Lynda – Microsoft Azure Security Technologies (AZ-500) Cert Prep 5 Data at Rest, App Security, and Key Vault

Lynda – Microsoft Azure Security Technologies AZ 500 Cert Prep 5 Data at Rest App Security and Key Vault-APoLLo
English | Size: 144.33 MB
Category: Security


Confident in your understanding of the Microsoft cybersecurity stack? Taking and passing the Microsoft Azure Security Technologies (AZ-500) exam can help you validate your skills-and, in turn, give your IT career a boost. In this course, instructor Pete Zerger lays out what you need to know to tackle the fourth domain of the AZ-500 exam: Securing Data and Applications. Pete takes a deep dive into the concepts covered in the second half of domain four, including how to configure encryption for data at rest, configure security features to protect web apps, and manage access to Key Vault. When coupled with Azure Security Technologies: Policy and Data Infrastructure-which covers the first half of the Securing Data and Applications domain-this course can help ensure that you walk into the test center feeling prepared to tackle this key portion of the exam.

Lynda – Privacy by Design Data Classification

Lynda – Privacy by Design Data Classification-APoLLo
English | Size: 227.25 MB
Category: Tutorial


Companies often collect customer data with third parties to enable better products and growing engagement, as well as for safety reasons. But users expect-and deserve-that their information is handled with great care. In this course, instructor Nishant Bhajaria steps through how to create an architecture to manage data collection and measure risk, as well as afford privacy protections relative to that risk. This architecture-which is a combination of technology, techniques, and processes-can enable companies to be more disciplined with data while collecting and processing it. Nishant goes over the current privacy landscape, explains how classifying data can save you money in the long run, and shares what the data classification process should look like. He also takes a deep dive into the data inventory process, explaining how to best approach it and discern whether it is succeeding. Finally, Nishant provides context on executive communication on privacy governance.

INE – Network Foundation Protection: Data Plane

INE – Network Foundation Protection Data Plane
English | Size: 1.88 GB
Category: Cisco | Networking | Security


Network Foundation Protection is a security framework that provides with strategies to protect three functional areas of a device: Management Plane, Control Plane, and Data Plane. In this course we will focus on the Data Plane functionality and we will learn sophisticated features that influence and/or preserve the integrity of data forwarding on network devices: DHCP Snooping, Dynamic ARP Inspection, IP Source Guard, Unicast Reverse Path Forwarding, 802.1X, and Quality of Service to name a few.

Lynda – Microsoft Azure Security Technologies AZ-500 Cert Prep 4 Policy and Data Infrastructure

Lynda – Microsoft Azure Security Technologies AZ-500 Cert Prep 4 Policy and Data Infrastructure-APoLLo
English | Size: 172.85 MB
Category: Tutorial


Cybersecurity skills are in high demand, and the Microsoft Azure Security Technologies (AZ-500) exam is the perfect opportunity for IT professionals to demonstrate their skills to current and future employers. This course is the first of a two-part series that prepares candidates to excel in the Secure Data and Applications domain of the exam. Instructor Pete Zerger explains how to configure critical security policies for data classification, retention, and sovereignty, and enable security features for your Azure data infrastructure, including database authentication, access control, Azure AD authentication, and shared access signatures for Azure Storage. Plus, learn how to secure big data solutions such as Cosmos DB and Azure Data Lake.

PluralSight – C Sharp Design Patterns Data Access Patterns

PluralSight – C Sharp Design Patterns Data Access Patterns-ELOHiM
English | Size: 266.42 MB
Category: CBTs


Most applications, if not all, need to work with some kind of data, a database, for example. Having a good strategy for how to decouple the specific data layer is crucial in order to make your application testable and maintainable. In this course, C# Design Patterns: Data Access Patterns, you ll learn foundational knowledge of the different data access patterns. First, you’ll learn how to implement the repository pattern and decouple parts of the application from the data layer. Then, you’ll develop an understanding of where this pattern is applicable. Next, you ll discover how to easily refactor an application to leverage the unit of work pattern, making the application even better
Finally, you’ll explore how to leverage lazy loading to avoid unnecessary data being loaded into your application. When you re finished with this course, you’ll have the skills and knowledge of these different data access patterns and what is needed to apply this in your solutions