AZ-500 Microsoft Azure Security Technologies (LA)
    
    File List
    
        
            
                
                    - 2. Configuring Azure Active Directory for Workloads/7. Working with Azure AD Connect.mp4  135.0 MB
 
                
                    - 2. Configuring Azure Active Directory for Workloads/6. Develop a Python App to Access Key Vault Using a Service Principal/2. Solution.mp4  91.0 MB
 
                
                    - 2. Configuring Azure Active Directory for Workloads/3. Create and Manage Azure AD Users in the Portal/2. Solution.mp4  90.8 MB
 
                
                    - 5. Network Security/6. Configuring an Azure VNet-to-VNet VPN Gateway (v2)/2. Solution I.mp4  79.5 MB
 
                
                    - 2. Configuring Azure Active Directory for Workloads/8. Azure AD Connect Authentication Methods Explained.mp4  77.2 MB
 
                
                    - 3. Azure AD Privileged Identity Management/4. Reviewing Access in PIM.mp4  72.5 MB
 
                
                    - 2. Configuring Azure Active Directory for Workloads/10. Multi-Factor Authentication: Part II.mp4  71.8 MB
 
                
                    - 2. Configuring Azure Active Directory for Workloads/15. Azure AD Identity Protection: Part II.mp4  70.9 MB
 
                
                    - 2. Configuring Azure Active Directory for Workloads/4. Create and Manage Azure AD Groups in the Portal/2. Solution.mp4  63.8 MB
 
                
                    - 2. Configuring Azure Active Directory for Workloads/14. Azure AD Identity Protection: Part I.mp4  61.3 MB
 
                
                    - 2. Configuring Azure Active Directory for Workloads/12. Conditional Access: Part II.mp4  60.7 MB
 
                
                    - 3. Azure AD Privileged Identity Management/2. PIM Configuration, Access Requests and Approval: Part I.mp4  58.7 MB
 
                
                    - 7. Securing Azure Resources/6. Ensuring Compliance with Azure Policies/2. Solution.mp4  56.9 MB
 
                
                    - 5. Network Security/4. Azure Firewall.mp4  55.8 MB
 
                
                    - 2. Configuring Azure Active Directory for Workloads/13. Conditional Access: Part III.mp4  52.2 MB
 
                
                    - 1. Welcome!/1. An Important Note About A Cloud Guru and Linux Academy Courses.mp4  51.7 MB
 
                
                    - 2. Configuring Azure Active Directory for Workloads/1. Azure AD Users.mp4  50.0 MB
 
                
                    - 2. Configuring Azure Active Directory for Workloads/9. Multi-Factor Authentication: Part I.mp4  49.0 MB
 
                
                    - 12. Managing Data/1. Data Classification Using Azure Information Protection.mp4  48.8 MB
 
                
                    - 2. Configuring Azure Active Directory for Workloads/2. Azure AD Groups.mp4  47.0 MB
 
                
                    - 13. Azure Key Vault/1. Working with Azure Key Vault.mp4  46.7 MB
 
                
                    - 3. Azure AD Privileged Identity Management/1. AD PIM Overview and Activation.mp4  45.3 MB
 
                
                    - 5. Network Security/5. Resource Firewalls.mp4  42.0 MB
 
                
                    - 14. Security for Data Infrastructure/1. Database Authentication and Auditing.mp4  41.2 MB
 
                
                    - 7. Securing Azure Resources/5. Azure Policies.mp4  40.7 MB
 
                
                    - 2. Configuring Azure Active Directory for Workloads/5. App Registrations, Permissions, Scopes, and Consent.mp4  40.3 MB
 
                
                    - 2. Configuring Azure Active Directory for Workloads/11. Conditional Access: Part I.mp4  40.1 MB
 
                
                    - 8. Container Security/1. Container Registry Security.mp4  40.0 MB
 
                
                    - 5. Network Security/6. Configuring an Azure VNet-to-VNet VPN Gateway (v2)/3. Solution II.mp4  39.9 MB
 
                
                    - 16. Security for Application Delivery/2. Synthetic Security Transactions.mp4  37.4 MB
 
                
                    - 17. Final Steps/2. Keep Up to Date with Azure This Week.mp4  37.1 MB
 
                
                    - 3. Azure AD Privileged Identity Management/3. PIM Configuration, Access Requests and Approval: Part II.mp4  36.0 MB
 
                
                    - 5. Network Security/3. Application Security Groups.mp4  35.1 MB
 
                
                    - 6. Host Security/1. VM Endpoint Security.mp4  34.1 MB
 
                
                    - 8. Container Security/2. Configuring Instance Security.mp4  33.3 MB
 
                
                    - 8. Container Security/5. AKS Security.mp4  31.8 MB
 
                
                    - 7. Securing Azure Resources/3. Azure Resource Locks.mp4  31.4 MB
 
                
                    - 15. Encryption for Data at Rest/4. Disk Encryption.mp4  30.0 MB
 
                
                    - 8. Container Security/3. Container Groups.mp4  27.4 MB
 
                
                    - 10. Security Policies/1. Just in Time VM Access Using Microsoft Azure Security Center.mp4  27.3 MB
 
                
                    - 4. Azure Tenant Security/1. Transferring Azure Subscriptions Between Tenants.mp4  24.4 MB
 
                
                    - 2. Configuring Azure Active Directory for Workloads/6. Develop a Python App to Access Key Vault Using a Service Principal/1. Introduction.mp4  23.6 MB
 
                
                    - 16. Security for Application Delivery/3. SSLTLS Certificates.mp4  23.4 MB
 
                
                    - 7. Securing Azure Resources/4. Azure Management Groups.mp4  23.4 MB
 
                
                    - 15. Encryption for Data at Rest/1. Microsoft Azure SQL Database Always Encrypted.mp4  22.3 MB
 
                
                    - 2. Configuring Azure Active Directory for Workloads/4. Create and Manage Azure AD Groups in the Portal/1. Introduction.mp4  21.5 MB
 
                
                    - 15. Encryption for Data at Rest/5. Backup Encryption.mp4  21.3 MB
 
                
                    - 16. Security for Application Delivery/1. Implementing Security Validations for Application Development.mp4  20.3 MB
 
                
                    - 9. Configuring Security Services/2. Diagnostic Logging and Log Retention.mp4  19.2 MB
 
                
                    - 11. Security Alerts/1. Reviewing and Responding to Alerts and Recommendations.mp4  19.0 MB
 
                
                    - 17. Final Steps/1. Course Completion and How to Prepare for the Exam.mp4  18.9 MB
 
                
                    - 6. Host Security/2. VM System Updates in Azure.mp4  18.8 MB
 
                
                    - 16. Security for Application Delivery/4. Protecting Web Apps.mp4  18.3 MB
 
                
                    - 14. Security for Data Infrastructure/6. Security for Microsoft Azure Data Lake.mp4  17.4 MB
 
                
                    - 7. Securing Azure Resources/6. Ensuring Compliance with Azure Policies/1. Introduction.mp4  16.7 MB
 
                
                    - 5. Network Security/6. Configuring an Azure VNet-to-VNet VPN Gateway (v2)/1. Introduction.mp4  16.5 MB
 
                
                    - 2. Configuring Azure Active Directory for Workloads/3. Create and Manage Azure AD Users in the Portal/1. Introduction.mp4  15.3 MB
 
                
                    - 1. Welcome!/1607454330287-367_AZ-500 Microsoft Azure Security Technologies - Network Security PDF.pdf  15.2 MB
 
                
                    - 12. Managing Data/3. Data Sovereignty with Azure Policy.mp4  15.1 MB
 
                
                    - 12. Managing Data/2. Storage Analytics Data Retention Policies.mp4  14.4 MB
 
                
                    - 11. Security Alerts/2. Microsoft Azure Security Center Playbooks.mp4  14.3 MB
 
                
                    - 14. Security for Data Infrastructure/5. Security for Cosmos DB.mp4  13.9 MB
 
                
                    - 7. Securing Azure Resources/1. Role-Based Access Control (RBAC) [Review].mp4  11.4 MB
 
                
                    - 5. Network Security/2. Network Security Groups [Review].mp4  9.5 MB
 
                
                    - 1. Welcome!/2. Course Introduction.mp4  9.4 MB
 
                
                    - 5. Network Security/1. Virtual Networks [Review].mp4  9.1 MB
 
                
                    - 1. Welcome!/4. Using the AZ-500 Guide.mp4  9.0 MB
 
                
                    - 15. Encryption for Data at Rest/3. Storage Service Encryption.mp4  8.8 MB
 
                
                    - 14. Security for Data Infrastructure/4. Security for HDInsight.mp4  8.7 MB
 
                
                    - 9. Configuring Security Services/1. Microsoft Azure Monitor [Review].mp4  8.3 MB
 
                
                    - 7. Securing Azure Resources/2. Managed Identities [Review].mp4  7.6 MB
 
                
                    - 14. Security for Data Infrastructure/2. Azure SQL Database Threat Detection.mp4  7.2 MB
 
                
                    - 14. Security for Data Infrastructure/3. Managing Access Control and Keys for Storage Accounts [Review].mp4  7.1 MB
 
                
                    - 8. Container Security/4. Container Vulnerability Management.mp4  5.7 MB
 
                
                    - 1. Welcome!/3. About the Training Architect.mp4  4.6 MB
 
                
                    - 15. Encryption for Data at Rest/2. Database Encryption.mp4  4.2 MB
 
                
                    - 5. Network Security/6. Configuring an Azure VNet-to-VNet VPN Gateway (v2)/1060_-_S06-HOL_-_Configuring_an_Azure_VNet-to-VNet_VPN_Gateway_(v2).001.png  644.1 KB
 
                
                    - 7. Securing Azure Resources/6. Ensuring Compliance with Azure Policies/1060_-_S14-HOL_-_Ensuring_Compliance_with_Azure_Policy.001.png  496.9 KB
 
                
                    - 2. Configuring Azure Active Directory for Workloads/4. Create and Manage Azure AD Groups in the Portal/Azure_AD_Labs_-_Create_and_Manage_Azure_AD_Groups_in_the_Portal.001.png  480.2 KB
 
                
                    - 2. Configuring Azure Active Directory for Workloads/6. Develop a Python App to Access Key Vault Using a Service Principal/Azure_AD_Labs_-_Develop_a_Python_App_to_Access_Key_Vault_Using_a_Service_Principal.001.png  447.9 KB
 
                
                    - 2. Configuring Azure Active Directory for Workloads/3. Create and Manage Azure AD Users in the Portal/Azure_AD_Labs_-_Create_and_Manage_Azure_AD_Users_in_the_Portal.001.png  413.1 KB
 
                
                    - 2. Configuring Azure Active Directory for Workloads/7. Working with Azure AD Connect.vtt  56.0 KB
 
                
                    - 2. Configuring Azure Active Directory for Workloads/8. Azure AD Connect Authentication Methods Explained.vtt  31.3 KB
 
                
                    - 2. Configuring Azure Active Directory for Workloads/10. Multi-Factor Authentication: Part II.vtt  31.2 KB
 
                
                    - 2. Configuring Azure Active Directory for Workloads/14. Azure AD Identity Protection: Part I.vtt  28.6 KB
 
                
                    - 3. Azure AD Privileged Identity Management/2. PIM Configuration, Access Requests and Approval: Part I.vtt  25.4 KB
 
                
                    - 2. Configuring Azure Active Directory for Workloads/12. Conditional Access: Part II.vtt  24.6 KB
 
                
                    - 2. Configuring Azure Active Directory for Workloads/3. Create and Manage Azure AD Users in the Portal/2. Solution.vtt  23.6 KB
 
                
                    - 2. Configuring Azure Active Directory for Workloads/9. Multi-Factor Authentication: Part I.vtt  21.4 KB
 
                
                    - 5. Network Security/4. Azure Firewall.vtt  20.9 KB
 
                
                    - 2. Configuring Azure Active Directory for Workloads/4. Create and Manage Azure AD Groups in the Portal/2. Solution.vtt  20.6 KB
 
                
                    - 12. Managing Data/1. Data Classification Using Azure Information Protection.vtt  20.2 KB
 
                
                    - 2. Configuring Azure Active Directory for Workloads/1. Azure AD Users.vtt  19.8 KB
 
                
                    - 2. Configuring Azure Active Directory for Workloads/2. Azure AD Groups.vtt  19.7 KB
 
                
                    - 13. Azure Key Vault/1. Working with Azure Key Vault.vtt  19.6 KB
 
                
                    - 2. Configuring Azure Active Directory for Workloads/6. Develop a Python App to Access Key Vault Using a Service Principal/2. Solution.vtt  19.2 KB
 
                
                    - 3. Azure AD Privileged Identity Management/1. AD PIM Overview and Activation.vtt  19.2 KB
 
                
                    - 3. Azure AD Privileged Identity Management/4. Reviewing Access in PIM.vtt  19.1 KB
 
                
                    - 2. Configuring Azure Active Directory for Workloads/13. Conditional Access: Part III.vtt  18.6 KB
 
                
                    - 2. Configuring Azure Active Directory for Workloads/5. App Registrations, Permissions, Scopes, and Consent.vtt  18.3 KB
 
                
                    - 5. Network Security/6. Configuring an Azure VNet-to-VNet VPN Gateway (v2)/2. Solution I.vtt  18.0 KB
 
                
                    - 2. Configuring Azure Active Directory for Workloads/15. Azure AD Identity Protection: Part II.vtt  17.9 KB
 
                
                    - 2. Configuring Azure Active Directory for Workloads/11. Conditional Access: Part I.vtt  17.0 KB
 
                
                    - 8. Container Security/1. Container Registry Security.vtt  16.6 KB
 
                
                    - 7. Securing Azure Resources/5. Azure Policies.vtt  16.5 KB
 
                
                    - 14. Security for Data Infrastructure/1. Database Authentication and Auditing.vtt  16.4 KB
 
                
                    - 5. Network Security/5. Resource Firewalls.vtt  16.3 KB
 
                
                    - 6. Host Security/1. VM Endpoint Security.vtt  15.1 KB
 
                
                    - 5. Network Security/3. Application Security Groups.vtt  14.6 KB
 
                
                    - 7. Securing Azure Resources/3. Azure Resource Locks.vtt  14.0 KB
 
                
                    - 8. Container Security/2. Configuring Instance Security.vtt  13.9 KB
 
                
                    - 3. Azure AD Privileged Identity Management/3. PIM Configuration, Access Requests and Approval: Part II.vtt  13.4 KB
 
                
                    - 15. Encryption for Data at Rest/4. Disk Encryption.vtt  13.3 KB
 
                
                    - 8. Container Security/5. AKS Security.vtt  13.3 KB
 
                
                    - 10. Security Policies/1. Just in Time VM Access Using Microsoft Azure Security Center.vtt  12.0 KB
 
                
                    - 8. Container Security/3. Container Groups.vtt  11.6 KB
 
                
                    - 5. Network Security/6. Configuring an Azure VNet-to-VNet VPN Gateway (v2)/metadata.md  11.3 KB
 
                
                    - 7. Securing Azure Resources/6. Ensuring Compliance with Azure Policies/2. Solution.vtt  11.0 KB
 
                
                    - 4. Azure Tenant Security/1. Transferring Azure Subscriptions Between Tenants.vtt  10.3 KB
 
                
                    - 5. Network Security/6. Configuring an Azure VNet-to-VNet VPN Gateway (v2)/3. Solution II.vtt  9.7 KB
 
                
                    - 7. Securing Azure Resources/4. Azure Management Groups.vtt  9.7 KB
 
                
                    - 2. Configuring Azure Active Directory for Workloads/6. Develop a Python App to Access Key Vault Using a Service Principal/metadata.md  9.6 KB
 
                
                    - 15. Encryption for Data at Rest/1. Microsoft Azure SQL Database Always Encrypted.vtt  9.4 KB
 
                
                    - 16. Security for Application Delivery/2. Synthetic Security Transactions.vtt  9.2 KB
 
                
                    - 11. Security Alerts/1. Reviewing and Responding to Alerts and Recommendations.vtt  9.1 KB
 
                
                    - 16. Security for Application Delivery/1. Implementing Security Validations for Application Development.vtt  8.9 KB
 
                
                    - 2. Configuring Azure Active Directory for Workloads/4. Create and Manage Azure AD Groups in the Portal/metadata.md  8.8 KB
 
                
                    - 16. Security for Application Delivery/3. SSLTLS Certificates.vtt  8.8 KB
 
                
                    - 9. Configuring Security Services/2. Diagnostic Logging and Log Retention.vtt  8.8 KB
 
                
                    - 6. Host Security/2. VM System Updates in Azure.vtt  8.7 KB
 
                
                    - 15. Encryption for Data at Rest/5. Backup Encryption.vtt  8.6 KB
 
                
                    - 17. Final Steps/1. Course Completion and How to Prepare for the Exam.vtt  8.2 KB
 
                
                    - 16. Security for Application Delivery/4. Protecting Web Apps.vtt  7.9 KB
 
                
                    - 11. Security Alerts/2. Microsoft Azure Security Center Playbooks.vtt  6.9 KB
 
                
                    - 12. Managing Data/2. Storage Analytics Data Retention Policies.vtt  6.3 KB
 
                
                    - 12. Managing Data/3. Data Sovereignty with Azure Policy.vtt  6.2 KB
 
                
                    - 14. Security for Data Infrastructure/5. Security for Cosmos DB.vtt  5.8 KB
 
                
                    - 2. Configuring Azure Active Directory for Workloads/4. Create and Manage Azure AD Groups in the Portal/1. Introduction.vtt  5.4 KB
 
                
                    - 2. Configuring Azure Active Directory for Workloads/6. Develop a Python App to Access Key Vault Using a Service Principal/1. Introduction.vtt  5.2 KB
 
                
                    - 7. Securing Azure Resources/1. Role-Based Access Control (RBAC) [Review].vtt  5.2 KB
 
                
                    - 2. Configuring Azure Active Directory for Workloads/3. Create and Manage Azure AD Users in the Portal/metadata.md  5.0 KB
 
                
                    - 14. Security for Data Infrastructure/6. Security for Microsoft Azure Data Lake.vtt  4.7 KB
 
                
                    - 1. Welcome!/2. Course Introduction.vtt  4.3 KB
 
                
                    - 7. Securing Azure Resources/6. Ensuring Compliance with Azure Policies/metadata.md  4.2 KB
 
                
                    - 15. Encryption for Data at Rest/3. Storage Service Encryption.vtt  4.1 KB
 
                
                    - 2. Configuring Azure Active Directory for Workloads/3. Create and Manage Azure AD Users in the Portal/1. Introduction.vtt  4.1 KB
 
                
                    - 5. Network Security/6. Configuring an Azure VNet-to-VNet VPN Gateway (v2)/1. Introduction.vtt  4.0 KB
 
                
                    - 9. Configuring Security Services/1. Microsoft Azure Monitor [Review].vtt  3.9 KB
 
                
                    - 5. Network Security/1. Virtual Networks [Review].vtt  3.8 KB
 
                
                    - 7. Securing Azure Resources/2. Managed Identities [Review].vtt  3.6 KB
 
                
                    - 14. Security for Data Infrastructure/4. Security for HDInsight.vtt  3.4 KB
 
                
                    - 14. Security for Data Infrastructure/2. Azure SQL Database Threat Detection.vtt  3.3 KB
 
                
                    - 7. Securing Azure Resources/6. Ensuring Compliance with Azure Policies/1. Introduction.vtt  3.3 KB
 
                
                    - 14. Security for Data Infrastructure/3. Managing Access Control and Keys for Storage Accounts [Review].vtt  3.3 KB
 
                
                    - 1. Welcome!/4. Using the AZ-500 Guide.vtt  2.9 KB
 
                
                    - 1. Welcome!/1. An Important Note About A Cloud Guru and Linux Academy Courses.vtt  2.8 KB
 
                
                    - 8. Container Security/4. Container Vulnerability Management.vtt  2.7 KB
 
                
                    - 5. Network Security/2. Network Security Groups [Review].vtt  2.6 KB
 
                
                    - 1. Welcome!/3. About the Training Architect.vtt  2.6 KB
 
                
                    - 15. Encryption for Data at Rest/2. Database Encryption.vtt  1.9 KB
 
                
                    - 17. Final Steps/2. Keep Up to Date with Azure This Week.vtt  1.9 KB
 
                
            
        
     
    Download Torrent
    
    Related Resources
    
    Copyright Infringement
    
        If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.