BOOKS - Microsoft Azure Security Technologies (AZ-500) - A Certification Guide Get qu...
Microsoft Azure Security Technologies (AZ-500) - A Certification Guide Get qualified to secure Azure AD, Network, Compute, Storage and Data services through Security Center, Sentinel and other Azure s - Jayant Sharma 2022 PDF | EPUB BPB Publications BOOKS
ECO~23 kg CO²

2 TON

Views
11550

Telegram
 
Microsoft Azure Security Technologies (AZ-500) - A Certification Guide Get qualified to secure Azure AD, Network, Compute, Storage and Data services through Security Center, Sentinel and other Azure s
Author: Jayant Sharma
Year: 2022
Pages: 711
Format: PDF | EPUB
File size: 71.5 MB, 16.5 MB
Language: ENG



Pay with Telegram STARS
The book "Microsoft Azure Security Technologies AZ500 A Certification Guide" provides a comprehensive overview of the security features and tools offered by Microsoft Azure, one of the leading cloud computing platforms today. The guide covers various aspects of Azure security, including network security, compute security, storage security, and data security, providing readers with the knowledge and skills necessary to secure their Azure environments. The book begins by discussing the importance of security in cloud computing and the role that Azure plays in protecting sensitive data and applications. It then delves into the different types of threats that organizations face in the cloud, such as malware, phishing, and denial-of-service attacks, and how to mitigate them using Azure's security features. One of the key topics covered in the book is Azure Active Directory (AAD), which is the foundation of Azure security. Readers will learn how to configure and manage AAD, including creating and managing users, groups, and roles, as well as implementing multi-factor authentication and conditional access policies. The book also explores Azure Security Center, which provides centralized management of security alerts and threat protection for all Azure subscriptions. The guide also covers network security, including configuring and monitoring network traffic, implementing network security groups, and using Azure Firewall to protect against unauthorized access. Additionally, it discusses compute security, such as securing virtual machines and containers, and data security, including encryption and access controls. The book concludes with a discussion on the future of Azure security and the importance of staying up-to-date with the latest developments in the field.
''

You may also be interested in:

Global Audit Leadership: A Practical Approach to Leading a Global Internal Audit (GIA) Function in a Constantly Changing Internal and External Landscape (Security, Audit and Leadership Series)
Data Analysis In Microsoft Excel: Guided Project - Healthcare: Master Skills in Data Analysis and Excel: A Healthcare Data Guided Project
Data Analysis In Microsoft Excel Guided Project - Healthcare Master Skills in Data Analysis and Excel A Healthcare Data Guided Project
Data Analysis In Microsoft Excel Guided Project - Healthcare Master Skills in Data Analysis and Excel A Healthcare Data Guided Project
Hacking With Kali Linux Step-by-step beginner’s guide to learn Hacking with Kali Linux and the basics of Cyber Security with Penetration Testing & Wireless Hacking
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide: Become an expert and get Google Cloud certified with this practitioner|s guide
Hacking with Kali Linux Step by Step Guide To Learn Kali Linux for Hackers, Cybersecurity, Wireless Network Security and Penetration Testing. Your First Hack and Computer Hacking Beginners Guide
Citizenship in Cold War America: The National Security State and the Possibilities of Dissent (Culture, Politics, and the Cold War) (Culture, Politics and the Cold War) by Andrea Friedman (31-Aug-2014
Certified Cloud Security Professional CCSP Exam Realistic Mock Tests: 6 Realistic Mock Tests with 280+ Questions and detailed explanations to get you CCSP certified
Software Supply Chain Security Securing the End-to-end Supply Chain for Software, Firmware, and Hardware
Social Security in Religious Networks: Anthropological Perspectives on New Risks and Ambivalences: Anthropological Perspectives on New Risks and Ambivalences
Software Supply Chain Security Securing the End-to-end Supply Chain for Software, Firmware, and Hardware