Companies Home Search Profile

Identity Protection and Governance

Focused View

2:07:16

14 View
    01 deploy azure active directory identity protection
  • 01 introduction to the course.en.txt
  • 01 introduction to the course.mp4
    04:50
  • 04 configure risk event detections.mp4
    03:45
  • 08 what is conditional access.en.txt
  • 08 what is conditional access.mp4
    04:34
  • 09 implement access reviews.en.txt
  • 09 implement access reviews.mp4
    04:46
  • 14 smart lockout instructions.html
    02 configure azure active directory privileged identity management
    03 working with azure active directory groups and guests in azure privileged
    04 graded assessment identity protection with azure active directory
  • 01 module summary.mp4
    06:23
    01 core principles of enterprise governance
  • 05 review azure hierarchy of systems.mp4
    05:34
    02 policies
  • 01 overview of azure policies.en.txt
  • 01 overview of azure policies.mp4
    04:53
  • 02 azure built in policies instructions.html
  • 03 azure policy definition structure instructions.html
  • 04 azure policy effects.en.txt
  • 04 azure policy effects.mp4
    07:19
  • 05 group policies into initiatives.en.txt
  • 05 group policies into initiatives.mp4
    04:03
  • 06 get compliance data of azure resources instructions.html
  • 07 built in initiatives instructions.html
  • 08 exercise implement azure policy instructions.html
  • 09 solution implement azure policy instructions.html
    03 graded assessment design an enterprise governance strategy
  • 01 module summary.mp4
    05:43
    01 role based access control
  • 01 what is azure role based access control.en.txt
  • 01 what is azure role based access control.mp4
    07:05
  • 02 enable azure role based access control.en.txt
  • 02 enable azure role based access control.mp4
    07:58
  • 06 azure built in roles.en.txt
  • 06 azure built in roles.mp4
    04:47
  • 07 an overview of custom roles in azure.en.txt
  • 07 an overview of custom roles in azure.mp4
    06:51
  • 08 create custom roles in azure instructions.html
    02 monitor maintain and protect resources
  • 01 an overview of resource locks.en.txt
  • 01 an overview of resource locks.mp4
    06:01
  • 02 demo manage resource locks.en.txt
  • 02 demo manage resource locks.mp4
    04:06
  • 05 deploy azure blueprints.en.txt
  • 05 deploy azure blueprints.mp4
    07:53
  • 06 design an azure subscription management plan.en.txt
  • 06 design an azure subscription management plan.mp4
    07:39
    03 graded assessment role based access control
  • 01 module summary.en.txt
  • 01 module summary.mp4
    05:57
    01 project
  • 01 course summary.en.txt
  • 01 course summary.mp4
    07:15
  • 02 about the course project instructions.html
    02 graded assessment
  • 01 about the graded assessment.en.txt
  • 01 about the graded assessment.mp4
    04:14
    03 course wrap up
  • 01 congratulations.en.txt
  • 01 congratulations.mp4
    02:02
  • 02 next steps.en.txt
  • 02 next steps.mp4
    03:38

More details


User Reviews
Rating
0
0
0
0
0
average 0
Total votes0
Focused display
Category
Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
  • language english
  • Training sessions 23
  • duration 2:07:16
  • English subtitles has
  • Release Date 2023/12/29

Courses related to Data Protection