Microsoft Azure Security Technologies (AZ-500) (Updated 2022)
Size: 17.37 GB Type: Tutorial Year: 2022 Version: 218
Episodes
Manage Azure Active Directory Identities
Overview
Managed Identity for Azure Resources
Manage Azure AD Groups
Manage Azure AD Users
Manage External Identities Using Azure AD
Manage Administrative Units
Manage Secure Access Using Azure AD
Configure Azure AD Privileged Identity Management (PIM)
Implement Conditional Access Policies
Implement Azure AD Identity Protection
Implement Passwordless Authentication
Configure Access Reviews
Manage Application Access
Integrate Single Sign-On (SSO) & Multiple Identity Providers
Create an App Registration
Configure App Registration Permission Scopes
Manage App Registration Permission Consent
Manage API Permissions
Authentication Methods for a Service Principal
Manage Access Control
Configure Azure Role Permissions
Interpret Role & Resource Permissions
Assign Built-in Azure AD Roles
Create & Assign Custom Roles
Implement Advanced Network Security
Secure the Connectivity of Hybrid Networks
Secure the Connectivity of Virtual Networks
Create & Configure Azure Firewall
Create & Configure Azure Firewall Manager
Create & Configure Azure Application Gateway
Create & Configure Azure Front Door
Create & Configure Web Application Firewall (WAF)
Configure a Resource Firewall
Network Isolation for Web Apps & Azure Functions
Implement Azure Service Endpoints
Implement Azure Private Endpoints
Implement Azure Private Links
Implement Azure DDoS Protection
Configure Advanced Security for Compute
Configure Endpoint Protection for VMs
Implement & Manage Security Updates for VMs
Configure Security of Container Services
Manage Access to Azure Container Registry
Configure Security for Serverless Compute
Configure Security for an Azure App Service
Configure Encryption at Rest
Configure Encryption in Transit
Configure Centralized Policy Management
Configure a Custom Security Policy
Create a Policy Initiative
Using Azure Policy
Configure & Manage Threat Protection
Configure Microsoft Defender for Servers
Evaluate Vulnerability Scans
Configure Microsoft Defender for SQL
Microsoft Threat Modeling Tool
Security Monitoring Solutions
Alert Rules Using Azure Monitor
Configure Logging for Azure Monitor
Monitor Security Logs Using Azure Monitor
Alert Rules in Microsoft Sentinel
Connectors in Microsoft Sentinel
Alerts & Incidents in Microsoft Sentinel
Configure Security for Storage
Access Control for Storage Accounts
Key Management for Access Keys
Delegated Access
Configure Azure AD Authentication for Azure Storage & Files
Configure Security for Databases
Database Authentication Using Azure AD
Enable Database Auditing
Dynamic Masking on SQL Workloads
Database Encryption for Azure SQL Database
Network Isolation for Data Solutions
Configure & Manage Azure Key Vault
Create & Configure Key Vault
Configure Access to Key Vault
Manage Certificates & Secrets & Keys
Configure Key Rotation
Configure Backup & Recovery
Код:
https://rapidgator.net/file/74ee0dd6204925c4d63055f3f0093fd6/ITProTV_-_Microsoft_Azure_Security_Technologies_(AZ-500)_(Updated_2022)_vis87.part1.rar.html
https://rapidgator.net/file/0634906ea4ccfd7457b4cb81032d02cd/ITProTV_-_Microsoft_Azure_Security_Technologies_(AZ-500)_(Updated_2022)_vis87.part2.rar.html
https://rapidgator.net/file/924a958b58a71e77a12bba2d12fae88f/ITProTV_-_Microsoft_Azure_Security_Technologies_(AZ-500)_(Updated_2022)_vis87.part3.rar.html
https://rapidgator.net/file/d90e96a879cd84dcb36f2156e65b4a7e/ITProTV_-_Microsoft_Azure_Security_Technologies_(AZ-500)_(Updated_2022)_vis87.part4.rar.html
https://rapidgator.net/file/64e1fb59f2c5ba3d616f325cf890abd8/ITProTV_-_Microsoft_Azure_Security_Technologies_(AZ-500)_(Updated_2022)_vis87.part5.rar.html