Pluralsight – Configuring and Managing SPF, DKIM, and DMARC

Pluralsight – Configuring and Managing SPF, DKIM, and DMARC
English | Size: 240.21 MB
Category: Cloud-Comp | Networking | Security


Learn how to increase your organization’s email deliverability, and prevent users within it from having their identity stolen in email forgery attacks, simply by publishing relevant DNS records on your domain.

Email deliverability is a constant challenge for organizations, but this challenge is widely amplified if your domain is not properly secured to prevent attackers from using its name in email forgery attacks to exploit its reputation, which will tarnish or ruin it in the eyes of spam filters and people. In this course, Configuring and Managing SPF, DKIM, and DMARC, you’ll gain the ability to configure your domain in a way that your legitimate emails will not be mixed up with foreign spam and phishing attacks. First, you’ll learn SPF to publish a whitelist of your email servers. Next, you’ll discover DKIM to sign your emails cryptographically against tampering. Finally, you’ll explore how to use DMARC to publish your policies for SPF and DKIM misalignments against an email’s claimed author, and monitor their application with third parties. When you’re finished with this course, you’ll have the skills and knowledge of SPF, DKIM, and DMARC needed to mitigate a wide range of email security attacks against your domain, and to allow spam filters to validate the true origin of your emails. [Read more…]

Pluralsight – Configuring and Managing SPF DKIM and DMARC

Pluralsight – Configuring and Managing SPF DKIM and DMARC-XQZT
English | Size: 249.22 MB
Category: Tutorial


Email deliverability is a constant challenge for organizations, but this challenge is widely amplified if your domain is not properly secured to prevent attackers from using its name in email forgery attacks to exploit its reputation, which will tarnish or ruin it in the eyes of spam filters and people. In this course, Configuring and Managing SPF, DKIM, and DMARC, you ll gain the ability to configure your domain in a way that your legitimate emails will not be mixed up with foreign spam and phishing attacks. First, you ll learn SPF to publish a whitelist of your email servers. Next, you ll discover DKIM to sign your emails cryptographically against tampering. Finally, you ll explore how to use DMARC to publish your policies for SPF and DKIM misalignments against an email’s claimed author, and monitor their application with third parties When you re finished with this course, you ll have the skills and knowledge of SPF, DKIM, and DMARC needed to mitigate a wide range of email security attacks against your domain, and to allow spam filters to validate the true origin of your emails. [Read more…]

Pluralsight – Configuring Microsoft Azure Data Infrastructure Security

Pluralsight – Configuring Microsoft Azure Data Infrastructure Security
English | Size: 336.57 MB
Category: Tutorial


As we move our data to the cloud, securing it is of critical importance. The cloud is very flexible, and it offers numerous data products, including many flavors of SQL server, CosmosDB, and more. This course, Configuring Microsoft Azure Data Infrastructure Security, will teach you how to secure your data infrastructure services running in the Microsoft Azure cloud. Relevant Azure products covered include Azure SQL Database, Azure Cosmos DB, and Azure Data Lake. By the end of this course you will find yourself well equipped with a clear understanding of the various security-related capabilities of various Azure data products, and how various other Azure security products help keep your data safe. [Read more…]

PluralSight – Configuring Microsoft Azure Data Infrastructure Security

PluralSight – Configuring Microsoft Azure Data Infrastructure Security-ViGOROUS
English | Size: 336.59 MB
Category: Tutorial


As we move our data to the cloud, securing it is of critical importance. The cloud is very flexible, and it offers numerous data products, including many flavors of SQL server, CosmosDB, and more. This course, Configuring Microsoft Azure Data Infrastructure Security, will teach you how to secure your data infrastructure services running in the Microsoft Azure cloud. Relevant Azure products covered include Azure SQL Database, Azure Cosmos DB, and Azure Data Lake. By the end of this course you will find yourself well equipped with a clear understanding of the various security-related capabilities of various Azure data products, and how various other Azure security products help keep your data safe. [Read more…]

PluralSight – Configuring Microsoft Azure Active Directory Privileged Identity Management

PluralSight – Configuring Microsoft Azure Active Directory Privileged Identity Management
English | Size: 195.25 MB
Category: Programming | Cloud-Comp | E-learning | HACKING | Hyper-V | Microsoft | Security | others


Configuring Microsoft Azure Active Directory Privileged Identity Management
by Tim Warner
In this course, Configuring Microsoft Azure Active Directory Privileged Identity Management, you learn how to apply and monitor least-privilege security for Azure Active Directory and your Azure subscriptions. [Read more…]

Configuring Microsoft Azure Active Directory Privileged Identity Management

Configuring Microsoft Azure Active Directory Privileged Identity Management
English | Size: 195.25 MB
Category: Programming | Cloud-Comp | E-learning | HACKING | Hyper-V | Microsoft | Security | others


Configuring Microsoft Azure Active Directory Privileged Identity Management
by Tim Warner
In this course, Configuring Microsoft Azure Active Directory Privileged Identity Management, you learn how to apply and monitor least-privilege security for Azure Active Directory and your Azure subscriptions. [Read more…]

PluralSight – Configuring Azure Active Directory for Microsoft Azure Workloads

PluralSight – Configuring Azure Active Directory for Microsoft Azure Workloads
English | Size: 360.74 MB
Category: Tutorial


Configuring Azure Active Directory for Microsoft Azure Workloads
by Tim Warner
In this course, Configuring Azure AD for Microsoft Azure Workloads, you learn how to secure Azure Active Directory for use as an identity store for your Azure-based cloud applications. This course’s audience is the Microsoft Azure security engineer. [Read more…]

Pluralsight – Configuring Microsoft Azure Active Directory Privileged Identity Management

Pluralsight – Configuring Microsoft Azure Active Directory Privileged Identity Management-BOOKWARE-KNiSO
English | Size: 183.28 MB
Category: Tutorial


Release Notes: Which accounts have high-privilege access to your Azure AD tenant and trusting subscriptions? How easily can you report and remediate this issue? In this course, Configuring Microsoft Azure Active Directory Privileged Identity Management, you will learn how to use this tool to quickly identify high-privilege role holders and assign time-limited on-demand administrative access. First, you will gain an understanding of how to use Azure AD PIM to manage and report on both Azure AD and Azure resource roles. Next, you will discover the “hows and whys” of access reviews. Finally, you will explore how to audit the entire process to ensure security compliance. When you are finished with this course, you will have the skills and knowledge to enforce least-privilege access in your Azure environment, which greatly increases your organizational security posture in Azure [Read more…]

Pluralsight – Configuring Azure Active Directory for Microsoft Azure Workloads

Pluralsight – Configuring Azure Active Directory for Microsoft Azure Workloads-ViGOROUS
English | Size: 371.86 MB
Category: Tutorial


You are a Microsoft Azure security engineer tasked with managing Azure Active Directory. In this course, Configuring Azure Active Directory for Microsoft Azure Workloads, you learn how to secure Azure AD for use as an identity store for your Azure-based cloud applications. First, you will discover how to create and configure Azure AD user and group accounts. Next, you will learn how to configure authentication methods, including deploying a hybrid cloud with Azure AD Connect. Finally, you will explore how to create and manage Azure AD application registrations. When you are finished with this course, you will have the skills and knowledge needed to provide security oversight of Azure AD. [Read more…]

Pluralsight – Configuring NAT and VPN’s Using Palo Alto Firewalls

Pluralsight – Configuring NAT and VPN’s Using Palo Alto Firewalls
English | Size: 307.59 MB
Category: Tutorial


At the core of network-security engineering is a thorough knowledge of NAT translations and VPN connections. In this course, Configuring NAT and VPN’s Using Palo Alto Firewalls, you’ll learn how to shape traffic using Palo Alto’s Next Generation Firewall. First, you’ll learn how to configure various types of NAT. Next, you’ll explore how to deploy site-to-site VPNs using both pre-shared keys and digital certificates. Finally, you’ll discover how to set up remote access VPNs using GlobalProtect. When you’re finished with this course, you’ll have a foundational knowledge of configuring NAT and VPNs on a Palo Alto firewall that will help you as you move forward to engineer enterprise network security. Software required: PAN-OS 8.1 (physical or virtual), Network Equipment (physical or virtual), Operating system (physical or virtual). [Read more…]