Cloud Security
Showing 73–84 of 85 results
Securing Cloud DevOps in PaaS, IaaS, and SaaS Settings
The usage of DevOps tools like Docker and Kubernetes has expanded. This course introduces you to securing cloud DevOps environments in PaaS, IaaS, and SaaS settings, DevOps practices, and activities across various types of cloud platforms.
Securing Docker Container Workloads
Docker containers are a mainstream mechanism for application delivery, and securing the container workload is vital. This course will give you the knowledge and techniques you need for securing containerized software applications.
Securing Microsoft 365 Messaging Environments
Microsoft 365 has implemented three products that include security, protection, and compliance websites. This course will introduce you to all three systems so that you'll be able to create a functional and secure messaging system.
Securing Microsoft Azure Data Access Endpoints
This course provides detail on the technologies and options available to secure the endpoints of data services that are available in Azure.
Security Best Practices in Google Cloud
This self-paced training course gives participants broad study of security controls and techniques on Google Cloud.
SharePoint 2016 Backup and Recovery
Backing up and restoring SharePoint farms or content is often a daily occurrence for you as the SharePoint administrator. In this course, you will learn how and why to backup and restore your SharePoint farm.
Splunk 9: Creating Workflow Actions
Have you been wanting to use your data better within Splunk? This course will give you the knowledge and tools to help you learn more about this SIEM, the workflow actions possible within it, and how to use them to add more context to your data.
The IT Ops Sessions: Should I Switch to PowerShell 7?
In this IT Ops session, you’ll develop a clear understanding of the similarities and differences between PowerShell 5.1 Desktop and PowerShell 7.x Core. You'll then be in an informed position to consider and plan your migration.
Trust and Security with Google Cloud
As organizations move their data and applications to the cloud, they must address new security challenges. The Trust and Security with Google Cloud course explores the basics of cloud security, the value of Google Cloud's multilayered approach to infrastructure security, and how Google earns and maintains customer trust in the cloud. Part of the Cloud Digital Leader learning path, this course aims to help individuals grow in their role and build the future of their business.
VMWare ESXi Vulnerability: What You Should Know
Q&A session discussing the VMWare ESXi Vulnerability, CVE-2021-21974
Windows Endpoint Administration: Manage Applications
This course will teach you how mobile device management in Microsoft Intune is great for deploying apps to Windows systems, and how mobile application management (MAM) lets us customize apps and secure data with configuration and protection policies.
Windows Endpoint Administration: Manage Identity and Compliance
Three big jobs for an endpoint administrator are setting up local and cloud identities for users and groups; managing authentication for those identities; and setting up compliance criteria to secure access to apps. This course explores all three.