Cloud Security
Showing 133–144 of 145 results
Securing the Application Lifecycle in Microsoft Azure
Do you manually maintain your Azure resources' security health? Has your team accidentally checked in sensitive credentials into the source control? Need cloud tests for your app service? If the answer is yes, this course can greatly help you.
Security Best Practices in Google Cloud
This self-paced training course gives participants broad study of security controls and techniques on Google Cloud.
Serverless Authentication and Authorization with Amazon Cognito
This course will teach you to leverage Amazon Cognito to configure both of these for a serverless application on AWS.
SharePoint 2016 Backup and Recovery
Backing up and restoring SharePoint farms or content is often a daily occurrence for you as the SharePoint administrator. In this course, you will learn how and why to backup and restore your SharePoint farm.
Splunk 9: Creating Workflow Actions
Have you been wanting to use your data better within Splunk? This course will give you the knowledge and tools to help you learn more about this SIEM, the workflow actions possible within it, and how to use them to add more context to your data.
Stuffing Your Cloud into Your SOCs
In this 5-minute session, Brendan O'Connor will talk about stuffing your cloud into SOCs.
The IT Ops Sessions: Should I Switch to PowerShell 7?
In this IT Ops session, you’ll develop a clear understanding of the similarities and differences between PowerShell 5.1 Desktop and PowerShell 7.x Core. You'll then be in an informed position to consider and plan your migration.
Trust and Security with Google Cloud
As organizations move their data and applications to the cloud, they must address new security challenges. The Trust and Security with Google Cloud course explores the basics of cloud security, the value of Google Cloud's multilayered approach to infrastructure security, and how Google earns and maintains customer trust in the cloud. Part of the Cloud Digital Leader learning path, this course aims to help individuals grow in their role and build the future of their business.
VMWare ESXi Vulnerability: What You Should Know
Q&A session discussing the VMWare ESXi Vulnerability, CVE-2021-21974
VMware NSX-T Data Center: Installation and Configuration
This course will teach you how to plan and deploy NSX-T Data Center network virtualization and security features.
Windows Endpoint Administration: Manage Applications
This course will teach you how mobile device management in Microsoft Intune is great for deploying apps to Windows systems, and how mobile application management (MAM) lets us customize apps and secure data with configuration and protection policies.
Windows Endpoint Administration: Manage Identity and Compliance
Three big jobs for an endpoint administrator are setting up local and cloud identities for users and groups; managing authentication for those identities; and setting up compliance criteria to secure access to apps. This course explores all three.