Cloud Security
Showing 25–36 of 85 results
Exam Alert: Design Business Continuity in Microsoft Azure
Preparing for an exam can be scary and confusing. This course will teach you what to expect and how to maximize your learning and be successful.
Exam Alert: Design Identity and Security in Microsoft Azure
Preparing for an exam can be scary and confusing. This course will teach you what to expect and how to maximize your learning and be successful.
Google Workspace Security
Google Workspace Security is the third course in the Google Workspace Administration series.
Hack My Misconfigured Kubernetes
In this hands-on presentation, you’ll see a demonstration on some of the key security issues that affect your Kubernetes configuration. You'll hear what they actually mean, what an attacker can do to your cluster and howto fix them.
IBM’s Principles of Chaos Engineering
In this session, we will describe a little of the process of getting engineers from across to agree on these principles and present the principles and lessons which we agreed upon.
Identity and Access Management: The Big Picture
This course will teach you the foundational knowledge of Identity and Access Management (IAM) including the key terminologies, concepts, and examples of how these are implemented in the real world.
Implementing and Managing Microsoft Defender for Cloud Apps
This course will teach you how to successfully plan, deploy, and manage Microsoft Defender for Cloud Apps. You'll gain the knowledge to successfully protect your organization from threats across your cloud services.
Implementing and Managing Microsoft Defender for Endpoint
This course will teach you to successfully deploy Microsoft Defender for Endpoint, perform advanced configuration, and fully manage the solution.
Implementing and Managing Microsoft Defender for Identity
This course teaches you how to protect your identities by implementing and managing Defender for Identity. You'll gain the skills and knowledge needed to successfully plan, implement, and manage protections for your identities in Active Directory.
Implementing and Managing Microsoft Defender for O365
This course will teach you how to implement and manage Microsoft Defender for Office 365.
Implementing and Managing Microsoft Sentinel
This course will teach you how to successfully plan, implement, and manage Microsoft Sentinel.
Implementing Customer Managed Encryption Keys (CMEK) with Google Key Management Service
This course covers the creation and validation of secrets and keys and the use of the Google Key Management Service (KMS) to rotate keys, create hierarchies, and work with keys and secrets on the cloud.