Pluralsight - Planning and Designing Microsoft Azure Security Solutions by John Savill

mp4   Hot:55   Size:257.01 MB   Created:2018-12-07 13:18:58   Update:2021-11-04 20:28:30  

File List

  • 06.Designing Access Security/06.Using Azure Security Center.mp4 34.29 MB
    03.Designing Identity Solutions/04.Azure AD Overview.mp4 17.87 MB
    06.Designing Access Security/03.Role-based Access Control.mp4 17.28 MB
    07.Azure Service Architecture Case Study Review/03.Case Study 2.mp4 14.51 MB
    03.Designing Identity Solutions/06.Azure AD SKUs.mp4 12.09 MB
    03.Designing Identity Solutions/05.Azure AD Population and Authentication.mp4 11.46 MB
    05.Designing Network Security/05.Network Security Groups.mp4 10.54 MB
    02.Common Solutions/02.Security Basics.mp4 10.36 MB
    04.Designing Key Storage/03.Azure Key Vault.mp4 9.66 MB
    05.Designing Network Security/03.Defense in Depth.mp4 9.65 MB
    06.Designing Access Security/04.Privileged Identity Management.mp4 9.58 MB
    03.Designing Identity Solutions/08.Multifactor Authentication.mp4 8.39 MB
    04.Designing Key Storage/04.Authentication and Authorization.mp4 7.77 MB
    06.Designing Access Security/05.Identity Protection.mp4 7.24 MB
    04.Designing Key Storage/05.Management and Usage.mp4 6.59 MB
    03.Designing Identity Solutions/07.Azure AD Domain Services.mp4 6.41 MB
    02.Common Solutions/03.Key Security Areas.mp4 6.22 MB
    06.Designing Access Security/02.Azure Resource Manager Review.mp4 5.84 MB
    05.Designing Network Security/06.Non-VNet Azure Service Considerations.mp4 5.11 MB
    04.Designing Key Storage/02.The Need for Keys and Secrets.mp4 4.95 MB
    07.Azure Service Architecture Case Study Review/02.Case Study 1.mp4 4.68 MB
    05.Designing Network Security/02.Network Security Requirements.mp4 4.67 MB
    03.Designing Identity Solutions/02.The Importance of Identity.mp4 4.64 MB
    05.Designing Network Security/07.Virtual Appliances and Azure Application Gateway.mp4 4.55 MB
    05.Designing Network Security/04.Virtual Network Review.mp4 4.2 MB
    03.Designing Identity Solutions/03.Authentication in the Public Cloud.mp4 3.05 MB
    01.Course Overview/01.Course Overview.mp4 2.97 MB
    02.Common Solutions/01.Module Introduction.mp4 2.67 MB
    planning-designing-microsoft-azure-security-solutions.zip 2.29 MB
    06.Designing Access Security/01.Module Introduction.mp4 1.27 MB
    06.Designing Access Security/07.Module Summary.mp4 1.04 MB
    05.Designing Network Security/08.Module Summary.mp4 760.43 KB
    03.Designing Identity Solutions/09.Module Summary.mp4 741.35 KB
    07.Azure Service Architecture Case Study Review/04.Module Summary.mp4 740.44 KB
    05.Designing Network Security/01.Module Introduction.mp4 739.07 KB
    03.Designing Identity Solutions/01.Module Introduction.mp4 551.96 KB
    04.Designing Key Storage/01.Module Introduction.mp4 515.5 KB
    07.Azure Service Architecture Case Study Review/01.Module Introduction.mp4 447.42 KB
    04.Designing Key Storage/06.Module Summary.mp4 387.44 KB
    02.Common Solutions/04.Module Summary.mp4 253.08 KB
    06.Designing Access Security/Using Azure Security Center.srt 20.55 KB
    03.Designing Identity Solutions/Azure AD Overview.srt 9.45 KB
    06.Designing Access Security/Role-based Access Control.srt 8.92 KB
    02.Common Solutions/Security Basics.srt 8.15 KB
    03.Designing Identity Solutions/Azure AD Population and Authentication.srt 8.08 KB
    03.Designing Identity Solutions/Azure AD SKUs.srt 7.84 KB
    05.Designing Network Security/Network Security Groups.srt 7.82 KB
    05.Designing Network Security/Defense in Depth.srt 7 KB
    06.Designing Access Security/Privileged Identity Management.srt 6.25 KB
    03.Designing Identity Solutions/Multifactor Authentication.srt 6.13 KB
    07.Azure Service Architecture Case Study Review/Case Study 2.srt 5.86 KB
    02.Common Solutions/Key Security Areas.srt 5.78 KB
    04.Designing Key Storage/Azure Key Vault.srt 5.76 KB
    06.Designing Access Security/Azure Resource Manager Review.srt 5.04 KB
    04.Designing Key Storage/Authentication and Authorization.srt 4.7 KB
    06.Designing Access Security/Identity Protection.srt 4.65 KB
    03.Designing Identity Solutions/Azure AD Domain Services.srt 4.45 KB
    07.Azure Service Architecture Case Study Review/Case Study 1.srt 4.31 KB
    05.Designing Network Security/Network Security Requirements.srt 3.88 KB
    04.Designing Key Storage/The Need for Keys and Secrets.srt 3.76 KB
    05.Designing Network Security/Virtual Appliances and Azure Application Gateway.srt 3.74 KB
    05.Designing Network Security/Virtual Network Review.srt 3.61 KB
    05.Designing Network Security/Non-VNet Azure Service Considerations.srt 3.48 KB
    03.Designing Identity Solutions/The Importance of Identity.srt 3.11 KB
    03.Designing Identity Solutions/Authentication in the Public Cloud.srt 2.26 KB
    02.Common Solutions/Module Introduction.srt 2.25 KB
    04.Designing Key Storage/Management and Usage.srt 1.71 KB
    content.txt 1.7 KB
    01.Course Overview/Course Overview.srt 1.38 KB
    07.Azure Service Architecture Case Study Review/Module Summary.srt 1.24 KB
    06.Designing Access Security/Module Summary.srt 1.11 KB
    06.Designing Access Security/Module Introduction.srt 1.07 KB
    03.Designing Identity Solutions/Module Summary.srt 795 B
    05.Designing Network Security/Module Summary.srt 688 B
    05.Designing Network Security/Module Introduction.srt 621 B
    04.Designing Key Storage/Module Introduction.srt 482 B
    07.Azure Service Architecture Case Study Review/Module Introduction.srt 481 B
    03.Designing Identity Solutions/Module Introduction.srt 455 B
    04.Designing Key Storage/Module Summary.srt 401 B
    02.Common Solutions/Module Summary.srt 229 B

Download Info

  • Tips

    “Pluralsight - Planning and Designing Microsoft Azure Security Solutions by John Savill” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.

  • DMCA Notice and Takedown Procedure

    If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.