Cybersecurity
Showing 517–528 of 1211 results
Implementing Customer Managed Encryption Keys (CMEK) with Google Key Management Service
This course covers the creation and validation of secrets and keys and the use of the Google Key Management Service (KMS) to rotate keys, create hierarchies, and work with keys and secrets on the cloud.
Implementing Docker Security
Docker Containers pose a new type of attack surface and security risk to organizations. This course will teach you how to implement Docker Security.
Implementing Managed Identities for Microsoft Azure Resources
A common challenge when building cloud applications is how to manage the credentials in your code for authenticating to cloud services. In this course, you will learn about managed identities for Azure resources that solve this problem for you.
Implementing Microsoft Azure Privileged Identity Management
Azure Active Directory Privileged Identity Management simplifies monitoring, controlling, and management of users' access on different Azure resources. In this course, you will learn how to enforce security governance using PIM.
Implementing Microsoft Windows Always On VPN
This course will teach you how to design, implement, and support a Microsoft Always On VPN secure remote access solution.
Implementing NIST’s Risk Management Framework (RMF)
Challenges in IT today include balancing security, functionality, risk, and compliance, all with limited resources. In this course, you'll learn how the NIST Risk Management Framework can help you do all of this by providing a formal process.
Implementing Physical Security
Pluralsight is not an official partner or accredited training center of EC-Council. In this course, you'll learn how to ensure the security and availability of IT systems. Software required: EXO5 and Windows Server 2016.
Implementing Privileged Access Workstations (PAWs) and User Rights Assignments in Windows Server 2019
This course will teach you how to implement Microsoft’s standards for security around Active Directory administration.
Implementing Service Provider Security and Application Control
When network engineers think of cyber security, they often think of firewalls, intrusion prevention systems, and host-based security systems. Alternatively, service provider security introduces an entirely new set of tools and operating processes.
Implementing Threat Detection Solutions in Windows Server 2016
This course is designed for seasoned Windows administrators who have a desire to learn about the threats facing Windows Administrator’s data and network.
Implementing User Access and Authentication with Amazon Cognito
This course will teach you how to use Amazon Cognito to manage access to your applications and AWS services with easy integration to third-party identity providers and provide your users with cutting edge security which is all managed by AWS.
Important DevSecOps Tools
Learn DevSecOps essentials: SAST and DAST tools like Bandit, Clean Code, LGTM, OWASP ZAP, and Nikto, plus dependency analysis and IaC security tools. Explore secrets and vulnerability management.