AZ-500: Microsoft Azure Security Technologies
Dive deep into the intricacies of Azure security with this expertly designed course that guides you through managing identity and access, securing networking, and safeguarding compute, storage, and databases. From setting up Azure Active Directory and implementing multifactor authentication to confi...
Gespeichert in:
Körperschaft: | |
---|---|
Weitere beteiligte Personen: | , |
Format: | Elektronisch Video |
Sprache: | Englisch |
Veröffentlicht: |
[Birmingham, United Kingdom]
Packt Publishing Ltd.
[2024]
|
Ausgabe: | [First edition]. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781836207214/?ar |
Zusammenfassung: | Dive deep into the intricacies of Azure security with this expertly designed course that guides you through managing identity and access, securing networking, and safeguarding compute, storage, and databases. From setting up Azure Active Directory and implementing multifactor authentication to configuring secure networks and private connections, this course offers a structured approach to strengthen your security posture in the cloud. Experience hands-on learning with video tutorials that detail the implementation of security best practices, use of Azure's security tools, and management of security operations. Whether it's securing Azure Kubernetes Services or managing security for containerized applications, you'll gain valuable insights into protecting cloud infrastructure and services effectively. The course culminates with an in-depth look at configuring and managing security operations. Learn to create and manage security policies, use Azure Defender for cloud-based threat mitigation, and leverage Microsoft Sentinel for security information and event management. This comprehensive overview prepares you to handle real-world security challenges and ensures a safer cloud environment for your organization. |
Beschreibung: | Online resource; title from title details screen (O'Reilly, viewed June 3, 2024) |
Umfang: | 1 Online-Ressource (1 video file (15 hr., 8 min.)) sound, color. |
ISBN: | 9781836207214 1836207212 |
Internformat
MARC
LEADER | 00000ngm a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-104370890 | ||
003 | DE-627-1 | ||
005 | 20240701091202.0 | ||
006 | m o | | | ||
007 | cr uuu---uuuuu | ||
008 | 240701s2024 xx ||| |o o ||eng c | ||
020 | |a 9781836207214 |c electronic video |9 978-1-83620-721-4 | ||
020 | |a 1836207212 |c electronic video |9 1-83620-721-2 | ||
035 | |a (DE-627-1)104370890 | ||
035 | |a (DE-599)KEP104370890 | ||
035 | |a (ORHE)9781836207214 | ||
035 | |a (DE-627-1)104370890 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 004.67/82 |2 23/eng/20240603 | |
245 | 0 | 0 | |a AZ-500 |b Microsoft Azure Security Technologies |
250 | |a [First edition]. | ||
264 | 1 | |a [Birmingham, United Kingdom] |b Packt Publishing Ltd. |c [2024] | |
300 | |a 1 Online-Ressource (1 video file (15 hr., 8 min.)) |b sound, color. | ||
336 | |a zweidimensionales bewegtes Bild |b tdi |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Online resource; title from title details screen (O'Reilly, viewed June 3, 2024) | ||
520 | |a Dive deep into the intricacies of Azure security with this expertly designed course that guides you through managing identity and access, securing networking, and safeguarding compute, storage, and databases. From setting up Azure Active Directory and implementing multifactor authentication to configuring secure networks and private connections, this course offers a structured approach to strengthen your security posture in the cloud. Experience hands-on learning with video tutorials that detail the implementation of security best practices, use of Azure's security tools, and management of security operations. Whether it's securing Azure Kubernetes Services or managing security for containerized applications, you'll gain valuable insights into protecting cloud infrastructure and services effectively. The course culminates with an in-depth look at configuring and managing security operations. Learn to create and manage security policies, use Azure Defender for cloud-based threat mitigation, and leverage Microsoft Sentinel for security information and event management. This comprehensive overview prepares you to handle real-world security challenges and ensures a safer cloud environment for your organization. | ||
630 | 2 | 0 | |a Windows Azure |
650 | 0 | |a Cloud computing |v Study guides |x Security measures |x Examinations | |
650 | 0 | |a Computer networks |v Study guides |x Security measures |x Examinations | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant | |
650 | 4 | |a Instructional films | |
650 | 4 | |a Nonfiction films | |
650 | 4 | |a Internet videos | |
650 | 4 | |a Films de formation | |
650 | 4 | |a Films autres que de fiction | |
650 | 4 | |a Vidéos sur Internet | |
700 | 1 | |a Svidergol, Brian |e MitwirkendeR |4 ctb | |
700 | 1 | |a Bryan, Wes |e MitwirkendeR |4 ctb | |
710 | 2 | |a ACI Learning (Firm), |e MitwirkendeR |4 ctb | |
710 | 2 | |a Packt Publishing, |e Verlag |4 pbl | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781836207214/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
935 | |c vide | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-104370890 |
---|---|
_version_ | 1831287144886304768 |
adam_text | |
any_adam_object | |
author2 | Svidergol, Brian Bryan, Wes |
author2_role | ctb ctb |
author2_variant | b s bs w b wb |
author_corporate | ACI Learning (Firm) |
author_corporate_role | ctb |
author_facet | Svidergol, Brian Bryan, Wes ACI Learning (Firm) |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)104370890 (DE-599)KEP104370890 (ORHE)9781836207214 |
dewey-full | 004.67/82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.67/82 |
dewey-search | 004.67/82 |
dewey-sort | 14.67 282 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | [First edition]. |
format | Electronic Video |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03227ngm a22005292c 4500</leader><controlfield tag="001">ZDB-30-ORH-104370890</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240701091202.0</controlfield><controlfield tag="006">m o | | </controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240701s2024 xx ||| |o o ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781836207214</subfield><subfield code="c">electronic video</subfield><subfield code="9">978-1-83620-721-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1836207212</subfield><subfield code="c">electronic video</subfield><subfield code="9">1-83620-721-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)104370890</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP104370890</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781836207214</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)104370890</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.67/82</subfield><subfield code="2">23/eng/20240603</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">AZ-500</subfield><subfield code="b">Microsoft Azure Security Technologies</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">[First edition].</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Birmingham, United Kingdom]</subfield><subfield code="b">Packt Publishing Ltd.</subfield><subfield code="c">[2024]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 video file (15 hr., 8 min.))</subfield><subfield code="b">sound, color.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">zweidimensionales bewegtes Bild</subfield><subfield code="b">tdi</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from title details screen (O'Reilly, viewed June 3, 2024)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Dive deep into the intricacies of Azure security with this expertly designed course that guides you through managing identity and access, securing networking, and safeguarding compute, storage, and databases. From setting up Azure Active Directory and implementing multifactor authentication to configuring secure networks and private connections, this course offers a structured approach to strengthen your security posture in the cloud. Experience hands-on learning with video tutorials that detail the implementation of security best practices, use of Azure's security tools, and management of security operations. Whether it's securing Azure Kubernetes Services or managing security for containerized applications, you'll gain valuable insights into protecting cloud infrastructure and services effectively. The course culminates with an in-depth look at configuring and managing security operations. Learn to create and manage security policies, use Azure Defender for cloud-based threat mitigation, and leverage Microsoft Sentinel for security information and event management. This comprehensive overview prepares you to handle real-world security challenges and ensures a safer cloud environment for your organization.</subfield></datafield><datafield tag="630" ind1="2" ind2="0"><subfield code="a">Windows Azure</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cloud computing</subfield><subfield code="v">Study guides</subfield><subfield code="x">Security measures</subfield><subfield code="x">Examinations</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="v">Study guides</subfield><subfield code="x">Security measures</subfield><subfield code="x">Examinations</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Instructional films</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Nonfiction films</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet videos</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Films de formation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Films autres que de fiction</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Vidéos sur Internet</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Svidergol, Brian</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bryan, Wes</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">ACI Learning (Firm),</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Packt Publishing,</subfield><subfield code="e">Verlag</subfield><subfield code="4">pbl</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781836207214/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="935" ind1=" " ind2=" "><subfield code="c">vide</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-104370890 |
illustrated | Not Illustrated |
indexdate | 2025-05-05T13:25:16Z |
institution | BVB |
isbn | 9781836207214 1836207212 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 video file (15 hr., 8 min.)) sound, color. |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | Packt Publishing Ltd. |
record_format | marc |
spelling | AZ-500 Microsoft Azure Security Technologies [First edition]. [Birmingham, United Kingdom] Packt Publishing Ltd. [2024] 1 Online-Ressource (1 video file (15 hr., 8 min.)) sound, color. zweidimensionales bewegtes Bild tdi rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Online resource; title from title details screen (O'Reilly, viewed June 3, 2024) Dive deep into the intricacies of Azure security with this expertly designed course that guides you through managing identity and access, securing networking, and safeguarding compute, storage, and databases. From setting up Azure Active Directory and implementing multifactor authentication to configuring secure networks and private connections, this course offers a structured approach to strengthen your security posture in the cloud. Experience hands-on learning with video tutorials that detail the implementation of security best practices, use of Azure's security tools, and management of security operations. Whether it's securing Azure Kubernetes Services or managing security for containerized applications, you'll gain valuable insights into protecting cloud infrastructure and services effectively. The course culminates with an in-depth look at configuring and managing security operations. Learn to create and manage security policies, use Azure Defender for cloud-based threat mitigation, and leverage Microsoft Sentinel for security information and event management. This comprehensive overview prepares you to handle real-world security challenges and ensures a safer cloud environment for your organization. Windows Azure Cloud computing Study guides Security measures Examinations Computer networks Study guides Security measures Examinations Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet Svidergol, Brian MitwirkendeR ctb Bryan, Wes MitwirkendeR ctb ACI Learning (Firm), MitwirkendeR ctb Packt Publishing, Verlag pbl |
spellingShingle | AZ-500 Microsoft Azure Security Technologies Windows Azure Cloud computing Study guides Security measures Examinations Computer networks Study guides Security measures Examinations Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet |
title | AZ-500 Microsoft Azure Security Technologies |
title_auth | AZ-500 Microsoft Azure Security Technologies |
title_exact_search | AZ-500 Microsoft Azure Security Technologies |
title_full | AZ-500 Microsoft Azure Security Technologies |
title_fullStr | AZ-500 Microsoft Azure Security Technologies |
title_full_unstemmed | AZ-500 Microsoft Azure Security Technologies |
title_short | AZ-500 |
title_sort | az 500 microsoft azure security technologies |
title_sub | Microsoft Azure Security Technologies |
topic | Windows Azure Cloud computing Study guides Security measures Examinations Computer networks Study guides Security measures Examinations Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet |
topic_facet | Windows Azure Cloud computing Study guides Security measures Examinations Computer networks Study guides Security measures Examinations Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet |
work_keys_str_mv | AT svidergolbrian az500microsoftazuresecuritytechnologies AT bryanwes az500microsoftazuresecuritytechnologies AT acilearningfirm az500microsoftazuresecuritytechnologies AT packtpublishing az500microsoftazuresecuritytechnologies |