Inhalt: If you're in charge of (or hoping to be in charge of) your organization's identity and access management systems, the Microsoft Identity and Access Administrator certification is one of the best ways to prove your skills and knowledge in designing, implementing, and managing an identity and access management solution with Azure Active Directory. While test prep for this exam can feel daunting, Microsoft MVP Pete Zerger is here to help you get ready for all four objective domains of the Microsoft SC-300 exam. Pete shares his knowledge and gives you his insights to help you secure a successful result. If you're ready to achieve your next cybersecurity career milestone, join Pete in this course. Umfang: 01:29:12
Inhalt: Azure Sentinel is a next-generation, cloud-native security event and information management (SEIM) system that provides real-time analysis of security alerts generated for your cloud and on-premises resources. By leveraging built-in machine learning from the security analytics experts at Microsoft, Sentinel effectively detects threats while automating threat response using orchestration and built-in or custom security playbooks. In this course, join Pete Zerger as he guides you through the implementation and configuration of Azure Sentinel. Discover how to connect key services and threat intelligence resources to Sentinel; investigate cases; create security playbooks to set automated threat responses to issues; and leverage search and query tools to hunt for threats. Umfang: 00:59:28.00
Inhalt: Is earning the Microsoft 365 Security Administrator Associate certification the next milestone in your cybersecurity career? If so, then this course can help you get there. Join Microsoft MVP Pete Zerger as he prepares you for the Microsoft 365 Security Administration exam (MS-500)-the required exam for the Security Administrator Associate certification. Pete dives into key topics such as how to install, configure, monitor, and manage Microsoft Defender for Identity; plan a Microsoft Defender for Endpoint deployment; plan for device and app protection with Microsoft Intune; use Azure Sentinel to monitor and respond to threats in Microsoft 365; and more. By the end of this course, you'll be ready to confidently tackle exam questions drawn from the second domain of the MS-500 exam: Implement and Manage Threat Protection. Umfang: 01:21:02
Inhalt: Cybersecurity skills are in high demand, and the Microsoft 365 Security Administration exam (MS-500) is the perfect opportunity for IT professionals to demonstrate their skills to current and future employers. This course, the third in a series that maps to the Microsoft 365 Security Administration exam, prepares students to excel in the Implement and Manage Information Protection domain on the MS-500 exam. Instructor Pete Zerger shows you how to implement and manage the Office 365 Customer Lockbox, configure data protection in Office 365 collaboration scenarios, and configure secure sharing with users outside of your organization. Pete explains how to plan, configure, and use sensitivity labels, including Azure Information Protection (AIP) deployment. He discusses how to plan a data loss prevention solution and manage DLP policies, sensitive information types, and DLP reports and notifications. Pete also steps through how to implement and manage Microsoft Cloud App Security (MCAS). Umfang: 01:34:29
Inhalt: Cybersecurity skills are in high demand, and the Microsoft 365 Security Administration (MS-500) exam is the perfect opportunity for IT professionals to demonstrate their skills to current and future employers. In this course, instructor and Microsoft MVP Pete Zerger gives you the tools to prep for the Manage Governance and Compliance Features in Microsoft 365 domain of the MS-500 exam. Pete covers important topics like configuring and analyzing security reporting, managing audit logs and reports, and data privacy and regulation compliance. By the end of the course, you will be better positioned on the path to earning your Microsoft 365 Security Administrator Associate certification. Umfang: 02:00:45
Inhalt: Cybersecurity skills are in high demand, and the AZ-500 Microsoft Azure Security Technologies exam is the perfect opportunity for IT professionals to demonstrate their skills to current and future employers. This course prepares certification candidates to excel in the Manage Identity and Access domain of the AZ-500 exam. Microsoft MVP Pete Zerger has designed lectures and hands-on demos to teach the key skills, including configuring and managing app registrations, enabling multi-factor authentication, configuring conditional and advanced auth controls, and implementing Privileged Identity Management for just-in-time access. Plus, learn how to manage API and subscription-level access, balancing programmatic access and automation with security. Umfang: 01:03:39.00
Inhalt: Cybersecurity skills are in high demand, and the Microsoft Azure Security Technologies (AZ-500) exam is the perfect opportunity for IT professionals to demonstrate their skills to current and future employers. This course prepares certification candidates to excel in the Manage Identity and Access domain of the AZ-500 exam. Microsoft MVP Pete Zerger has designed lectures and hands-on demos to teach the key skills, including configuring and managing app registrations, enabling multi-factor authentication, configuring conditional auth controls, and implementing Privileged Identity Management (PIM) for just-in-time access. Plus, learn how to manage API and subscription-level access, balancing programmatic access and automation with security. Umfang: 01:22:57
Inhalt: With cyberattacks on the rise, professionals who can keep an organization's networks, applications, and data safe are in high demand. The Microsoft Azure Security Technologies (AZ-500) exam is the perfect opportunity for IT professionals to demonstrate their cybersecurity skills to current and future employers. In this course, Pete Zerger helps you deepen your knowledge of Azure security as you study for the Implement Platform Protection domain of the AZ-500 exam. Pete demonstrates how to configure network, host, and container security. Plus, he covers how to implement Azure Resource Manager security, including how to configure security permissions in Azure. Along the way, he provides hands-on demonstrations that show how to apply these concepts in the real world. Umfang: 01:37:43.00
Inhalt: With cyberattacks on the rise, professionals who can keep an organization''s networks, applications, and data safe are in high demand. The Microsoft Azure Security Technologies (AZ-500) exam is the perfect opportunity for IT professionals to demonstrate their cybersecurity skills to current and future employers. In this course, Pete Zerger helps you deepen your knowledge of Azure security as you study for the Implement Platform Protection domain of the AZ-500 exam. Pete demonstrates how to implement advanced network security, including how to create and configure Microsoft Azure Firewall and implement service endpoints. Plus, he covers how to configure container security, explaining how to configure security for different types of containers, implement Azure Disk Encryption, and more. Along the way, he provides hands-on demonstrations that show how to apply these concepts in the real world. Umfang: 01:26:40
Inhalt: Cybersecurity skills are in high demand, and the Microsoft Azure Security Technologies (AZ-500) exam is a great opportunity for IT professionals to showcase their skills to current and future employers. In this course, Pete Zerger helps prepare test takers to excel in the Managing Security Operations domain of the AZ-500 exam. Pete provides end-to-end coverage of each of the exam objectives for this domain, providing hands-on demonstrations along the way. Learn how to configure diagnostic logging and log retention, configure centralized policy management using Azure Security Center, configure a playbook for a security event using Azure Security Center, create and customize alerts to deliver timely notification of important changes and events in your Azure subscription, and more. Umfang: 00:44:44.00
Inhalt: Cybersecurity skills are in high demand, and the Microsoft Azure Security Technologies (AZ-500) exam is a great opportunity for IT professionals to showcase their skills to current and future employers. In this course, Pete Zerger helps prepare test takers to excel in the Managing Security Operations domain of the AZ-500 exam. Pete provides end-to-end coverage of each of the exam objectives for this domain, providing hands-on demonstrations along the way. Learn how to configure diagnostic logging and log retention, configure centralized policy management using Azure Security Center, configure a playbook for a security event using Azure Sentinel, create and customize alerts to deliver timely notification of important changes and events in your Azure subscription, and more. Umfang: 01:02:40
Inhalt: Cybersecurity skills are in high demand, and the Microsoft Azure Security Technologies (AZ-500) exam is the perfect opportunity for IT professionals to demonstrate their skills to current and future employers. This course is the first of a two-part series that prepares candidates to excel in the Secure Data and Applications domain of the exam. Instructor Pete Zerger explains how to configure critical security policies for data classification, retention, and sovereignty, and enable security features for your Azure data infrastructure, including database authentication, access control, Azure AD authentication, and shared access signatures for Azure Storage. Plus, learn how to secure big data solutions such as Cosmos DB and Azure Data Lake. Umfang: 00:57:24.00
Inhalt: Confident in your understanding of the Microsoft cybersecurity stack? Taking and passing the Microsoft Azure Security Technologies (AZ-500) exam can help you validate your skills-and, in turn, give your IT career a boost. In this course, instructor Pete Zerger lays out what you need to know to tackle the fourth domain of the AZ-500 exam: Securing Data and Applications. Pete takes a deep dive into the concepts covered in the second half of domain four, including how to configure encryption for data at rest, configure security features to protect web apps, and manage access to Key Vault. When coupled with Azure Security Technologies: Policy and Data Infrastructure-which covers the first half of the Securing Data and Applications domain-this course can help ensure that you walk into the test center feeling prepared to tackle this key portion of the exam. Umfang: 00:49:52.00
Inhalt: The rise of the hybrid cloud has rendered traditional data center infrastructure security approaches insufficient. The modern IT professional must be equipped with the knowledge and skills to defend against an array of threats, such as threat actors trying to penetrate IaaS and PaaS resources hosted in public clouds. In this installment of the Microsoft Cybersecurity Stack series, instructor Pete Zerger demonstrates how to design and implement an approach to securing your data center and cloud infrastructure from a variety of internal and external threats. Pete goes over the features and benefits of Hyper-V guarded fabric, explores shielding data in VMs on guarded fabric, explains how to manage and respond to security threats, and discusses encrypting data in Azure virtual machines. Umfang: 01:30:25.00
Inhalt: With the rise of the cloud, the traditional model of the network perimeter is dead-identity is the new control plane. This course offers advanced techniques for identity and endpoint security with the Microsoft cybersecurity stack: Enterprise Mobility + Security (EMS) and Azure Active Directory Premium. Instructor Peter Zerger shows how to set up secure access to resources in any app, on any cloud, and from any device. Learn how to configure virtual-based security with Windows Defender Device Guard and Credential Guard, secure email with Exchange Online ATP, control what happens after a breach with Advanced Threat Analytics, and protect the cloud with Azure Active Directory. Plus, find out how to use Windows Defender ATP and manage access to secure Azure resources using privileged access. Umfang: 02:31:36.00
Inhalt: The traditional model of the network perimeter is dead. The perimeter-where access and authorization are enforced-can be anywhere, on any device. With the evolution of Microsoft Enterprise Mobility + Security (EMS) and Azure, the Microsoft enterprise cybersecurity story is growing increasingly more exciting. The Microsoft Cybersecurity Stack series of courses provides IT pros with a holistic view of the Microsoft cybersecurity stack, and how to configure those components to strengthen an organization's security posture. These hands-on courses demonstrate how to configure EMS and Azure features, and how to combine them for greatest effect. In this course-the first in the series-Microsoft MVP Pete Zerger takes you through the basics of setting up endpoint protection. He begins by explaining how to set up Azure Active Directory Premium. Next, he goes into enabling multi-factor authentication, followed by setting conditions for secure access. To wrap up, Pete covers managing mobile devices with Intune, and publishing applications with Azure AD App Proxy. Umfang: 02:04:49.00
Inhalt: Today's users expect to be productive wherever they are. IT pros must look beyond the traditional network perimeter model, and discover how to design and implement a comprehensive strategy for protecting corporate information. The Microsoft Cybersecurity Stack series shows how to use the Microsoft cybersecurity stack to strengthen your organization's security posture. In this course, Microsoft MVP Pete Zerger demonstrates how to leverage the Microsoft cybersecurity stack to more effectively protect corporate information-on any device and in any cloud. Pete explains how to use Azure Information Protection (AIP) and secure data on mobile devices. He also covers identifying and controlling shadow IT and securing structured data in Azure. Umfang: 02:06:03.00
Inhalt: Windows 10 brings an array of security features and services to the table. In this course, instructor Pete Zerger discusses how to leverage these features as part of a layered defense, sharing what you need to know to design and implement a strategy for securing Windows 10 systems in corporate environments. Pete explores proactive measures like securing privileged credentials, thwarting phishing attacks, and detecting zero-day threats. He also covers the integration between Windows 10 and the advanced security features in the Microsoft cloud, such as cloud protection in Windows Defender. Plus, learn security strategies for working from home and public spaces, including how to approach common corporate remote access scenarios. Umfang: 01:48:21.00
Inhalt: Shadow IT is the use of systems and services-such as Dropbox and AWS-that are managed without the knowledge of a company's IT department. As a majority of modern enterprises grapple with the risks posed by shadow IT, IT pros need to grasp how to mitigate these threats. In this installment of the Microsoft Cybersecurity Stack series, Pete Zerger provides end-to-end coverage of shadow IT, from the risks it poses to how to identify and eliminate threats with tools in the Microsoft cybersecurity stack. Discover how to leverage Cloud App Security (CAS), as well as how to anonymize user identity information. Plus, learn how to leverage the Microsoft Data Classification Service and CAS file policies to protect confidential information, how to control access to unmanaged devices, and more. Umfang: 01:01:46.00
Programm Findus Internet-OPAC findus.pl V20.235/8 auf Server windhund2.findus-internet-opac.de,
letztes Datenbankupdate: 09.05.2024, 13:27 Uhr. 964 Zugriffe im Mai 2024. Insgesamt 511.194 Zugriffe seit Januar 2009
Mobil - Impressum - Datenschutz - CO2-Neutral