Cloud Security
Showing 61–72 of 145 results
Implementing Microsoft Azure Privileged Identity Management
Azure Active Directory Privileged Identity Management simplifies monitoring, controlling, and management of users' access on different Azure resources. In this course, you will learn how to enforce security governance using PIM.
Implementing User Access and Authentication with Amazon Cognito
This course will teach you how to use Amazon Cognito to manage access to your applications and AWS services with easy integration to third-party identity providers and provide your users with cutting edge security which is all managed by AWS.
Infrastructure-as-Code Security: Why, What, and How
In this talk, you'll learn about common IaC risks and best practices for securing infrastructure at scale using policy-as-code in both in build-time and run-time.
Installing and Configuring HashiCorp Vault
HashiCorp Vault is a cloud-agnostic tool providing Secrets life-cycle management. This course will teach you the fundamentals of using HashiCorp Vault and how to install and configure a production instance.
Integrating HashiCorp Vault in DevOps Workflows
The more you make use of Vault, the more value you’ll generate from it. This course will teach you how to integrate Vault with a wealth of DevOps tools and workflows.
Introduction to the Certified Kubernetes Security Specialist (CKS) Exam
This course will introduce you to the Certified Kubernetes Security Specialist (CKS) Exam.
Introduction to the Microsoft Identity and Access Administrator (SC-300) Exam
This course will teach you the basic skills and details of the SC-300 exam.
Introduction to the SC-400: Microsoft Information Protection Administrator Exam
Organizations require information protection and governance solutions to protect their data against theft and accidental loss. This course serves as a learning path introduction to the SC-400: Microsoft Information Protection Administrator exam.
Introduction to the Splunk Enterprise Certified Admin Certification
Gain the necessary knowledge required to pass the Splunk Enterprise Certified Admin exam by learning the exam blueprint, topic areas, sample questions, and preparation-tips.
Kubernetes on Windows Vulnerability: What You Should Know
Q&A session discussing the Kubernetes on Windows Vulnerability, CVE-2023-3676.
Kubernetes Security: Cluster Hardening
This course will teach you how to secure your Kubernetes clusters for production workloads.
Kubernetes Security: Implementing Supply Chain Security
Kubernetes is an open-source system for automating deployment, scaling, and management of containerized applications. This course will teach you the concepts for securing the Kubernetes supply chain.