AZ-500 Microsoft Azure Security Technologies (LA)
File List
- 2. Configuring Azure Active Directory for Workloads/7. Working with Azure AD Connect.mp4 135.0 MB
- 2. Configuring Azure Active Directory for Workloads/6. Develop a Python App to Access Key Vault Using a Service Principal/2. Solution.mp4 91.0 MB
- 2. Configuring Azure Active Directory for Workloads/3. Create and Manage Azure AD Users in the Portal/2. Solution.mp4 90.8 MB
- 5. Network Security/6. Configuring an Azure VNet-to-VNet VPN Gateway (v2)/2. Solution I.mp4 79.5 MB
- 2. Configuring Azure Active Directory for Workloads/8. Azure AD Connect Authentication Methods Explained.mp4 77.2 MB
- 3. Azure AD Privileged Identity Management/4. Reviewing Access in PIM.mp4 72.5 MB
- 2. Configuring Azure Active Directory for Workloads/10. Multi-Factor Authentication: Part II.mp4 71.8 MB
- 2. Configuring Azure Active Directory for Workloads/15. Azure AD Identity Protection: Part II.mp4 70.9 MB
- 2. Configuring Azure Active Directory for Workloads/4. Create and Manage Azure AD Groups in the Portal/2. Solution.mp4 63.8 MB
- 2. Configuring Azure Active Directory for Workloads/14. Azure AD Identity Protection: Part I.mp4 61.3 MB
- 2. Configuring Azure Active Directory for Workloads/12. Conditional Access: Part II.mp4 60.7 MB
- 3. Azure AD Privileged Identity Management/2. PIM Configuration, Access Requests and Approval: Part I.mp4 58.7 MB
- 7. Securing Azure Resources/6. Ensuring Compliance with Azure Policies/2. Solution.mp4 56.9 MB
- 5. Network Security/4. Azure Firewall.mp4 55.8 MB
- 2. Configuring Azure Active Directory for Workloads/13. Conditional Access: Part III.mp4 52.2 MB
- 1. Welcome!/1. An Important Note About A Cloud Guru and Linux Academy Courses.mp4 51.7 MB
- 2. Configuring Azure Active Directory for Workloads/1. Azure AD Users.mp4 50.0 MB
- 2. Configuring Azure Active Directory for Workloads/9. Multi-Factor Authentication: Part I.mp4 49.0 MB
- 12. Managing Data/1. Data Classification Using Azure Information Protection.mp4 48.8 MB
- 2. Configuring Azure Active Directory for Workloads/2. Azure AD Groups.mp4 47.0 MB
- 13. Azure Key Vault/1. Working with Azure Key Vault.mp4 46.7 MB
- 3. Azure AD Privileged Identity Management/1. AD PIM Overview and Activation.mp4 45.3 MB
- 5. Network Security/5. Resource Firewalls.mp4 42.0 MB
- 14. Security for Data Infrastructure/1. Database Authentication and Auditing.mp4 41.2 MB
- 7. Securing Azure Resources/5. Azure Policies.mp4 40.7 MB
- 2. Configuring Azure Active Directory for Workloads/5. App Registrations, Permissions, Scopes, and Consent.mp4 40.3 MB
- 2. Configuring Azure Active Directory for Workloads/11. Conditional Access: Part I.mp4 40.1 MB
- 8. Container Security/1. Container Registry Security.mp4 40.0 MB
- 5. Network Security/6. Configuring an Azure VNet-to-VNet VPN Gateway (v2)/3. Solution II.mp4 39.9 MB
- 16. Security for Application Delivery/2. Synthetic Security Transactions.mp4 37.4 MB
- 17. Final Steps/2. Keep Up to Date with Azure This Week.mp4 37.1 MB
- 3. Azure AD Privileged Identity Management/3. PIM Configuration, Access Requests and Approval: Part II.mp4 36.0 MB
- 5. Network Security/3. Application Security Groups.mp4 35.1 MB
- 6. Host Security/1. VM Endpoint Security.mp4 34.1 MB
- 8. Container Security/2. Configuring Instance Security.mp4 33.3 MB
- 8. Container Security/5. AKS Security.mp4 31.8 MB
- 7. Securing Azure Resources/3. Azure Resource Locks.mp4 31.4 MB
- 15. Encryption for Data at Rest/4. Disk Encryption.mp4 30.0 MB
- 8. Container Security/3. Container Groups.mp4 27.4 MB
- 10. Security Policies/1. Just in Time VM Access Using Microsoft Azure Security Center.mp4 27.3 MB
- 4. Azure Tenant Security/1. Transferring Azure Subscriptions Between Tenants.mp4 24.4 MB
- 2. Configuring Azure Active Directory for Workloads/6. Develop a Python App to Access Key Vault Using a Service Principal/1. Introduction.mp4 23.6 MB
- 16. Security for Application Delivery/3. SSLTLS Certificates.mp4 23.4 MB
- 7. Securing Azure Resources/4. Azure Management Groups.mp4 23.4 MB
- 15. Encryption for Data at Rest/1. Microsoft Azure SQL Database Always Encrypted.mp4 22.3 MB
- 2. Configuring Azure Active Directory for Workloads/4. Create and Manage Azure AD Groups in the Portal/1. Introduction.mp4 21.5 MB
- 15. Encryption for Data at Rest/5. Backup Encryption.mp4 21.3 MB
- 16. Security for Application Delivery/1. Implementing Security Validations for Application Development.mp4 20.3 MB
- 9. Configuring Security Services/2. Diagnostic Logging and Log Retention.mp4 19.2 MB
- 11. Security Alerts/1. Reviewing and Responding to Alerts and Recommendations.mp4 19.0 MB
- 17. Final Steps/1. Course Completion and How to Prepare for the Exam.mp4 18.9 MB
- 6. Host Security/2. VM System Updates in Azure.mp4 18.8 MB
- 16. Security for Application Delivery/4. Protecting Web Apps.mp4 18.3 MB
- 14. Security for Data Infrastructure/6. Security for Microsoft Azure Data Lake.mp4 17.4 MB
- 7. Securing Azure Resources/6. Ensuring Compliance with Azure Policies/1. Introduction.mp4 16.7 MB
- 5. Network Security/6. Configuring an Azure VNet-to-VNet VPN Gateway (v2)/1. Introduction.mp4 16.5 MB
- 2. Configuring Azure Active Directory for Workloads/3. Create and Manage Azure AD Users in the Portal/1. Introduction.mp4 15.3 MB
- 1. Welcome!/1607454330287-367_AZ-500 Microsoft Azure Security Technologies - Network Security PDF.pdf 15.2 MB
- 12. Managing Data/3. Data Sovereignty with Azure Policy.mp4 15.1 MB
- 12. Managing Data/2. Storage Analytics Data Retention Policies.mp4 14.4 MB
- 11. Security Alerts/2. Microsoft Azure Security Center Playbooks.mp4 14.3 MB
- 14. Security for Data Infrastructure/5. Security for Cosmos DB.mp4 13.9 MB
- 7. Securing Azure Resources/1. Role-Based Access Control (RBAC) [Review].mp4 11.4 MB
- 5. Network Security/2. Network Security Groups [Review].mp4 9.5 MB
- 1. Welcome!/2. Course Introduction.mp4 9.4 MB
- 5. Network Security/1. Virtual Networks [Review].mp4 9.1 MB
- 1. Welcome!/4. Using the AZ-500 Guide.mp4 9.0 MB
- 15. Encryption for Data at Rest/3. Storage Service Encryption.mp4 8.8 MB
- 14. Security for Data Infrastructure/4. Security for HDInsight.mp4 8.7 MB
- 9. Configuring Security Services/1. Microsoft Azure Monitor [Review].mp4 8.3 MB
- 7. Securing Azure Resources/2. Managed Identities [Review].mp4 7.6 MB
- 14. Security for Data Infrastructure/2. Azure SQL Database Threat Detection.mp4 7.2 MB
- 14. Security for Data Infrastructure/3. Managing Access Control and Keys for Storage Accounts [Review].mp4 7.1 MB
- 8. Container Security/4. Container Vulnerability Management.mp4 5.7 MB
- 1. Welcome!/3. About the Training Architect.mp4 4.6 MB
- 15. Encryption for Data at Rest/2. Database Encryption.mp4 4.2 MB
- 5. Network Security/6. Configuring an Azure VNet-to-VNet VPN Gateway (v2)/1060_-_S06-HOL_-_Configuring_an_Azure_VNet-to-VNet_VPN_Gateway_(v2).001.png 644.1 KB
- 7. Securing Azure Resources/6. Ensuring Compliance with Azure Policies/1060_-_S14-HOL_-_Ensuring_Compliance_with_Azure_Policy.001.png 496.9 KB
- 2. Configuring Azure Active Directory for Workloads/4. Create and Manage Azure AD Groups in the Portal/Azure_AD_Labs_-_Create_and_Manage_Azure_AD_Groups_in_the_Portal.001.png 480.2 KB
- 2. Configuring Azure Active Directory for Workloads/6. Develop a Python App to Access Key Vault Using a Service Principal/Azure_AD_Labs_-_Develop_a_Python_App_to_Access_Key_Vault_Using_a_Service_Principal.001.png 447.9 KB
- 2. Configuring Azure Active Directory for Workloads/3. Create and Manage Azure AD Users in the Portal/Azure_AD_Labs_-_Create_and_Manage_Azure_AD_Users_in_the_Portal.001.png 413.1 KB
- 2. Configuring Azure Active Directory for Workloads/7. Working with Azure AD Connect.vtt 56.0 KB
- 2. Configuring Azure Active Directory for Workloads/8. Azure AD Connect Authentication Methods Explained.vtt 31.3 KB
- 2. Configuring Azure Active Directory for Workloads/10. Multi-Factor Authentication: Part II.vtt 31.2 KB
- 2. Configuring Azure Active Directory for Workloads/14. Azure AD Identity Protection: Part I.vtt 28.6 KB
- 3. Azure AD Privileged Identity Management/2. PIM Configuration, Access Requests and Approval: Part I.vtt 25.4 KB
- 2. Configuring Azure Active Directory for Workloads/12. Conditional Access: Part II.vtt 24.6 KB
- 2. Configuring Azure Active Directory for Workloads/3. Create and Manage Azure AD Users in the Portal/2. Solution.vtt 23.6 KB
- 2. Configuring Azure Active Directory for Workloads/9. Multi-Factor Authentication: Part I.vtt 21.4 KB
- 5. Network Security/4. Azure Firewall.vtt 20.9 KB
- 2. Configuring Azure Active Directory for Workloads/4. Create and Manage Azure AD Groups in the Portal/2. Solution.vtt 20.6 KB
- 12. Managing Data/1. Data Classification Using Azure Information Protection.vtt 20.2 KB
- 2. Configuring Azure Active Directory for Workloads/1. Azure AD Users.vtt 19.8 KB
- 2. Configuring Azure Active Directory for Workloads/2. Azure AD Groups.vtt 19.7 KB
- 13. Azure Key Vault/1. Working with Azure Key Vault.vtt 19.6 KB
- 2. Configuring Azure Active Directory for Workloads/6. Develop a Python App to Access Key Vault Using a Service Principal/2. Solution.vtt 19.2 KB
- 3. Azure AD Privileged Identity Management/1. AD PIM Overview and Activation.vtt 19.2 KB
- 3. Azure AD Privileged Identity Management/4. Reviewing Access in PIM.vtt 19.1 KB
- 2. Configuring Azure Active Directory for Workloads/13. Conditional Access: Part III.vtt 18.6 KB
- 2. Configuring Azure Active Directory for Workloads/5. App Registrations, Permissions, Scopes, and Consent.vtt 18.3 KB
- 5. Network Security/6. Configuring an Azure VNet-to-VNet VPN Gateway (v2)/2. Solution I.vtt 18.0 KB
- 2. Configuring Azure Active Directory for Workloads/15. Azure AD Identity Protection: Part II.vtt 17.9 KB
- 2. Configuring Azure Active Directory for Workloads/11. Conditional Access: Part I.vtt 17.0 KB
- 8. Container Security/1. Container Registry Security.vtt 16.6 KB
- 7. Securing Azure Resources/5. Azure Policies.vtt 16.5 KB
- 14. Security for Data Infrastructure/1. Database Authentication and Auditing.vtt 16.4 KB
- 5. Network Security/5. Resource Firewalls.vtt 16.3 KB
- 6. Host Security/1. VM Endpoint Security.vtt 15.1 KB
- 5. Network Security/3. Application Security Groups.vtt 14.6 KB
- 7. Securing Azure Resources/3. Azure Resource Locks.vtt 14.0 KB
- 8. Container Security/2. Configuring Instance Security.vtt 13.9 KB
- 3. Azure AD Privileged Identity Management/3. PIM Configuration, Access Requests and Approval: Part II.vtt 13.4 KB
- 15. Encryption for Data at Rest/4. Disk Encryption.vtt 13.3 KB
- 8. Container Security/5. AKS Security.vtt 13.3 KB
- 10. Security Policies/1. Just in Time VM Access Using Microsoft Azure Security Center.vtt 12.0 KB
- 8. Container Security/3. Container Groups.vtt 11.6 KB
- 5. Network Security/6. Configuring an Azure VNet-to-VNet VPN Gateway (v2)/metadata.md 11.3 KB
- 7. Securing Azure Resources/6. Ensuring Compliance with Azure Policies/2. Solution.vtt 11.0 KB
- 4. Azure Tenant Security/1. Transferring Azure Subscriptions Between Tenants.vtt 10.3 KB
- 5. Network Security/6. Configuring an Azure VNet-to-VNet VPN Gateway (v2)/3. Solution II.vtt 9.7 KB
- 7. Securing Azure Resources/4. Azure Management Groups.vtt 9.7 KB
- 2. Configuring Azure Active Directory for Workloads/6. Develop a Python App to Access Key Vault Using a Service Principal/metadata.md 9.6 KB
- 15. Encryption for Data at Rest/1. Microsoft Azure SQL Database Always Encrypted.vtt 9.4 KB
- 16. Security for Application Delivery/2. Synthetic Security Transactions.vtt 9.2 KB
- 11. Security Alerts/1. Reviewing and Responding to Alerts and Recommendations.vtt 9.1 KB
- 16. Security for Application Delivery/1. Implementing Security Validations for Application Development.vtt 8.9 KB
- 2. Configuring Azure Active Directory for Workloads/4. Create and Manage Azure AD Groups in the Portal/metadata.md 8.8 KB
- 16. Security for Application Delivery/3. SSLTLS Certificates.vtt 8.8 KB
- 9. Configuring Security Services/2. Diagnostic Logging and Log Retention.vtt 8.8 KB
- 6. Host Security/2. VM System Updates in Azure.vtt 8.7 KB
- 15. Encryption for Data at Rest/5. Backup Encryption.vtt 8.6 KB
- 17. Final Steps/1. Course Completion and How to Prepare for the Exam.vtt 8.2 KB
- 16. Security for Application Delivery/4. Protecting Web Apps.vtt 7.9 KB
- 11. Security Alerts/2. Microsoft Azure Security Center Playbooks.vtt 6.9 KB
- 12. Managing Data/2. Storage Analytics Data Retention Policies.vtt 6.3 KB
- 12. Managing Data/3. Data Sovereignty with Azure Policy.vtt 6.2 KB
- 14. Security for Data Infrastructure/5. Security for Cosmos DB.vtt 5.8 KB
- 2. Configuring Azure Active Directory for Workloads/4. Create and Manage Azure AD Groups in the Portal/1. Introduction.vtt 5.4 KB
- 2. Configuring Azure Active Directory for Workloads/6. Develop a Python App to Access Key Vault Using a Service Principal/1. Introduction.vtt 5.2 KB
- 7. Securing Azure Resources/1. Role-Based Access Control (RBAC) [Review].vtt 5.2 KB
- 2. Configuring Azure Active Directory for Workloads/3. Create and Manage Azure AD Users in the Portal/metadata.md 5.0 KB
- 14. Security for Data Infrastructure/6. Security for Microsoft Azure Data Lake.vtt 4.7 KB
- 1. Welcome!/2. Course Introduction.vtt 4.3 KB
- 7. Securing Azure Resources/6. Ensuring Compliance with Azure Policies/metadata.md 4.2 KB
- 15. Encryption for Data at Rest/3. Storage Service Encryption.vtt 4.1 KB
- 2. Configuring Azure Active Directory for Workloads/3. Create and Manage Azure AD Users in the Portal/1. Introduction.vtt 4.1 KB
- 5. Network Security/6. Configuring an Azure VNet-to-VNet VPN Gateway (v2)/1. Introduction.vtt 4.0 KB
- 9. Configuring Security Services/1. Microsoft Azure Monitor [Review].vtt 3.9 KB
- 5. Network Security/1. Virtual Networks [Review].vtt 3.8 KB
- 7. Securing Azure Resources/2. Managed Identities [Review].vtt 3.6 KB
- 14. Security for Data Infrastructure/4. Security for HDInsight.vtt 3.4 KB
- 14. Security for Data Infrastructure/2. Azure SQL Database Threat Detection.vtt 3.3 KB
- 7. Securing Azure Resources/6. Ensuring Compliance with Azure Policies/1. Introduction.vtt 3.3 KB
- 14. Security for Data Infrastructure/3. Managing Access Control and Keys for Storage Accounts [Review].vtt 3.3 KB
- 1. Welcome!/4. Using the AZ-500 Guide.vtt 2.9 KB
- 1. Welcome!/1. An Important Note About A Cloud Guru and Linux Academy Courses.vtt 2.8 KB
- 8. Container Security/4. Container Vulnerability Management.vtt 2.7 KB
- 5. Network Security/2. Network Security Groups [Review].vtt 2.6 KB
- 1. Welcome!/3. About the Training Architect.vtt 2.6 KB
- 15. Encryption for Data at Rest/2. Database Encryption.vtt 1.9 KB
- 17. Final Steps/2. Keep Up to Date with Azure This Week.vtt 1.9 KB
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.