وب سایت تخصصی شرکت فرین
دسته بندی دوره ها
12

Azure Security, Video Edition

سرفصل های دوره
  • 001. Part 1. First steps
  • 002. Chapter 1. About Azure security
  • 003. Chapter 1. Shared responsibility model
  • 004. Chapter 1. Azure security serices
  • 005. Chapter 1. The threat landscape
  • 006. Chapter 1. Cloud security challenges
  • 007. Chapter 1. Digital mediealism
  • 008. Chapter 1. The zero trust security model
  • 009. Chapter 1. Defense in depth
  • 010. Chapter 1. Summary
  • 011. Chapter 2. Securing identities in Azure The four pillars of identity and Azure Actie Directory
  • 012. Chapter 2. Authentication
  • 013. Chapter 2. Authorization
  • 014. Chapter 2. Custom roles
  • 015. Chapter 2. Custom roles in action
  • 016. Chapter 2. Identity goernance
  • 017. Chapter 2. Answers to exercises
  • 018. Chapter 2. Summary
  • 019. Part 2. Securing Azure resources
  • 020. Chapter 3. Implementing network security in Azure Firewall, WAF, and DDoS protection
  • 021. Chapter 3. Azure Firewall
  • 022. Chapter 3. Azure Web Application Firewall
  • 023. Chapter 3. Mitigating DDoS attacks
  • 024. Chapter 3. Answers to exercises
  • 025. Chapter 3. Summary
  • 026. Chapter 4. Securing compute resources in Azure Azure Bastion, Kubernetes, and Azure App Serice
  • 027. Chapter 4. Azure Bastion
  • 028. Chapter 4. Securing Kubernetes clusters
  • 029. Chapter 4. What makes container security different
  • 030. Chapter 4. Securing Azure App Serice
  • 031. Chapter 4. Answers to exercises
  • 032. Chapter 4. Summary
  • 033. Chapter 5. Securing data in Azure Storage accounts Azure Key Vault
  • 034. Chapter 5. Securing Azure Key Vault
  • 035. Chapter 5. Summary
  • 036. Chapter 6. Implementing good security hygiene Microsoft Defender for Cloud and Defender CSPM
  • 037. Chapter 6. Cloud security posture management
  • 038. Chapter 6. Cloud security graph
  • 039. Chapter 6. Security goernance
  • 040. Chapter 6. Regulatory compliance
  • 041. Chapter 6. Answers to exercises
  • 042. Chapter 6. Summary
  • 043. Chapter 7. Security monitoring for Azure resources Microsoft Defender for Cloud plans
  • 044. Chapter 7. Microsoft Defender for Cloud plans
  • 045. Chapter 7. Security alerts
  • 046. Chapter 7. Workflow automation
  • 047. Chapter 7. Exporting data
  • 048. Chapter 7. Workbooks
  • 049. Chapter 7. Answers to exercises
  • 050. Chapter 7. Summary
  • 051. Part 3. Going further
  • 052. Chapter 8. Security operations and response Microsoft Sentinel
  • 053. Chapter 8. Microsoft Sentinel
  • 054. Chapter 8. Data collection
  • 055. Chapter 8. Analytics rules
  • 056. Chapter 8. Incidents
  • 057. Chapter 8. User and entity behaior analytics
  • 058. Chapter 8. Security orchestration, automation, and response
  • 059. Chapter 8. Automation rules
  • 060. Chapter 8. Answers to Exercises
  • 061. Chapter 8. Summary
  • 062. Chapter 9. Audit and log data Azure Monitor
  • 063. Chapter 9. Azure Monitor
  • 064. Chapter 9. Diagnostic settings
  • 065. Chapter 9. Data collection rules
  • 066. Chapter 9. Alert rules
  • 067. Chapter 9. Answers to exercises
  • 068. Chapter 9. Summary
  • 069. Chapter 10. Importance of goernance Azure Policy and Azure Blueprints
  • 070. Chapter 10. Getting started with Azure Policy
  • 071. Chapter 10. Custom policies
  • 072. Chapter 10. Centralized security policy management
  • 073. Chapter 10. Azure Blueprints
  • 074. Chapter 10. Answers to exercises
  • 075. Chapter 10. Summary
  • 076. Chapter 11. DeSecOps Microsoft Defender for DeOps
  • 077. Chapter 11. What is shifting security left
  • 078. Chapter 11. Infrastructure as code
  • 079. Chapter 11. Microsoft Defender for DeOps
  • 080. Chapter 11. Cybersecurity as an infinite game
  • 081. Chapter 11. Answers to exercises
  • 082. Chapter 11. Summary
  • 083. Appendix. Setting up Azure CLI on your machine
  • 084. Appendix. Setting up Azure CLI on Linux
  • 085. Appendix. Setting up Azure CLI on macOS
  • 189,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 38844
    حجم: 10188 مگابایت
    مدت زمان: 592 دقیقه
    تاریخ انتشار: ۳۰ تیر ۱۴۰۳
    طراحی سایت و خدمات سئو

    189,000 تومان
    افزودن به سبد خرید