وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Azure Security, Video Edition

سرفصل های دوره
  • 001. Part 1. First steps
  • 002. Chapter 1. About Azure security
  • 003. Chapter 1. Shared responsibility model
  • 004. Chapter 1. Azure security serices
  • 005. Chapter 1. The threat landscape
  • 006. Chapter 1. Cloud security challenges
  • 007. Chapter 1. Digital mediealism
  • 008. Chapter 1. The zero trust security model
  • 009. Chapter 1. Defense in depth
  • 010. Chapter 1. Summary
  • 011. Chapter 2. Securing identities in Azure The four pillars of identity and Azure Actie Directory
  • 012. Chapter 2. Authentication
  • 013. Chapter 2. Authorization
  • 014. Chapter 2. Custom roles
  • 015. Chapter 2. Custom roles in action
  • 016. Chapter 2. Identity goernance
  • 017. Chapter 2. Answers to exercises
  • 018. Chapter 2. Summary
  • 019. Part 2. Securing Azure resources
  • 020. Chapter 3. Implementing network security in Azure Firewall, WAF, and DDoS protection
  • 021. Chapter 3. Azure Firewall
  • 022. Chapter 3. Azure Web Application Firewall
  • 023. Chapter 3. Mitigating DDoS attacks
  • 024. Chapter 3. Answers to exercises
  • 025. Chapter 3. Summary
  • 026. Chapter 4. Securing compute resources in Azure Azure Bastion, Kubernetes, and Azure App Serice
  • 027. Chapter 4. Azure Bastion
  • 028. Chapter 4. Securing Kubernetes clusters
  • 029. Chapter 4. What makes container security different
  • 030. Chapter 4. Securing Azure App Serice
  • 031. Chapter 4. Answers to exercises
  • 032. Chapter 4. Summary
  • 033. Chapter 5. Securing data in Azure Storage accounts Azure Key Vault
  • 034. Chapter 5. Securing Azure Key Vault
  • 035. Chapter 5. Summary
  • 036. Chapter 6. Implementing good security hygiene Microsoft Defender for Cloud and Defender CSPM
  • 037. Chapter 6. Cloud security posture management
  • 038. Chapter 6. Cloud security graph
  • 039. Chapter 6. Security goernance
  • 040. Chapter 6. Regulatory compliance
  • 041. Chapter 6. Answers to exercises
  • 042. Chapter 6. Summary
  • 043. Chapter 7. Security monitoring for Azure resources Microsoft Defender for Cloud plans
  • 044. Chapter 7. Microsoft Defender for Cloud plans
  • 045. Chapter 7. Security alerts
  • 046. Chapter 7. Workflow automation
  • 047. Chapter 7. Exporting data
  • 048. Chapter 7. Workbooks
  • 049. Chapter 7. Answers to exercises
  • 050. Chapter 7. Summary
  • 051. Part 3. Going further
  • 052. Chapter 8. Security operations and response Microsoft Sentinel
  • 053. Chapter 8. Microsoft Sentinel
  • 054. Chapter 8. Data collection
  • 055. Chapter 8. Analytics rules
  • 056. Chapter 8. Incidents
  • 057. Chapter 8. User and entity behaior analytics
  • 058. Chapter 8. Security orchestration, automation, and response
  • 059. Chapter 8. Automation rules
  • 060. Chapter 8. Answers to Exercises
  • 061. Chapter 8. Summary
  • 062. Chapter 9. Audit and log data Azure Monitor
  • 063. Chapter 9. Azure Monitor
  • 064. Chapter 9. Diagnostic settings
  • 065. Chapter 9. Data collection rules
  • 066. Chapter 9. Alert rules
  • 067. Chapter 9. Answers to exercises
  • 068. Chapter 9. Summary
  • 069. Chapter 10. Importance of goernance Azure Policy and Azure Blueprints
  • 070. Chapter 10. Getting started with Azure Policy
  • 071. Chapter 10. Custom policies
  • 072. Chapter 10. Centralized security policy management
  • 073. Chapter 10. Azure Blueprints
  • 074. Chapter 10. Answers to exercises
  • 075. Chapter 10. Summary
  • 076. Chapter 11. DeSecOps Microsoft Defender for DeOps
  • 077. Chapter 11. What is shifting security left
  • 078. Chapter 11. Infrastructure as code
  • 079. Chapter 11. Microsoft Defender for DeOps
  • 080. Chapter 11. Cybersecurity as an infinite game
  • 081. Chapter 11. Answers to exercises
  • 082. Chapter 11. Summary
  • 083. Appendix. Setting up Azure CLI on your machine
  • 084. Appendix. Setting up Azure CLI on Linux
  • 085. Appendix. Setting up Azure CLI on macOS
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 38844
    حجم: 10188 مگابایت
    مدت زمان: 592 دقیقه
    تاریخ انتشار: 30 تیر 1403
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید