Showing 15565–15576 of 18767 results
Securing Azure Kubernetes Service (AKS) Clusters
This course will teach you to design, configure, and manage cluster security in Azure Kubernetes Service. Focusing on API server access, authentication, authorization, and network policies.
Securing Azure Workloads: Principles and Practices
This course explains how to secure Azure resources using various security features provided by Azure and Microsoft.
Securing Blazor Applications with Auth0
Understand how to secure Blazor applications using Auth0 for user authentication and access control, focusing on best practices for security.
Securing Blazor Applications with Auth0
Learn how to secure Blazor applications with Auth0, an identity management service that simplifies authentication and authorization.
Securing Blazor Client-side Applications
Explore how to secure your Blazor WebAssembly application using a variety of best practice techniques for authentication and authorization.
Securing Blazor Server-side Applications
Learn how to secure your Blazor Server application using a variety of best practice techniques for authentication and authorization.
Securing Cloud DevOps in PaaS, IaaS, and SaaS Settings
The usage of DevOps tools like Docker and Kubernetes has expanded. This course introduces you to securing cloud DevOps environments in PaaS, IaaS, and SaaS settings, DevOps practices, and activities across various types of cloud platforms.
Securing Connected Devices with AWS IoT Device Defender
As the number of AWS IoT devices in your environment grows, it is important to properly monitor and secure them. This course will introduce the AWS Device Defender tool to help you secure your IoT environment.
Securing Containers by Breaking in
This session explains and distinguishes the security concern of each layer in the container layers. We’ll look at OS dependencies in your images and your application dependencies.
Securing Data Analytics Pipelines on AWS
As you start preparing for your AWS certified Data Analytics Specialty exam, you need to pay close attention to the security aspect of this certification. This course will teach you how to set up access control and encryption to your data analytics pipelines.
Securing Data on AWS
This course will teach you how to encrypt your data at Amazon Web Services (AWS). Concepts include encryption and decryption, use of the Key Management Service (KMS), CloudHSM, and using Amazon Macie to manage and protect S3 storage.
Securing Data with Asymmetric Cryptography
Asymmetric cryptography is used in everything ranging from SSL and TLS certificates to credit card chips to digital document signatures. Security is more critical than ever and is one of the most important skills to have in the industry today.