资源详情

返回首页 | 相关搜索
Pluralsight - Managing Microsoft Azure Security by Ned Bellavance
大小 271.78 MB
文件数 108
Info Hash: 00316583780E4015304010B9C3BEFD9EE7EB4870
收录时间 2025-12-20 08:14:19
更新时间 2025-12-20 08:36:08
文件列表 (108)
0. Course Overview/0. Course Overview.mp4
2.92 MB
0. Course Overview/0. Course Overview.srt
2.82 KB
1. Introducing Monitoring Azure Security/0. Introduction.mp4
2.14 MB
1. Introducing Monitoring Azure Security/0. Introduction.srt
3.23 KB
1. Introducing Monitoring Azure Security/1. Course Overview.mp4
4.71 MB
1. Introducing Monitoring Azure Security/1. Course Overview.srt
6.41 KB
1. Introducing Monitoring Azure Security/2. Contoso Scenario.mp4
2.8 MB
1. Introducing Monitoring Azure Security/2. Contoso Scenario.srt
4.07 KB
1. Introducing Monitoring Azure Security/3. Security Challenges and Controls.mp4
4.77 MB
1. Introducing Monitoring Azure Security/3. Security Challenges and Controls.srt
7.36 KB
1. Introducing Monitoring Azure Security/4. Shared Responsibility Model.mp4
4.91 MB
1. Introducing Monitoring Azure Security/4. Shared Responsibility Model.srt
7 KB
1. Introducing Monitoring Azure Security/5. Summary.mp4
1.78 MB
1. Introducing Monitoring Azure Security/5. Summary.srt
2.64 KB
2. Understanding Azure Security Center/0. Introduction.mp4
1.22 MB
2. Understanding Azure Security Center/0. Introduction.srt
2.14 KB
2. Understanding Azure Security Center/1. Security Center Management.mp4
2.73 MB
2. Understanding Azure Security Center/1. Security Center Management.srt
4.22 KB
2. Understanding Azure Security Center/2. Exploring the Portal.mp4
6.51 MB
2. Understanding Azure Security Center/2. Exploring the Portal.srt
6.75 KB
2. Understanding Azure Security Center/3. Licensing Tiers and Costs.mp4
4.03 MB
2. Understanding Azure Security Center/3. Licensing Tiers and Costs.srt
5.53 KB
2. Understanding Azure Security Center/4. Summary.mp4
1.54 MB
2. Understanding Azure Security Center/4. Summary.srt
2.39 KB
3. Policies and Data Collection/0. Introduction.mp4
2.78 MB
3. Policies and Data Collection/0. Introduction.srt
4.05 KB
3. Policies and Data Collection/1. Policy and Compliance.mp4
7.57 MB
3. Policies and Data Collection/1. Policy and Compliance.srt
7.79 KB
3. Policies and Data Collection/2. Azure Policies.mp4
10.39 MB
3. Policies and Data Collection/2. Azure Policies.srt
11.72 KB
3. Policies and Data Collection/3. Regulatory Compliance.mp4
5.69 MB
3. Policies and Data Collection/3. Regulatory Compliance.srt
4.42 KB
3. Policies and Data Collection/4. Subscription Settings.mp4
14.52 MB
3. Policies and Data Collection/4. Subscription Settings.srt
13.95 KB
3. Policies and Data Collection/5. Summary.mp4
1.64 MB
3. Policies and Data Collection/5. Summary.srt
2.33 KB
4. Security Assessments and Threat Prevention/0. Introduction.mp4
2.31 MB
4. Security Assessments and Threat Prevention/0. Introduction.srt
3.31 KB
4. Security Assessments and Threat Prevention/1. Secure Score.mp4
4.16 MB
4. Security Assessments and Threat Prevention/1. Secure Score.srt
4.5 KB
4. Security Assessments and Threat Prevention/2. Compute and Apps.mp4
9.48 MB
4. Security Assessments and Threat Prevention/2. Compute and Apps.srt
10.54 KB
4. Security Assessments and Threat Prevention/3. Network.mp4
5.87 MB
4. Security Assessments and Threat Prevention/3. Network.srt
6.7 KB
4. Security Assessments and Threat Prevention/4. Data and Storage.mp4
4.99 MB
4. Security Assessments and Threat Prevention/4. Data and Storage.srt
5.45 KB
4. Security Assessments and Threat Prevention/5. Identity and Access.mp4
4.13 MB
4. Security Assessments and Threat Prevention/5. Identity and Access.srt
3.99 KB
4. Security Assessments and Threat Prevention/6. Summary.mp4
1.75 MB
4. Security Assessments and Threat Prevention/6. Summary.srt
2.46 KB
5. Managing Security Solutions/0. Introduction.mp4
2.63 MB
5. Managing Security Solutions/0. Introduction.srt
3.62 KB
5. Managing Security Solutions/1. Security Solutions.mp4
2.02 MB
5. Managing Security Solutions/1. Security Solutions.srt
3.1 KB
5. Managing Security Solutions/2. Connecting a Solution.mp4
4.17 MB
5. Managing Security Solutions/2. Connecting a Solution.srt
3.72 KB
5. Managing Security Solutions/3. Retired Solutions.mp4
2.01 MB
5. Managing Security Solutions/3. Retired Solutions.srt
3.12 KB
5. Managing Security Solutions/4. Data Sources.mp4
2.6 MB
5. Managing Security Solutions/4. Data Sources.srt
3.96 KB
5. Managing Security Solutions/5. Adding a Non-Azure Windows Machine.mp4
8.19 MB
5. Managing Security Solutions/5. Adding a Non-Azure Windows Machine.srt
6.96 KB
5. Managing Security Solutions/6. Adding a Non-Azure Linux Machine.mp4
9.5 MB
5. Managing Security Solutions/6. Adding a Non-Azure Linux Machine.srt
5.84 KB
5. Managing Security Solutions/7. Connecting to a SIEM.mp4
10.36 MB
5. Managing Security Solutions/7. Connecting to a SIEM.srt
8.68 KB
5. Managing Security Solutions/8. Summary.mp4
1.26 MB
5. Managing Security Solutions/8. Summary.srt
1.86 KB
6. Investigating Threats/0. Introduction.mp4
1.67 MB
6. Investigating Threats/0. Introduction.srt
2.47 KB
6. Investigating Threats/1. Investigating Threats.mp4
2.99 MB
6. Investigating Threats/1. Investigating Threats.srt
4 KB
6. Investigating Threats/2. Viewing Security Alerts.mp4
5.15 MB
6. Investigating Threats/2. Viewing Security Alerts.srt
4.35 KB
6. Investigating Threats/3. Working with Security Incidents.mp4
8.03 MB
6. Investigating Threats/3. Working with Security Incidents.srt
8.56 KB
6. Investigating Threats/4. Alert Validation and Remediation.mp4
7.28 MB
6. Investigating Threats/4. Alert Validation and Remediation.srt
7.49 KB
6. Investigating Threats/5. Summary.mp4
1.2 MB
6. Investigating Threats/5. Summary.srt
1.78 KB
7. Automating Security Workflows/0. Introduction.mp4
2.56 MB
7. Automating Security Workflows/0. Introduction.srt
3.59 KB
7. Automating Security Workflows/1. Configuring Workflow Automation.mp4
5.4 MB
7. Automating Security Workflows/1. Configuring Workflow Automation.srt
5.35 KB
7. Automating Security Workflows/2. Creating a New Workflow.mp4
10.22 MB
7. Automating Security Workflows/2. Creating a New Workflow.srt
8.41 KB
7. Automating Security Workflows/3. Triggering a Logic App from an Alert.mp4
9.42 MB
7. Automating Security Workflows/3. Triggering a Logic App from an Alert.srt
7.75 KB
7. Automating Security Workflows/4. Summary.mp4
1.48 MB
7. Automating Security Workflows/4. Summary.srt
2.21 KB
8. Advanced Cloud Defense/0. Introduction.mp4
2.68 MB
8. Advanced Cloud Defense/0. Introduction.srt
3.49 KB
8. Advanced Cloud Defense/1. Reviewing Just in Time VM Access.mp4
12.11 MB
8. Advanced Cloud Defense/1. Reviewing Just in Time VM Access.srt
11.62 KB
8. Advanced Cloud Defense/2. Configuring JIT VM Access.mp4
9.23 MB
8. Advanced Cloud Defense/2. Configuring JIT VM Access.srt
7.17 KB
8. Advanced Cloud Defense/3. Reviewing Adaptive Application Controls.mp4
10.61 MB
8. Advanced Cloud Defense/3. Reviewing Adaptive Application Controls.srt
10.73 KB
8. Advanced Cloud Defense/4. Adding a Group to Adaptive Application Controls.mp4
3.6 MB
8. Advanced Cloud Defense/4. Adding a Group to Adaptive Application Controls.srt
3.22 KB
8. Advanced Cloud Defense/5. Using File Integrity Monitoring.mp4
12.39 MB
8. Advanced Cloud Defense/5. Using File Integrity Monitoring.srt
11.52 KB
8. Advanced Cloud Defense/6. Adaptive Network Hardening.mp4
1.74 MB
8. Advanced Cloud Defense/6. Adaptive Network Hardening.srt
2.61 KB
8. Advanced Cloud Defense/7. Summary and Next Steps.mp4
3.12 MB
8. Advanced Cloud Defense/7. Summary and Next Steps.srt
4.83 KB
content.txt
2.2 KB
microsoft-azure-security-managing-update.zip
2.56 MB

免责声明

本网站仅提供DHT网络资源索引服务,不存储任何资源文件。所有资源均来自DHT网络,本站无法控制其内容。请遵守当地法律法规,合理使用网络资源。如涉及版权问题,请联系 fuckatgfw@protonmail.com。