PluralSight – Configuring CORS In ASP.NET And ASP.NET Core

PluralSight – Configuring CORS In ASP NET And ASP NET Core-REBAR
English | Size: 147.57 MB
Category: Tutorial


In this modern application era, applications that have the client and the server on the same origin are becoming less and less common. APIs are accessed from multiple clients hosted on different origins. In this course, Configuring CORS in ASP.NET and ASP.NET Core, you will learn how to setup CORS for your APIs so only approved client applications can access them. First, you will learn how browsers implement CORS. Next, you will discover how to configure your ASP.NET applications to allow CORS request to origins that you trust. Finally, you will explore the different CORS requests types and configuration options to help us secure and optimize requests coming in from other origins. By the end of this course, you will be able to identify CORS requests, configure CORS for your ASP.NET and ASP.NET Core applications.

Cloud Academy – Configuring Azure Application and Data Security

Cloud Academy – Configuring Azure Application and Data Security-STM
English | Size: 981.27 MB
Category: Tutorial


Microsoft Azure offers a wide range of options to secure and protect your data, regardless of the format Whether you’re dealing with documents, SQL databases or big data, there are multiple solutions ranging from authentication to virtual networks

Cloud Academy – Configuring GCP Access and Security

Cloud Academy – Configuring GCP Access and Security-STM
English | Size: 619.82 MB
Category: Tutorial


Security is considered to be one of the biggest challenges when comparing cloud vs. in-house infrastructure. Due to lack of trust, loss of control, and the multi-tenant nature of the cloud, security controls and mechanisms are of the utmost importance
Google Cloud Platform offers tools with a single dashboard and simple interfaces to implement security policies Google Cloud Identity and Access Management (IAM) provides an easy way to manage GCP users and the permissions assigned to them. Besides human users, GCP provides a way to create non-human identities (service accounts) and attach those to cloud applications and VMs. The correct configuration and usage of service accounts and IAM are critical to GCP security. GCP also provides a centralized dashboard to view audit logs, which are useful in the case of a security breach To help you get the most out of the security tools offered in Google Cloud, this course covers how to properly manage IAM, service accounts, and audit logs

PluralSight – Configuring Windows Firewall For Windows Server 2019

PluralSight – Configuring Windows Firewall For Windows Server 2019-REBAR
English | Size: 232.73 MB
Category: Tutorial


Protecting Windows Server 2019 hosts from unauthorized network traffic can be achieved with correctly configured firewall rules. Both traffic coming into and out of hosts can be controlled using Windows Defender firewall. More than just basic IP address and port filtering, rules can be based on apps and services and have conditions such as user or host attempting to make a connection. In this course, Configuring Windows Firewall for Windows Server 2019, you’ll explore how to create inbound and outbound firewall rules using the GUI including through Group Policy, and how rules relate to network location profiles. Next, you’ll discover how to encrypt and authenticate network traffic using IPsec connection security rules. Finally, you will experience managing Windows Defender Firewall using PowerShell cmdlets. When you’re done with this course, you’ll have acquired the skills needed to plan and implement Windows Defender Firewall rules and IPsec.

PluralSight – Cisco Data Center Core Configuring Network Storage

PluralSight – Cisco Data Center Core Configuring Network Storage-REBAR
English | Size: 246.45 MB
Category: Tutorial


Cisco is leading a technological revolution with devices that offer many storage infrastructure services, that help you improve agility, and reduce risks in daily operations. In this course, Cisco Data Center Core: Configuring Network Storage, you will learn about data center storage solutions. First, you will understand Fibre Channel, which is a standards-based technology used for storage networking. Next, you will discover how to deploy the storage services device-aliases and zoning within the fabric that help you improve agility and reduce risks in daily operations. You will be able to configure N port virtualization and N Port ID virtualization to simplify and scale large data center fabrics. You will also explore NAS and SAN solutions. Finally, you will examine how Fibre Channel over Ethernet technology allows the transferring of Fibre Channel frames over the Ethernet. When you are finished with this course, you will have the skills and knowledge needed to deploy Fibre Channel, zoning, device-aliases, NPV, and Fibre Channel over Ethernet Cisco in data centers.