Showing 14605–14616 of 18767 results
Protect Your Stock Positions Made Easy
Learn an Easy Option Strategy to Hedge Your risk
Protect your virtual machine settings with Azure Automation State Configuration
Create a desired state configuration script that checks that IIS is installed. Onboard virtual machines (VMs) for management by Azure Automation. Automatically install IIS on the VMs where that feature is missing.
Protect, monitor, and tune a migrated database
In this module, you'll learn how to use the Azure features available for protect, monitor, and tune a database.
Protecting Against XML External Entity and Deserialization Attacks in ASP.NET and ASP.NET Core
We think of XML, JSON and binary serialized data as a way to exchange data between applications, but these data formats can also be used by hackers to attack your applications. This course will teach you how you can prevent them.
Protecting and Monitoring Azure Media Services
This course will help you to learn about how you can protect and monitor video content/assets using the content protection DRM features available in Azure Media Services.
Protecting Sensitive Data From Exposure in ASP.NET 3 and ASP.NET Core 3 Applications
Keeping personal, financial, or other sensitive data secure from theft or exposure takes active management. This course will teach you how to identify sensitive data in your applications and the protection measures that can be used to keep it secure.
Protecting Yourself from Distractions
This course will teach you the best-of-breed approaches to dealing with distractions in the workplace and protecting your productivity.
Protective Technology with Apache Kafka
Apache Kafka is one of the most popular streaming platforms nowadays. In this course, you will learn the setup, configuration, and validation of Apache Kafka in an enterprise environment.
Protective Technology with Dockle
Learn all about configuring and validating hardened best-practice docker images. In this course, you will learn the setup, configuration, and validation of Dockle in an enterprise environment.
Protective Technology with Pi-hole
In this course, we will cover how to set up a Pi-Hole in your home or small business and block unwanted advertisements and tracking data about your internet-connected devices.
Protocol Deep Dive: Address Resolution Protocol (ARP)
Address Resolution Protocol (ARP) is essential for computer communication across the network. This course provides the in-depth knowledge needed to understand, improve, troubleshoot, and secure ARP-related communications in your network.
Protocol Deep Dive: DHCP
DHCP is one of the core protocols that makes the network "just work". This course will delve into the specifics of the protocol including configuration, vendor-specific options and extensions, and troubleshooting the network when things go wrong.