Azure SQL Authentication Mechanisms.srt
8.8 kB
Configure Security for Databases/0. Authenticating to Azure SQL/3. Use SSMS with AAD Authentication.srt
5.5 kB
Configure Security for Databases/0. Authenticating to Azure SQL/2. Setup AAD Authentication for SQL.srt
2.5 kB
Configure Security for Databases/0. Authenticating to Azure SQL/0. Introduction.srt
1.6 kB
Configure Security for Databases/0. Authenticating to Azure SQL/5. Summary.srt
1.1 kB
Configure Security for Databases/1. Auditing SQL Server/3. Analyze Audit Logs.mp4
25 MB
Configure Security for Databases/1. Auditing SQL Server/2. Setup Auditing.mp4
7.6 MB
Configure Security for Databases/1. Auditing SQL Server/1. Overview of Auditing.mp4
4.9 MB
Configure Security for Databases/1. Auditing SQL Server/4. Limitations of Auditing.mp4
1.5 MB
Configure Security for Databases/1. Auditing SQL Server/0. Introduction.mp4
862 kB
Configure Security for Databases/1. Auditing SQL Server/5. Summary.mp4
529 kB
Configure Security for Databases/1. Auditing SQL Server/3. Analyze Audit Logs.srt
10 kB
Configure Security for Databases/1. Auditing SQL Server/1. Overview of Auditing.srt
6.0 kB
Configure Security for Databases/1. Auditing SQL Server/2. Setup Auditing.srt
3.3 kB
Configure Security for Databases/1. Auditing SQL Server/4. Limitations of Auditing.srt
1.3 kB
Configure Security for Databases/1. Auditing SQL Server/0. Introduction.srt
948 B
Configure Security for Databases/1. Auditing SQL Server/5. Summary.srt
570 B
Configure Security for Databases/2. Encrypting SQL/4. Always Encrypted.mp4
6.4 MB
Configure Security for Databases/2. Encrypting SQL/3. Encryption at Rest.mp4
4.2 MB
Configure Security for Databases/2. Encrypting SQL/5. Dynamic Data Masking.mp4
3.8 MB
Configure Security for Databases/2. Encrypting SQL/2. Encryption in Transit.mp4
2.4 MB
Configure Security for Databases/2. Encrypting SQL/1. Overview of Encryption.mp4
2.1 MB
Configure Security for Databases/2. Encrypting SQL/0. Introduction.mp4
948 kB
Configure Security for Databases/2. Encrypting SQL/6. Summary.mp4
820 kB
Configure Security for Databases/2. Encrypting SQL/4. Always Encrypted.srt
7.8 kB
Configure Security for Databases/2. Encrypting SQL/3. Encryption at Rest.srt
3.8 kB
Configure Security for Databases/2. Encrypting SQL/5. Dynamic Data Masking.srt
3.5 kB
Configure Security for Databases/2. Encrypting SQL/1. Overview of Encryption.srt
2.9 kB
Configure Security for Databases/2. Encrypting SQL/2. Encryption in Transit.srt
2.7 kB
Configure Security for Databases/2. Encrypting SQL/0. Introduction.srt
1018 B
Configure Security for Databases/2. Encrypting SQL/6. Summary.srt
938 B
Configure Security for Databases/3. Using SQL with Advanced Threat Protection (ATP)/3. Demo Vulnerability Assessment.mp4
16 MB
Configure Security for Databases/3. Using SQL with Advanced Threat Protection (ATP)/5. Information Protection.mp4
11 MB
Configure Security for Databases/3. Using SQL with Advanced Threat Protection (ATP)/4. Threat Protection.mp4
6.0 MB
Configure Security for Databases/3. Using SQL with Advanced Threat Protection (ATP)/1. Azure Defender.mp4
2.8 MB
Configure Security for Databases/3. Using SQL with Advanced Threat Protection (ATP)/2. Vulnerability Assessment.mp4
1.5 MB
Configure Security for Databases/3. Using SQL with Advanced Threat Protection (ATP)/0. Introduction.mp4
1.1 MB
Configure Security for Databases/3. Using SQL with Advanced Threat Protection (ATP)/6. Summary.mp4
726 kB
Configure Security for Databases/3. Using SQL with Advanced Threat Protection (ATP)/5. Information Protection.srt
10 kB
Configure Security for Databases/3. Using SQL with Advanced Threat Protection (ATP)/4. Threat Protection.srt
7.4 kB
Configure Security for Databases/3. Using SQL with Advanced Threat Protection (ATP)/3. Demo Vulnerability Assessment.srt
6.7 kB
Configure Security for Databases/3. Using SQL with Advanced Threat Protection (ATP)/1. Azure Defender.srt
3.0 kB
Configure Security for Databases/3. Using SQL with Advanced Threat Protection (ATP)/2. Vulnerability Assessment.srt
1.7 kB
Configure Security for Databases/3. Using SQL with Advanced Threat Protection (ATP)/0. Introduction.srt
1.2 kB
Configure Security for Databases/3. Using SQL with Advanced Threat Protection (ATP)/6. Summary.srt
880 B
Configure Security for Databases/microsoft-azure-security-engineer-configure-security-databases.zip
3.5 MB
Configure Security for Storage/0. Configuring Azure Storage Security/4. Shared Access Signature Security.mp4
11 MB
Configure Security for Storage/0. Configuring Azure Storage Security/5. Manage SAS based security for Azure Storage.mp4
9.8 MB
Configure Security for Storage/0. Configuring Azure Storage Security/7. Demo Manage Keys with Keyvault.mp4
9.3 MB
Configure Security for Storage/0. Configuring Azure Storage Security/3. Demo Configure and Manage Storage Keys.mp4
6.2 MB
Configure Security for Storage/0. Configuring Azure Storage Security/1. Manage Azure Storage Authentication.mp4
3.5 MB
Configure Security for Storage/0. Configuring Azure Storage Security/2. Key Based Security.mp4
2.1 MB
Configure Security for Storage/0. Configuring Azure Storage Security/0. Introduction.mp4
1.5 MB
Configure Security for Storage/0. Configuring Azure Storage Security/6. Manage Keys Using Keyvault.mp4
827 kB
Configure Security for Storage/0. Configuring Azure Storage Security/8. Summary.mp4
809 kB
Configure Security for Storage/0. Configuring Azure Storage Security/4. Shared Access Signature Security.srt
11 kB
Configure Security for Storage/0. Configuring Azure Storage Security/7. Demo Manage Keys with Keyvault.srt
7.6 kB
Configure Security for Storage/0. Configuring Azure Storage Security/5. Manage SAS based security for Azure Storage.srt
4.5 kB
Configure Security for Storage/0. Configuring Azure Storage Security/1. Manage Azure Storage Authentication.srt
3.8 kB
Configure Security for Storage/0. Configuring Azure Storage Security/3. Demo Configure and Manage Storage Keys.srt
3.6 kB
Configure Security for Storage/0. Configuring Azure Storage Security/2. Key Based Security.srt
2.3 kB
Configure Security for Storage/0. Configuring Azure Storage Security/0. Introduction.srt
1.4 kB
Configure Security for Storage/0. Configuring Azure Storage Security/8. Summary.srt
898 B
Configure Security for Storage/0. Configuring Azure Storage Security/6. Manage Keys Using Keyvault.srt
662 B
Configure Security for Storage/1. Authenticate to Azure Storage using Azure AD/2. Demo Azure AD Authentication with Azure Storage.mp4
46 MB
Configure Security for Storage/1. Authenticate to Azure Storage using Azure AD/3. Azure Files Authentication with AADDS.mp4
14 MB
Configure Security for Storage/1. Authenticate to Azure Storage using Azure AD/1. Secure Azure Storage Using Azure AD.mp4
8.7 MB
Configure Security for Storage/1. Authenticate to Azure Storage using Azure AD/0. Introduction.mp4
1.3 MB
Configure Security for Storage/1. Authenticate to Azure Storage using Azure AD/4. Summary.mp4
423 kB
Configure Security for Storage/1. Authenticate to Azure Storage using Azure AD/2. Demo Azure AD Authentication with Azure Storage.srt
17 kB
Configure Security for Storage/1. Authenticate to Azure Storage using Azure AD/3. Azure Files Authentication with AADDS.srt
14 kB
Configure Security for Storage/1. Authenticate to Azure Storage using Azure AD/1. Secure Azure Storage Using Azure AD.srt
9.5 kB
Configure Security for Storage/1. Authenticate to Azure Storage using Azure AD/0. Introduction.srt
1.3 kB
Configure Security for Storage/1. Authenticate to Azure Storage using Azure AD/4. Summary.srt
423 B
Configure Security for Storage/2. Encrypt Azure Storage/3. Encrypt Data at Rest.mp4
11 MB
Configure Security for Storage/2. Encrypt Azure Storage/1. Understand Azure Storage Encryption.mp4
4.4 MB
Configure Security for Storage/2. Encrypt Azure Storage/2. Encrypt Data in Transit.mp4
3.4 MB
Configure Security for Storage/2. Encrypt Azure Storage/0. Introduction.mp4
1.1 MB
Configure Security for Storage/2. Encrypt Azure Storage/3. Encrypt Data at Rest.srt
12 kB
Configure Security for Storage/2. Encrypt Azure Storage/1. Understand Azure Storage Encryption.srt
4.5 kB
Configure Security for Storage/2. Encrypt Azure Storage/2. Encrypt Data in Transit.srt
4.0 kB
Configure Security for Storage/2. Encrypt Azure Storage/0. Introduction.srt
1.2 kB
Configure Security for Storage/microsoft-azure-security-engineer-configure-security-storage.zip
2.6 MB
Configure Security Policies/0. Configuring Azure Policy for Security/15. Assigning the Policy to a Resource Group.mp4
13 MB
Configure Security Policies/0. Configuring Azure Policy for Security/14. Creating a Modify Effect Policy.mp4
13 MB
Configure Security Policies/0. Configuring Azure Policy for Security/8. Creating a New Policy Definition.mp4
12 MB
Configure Security Policies/0. Configuring Azure Policy for Security/6. Preparing the Scenario Environment.mp4
9.0 MB
Configure Security Policies/0. Configuring Azure Policy for Security/9. Adding a Policy to an Initiative.mp4
8.5 MB
Configure Security Policies/0. Configuring Azure Policy for Security/3. Management Group and Policy Demo.mp4
7.8 MB
Configure Security Policies/0. Configuring Azure Policy for Security/10. Assign the Initiative to a Subscription.mp4
7.4 MB
Configure Security Policies/0. Configuring Azure Policy for Security/13. Policy Effects and Remediation.mp4
6.4 MB
Configure Security Policies/0. Configuring Azure Policy for Security/12. Review Policy Compliance in the Portal.mp4
6.3 MB
Configure Security Policies/0. Configuring Azure Policy for Security/2. Creating and Assigning Policies.mp4
4.7 MB
Configure Security Policies/0. Configuring Azure Policy for Security/11. Review Policies in the Portal.mp4
3.9 MB
Configure Security Policies/0. Configuring Azure Policy for Security/0. Certification Coverage.mp4
3.4 MB
Configure Security Policies/0. Configuring Azure Policy for Security/5. Assigning a Policy Scenario.mp4
3.3 MB
Configure Security Policies/0. Configuring Azure Policy for Security/4. Azure Security Benchmark Policies.mp4
2.7 MB
Configure Security Policies/0. Configuring Azure Policy for Security/7. Review the Policy Structure.mp4
2.6 MB
Configure Security Policies/0. Configuring Azure Policy for Security/1. Reviewing Azure Policies.mp4
1.2 MB
Configure Security Policies/0. Configuring Azure Policy for Security/13. Policy Effects and Remediation.srt
8.3 kB
Configure Security Policies/0. Configuring Azure Policy for Security/15. Assigning the Policy to a Resource Group.srt
7.7 kB
Configure Security Policies/0. Configuring Azure Policy for Security/14. Creating a Modify Effect Policy.srt
7.6 kB
Configure Security Policies/0. Configuring Azure Policy for Security/8. Creating a New Policy Definition.srt
7.5 kB
Configure Security Policies/0. Configuring Azure Policy for Security/2. Creating and Assigning Policies.srt
6.4 kB
Configure Security Policies/0. Configuring Azure Policy for Security/3. Management Group and Policy Demo.srt
6.3 kB
Configure Security Policies/0. Configuring Azure Policy for Security/6. Preparing the Scenario Environment.srt
6.0 kB
Configure Security Policies/0. Configuring Azure Policy for Security/9. Adding a Policy to an Initiative.srt
5.4 kB
Configure Security Policies/0. Configuring Azure Policy for Security/5. Assigning a Policy Scenario.srt
5.0 kB
Configure Security Policies/0. Configuring Azure Policy for Security/4. Azure Security Benchmark Policies.srt
4.4 kB
Configure Security Policies/0. Configuring Azure Policy for Security/10. Assign the Initiative to a Subscription.srt
4.3 kB
Configure Security Policies/0. Configuring Azure Policy for Security/0. Certification Coverage.srt
3.9 kB
Configure Security Policies/0. Configuring Azure Policy for Security/12. Review Policy Compliance in the Portal.srt
3.9 kB
Configure Security Policies/0. Configuring Azure Policy for Security/7. Review the Policy Structure.srt
3.1 kB
Configure Security Policies/0. Configuring Azure Policy for Security/11. Review Policies in the Portal.srt
2.6 kB
Configure Security Policies/0. Configuring Azure Policy for Security/1. Reviewing Azure Policies.srt
2.1 kB
Configure Security Policies/1. Configuring Azure Blueprints for Security/4. Adding Artifacts to the Blueprint.mp4
21 MB
Configure Security Policies/1. Configuring Azure Blueprints for Security/3. Creating a Blueprint Demonstration.mp4
14 MB
Configure Security Policies/1. Configuring Azure Blueprints for Security/8. Updating the Assignment.mp4
10 MB
Configure Security Policies/1. Configuring Azure Blueprints for Security/7. Reviewing Assignment Results.mp4
8.8 MB
Configure Security Policies/1. Configuring Azure Blueprints for Security/6. Creating the Assignment.mp4
8.6 MB
Configure Security Policies/1. Configuring Azure Blueprints for Security/0. Reviewing Azure Blueprints.mp4
6.8 MB
Configure Security Policies/1. Configuring Azure Blueprints for Security/5. Assigning Blueprints.mp4
2.8 MB
Configure Security Policies/1. Configuring Azure Blueprints for Security/1. Azure Blueprint Lifecycle.mp4
2.0 MB
Configure Security Policies/1. Configuring Azure Blueprints for Security/2. Creating a Blueprint Scenario.mp4
1.7 MB
Configure Security Policies/1. Configuring Azure Blueprints for Security/4. Adding Artifacts to the Blueprint.srt
10 kB
Configure Security Policies/1. Configuring Azure Blueprints for Security/0. Reviewing Azure Blueprints.srt
8.6 kB
Configure Security Policies/1. Configuring Azure Blueprints for Security/3. Creating a Blueprint Demonstration.srt
7.8 kB
Configure Security Policies/1. Configuring Azure Blueprints for Security/6. Creating the Assignment.srt
7.3 kB
Configure Security Policies/1. Configuring Azure Blueprints for Security/8. Updating the Assignment.srt
7.2 kB
Configure Security Policies/1. Configuring Azure Blueprints for Security/7. Reviewing Assignment Results.srt
5.3 kB
Configure Security Policies/1. Configuring Azure Blueprints for Security/5. Assigning Blueprints.srt
3.5 kB
Configure Security Policies/1. Configuring Azure Blueprints for Security/1. Azure Blueprint Lifecycle.srt
3.1 kB
Configure Security Policies/1. Configuring Azure Blueprints for Security/2. Creating a Blueprint Scenario.srt
2.5 kB
Configure Security Policies/2. Using Playbooks in Azure Sentinel/3. Creating an Alert Rule.mp4
10 MB
Configure Security Policies/2. Using Playbooks in Azure Sentinel/4. Creating a Playbook.mp4
9.8 MB
Configure Security Policies/2. Using Playbooks in Azure Sentinel/5. Adding the Playbook to an Alert Rule.mp4
9.5 MB
Configure Security Policies/2. Using Playbooks in Azure Sentinel/0. Reviewing Azure Sentinel.mp4
3.9 MB
Configure Security Policies/2. Using Playbooks in Azure Sentinel/2. Connecting Azure Activity to Sentinel.mp4
3.2 MB
Configure Security Policies/2. Using Playbooks in Azure Sentinel/1. Collect and Detect Data.mp4
1.2 MB
Configure Security Policies/2. Using Playbooks in Azure Sentinel/3. Creating an Alert Rule.srt
8.6 kB
Configure Security Policies/2. Using Playbooks in Azure Sentinel/4. Creating a Playbook.srt
8.1 kB
Configure Security Policies/2. Using Playbooks in Azure Sentinel/5. Adding the Playbook to an Alert Rule.srt
6.8 kB
Configure Security Policies/2. Using Playbooks in Azure Sentinel/0. Reviewing Azure Sentinel.srt
4.1 kB
Configure Security Policies/2. Using Playbooks in Azure Sentinel/2. Connecting Azure Activity to Sentinel.srt
2.8 kB
Configure Security Policies/2. Using Playbooks in Azure Sentinel/1. Collect and Detect Data.srt
1.6 kB
Configure Security Policies/microsoft-azure-security-engineer-configure-policies.zip
1.6 MB
Manage Access Control/0. Implement RBAC in Microsoft Azure/7. Demo Implement RBAC in Azure.mp4
22 MB
Manage Access Control/0. Implement RBAC in Microsoft Azure/8. Demo Test RBAC Assignments.mp4
10 MB
Manage Access Control/0. Implement RBAC in Microsoft Azure/0. Overview.mp4
4.5 MB
Manage Access Control/0. Implement RBAC in Microsoft Azure/6. Programmatic RBAC Role Assignment.mp4
3.9 MB
Manage Access Control/0. Implement RBAC in Microsoft Azure/3. Built-in Azure RBAC Roles.mp4
3.4 MB
Manage Access Control/0. Implement RBAC in Microsoft Azure/2. Azure Management Scopes.mp4
3.2 MB
Manage Access Control/0. Implement RBAC in Microsoft Azure/4. Effective Permissions.mp4
2.9 MB
Manage Access Control/0. Implement RBAC in Microsoft Azure/1. Preliminary Terminology.mp4
1.9 MB
Manage Access Control/0. Implement RBAC in Microsoft Azure/9. Summary.mp4
1.4 MB
Manage Access Control/0. Implement RBAC in Microsoft Azure/5. Resource Locks.mp4
1.4 MB
Manage Access Control/0. Implement RBAC in Microsoft Azure/7. Demo Implement RBAC in Azure.srt
16 kB
Manage Access Control/0. Implement RBAC in Microsoft Azure/8. Demo Test RBAC Assignments.srt
6.9 kB
Manage Access Control/0. Implement RBAC in Microsoft Azure/3. Built-in Azure RBAC Roles.srt
6.0 kB
Manage Access Control/0. Implement RBAC in Microsoft Azure/6. Programmatic RBAC Role Assignment.srt
5.5 kB
Manage Access Control/0. Implement RBAC in Microsoft Azure/0. Overview.srt
4.3 kB
Manage Access Control/0. Implement RBAC in Microsoft Azure/4. Effective Permissions.srt
4.1 kB
Manage Access Control/0. Implement RBAC in Microsoft Azure/2. Azure Management Scopes.srt
4.1 kB
Manage Access Control/0. Implement RBAC in Microsoft Azure/1. Preliminary Terminology.srt
2.8 kB
Manage Access Control/0. Implement RBAC in Microsoft Azure/9. Summary.srt
1.9 kB
Manage Access Control/0. Implement RBAC in Microsoft Azure/5. Resource Locks.srt
1.8 kB
Manage Access Control/1. Define Custom RBAC Roles in Microsoft Azure/3. Demo Create Azure Custom Resource Roles.mp4
30 MB
Manage Access Control/1. Define Custom RBAC Roles in Microsoft Azure/5. Demo Create Custom Azure AD Roles.mp4
13 MB
Manage Access Control/1. Define Custom RBAC Roles in Microsoft Azure/1. Azure RBAC Role Structure.mp4
4.3 MB
Manage Access Control/1. Define Custom RBAC Roles in Microsoft Azure/4. Custom Azure AD Roles.mp4
4.2 MB
Manage Access Control/1. Define Custom RBAC Roles in Microsoft Azure/6. Summary.mp4
1.4 MB
Manage Access Control/1. Define Custom RBAC Roles in Microsoft Azure/2. Custom Role Creation Process.mp4
676 kB
Manage Access Control/1. Define Custom RBAC Roles in Microsoft Azure/0. Overview.mp4
597 kB
Manage Access Control/1. Define Custom RBAC Roles in Microsoft Azure/3. Demo Create Azure Custom Resource Roles.srt
18 kB
Manage Access Control/1. Define Custom RBAC Roles in Microsoft Azure/5. Demo Create Custom Azure AD Roles.srt
9.9 kB
Manage Access Control/1. Define Custom RBAC Roles in Microsoft Azure/1. Azure RBAC Role Structure.srt
3.9 kB
Manage Access Control/1. Define Custom RBAC Roles in Microsoft Azure/4. Custom Azure AD Roles.srt
3.7 kB
Manage Access Control/1. Define Custom RBAC Roles in Microsoft Azure/6. Summary.srt
2.1 kB
Manage Access Control/1. Define Custom RBAC Roles in Microsoft Azure/2. Custom Role Creation Process.srt
1018 B
Manage Access Control/1. Define Custom RBAC Roles in Microsoft Azure/0. Overview.srt
730 B
Manage Access Control/microsoft-azure-security-engineer-manage-manage-access-control.zip
2.0 MB
Manage Application Access/0. Configure App Registrations in Microsoft Azure/4. Demo Register an App with Azure AD.mp4
20 MB
Manage Application Access/0. Configure App Registrations in Microsoft Azure/5. Demo Connect to API Permission Scopes.mp4
11 MB
Manage Application Access/0. Configure App Registrations in Microsoft Azure/1. Preliminary Information.mp4
5.4 MB
Manage Application Access/0. Configure App Registrations in Microsoft Azure/0. Overview.mp4
5.1 MB
Manage Application Access/0. Configure App Registrations in Microsoft Azure/3. Cloud App Permissions and Consent.mp4
4.5 MB
Manage Application Access/0. Configure App Registrations in Microsoft Azure/2. App Registrations vs. Service Principals.mp4
2.9 MB
Manage Application Access/0. Configure App Registrations in Microsoft Azure/6. Summary.mp4
1.8 MB
Manage Application Access/1. Manage API Access to Microsoft Azure Resources/2. Demo Expose an API in Azure AD.mp4
9.5 MB
Manage Application Access/1. Manage API Access to Microsoft Azure Resources/3. Demo Consume an API Scope in Azure AD.mp4
6.3 MB
Manage Application Access/1. Manage API Access to Microsoft Azure Resources/1. Understand REST APIs.mp4
5.0 MB
Manage Application Access/1. Manage API Access to Microsoft Azure Resources/4. Summary.mp4
1.9 MB
Manage Application Access/1. Manage API Access to Microsoft Azure Resources/0. Overview.mp4
514 kB
Manage Application Access/microsoft-azure-security-engineer-manage-manage-application-access.zip
2.4 MB
Manage Azure Active Directory Identities/0. Manage Azure AD Users and Groups/10. Demo Service Principals and Managed Identities.mp4
14 MB
Manage Azure Active Directory Identities/0. Manage Azure AD Users and Groups/6. Demo Create Azure AD Users and Groups.mp4
12 MB
Manage Azure Active Directory Identities/0. Manage Azure AD Users and Groups/0. Overview.mp4
3.8 MB
Manage Azure Active Directory Identities/0. Manage Azure AD Users and Groups/8. App Registrations and Service Principals.mp4
3.6 MB
Manage Azure Active Directory Identities/0. Manage Azure AD Users and Groups/2. Azure AD User Security Options.mp4
3.6 MB
Manage Azure Active Directory Identities/0. Manage Azure AD Users and Groups/3. Azure AD Domain Services Integration.mp4
2.8 MB
Manage Azure Active Directory Identities/0. Manage Azure AD Users and Groups/1. Azure AD User Types.mp4
2.6 MB
Manage Azure Active Directory Identities/0. Manage Azure AD Users and Groups/7. Demo Test Azure AD User Access.mp4
2.5 MB
Manage Azure Active Directory Identities/0. Manage Azure AD Users and Groups/11. Summary.mp4
2.0 MB
Manage Azure Active Directory Identities/0. Manage Azure AD Users and Groups/9. Managed Identities.mp4
1.8 MB
Manage Azure Active Directory Identities/0. Manage Azure AD Users and Groups/4. Azure AD Group Types.mp4
1.6 MB
Manage Azure Active Directory Identities/0. Manage Azure AD Users and Groups/5. Administrative Units.mp4
1.6 MB
Manage Azure Active Directory Identities/1. Manage Azure AD Authentication/5. Demo Implement Azure AD Connect.mp4
15 MB
Manage Azure Active Directory Identities/1. Manage Azure AD Authentication/7. Demo Test Password Writeback.mp4
8.5 MB
Manage Azure Active Directory Identities/1. Manage Azure AD Authentication/4. Local AD Account Synchronization Methods.mp4
7.7 MB
Manage Azure Active Directory Identities/1. Manage Azure AD Authentication/1. Preliminary Information.mp4
6.4 MB
Manage Azure Active Directory Identities/1. Manage Azure AD Authentication/2. Hybrid Identity and Azure AD Connect.mp4
4.3 MB
Manage Azure Active Directory Identities/1. Manage Azure AD Authentication/3. Azure AD Passwordless Sign-In.mp4
2.5 MB
Manage Azure Active Directory Identities/1. Manage Azure AD Authentication/8. Summary.mp4
1.3 MB
Manage Azure Active Directory Identities/1. Manage Azure AD Authentication/6. Demo Configure Azure AD Connect Password Writeback.mp4
1.2 MB
Manage Azure Active Directory Identities/1. Manage Azure AD Authentication/0. Overview.mp4
867 kB
Manage Azure Active Directory Identities/2. Transfer Microsoft Azure Resources/0. Overview.mp4
31 MB
Manage Azure Active Directory Identities/2. Transfer Microsoft Azure Resources/5. Demo Move Resources Between Resource Groups.mp4
5.1 MB
Manage Azure Active Directory Identities/2. Transfer Microsoft Azure Resources/3. Azure Resource Move Process.mp4
4.6 MB
Manage Azure Active Directory Identities/2. Transfer Microsoft Azure Resources/8. Demo Transfer an Azure Subscription to Another Tenant.mp4
4.5 MB
Manage Azure Active Directory Identities/2. Transfer Microsoft Azure Resources/1. Azure Resource Management Scopes.mp4
3.9 MB
Manage Azure Active Directory Identities/2. Transfer Microsoft Azure Resources/6. Demo Move Resources Between Subscriptions.mp4
3.6 MB
Manage Azure Active Directory Identities/2. Transfer Microsoft Azure Resources/7. Inter-Azure AD Tenant Move Process.mp4
3.0 MB
Manage Azure Active Directory Identities/2. Transfer Microsoft Azure Resources/2. Azure Identifiers.mp4
1.8 MB
Manage Azure Active Directory Identities/2. Transfer Microsoft Azure Resources/9. Summary.mp4
1.5 MB
Manage Azure Active Directory Identities/2. Transfer Microsoft Azure Resources/4. Azure Resource Mover.mp4
1.4 MB
Manage Azure Active Directory Identities/microsoft-azure-security-engineer-manage-azure-active-directory-identities.zip
3.7 MB
Monitor Security Using Azure Monitor/0. Manage Alerts/4. Examine Security Alerts Using Azure Monitor.mp4
30 MB
Monitor Security Using Azure Monitor/0. Manage Alerts/3. Create a Metric Alert.mp4
21 MB
Monitor Security Using Azure Monitor/0. Manage Alerts/2. Alerts.mp4
4.6 MB
Monitor Security Using Azure Monitor/0. Manage Alerts/1. Azure Monitor.mp4
2.8 MB
Monitor Security Using Azure Monitor/0. Manage Alerts/0. Introduction.mp4
1.1 MB
Monitor Security Using Azure Monitor/0. Manage Alerts/5. Summary.mp4
459 kB
Monitor Security Using Azure Monitor/0. Manage Alerts/4. Examine Security Alerts Using Azure Monitor.srt
13 kB
Monitor Security Using Azure Monitor/0. Manage Alerts/3. Create a Metric Alert.srt
10 kB
Monitor Security Using Azure Monitor/0. Manage Alerts/2. Alerts.srt
4.9 kB
Monitor Security Using Azure Monitor/0. Manage Alerts/1. Azure Monitor.srt
3.6 kB
Monitor Security Using Azure Monitor/0. Manage Alerts/0. Introduction.srt
1.4 kB
Monitor Security Using Azure Monitor/0. Manage Alerts/5. Summary.srt
628 B
Monitor Security Using Azure Monitor/1. Configure Diagnostic Logging/3. Setup Diagnostic Logging.mp4
30 MB
Monitor Security Using Azure Monitor/1. Configure Diagnostic Logging/4. Azure Monitor and Diagnostic Logging.mp4
27 MB
Monitor Security Using Azure Monitor/1. Configure Diagnostic Logging/1. What Is Diagnostic Logging.mp4
5.8 MB
Monitor Security Using Azure Monitor/1. Configure Diagnostic Logging/2. Azure Monitor and App Service Logs.mp4
4.0 MB
Monitor Security Using Azure Monitor/1. Configure Diagnostic Logging/5. Summary.mp4
752 kB
Monitor Security Using Azure Monitor/1. Configure Diagnostic Logging/0. Introduction.mp4
749 kB
Monitor Security Using Azure Monitor/1. Configure Diagnostic Logging/4. Azure Monitor and Diagnostic Logging.srt
11 kB
Monitor Security Using Azure Monitor/1. Configure Diagnostic Logging/3. Setup Diagnostic Logging.srt
10 kB
Monitor Security Using Azure Monitor/1. Configure Diagnostic Logging/1. What Is Diagnostic Logging.srt
7.2 kB
Monitor Security Using Azure Monitor/1. Configure Diagnostic Logging/2. Azure Monitor and App Service Logs.srt
4.8 kB
Monitor Security Using Azure Monitor/1. Configure Diagnostic Logging/5. Summary.srt
934 B
Monitor Security Using Azure Monitor/1. Configure Diagnostic Logging/0. Introduction.srt
793 B
Monitor Security Using Azure Monitor/2. Configure Log Retention/2. Configure Log Retention.mp4
13 MB
Monitor Security Using Azure Monitor/2. Configure Log Retention/1. What Is Log Retention.mp4
2.7 MB
Monitor Security Using Azure Monitor/2. Configure Log Retention/0. Introduction.mp4
618 kB
Monitor Security Using Azure Monitor/2. Configure Log Retention/3. Summary.mp4
601 kB
Monitor Security Using Azure Monitor/2. Configure Log Retention/2. Configure Log Retention.srt
5.9 kB
Monitor Security Using Azure Monitor/2. Configure Log Retention/1. What Is Log Retention.srt
2.5 kB
Monitor Security Using Azure Monitor/2. Configure Log Retention/3. Summary.srt
809 B
Monitor Security Using Azure Monitor/2. Configure Log Retention/0. Introduction.srt
713 B
Monitor Security Using Azure Monitor/microsoft-azure-security-engineer-monitor-security-using-azure-monitor.zip
1.2 MB
Monitor Security Using Azure Security Center/0. Managing Policies in Azure Security Center/3. Assigning Policies through Security Center.mp4
7.4 MB
Monitor Security Using Azure Security Center/0. Managing Policies in Azure Security Center/5. Assigning a Custom Initiative.mp4
6.4 MB
Monitor Security Using Azure Security Center/0. Managing Policies in Azure Security Center/0. Certification Coverage.mp4
5.0 MB
Monitor Security Using Azure Security Center/0. Managing Policies in Azure Security Center/2. Reviewing the Default Security Policy.mp4
4.1 MB
Monitor Security Using Azure Security Center/0. Managing Policies in Azure Security Center/1. Azure Policies Reviewed.mp4
2.6 MB
Monitor Security Using Azure Security Center/0. Managing Policies in Azure Security Center/4. Policy Hierarchy and Assignment.mp4
2.2 MB
Monitor Security Using Azure Security Center/0. Managing Policies in Azure Security Center/3. Assigning Policies through Security Center.srt
7.1 kB
Monitor Security Using Azure Security Center/0. Managing Policies in Azure Security Center/0. Certification Coverage.srt
5.0 kB
Monitor Security Using Azure Security Center/0. Managing Policies in Azure Security Center/5. Assigning a Custom Initiative.srt
4.8 kB
Monitor Security Using Azure Security Center/0. Managing Policies in Azure Security Center/1. Azure Policies Reviewed.srt
4.0 kB
Monitor Security Using Azure Security Center/0. Managing Policies in Azure Security Center/4. Policy Hierarchy and Assignment.srt
3.2 kB
Monitor Security Using Azure Security Center/0. Managing Policies in Azure Security Center/2. Reviewing the Default Security Policy.srt
2.8 kB
Monitor Security Using Azure Security Center/1. Managing Compliance in Azure Security Center/5. Reviewing Compliance Assessment.mp4
6.2 MB
Monitor Security Using Azure Security Center/1. Managing Compliance in Azure Security Center/4. Adding a Compliance Standard to a Subscription.mp4
5.6 MB
Monitor Security Using Azure Security Center/1. Managing Compliance in Azure Security Center/3. Enabling Azure Defender Plan.mp4
3.2 MB
Monitor Security Using Azure Security Center/1. Managing Compliance in Azure Security Center/1. Reviewing Regulatory Compliance Settings.mp4
3.0 MB
Monitor Security Using Azure Security Center/1. Managing Compliance in Azure Security Center/0. Compliance Policies in Azure Security Center.mp4
2.5 MB
Monitor Security Using Azure Security Center/1. Managing Compliance in Azure Security Center/2. Compliance Policy Lifecycle.mp4
2.2 MB
Monitor Security Using Azure Security Center/1. Managing Compliance in Azure Security Center/5. Reviewing Compliance Assessment.srt
4.3 kB
Monitor Security Using Azure Security Center/1. Managing Compliance in Azure Security Center/4. Adding a Compliance Standard to a Subscription.srt
3.8 kB
Monitor Security Using Azure Security Center/1. Managing Compliance in Azure Security Center/2. Compliance Policy Lifecycle.srt
3.6 kB
Monitor Security Using Azure Security Center/1. Managing Compliance in Azure Security Center/0. Compliance Policies in Azure Security Center.srt
3.3 kB
Monitor Security Using Azure Security Center/1. Managing Compliance in Azure Security Center/3. Enabling Azure Defender Plan.srt
1.8 kB
Monitor Security Using Azure Security Center/1. Managing Compliance in Azure Security Center/1. Reviewing Regulatory Compliance Settings.srt
1.6 kB
Monitor Security Using Azure Security Center/2. Configuring Just in Time VM Access/5. Validating JIT VM Access.mp4
8.5 MB
Monitor Security Using Azure Security Center/2. Configuring Just in Time VM Access/3. Enabling JIT VM Access.mp4
5.7 MB
Monitor Security Using Azure Security Center/2. Configuring Just in Time VM Access/2. Checking JIT VM Access.mp4
3.9 MB
Monitor Security Using Azure Security Center/2. Configuring Just in Time VM Access/0. Introducing Just in Time VM Access.mp4
2.9 MB
Monitor Security Using Azure Security Center/2. Configuring Just in Time VM Access/1. Deploying Demo Resources.mp4
2.4 MB
Monitor Security Using Azure Security Center/2. Configuring Just in Time VM Access/4. Reviewing the JIT Process.mp4
1.8 MB
Monitor Security Using Azure Security Center/2. Configuring Just in Time VM Access/5. Validating JIT VM Access.srt
5.2 kB
Monitor Security Using Azure Security Center/2. Configuring Just in Time VM Access/3. Enabling JIT VM Access.srt
4.2 kB
Monitor Security Using Azure Security Center/2. Configuring Just in Time VM Access/0. Introducing Just in Time VM Access.srt
3.9 kB
Monitor Security Using Azure Security Center/2. Configuring Just in Time VM Access/2. Checking JIT VM Access.srt
3.1 kB
Monitor Security Using Azure Security Center/2. Configuring Just in Time VM Access/4. Reviewing the JIT Process.srt
2.1 kB
Monitor Security Using Azure Security Center/2. Configuring Just in Time VM Access/1. Deploying Demo Resources.srt
1.8 kB
Monitor Security Using Azure Security Center/3. Evaluating Vulnerability Scans/5. Viewing the Assessment Results.mp4
7.0 MB
Monitor Security Using Azure Security Center/3. Evaluating Vulnerability Scans/1. Deploying Demo Resources.mp4
4.7 MB
Monitor Security Using Azure Security Center/3. Evaluating Vulnerability Scans/3. Deploy the Assessment Agent.mp4
3.6 MB
Monitor Security Using Azure Security Center/3. Evaluating Vulnerability Scans/2. Reviewing Vulnerability Assessments.mp4
3.1 MB
Monitor Security Using Azure Security Center/3. Evaluating Vulnerability Scans/0. Introducing Vulnerability Scans.mp4
1.8 MB
Monitor Security Using Azure Security Center/3. Evaluating Vulnerability Scans/4. Review the Assessment Process.mp4
1.4 MB
Monitor Security Using Azure Security Center/3. Evaluating Vulnerability Scans/5. Viewing the Assessment Results.srt
4.8 kB
Monitor Security Using Azure Security Center/3. Evaluating Vulnerability Scans/2. Reviewing Vulnerability Assessments.srt
3.4 kB
Monitor Security Using Azure Security Center/3. Evaluating Vulnerability Scans/1. Deploying Demo Resources.srt
2.8 kB
Monitor Security Using Azure Security Center/3. Evaluating Vulnerability Scans/0. Introducing Vulnerability Scans.srt
2.7 kB
Monitor Security Using Azure Security Center/3. Evaluating Vulnerability Scans/3. Deploy the Assessment Agent.srt
2.6 kB
Monitor Security Using Azure Security Center/3. Evaluating Vulnerability Scans/4. Review the Assessment Process.srt
1.8 kB
Monitor Security Using Azure Security Center/microsoft-azure-security-engineer-monitor-security-using-center.zip
2.2 MB
Monitor Security Using Azure Sentinel/0. Explore Data Sources/5. Connect Azure Sentinel to Azure Active Directory.mp4
6.6 MB
Monitor Security Using Azure Sentinel/0. Explore Data Sources/4. Onboard Azure Sentinel.mp4
5.8 MB
Monitor Security Using Azure Sentinel/0. Explore Data Sources/3. Data Sources.mp4
3.6 MB
Monitor Security Using Azure Sentinel/0. Explore Data Sources/1. Azure Sentinel.mp4
2.5 MB
Monitor Security Using Azure Sentinel/0. Explore Data Sources/0. Introduction.mp4
1.2 MB
Monitor Security Using Azure Sentinel/0. Explore Data Sources/2. Layout of This Course.mp4
906 kB
Monitor Security Using Azure Sentinel/0. Explore Data Sources/6. Summary.mp4
887 kB
Monitor Security Using Azure Sentinel/0. Explore Data Sources/3. Data Sources.srt
3.7 kB
Monitor Security Using Azure Sentinel/0. Explore Data Sources/5. Connect Azure Sentinel to Azure Active Directory.srt
2.9 kB
Monitor Security Using Azure Sentinel/0. Explore Data Sources/4. Onboard Azure Sentinel.srt
2.6 kB
Monitor Security Using Azure Sentinel/0. Explore Data Sources/1. Azure Sentinel.srt
2.4 kB
Monitor Security Using Azure Sentinel/0. Explore Data Sources/0. Introduction.srt
1.3 kB
Monitor Security Using Azure Sentinel/0. Explore Data Sources/6. Summary.srt
1.0 kB
Monitor Security Using Azure Sentinel/0. Explore Data Sources/2. Layout of This Course.srt
942 B
Monitor Security Using Azure Sentinel/1. Evaluate Results/3. Analytics Rules.mp4
23 MB
Monitor Security Using Azure Sentinel/1. Evaluate Results/2. Custom Alerts.mp4
19 MB
Monitor Security Using Azure Sentinel/1. Evaluate Results/1. Detecting Problems.mp4
6.0 MB
Monitor Security Using Azure Sentinel/1. Evaluate Results/0. Introduction.mp4
978 kB
Monitor Security Using Azure Sentinel/1. Evaluate Results/4. Summary.mp4
656 kB
Monitor Security Using Azure Sentinel/1. Evaluate Results/3. Analytics Rules.srt
11 kB
Monitor Security Using Azure Sentinel/1. Evaluate Results/2. Custom Alerts.srt
9.7 kB
Monitor Security Using Azure Sentinel/1. Evaluate Results/1. Detecting Problems.srt
7.2 kB
Monitor Security Using Azure Sentinel/1. Evaluate Results/0. Introduction.srt
1.1 kB
Monitor Security Using Azure Sentinel/1. Evaluate Results/4. Summary.srt
851 B
Monitor Security Using Azure Sentinel/2. Use Automation/3. Author a Logic App.mp4
13 MB
Monitor Security Using Azure Sentinel/2. Use Automation/5. Test the Playbook.mp4
9.1 MB
Monitor Security Using Azure Sentinel/2. Use Automation/2. Create a Playbook.mp4
7.5 MB
Monitor Security Using Azure Sentinel/2. Use Automation/1. What Is Automation.mp4
6.6 MB
Monitor Security Using Azure Sentinel/2. Use Automation/4. Connect Playbook to an Analytics Rule.mp4
5.7 MB
Monitor Security Using Azure Sentinel/2. Use Automation/6. Summary.mp4
1.4 MB
Monitor Security Using Azure Sentinel/2. Use Automation/0. Introduction.mp4
1.1 MB
Monitor Security Using Azure Sentinel/2. Use Automation/1. What Is Automation.srt
7.3 kB
Monitor Security Using Azure Sentinel/2. Use Automation/3. Author a Logic App.srt
6.4 kB
Monitor Security Using Azure Sentinel/2. Use Automation/5. Test the Playbook.srt
5.5 kB
Monitor Security Using Azure Sentinel/2. Use Automation/2. Create a Playbook.srt
3.4 kB
Monitor Security Using Azure Sentinel/2. Use Automation/4. Connect Playbook to an Analytics Rule.srt
3.2 kB
Monitor Security Using Azure Sentinel/2. Use Automation/6. Summary.srt
1.6 kB
Monitor Security Using Azure Sentinel/2. Use Automation/0. Introduction.srt
1.2 kB
Monitor Security Using Azure Sentinel/microsoft-azure-security-engineer-monitor-security-using-azure-sentinel.zip
1.5 MB
content.txt
19 kB