Cloud Academy – Configuring GCP Access and Security

Cloud Academy – Configuring GCP Access and Security-STM
English | Size: 619.82 MB
Category: Tutorial


Security is considered to be one of the biggest challenges when comparing cloud vs. in-house infrastructure. Due to lack of trust, loss of control, and the multi-tenant nature of the cloud, security controls and mechanisms are of the utmost importance
Google Cloud Platform offers tools with a single dashboard and simple interfaces to implement security policies Google Cloud Identity and Access Management (IAM) provides an easy way to manage GCP users and the permissions assigned to them. Besides human users, GCP provides a way to create non-human identities (service accounts) and attach those to cloud applications and VMs. The correct configuration and usage of service accounts and IAM are critical to GCP security. GCP also provides a centralized dashboard to view audit logs, which are useful in the case of a security breach To help you get the most out of the security tools offered in Google Cloud, this course covers how to properly manage IAM, service accounts, and audit logs

INE – IPv6, MPLS, Internet Access & Multi-VRF CE

INE – IPv6, MPLS, Internet Access & Multi-VRF CE
English | Size: 668.31 MB
Category: Tutorial


Advance your networking knowledge with access to thousands of training videos instantly with INE’s All Access Pass

PluralSight – Microsoft Azure Developer Configuring CORS Access For Storage APR2020

PluralSight – Microsoft Azure Developer Configuring CORS Access For Storage APR2020-REBAR
English | Size: 199.92 MB
Category: Tutorial


Cross-Origin Resource Sharing (CORS) is an HTTP feature that can restrict how clients request your content. In this course, Microsoft Azure Developer: Configuring CORS Access for Storage, you will learn foundational knowledge of how CORS rules can be enabled, configured, and used with Azure Storage services. First, you will see how CORS works in practice. Next, you will discover how Azure Storage evaluates CORS rules. Finally, you will explore how to configure rules with common Azure SDKs and tooling. When you’re finished with this course, you will have the skills and knowledge of configuring CORS needed to manage cross-origin requests to your Azure Storage services.

PluralSight – C Sharp Design Patterns Data Access Patterns

PluralSight – C Sharp Design Patterns Data Access Patterns-ELOHiM
English | Size: 266.42 MB
Category: CBTs


Most applications, if not all, need to work with some kind of data, a database, for example. Having a good strategy for how to decouple the specific data layer is crucial in order to make your application testable and maintainable. In this course, C# Design Patterns: Data Access Patterns, you ll learn foundational knowledge of the different data access patterns. First, you’ll learn how to implement the repository pattern and decouple parts of the application from the data layer. Then, you’ll develop an understanding of where this pattern is applicable. Next, you ll discover how to easily refactor an application to leverage the unit of work pattern, making the application even better
Finally, you’ll explore how to leverage lazy loading to avoid unnecessary data being loaded into your application. When you re finished with this course, you’ll have the skills and knowledge of these different data access patterns and what is needed to apply this in your solutions

Linux Academy – Identity and Access Management for Azure

Linux Academy – Identity and Access Management for Azure-APoLLo
English | Size: 1.48 GB
Category: Tutorial


This course, as the title implies, is about Identity and Access Management in the Microsoft Azure Cloud environment. The course is comprised of 12 videos, each specifically focusing on an Azure service or group of services. The titles of each course directly match (at the time of publishing) the service’s name as they appear in the Azure Portal service catalog.