Cybersecurity
Showing 205–216 of 1317 results
Conducting Network Vulnerability Analysis
This course will teach you how to find vulnerabilities in systems and software by teaching the process that a hacker uses when they target an organization.
Configure and Protect Devices with Microsoft Intune
Learn how and where to manage Windows, iOS, and Android device configurations, including certificate deployment, updates, and conditional access policies, in this course.
Configure NAT and VPNs Using Palo Alto Firewalls
A robust enterprise requires NAT and VPNs for their infrastructure to remain secure. This course will teach you how to understand and configure source and destination NAT solutions, as well as various site-to-site and remote access VPN solutions.
Configure Palo Alto Firewalls in a Home Lab
Without a way to practice what you are learning when watching a Pluralsight course, it is much harder to grasp the concepts. This course will teach you how to create a home networking lab to follow along with the Palo Alto Firewall Skillpath.
Configuring and Managing Microsoft 365 Workload Integrations
Microsoft 365 is the most popular productivity cloud solution in the world! In this course, you will learn how to manage multiple services such as Yammer, Stream, Delve, Power Apps, Power Automate, and more!
Configuring and Managing Microsoft Azure Key Vault
Azure Key Vault provides life-cycle management for keys, secrets, and certificates. In this course you will learn the basics of using and managing Key Vault, including creating and securing Key Vault, storing sensitive data, and auditing access.
Configuring and Managing SharePoint Online and OneDrive for Business
SharePoint Online and OneDrive for Business are the core of Microsoft’s 365 mission to empower everyone to achieve more. In this course, you will learn how to configure and manage both SharePoint and OneDrive in Microsoft 365.
Configuring and Troubleshooting FreeRADIUS
This course will teach you FreeRADIUS, an open-source carrier grade RADIUS server.
Configuring Azure Active Directory for Microsoft Azure Workloads
In this course, Configuring Azure AD for Microsoft Azure Workloads, you learn how to secure Azure Active Directory for use as an identity store for your Azure-based cloud applications. This course's audience is the Microsoft Azure security engineer.
Configuring CORS in ASP.NET 2 and ASP.NET Core 2
Learn how to configure CORS for your APIs to secure your web applications by making sure only authorized client applications can consume them, adding an extra layer of security.
Configuring Data Security Policies in Microsoft Azure
In this course, Cloud architects, dev-ops, developers, and their organizations will learn to comply with data security and privacy regulations by using Azure's data classification, retention, governance, and data sovereignty services.
Configuring Encryption for Data at Rest in Microsoft Azure
In this course, you will learn how to apply additional encryption protection for data at rest on Azure resources, including Azure storage, Azure Disk Encryption, Recovery Vaults, Transparent Data Encryption, and Always Encrypted databases.