Companies Home Search Profile

Microsoft Azure (AZ-500)

Focused View

25:59:03

9 View
  • 1. Overview.mp4
    04:17
  • 2. Create App Registration.mp4
    26:42
  • 3. Configure App Registration permission scopes.mp4
    24:23
  • 4. Manage App Registration permission consent.mp4
    23:03
  • 5. Configure Multi-Factor Authentication settings.mp4
    24:02
  • 6. Manage Azure AD directory groups.mp4
    25:33
  • 7. Manage Azure AD Users.mp4
    22:54
  • 8. Install and Configure Azure AD Connect.mp4
    25:55
  • 9. Configure authentication methods.mp4
    16:29
  • 10. Implement Conditional Access policies.mp4
    22:42
  • 11. Configure Azure AD identity protection.mp4
    25:21
  • 12. Activate Privileged Identity Management.mp4
    23:20
  • 13. Monitor Privileged Access.mp4
    21:38
  • 14. Configure Access Reviews.mp4
    25:57
  • 15. Transfer Azure subs between Azure AD tenants.mp4
    16:29
  • 16. Manage API access Azure subscriptions, resources.mp4
    13:49
  • 17. Configure virtual network connectivity.mp4
    25:30
  • 18. Create, Configure Network, App Security Groups.mp4
    12:56
  • 19. Steps to Create and Configure NSGs and ASGs.mp4
    21:48
  • 20. Create and configure Azure Firewall.mp4
    23:37
  • 21. Configure Resource Firewall.mp4
    17:44
  • 22. Create and configure Azure Front Door service.mp4
    23:53
  • 23. Configure remote access management.mp4
    23:54
  • 24. Configure baseline.mp4
    25:55
  • 25. Configure endpoint security within the VM.mp4
    21:53
  • 26. Configure VM Security and Configure Baseline.mp4
    21:49
  • 27. Harden VMs in Azure.mp4
    19:42
  • 28. Configure system updates for VMs in Azure.mp4
    23:46
  • 29. Configure networking.mp4
    22:32
  • 30. Configure authentication.mp4
    20:44
  • 31. Configure container isolation.mp4
    24:22
  • 32. Configure AKS Security.mp4
    23:52
  • 33. Configure container registry.mp4
    24:40
  • 34. Implement vulnerability management.mp4
    14:50
  • 35. Create Azure resource locks.mp4
    22:26
  • 36. Managing security policies, groups, roles, perms.mp4
    20:05
  • 37. Configure Azure Monitor.mp4
    20:59
  • 38. Configure diagnostic logging and log retention.mp4
    24:53
  • 39. Configure vulnerability scanning.mp4
    14:33
  • 40. Alerts - create, customize, review and respond.mp4
    23:00
  • 41. Configure playbook security event Azure Sentinel.mp4
    23:10
  • 42. Investigate escalated security incidents.mp4
    20:56
  • 43. Configure data classification.mp4
    24:15
  • 44. Configure data retention.mp4
    20:35
  • 45. Configure data sovereignty.mp4
    19:53
  • 46. Enable database authentication.mp4
    20:09
  • 47. Enable database auditing.mp4
    13:26
  • 48. Configure Azure SQL Database ATP.mp4
    20:26
  • 49. Configure access control for storage accounts.mp4
    22:32
  • 50. Configure key management for storage accounts.mp4
    25:37
  • 51. Configure Azure AD DS auth for Azure Files.mp4
    22:03
  • 52. Create and manage Shared Access Signatures (SAS).mp4
    24:22
  • 53. Configure security for HDInsight.mp4
    16:01
  • 54. Configure security for Cosmos DB.mp4
    19:09
  • 55. Configure security for Azure Data Lake.mp4
    20:22
  • 56. Implement Azure SQL DB Always Encrypted.mp4
    22:14
  • 57. Implement database encryption.mp4
    13:20
  • 58. Implement Storage Service Encryption.mp4
    14:09
  • 59. Implement disk encryption.mp4
    23:38
  • 60. Configure SSL TLS certs.mp4
    22:41
  • 61. Configure Azure services to protect web apps.mp4
    19:07
  • 62. Create an application security baseline.mp4
    14:57
  • 63. Manage access to Key Vault.mp4
    22:59
  • 64. Manage certificates.mp4
    22:23
  • 65. Manage secrets.mp4
    16:00
  • 66. Configure key rotation.mp4
    18:52
  • 67. Spotlight Key Vault Soft Delete, Purge Protection.mp4
    23:11
  • 68. Configure security for service principals.mp4
    19:57
  • 69. Secure the connectivity of virtual networks.mp4
    21:18
  • 70. Configure a WAF on Azure Application Gateway.mp4
    24:11
  • 71. Configure Azure Bastion.mp4
    22:52
  • 72. Implement Service Endpoints.mp4
    17:22
  • 73. Implement DDoS.mp4
    21:43
  • 74. Shared access policy for a blob or blob container.mp4
    23:16
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    We created ITProTV [ITPro] because it is the IT training we wanted to have ourselves — engaging, conversational, affordable, and convenient.
    • language english
    • Training sessions 74
    • duration 25:59:03
    • Release Date 2024/04/26