Cybersecurity
Showing 553–564 of 1314 results
Implementing and Managing OWASP ZAP for DevSecOps
This course will teach you how to incorporate OWASP ZAP into a DevSecOps pipeline, while walking through the advantages of this automated setup and how to get results out in a productive way to take action on.
Implementing Customer Managed Encryption Keys (CMEK) with Google Key Management Service
This course covers the creation and validation of secrets and keys and the use of the Google Key Management Service (KMS) to rotate keys, create hierarchies, and work with keys and secrets on the cloud.
Implementing Docker Security
Docker Containers pose a new type of attack surface and security risk to organizations. This course will teach you how to implement Docker Security.
Implementing Host Security in Microsoft Azure
This course identifies the resources, tools, and methods needed to secure hosts in Azure as well as hosts connecting to Azure.
Implementing Managed Identities for Microsoft Azure Resources
A common challenge when building cloud applications is how to manage the credentials in your code for authenticating to cloud services. In this course, you will learn about managed identities for Azure resources that solve this problem for you.
Implementing Microsoft Azure Privileged Identity Management
Azure Active Directory Privileged Identity Management simplifies monitoring, controlling, and management of users' access on different Azure resources. In this course, you will learn how to enforce security governance using PIM.
Implementing Microsoft Windows Always On VPN
This course will teach you how to design, implement, and support a Microsoft Always On VPN secure remote access solution.
Implementing NIST’s Risk Management Framework (RMF)
Challenges in IT today include balancing security, functionality, risk, and compliance, all with limited resources. In this course, you'll learn how the NIST Risk Management Framework can help you do all of this by providing a formal process.
Implementing Physical Security
Pluralsight is not an official partner or accredited training center of EC-Council. In this course, you'll learn how to ensure the security and availability of IT systems. Software required: EXO5 and Windows Server 2016.
Implementing Privileged Access Workstations (PAWs) and User Rights Assignments in Windows Server 2019
This course will teach you how to implement Microsoft’s standards for security around Active Directory administration.
Implementing Service Provider Security and Application Control
When network engineers think of cyber security, they often think of firewalls, intrusion prevention systems, and host-based security systems. Alternatively, service provider security introduces an entirely new set of tools and operating processes.
Implementing Threat Detection Solutions in Windows Server 2016
This course is designed for seasoned Windows administrators who have a desire to learn about the threats facing Windows Administrator’s data and network.