PluralSight Securing Access to Microsoft Azure Databases

PluralSight Securing Access to Microsoft Azure Databases
English | Size: 133.72 MB
Category: Tutorial


Release Notes: With the range of cloud-based database solutions available in Azure, there can often be questions around the authentication and authorization for services. In this course, Securing Access to Microsoft Azure Databases, you will gain the ability to implement access security for the most commonly used Azure database services. First, you will learn about the key security considerations related to databases. Next, you will discover the access controls for Azure SQL database including logins, users, and roles. Finally, you will explore how to secure Azure Cosmos DB access and some core best practices. When you re finished with this course, you will have the skills and knowledge of Azure database access needed to secure your Azure-based database deployments
[Read more…]

PluralSight Securing Microsoft Azure Networks

PluralSight Securing Microsoft Azure Networks
English | Size: 164.68 MB
Category: Tutorial


This course provides a fundamental understanding of Azure network security services, resources, and features to help you better secure your Azure environment. Along the way, you’ll learn Microsoft’s best practices and their role in your journey.
Establishing a presence in the cloud should be done with security at the forefront. In this course, Securing Microsoft Azure Networks, you will learn what services and features you can leverage to create a plan to better improve your security profile in Azure. First, you will configure access control by securing what traffic can access your assets as well as who. Next, you will create and configure services that will better protect your network from malicious actors. Finally, you will maintain a secured connection from your on-premises environment to Azure in order to manage your Azure assets in a more secure fashion. When you’re finished with this course, you will have the skills and knowledge to apply security controls to your Azure network resources while creating a secure posture in the cloud. [Read more…]

PluralSight Securing Microsoft Azure Subscriptions

PluralSight Securing Microsoft Azure Subscriptions-BOOKWARE-KNiSO
English | Size: 272.68 MB
Category: Tutorial


Release Notes: At the core of Azure subscription security is a thorough knowledge of least-privilege authorization. In this course Securing Microsoft Azure Subscriptions, you will learn how to protect your Azure AD tenants and the subscriptions that trust them. First, you will touch on how to implement role-based access control for your Azure resources and Azure AD tenant. Next, you will explore how to identify and manage high-privilege external accounts in Azure AD. Finally, you will discover how to protect application programming interface (API) access to Azure AD and, by extension, to your cloud apps. When you are finished with this course, you will have a foundational knowledge of Azure subscription security that will help you as you move forward in your Azure security engineer career. Software required: Microsoft Azure subscription [Read more…]

PLURALSIGHT Securing Access to Microsoft Azure Storage-JGTiSO

PLURALSIGHT SECURING ACCESS TO MICROSOFT AZURE STORAGE-JGTiSO
English | Size: 187.88 MB
Category: Tutorial


Azure Storage accounts provide a range of storage services that are key to many application scenarios. In this course Securing Access to Microsoft Azure Storage, you will learn foundational knowledge of securing the access to storage services in Azure. First, you will explore securing access through integration with Azure AD. Next, you will discover the options for securing using types of account keys. Finally, you will examine how to integrate with Azure Key Vault and best practices. When you re finished with this course, you will have the skills and knowledge of Azure storage access needed to store and use data hosted in Azure Storage accounts in a secure, yet productive way [Read more…]

Pluralsight.com Securing Microsoft Azure Data Access Endpoints-ELOHiM

Pluralsight.com Securing Microsoft Azure Data Access Endpoints-ELOHiM
English | Size: 103.50 MB
Category: Tutorial


Hosting data in the cloud opens up new considerations when thinking about the security of access to that data. In this course, Securing Microsoft Azure Data Access Endpoints, you will learn foundational knowledge of securing the endpoints of services offered by Azure. First, you will explore the key technologies related to endpoints and endpoint access. Next, you will discover the options for integrating with virtual networks. Finally, you will examine how to secure the resource instance endpoints. When you’re finished with this course, you will have the skills and knowledge of endpoint security needed to store and use data hosted in Azure data services in a secure, yet productive way. [Read more…]

Pluralsight Deploying, Administering, and Securing Palo Alto Firewalls

Pluralsight Deploying, Administering, and Securing Palo Alto Firewalls
English | Size: 361.81 MB
Category: Tutorial

Now, more than ever before, there are more sophisticated threats geared towards enterprise networks and disrupting their day-to-day business, requiring a comprehensive solution to mitigate and prevent these attacks. In this course, Deploying, Administering, and Securing Palo Alto Firewalls, you will gain the ability to protect your network using Palo Alto’s Next Generation Firewall. [Read more…]

Packtpub – Securing Applications in Node.js [Video]

Packtpub – Securing Applications in Node.js [Video]
English | Size: 505.76 MB
Category: Programming | E-learning | Security | others

Everyone agrees that web application security is very important but there are very few to take it seriously. There have been lots of high-profile instances of websites having their password databases exposed to the World (e.g. Ashley Madison and Adobe). You don’t want the application you are building to be the next big security horror story. This course will get you up-to-speed on the key attack vectors, quickly covering issues such as cross-site scripting, CSRF, and SQL injection. It will provide you with clear, practical approaches to mitigating these problems. It will show you how to implement OAuth and two-factor authentication for the additional protection of users who need it. Further, we will delve into the critical process of adding secured, well-thought-out authentication and authorization to a Node.js application. After completing this course, you should be confident in your ability to make an application secure with Node.js and keep your data protected. [Read more…]

PS – Deploying, Administering, and Securing Palo Alto Firewalls

PS – Deploying, Administering, and Securing Palo Alto Firewalls
English | Size: 358.46 MB
Category: Programming | E-learning | Networking | others

Now, more than ever before, there are more sophisticated threats geared towards enterprise networks and disrupting their day-to-day business, requiring a comprehensive solution to mitigate and prevent these attacks. In this course, Deploying, Administering, and Securing Palo Alto Firewalls, you will gain the ability to protect your network using Palo Alto’s Next Generation Firewall. First, you will learn how firewalls have evolved over the years to combat ever changing threats, and how Palo Alto is leading the way. Next, you will discover how to deploy the firewall out-of-the-box and configure administrative and back-end settings. Lastly, you will explore how to setup routing, create security zones, addresses, applications and service objects, and how to tie it all together into a security policy to shape your network’s traffic. When you are finished with this course, you will have the skills and knowledge of a Network Security Engineer needed to administer Palo Alto’s Next Generation Firewall. [Read more…]

SANS SEC 506 Securing LinuxUnix

SANS SEC 506: Securing Linux/Unix
English | Size: 214.38 MB
Category: CBTS

SEC506: Securing Linux/Unix provides in-depth coverage of Linux and Unix security issues that includes specific configuration guidance and practical, real-world examples, tips, and tricks. We examine how to mitigate or eliminate general problems that apply to all Unix-like operating systems, including vulnerabilities in the password authentication system, file system, virtual memory system, and applications that commonly run on Linux and Unix. [Read more…]

Oreilly – Securing Microservices Protect Sensitive Data in Transit and at Rest

Oreilly – Securing Microservices Protect Sensitive Data in Transit and at Rest
English | Size: 0.99 GB
Category: CBTs

Microservice architectures offer a lot of advantages: making it easier to scale your application and team, use different technology, and ship features more quickly. However, they also create serious challenges, such as how to properly ensure that the systems you create are secure. If done well, microservice architectures can be significantly more secure than other types of software, but if approached in a naive fashion, you can end up with a less secure, more compromised system. This video provides the sophisticated knowledge you need to create secure architectures from the ground up. The course works best for participants who understand what microservices are and who have some experience working with distributed systems. [Read more…]

Skip to toolbar