Showing 11485–11496 of 14641 results
Protect data in-transit and at rest
Explore encryption options available within Azure SQL, including firewall rules, Always Encrypted, and Transport Layer Security. Understand how SQL Injection works.
Protect data with Zero Trust
Zero Trust isn't a tool or product, it's an essential security strategy, with data at its core. Here, you'll learn how to identify and protect your data using a Zero Trust approach.
Protect identities in Microsoft Entra ID
This module introduces students to the various authentication methods used to protect identities.
Protect identities in Microsoft Entra ID
This module introduces students to the various authentication methods used to protect identities.
Protect infrastructure with Zero Trust
Infrastructure is a broad term that covers all hardware, software, servers, networks, facilities, and much more. Utilizing Zero Trust principles can help to reduce your infrastructure's exposure to cyberattacks through improved monitoring, configuration management, and keeping software up-to-date.
Protect Windows Devices with Microsoft Intune
Endpoint devices are a primary attack surface for cyberthreats. This course will teach you how to protect Windows devices with Microsoft Intune using capabilities available right out of the box.
Protect your APIs on Azure API Management
Protect your backend APIs from information exposure and implement throttling (rate limiting) to prevent resource exhaustion with policies in Azure API Management.
Protect your Azure Virtual Desktop deployment by using Azure Firewall
In this module, you'll learn to deploy Azure Firewall, route all network traffic through Azure Firewall, and configure rules. You'll also route the outbound network traffic from the Azure Virtual Desktop host pool to the service through Azure Firewall.
Protect your endpoint environment with Microsoft Intune
In this module, you'll learn about protecting devices, apps, and data. Additionally, you'll understand the endpoint environment and the supported platforms available with Microsoft Intune.
Protect Your Stock Positions Made Easy
Learn an Easy Option Strategy to Hedge Your risk
Protect your virtual machine settings with Azure Automation State Configuration
Create a desired state configuration script that checks that IIS is installed. Onboard virtual machines (VMs) for management by Azure Automation. Automatically install IIS on the VMs where that feature is missing.
Protect, monitor, and tune a migrated database
In this module, you'll learn how to use the Azure features available for protect, monitor, and tune a database.