Cybersecurity
Showing 289–300 of 1211 results
Design a Data Protection Strategy with Microsoft Azure
This course explores the key aspects and solutions related to designing a data protection strategy for your organization using Azure services.
Design a Monitoring Strategy for Identity and Security in Microsoft Azure
The monitoring of an identity solution is critical to every environment. This course covers how to monitor AD, Azure AD, and other components used in a hybrid identity solution.
Design Auditing for Microsoft Azure
Understanding how to audit can be challenging when leveraging cloud services. This course provides the knowledge necessary to audit using Azure services.
Design for Risk Prevention in Microsoft Azure
Every organization has varying levels of risk, and as the cloud becomes more popular there are new risks but also new opportunities to mitigate both new and old risks. This course explores ways to think about risk with Azure and how to manage them.
Designing and Creating Add-ons for Splunk Enterprise Security
Splunk Enterprise Security is a premium application used within the Splunk deployment to help with SOC operations. This course will teach you how to design and create add-ons to enable customization of the application and its uses.
Designing and Implementing Active Directory and Entra ID
Active Directory and Entra ID work together to provide identity services to your corporate and external users. This course teaches you Active Directory concepts and how to configure the environments to work together.
Designing and Implementing Security Policies
Pluralsight is not an official partner or accredited training center of EC-Council. In this course you'll develop an understanding of proper functions and how to design your own security policies within business and regulatory requirements.
Designing/Deploying Exchange 2016: Compliance & Archiving
This course will teach you about Exchange 2016 compliance and archiving. Along with other courses in the series, this course will help to prepare you for the Microsoft 70-345 exam.
Designing/Deploying Exchange 2016: Recipients & Security
This course will teach you about managing Exchange 2016 Active Directory, recipients, and security. Along with other courses in the series, this course will help to prepare you for the Microsoft 70-345 exam.
Detecting Anomalies and Events with Packetbeat
In this course, you will learn the setup, configuration, and validation of Packetbeats in an enterprise environment. We will also cover some practical network and security use cases, as well as create custom alerts.
Detecting Anomalies and Events with Winlogbeat
Winlogbeat is an open-source log collector that ships Windows Event Logs to Elasticsearch or Logstash. In this course, you will learn the setup, configuration, and validation of Winlogbeat in an enterprise environment.
Dev-first Security: Learning from the Pioneers
This talk shares practices and learnings from companies with forward thinking security teams. You'll also hear practical tips and tricks from these leaders and a broader view on dev-first security.