Companies Home Search Profile

Microsoft Azure Security Center

Focused View

4:54:53

86 View
  • 01 - Microsoft Azure Security Center - Introduction.mp4
    04:33
  • 02 - Learning objectives.mp4
    00:44
  • 03 - 1.1 Analyze the current threat landscape.mp4
    05:54
  • 04 - 1.2 Understand the cyber kill chain.mp4
    07:38
  • 05 - 1.3 Review the cloud threads and cloud security design considerations.mp4
    10:49
  • 06 - 1.4 Understand the Azure security infrastructure.mp4
    14:42
  • 07 - Learning objectives.mp4
    00:26
  • 08 - 2.1 Understand the use case scenarios for CSPM and CWPP.mp4
    05:33
  • 09 - 2.2 Design considerations for Azure Security Center.mp4
    14:54
  • 10 - 2.3 Plan Azure Security Center adoption.mp4
    09:35
  • 11 - Learning objectives.mp4
    00:27
  • 12 - 3.1 Onboard Azure resources.mp4
    08:00
  • 13 - 3.2 Onboard non-Azure resources.mp4
    08:49
  • 14 - 3.3 Automate Azure Security Center deployment.mp4
    04:46
  • 15 - Learning objectives.mp4
    00:32
  • 16 - 4.1 Understand security policy.mp4
    05:45
  • 17 - 4.2 Customize security policy.mp4
    05:36
  • 18 - 4.3 Understand regulatory and compliance standards.mp4
    06:31
  • 19 - Learning objectives.mp4
    00:45
  • 20 - 5.1 Understand secure score.mp4
    07:36
  • 21 - 5.2 Take actions to increase your secure score.mp4
    06:25
  • 22 - 5.3 Remediate security recommendations for Compute & Apps.mp4
    03:38
  • 23 - 5.4 Remediate security recommendations for Networking.mp4
    10:09
  • 24 - 5.5 Remediate security recommendations for data and storage.mp4
    19:11
  • 25 - 5.6 Remediate security recommendations for identity and access.mp4
    03:24
  • 26 - 5.7 Remediate security recommendations for containers.mp4
    03:09
  • 27 - 5.8 Remediate security recommendations for applications.mp4
    01:31
  • 28 - Learning objectives.mp4
    00:35
  • 29 - 6.1 Understand IoT security.mp4
    06:11
  • 30 - 6.2 Understand Azure IoT solution.mp4
    04:02
  • 31 - 6.3 Configure Azure Security Center for IoT.mp4
    05:12
  • 32 - Learning objectives.mp4
    00:26
  • 33 - 7.1 Implement Just-in-Time VM Access.mp4
    09:22
  • 34 - 7.2 Implement File Integrity Monitoring (FIM).mp4
    08:33
  • 35 - 7.3 Implement adaptive application control.mp4
    09:18
  • 36 - Learning objectives.mp4
    00:34
  • 37 - 8.1 Understand how threat detection works in Azure Security Center.mp4
    10:10
  • 38 - 8.2 Use the Security Alerts dashboard in Azure Security Center.mp4
    04:55
  • 39 - 8.3 Understand threat detection for PaaS workloads.mp4
    09:17
  • 40 - 8.4 Integrate Azure Security Center with other Microsoft products.mp4
    05:04
  • 41 - 8.5 Access security alerts using API.mp4
    07:21
  • 42 - Learning objectives.mp4
    00:30
  • 43 - 9.1 Understand how to use Playbooks in Azure Security Center.mp4
    04:42
  • 44 - 9.2 Create your own playbook.mp4
    07:43
  • 45 - 9.3 Validate your playbook.mp4
    06:53
  • 46 - Learning objectives.mp4
    00:25
  • 47 - 10.1 Hunt threats using Azure Security Center.mp4
    06:46
  • 48 - 10.2 Integrate Azure Security Center with Azure Sentinel.mp4
    05:09
  • 49 - 10.3 Hunt threats using Azure Sentinel.mp4
    09:20
  • 50 - Microsoft Azure Security Center - Summary.mp4
    01:23
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Pearson's video training library is an indispensable learning tool for today's competitive job market. Having essential technology training and certifications can open doors for career advancement and life enrichment. We take learning personally. We've published hundreds of up-to-date videos on wide variety of key topics for Professionals and IT Certification candidates. Now you can learn from renowned industry experts from anywhere in the world, without leaving home.
    • language english
    • Training sessions 50
    • duration 4:54:53
    • Release Date 2023/11/03

    Courses related to Microsoft Azure

    Courses related to Network Security

    Courses related to Computer Network

    Courses related to Network Engineering