Cloud Academy – Implementing Continuous Feedback With Azure Devops

Cloud Academy – Implementing Continuous Feedback With Azure Devops-STM
English | Size: 973.41 MB
Category: Tutorial


The application lifecycle doesn’t finish with app deployment. Feedback is an important element of refining an application, whether that’s exception detection and diagnoses or improving the user experience. In this course, we will look at a suite of services that capture a vast array of feedback data, ranging from exceptions to client and server telemetry. This data can be turned into easily digestible information that can be used to trigger alerts and feedback into the development lifecycle as work items.

PluralSight – Implementing Windows Server 2019 Distributed Networking Services

PluralSight – Implementing Windows Server 2019 Distributed Networking Services-REBAR
English | Size: 352.99 MB
Category: Tutorial


Organizations that have spread out across the globe need ways to enable sharing data with their users while still keeping control of that data. In this course, Implementing Windows Server 2019 Distributed Networking Services, you will gain the ability to set up and manage data on Windows. First, you will learn how to setup and configure Distributed File Services. Next, you will discover replicating network shares with DFS Replication. Finally, you will explore how to install and configure BranchCache. When you are finished with this course, you will have the skills and knowledge of managing the Windows data features needed to manage data for your end users across the globe.

PluralSight – Implementing And Managing Microsoft Azure Multi Factor Authentication

PluralSight – Implementing And Managing Microsoft Azure Multi Factor Authentication-REBAR
English | Size: 837.73 MB
Category: Tutorial


Username and password authentication is susceptible to many forms of attack, and multi-factor authentication offers a way to mitigate this threat. Azure multi-factor authentication is a global service that allows you to add a second factor of authentication to your on-premises and cloud based systems using a hardware device already in the hands of your users and customers – their mobile phone. In this course, Implementing and Managing Microsoft Azure Multi-factor Authentication, you’ll learn how to configure Azure MFA in the cloud and on-premises. First, you’ll discover the self-service options available to users and business administrators, and how to integrate Azure MFA with a variety of technologies and applications. Next, you’ll explore the configuration options to integrate Azure MFA with your existing systems. Finally, you’ll see how to protect cloud-based applications with MFA and Conditional Access Policies. By the end of this course, you’ll know how to deploy, configure, and monitor Azure MFA, in the cloud and on-premises.

Cloud Academy – Implementing Azure Infrastructure Compliance and Security

Cloud Academy – Implementing Azure Infrastructure Compliance and Security-STM
English | Size: 2.00 GB
Category: Tutorial


Microsoft Azure is a robust, feature-rich cloud platform used by a growing number of technology companies. With its vast array of services, a key challenge to administering an Azure environment is security. How can we ensure that our Azure infrastructure meets strict security standards? This course offers the answer

PluralSight – Implementing The 20 CIS Critical Security Controls

PluralSight – Implementing The 20 CIS Critical Security Controls-REBAR
English | Size: 368.21 MB
Category: Tutorial


A question familiar to every information security professional is, “where do I start?” The CIS Controls get to the heart of the information security problem, putting security professionals in a position to make immediate and meaningful progress early in an information security program. In this course, Implementing the 20 CIS Critical Security Controls, you will find a practical framework to manage information security risks. First, you will learn about the history and purpose of the CIS controls. Next, you will learn about implementation groups to better understand the controls and sub-controls that make sense for your organization to implement. Finally, you will be equipped with 20 controls and over 170 sub-controls that can be customized to meet your organization’s unique security requirements. When you’re finished with this course, you will have the fundamental knowledge to address a majority of information security risks in your organization.