Azure Security, Video Edition
Focused View
9:51:30
195 View
001. Part 1. First steps.mp4
00:48
002. Chapter 1. About Azure security.mp4
07:13
003. Chapter 1. Shared responsibility model.mp4
03:41
004. Chapter 1. Azure security serices.mp4
03:22
005. Chapter 1. The threat landscape.mp4
06:09
006. Chapter 1. Cloud security challenges.mp4
04:52
007. Chapter 1. Digital mediealism.mp4
02:01
008. Chapter 1. The zero trust security model.mp4
02:18
009. Chapter 1. Defense in depth.mp4
12:32
010. Chapter 1. Summary.mp4
01:12
011. Chapter 2. Securing identities in Azure The four pillars of identity and Azure Actie Directory.mp4
17:11
012. Chapter 2. Authentication.mp4
23:28
013. Chapter 2. Authorization.mp4
12:12
014. Chapter 2. Custom roles.mp4
01:11
015. Chapter 2. Custom roles in action.mp4
02:37
016. Chapter 2. Identity goernance.mp4
17:00
017. Chapter 2. Answers to exercises.mp4
01:49
018. Chapter 2. Summary.mp4
01:30
019. Part 2. Securing Azure resources.mp4
01:36
020. Chapter 3. Implementing network security in Azure Firewall, WAF, and DDoS protection.mp4
07:25
021. Chapter 3. Azure Firewall.mp4
19:23
022. Chapter 3. Azure Web Application Firewall.mp4
17:13
023. Chapter 3. Mitigating DDoS attacks.mp4
08:51
024. Chapter 3. Answers to exercises.mp4
00:25
025. Chapter 3. Summary.mp4
01:30
026. Chapter 4. Securing compute resources in Azure Azure Bastion, Kubernetes, and Azure App Serice.mp4
03:32
027. Chapter 4. Azure Bastion.mp4
17:07
028. Chapter 4. Securing Kubernetes clusters.mp4
09:46
029. Chapter 4. What makes container security different.mp4
09:26
030. Chapter 4. Securing Azure App Serice.mp4
15:30
031. Chapter 4. Answers to exercises.mp4
01:38
032. Chapter 4. Summary.mp4
01:56
033. Chapter 5. Securing data in Azure Storage accounts Azure Key Vault.mp4
31:06
034. Chapter 5. Securing Azure Key Vault.mp4
11:58
035. Chapter 5. Summary.mp4
01:49
036. Chapter 6. Implementing good security hygiene Microsoft Defender for Cloud and Defender CSPM.mp4
04:58
037. Chapter 6. Cloud security posture management.mp4
22:49
038. Chapter 6. Cloud security graph.mp4
10:09
039. Chapter 6. Security goernance.mp4
07:30
040. Chapter 6. Regulatory compliance.mp4
06:53
041. Chapter 6. Answers to exercises.mp4
01:58
042. Chapter 6. Summary.mp4
01:43
043. Chapter 7. Security monitoring for Azure resources Microsoft Defender for Cloud plans.mp4
03:22
044. Chapter 7. Microsoft Defender for Cloud plans.mp4
34:25
045. Chapter 7. Security alerts.mp4
08:02
046. Chapter 7. Workflow automation.mp4
05:46
047. Chapter 7. Exporting data.mp4
06:27
048. Chapter 7. Workbooks.mp4
05:06
049. Chapter 7. Answers to exercises.mp4
00:49
050. Chapter 7. Summary.mp4
01:48
051. Part 3. Going further.mp4
01:28
052. Chapter 8. Security operations and response Microsoft Sentinel.mp4
03:35
053. Chapter 8. Microsoft Sentinel.mp4
04:16
054. Chapter 8. Data collection.mp4
12:52
055. Chapter 8. Analytics rules.mp4
16:34
056. Chapter 8. Incidents.mp4
04:39
057. Chapter 8. User and entity behaior analytics.mp4
04:01
058. Chapter 8. Security orchestration, automation, and response.mp4
02:16
059. Chapter 8. Automation rules.mp4
04:49
060. Chapter 8. Answers to Exercises.mp4
02:11
061. Chapter 8. Summary.mp4
01:53
062. Chapter 9. Audit and log data Azure Monitor.mp4
26:58
063. Chapter 9. Azure Monitor.mp4
02:09
064. Chapter 9. Diagnostic settings.mp4
03:42
065. Chapter 9. Data collection rules.mp4
06:41
066. Chapter 9. Alert rules.mp4
03:21
067. Chapter 9. Answers to exercises.mp4
03:14
068. Chapter 9. Summary.mp4
01:55
069. Chapter 10. Importance of goernance Azure Policy and Azure Blueprints.mp4
03:39
070. Chapter 10. Getting started with Azure Policy.mp4
14:52
071. Chapter 10. Custom policies.mp4
03:02
072. Chapter 10. Centralized security policy management.mp4
04:41
073. Chapter 10. Azure Blueprints.mp4
01:48
074. Chapter 10. Answers to exercises.mp4
00:43
075. Chapter 10. Summary.mp4
01:44
076. Chapter 11. DeSecOps Microsoft Defender for DeOps.mp4
03:19
077. Chapter 11. What is shifting security left.mp4
01:44
078. Chapter 11. Infrastructure as code.mp4
13:22
079. Chapter 11. Microsoft Defender for DeOps.mp4
23:30
080. Chapter 11. Cybersecurity as an infinite game.mp4
02:08
081. Chapter 11. Answers to exercises.mp4
00:49
082. Chapter 11. Summary.mp4
01:54
083. Appendix. Setting up Azure CLI on your machine.mp4
02:13
084. Appendix. Setting up Azure CLI on Linux.mp4
01:15
085. Appendix. Setting up Azure CLI on macOS.mp4
01:11
More details
User Reviews
Rating
average 0
Focused display
Category

Udemy
View courses UdemyStudents take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
- language english
- Training sessions 85
- duration 9:51:30
- Release Date 2024/07/07