kingers Posted March 30 Report Share Posted March 30 6.37 GB | 19min 31s | mp4 | 1280X720 | 16:9Genre:eLearning |Language:EnglishFiles Included :1 -Welcome.mp4 (15.45 MB)2 -Slides.mp4 (11.62 MB)1 -Application Identities & Application Registrations.mp4 (9 MB)2 -Demo Create an Application Registration.mp4 (17.32 MB)3 -Demo App Authentication.mp4 (21.27 MB)4 -Demo App API Permissions.mp4 (20.83 MB)5 -Entra Application Proxy.mp4 (28.95 MB)1 -Azure Virtual Networks (VNets).mp4 (27.65 MB)10 -VNet Peering.mp4 (30.52 MB)11 -Demo Configure VNet Peering.mp4 (17.01 MB)12 -VPN in Azure.mp4 (20.7 MB)13 -Demo Configure S2S VPN.mp4 (26.4 MB)14 -Resource Firewalls.mp4 (12.17 MB)15 -Demo Configure a Resource Firewall.mp4 (32.4 MB)2 -Demo Configure a VNet.mp4 (23.5 MB)3 -Demo NAT Gateway.mp4 (27.33 MB)4 -Network Security Groups (NSGs).mp4 (35.34 MB)5 -Demo Configure NSGs.mp4 (64.04 MB)6 -Application Security Groups (ASGs).mp4 (29.6 MB)7 -Demo Configure ASGs.mp4 (18.22 MB)8 -User Defined Routing (UDR).mp4 (17.94 MB)9 -Demo Configure UDR.mp4 (18.91 MB)1 -Service Endpoints.mp4 (15.83 MB)2 -Azure Private Link.mp4 (12.76 MB)3 -Demo Service & Private Endpoints.mp4 (19.76 MB)4 -Express Route & Private Link.mp4 (12.42 MB)5 -Azure App Service.mp4 (27.95 MB)6 -Demo Azure App Service.mp4 (21.71 MB)7 -Azure App Service Environments (ASE).mp4 (12.14 MB)8 -Demo ASE.mp4 (15.32 MB)1 -Azure Firewall.mp4 (36.52 MB)10 -Demo Configure an Azure WAF.mp4 (48.99 MB)11 -Azure DDoS Protection.mp4 (63.37 MB)12 -Demo Configure DDoS Protection.mp4 (20.63 MB)2 -Demo Azure Firewall.mp4 (141.44 MB)3 -Azure Load Balancer.mp4 (9.46 MB)4 -Demo Configure an Azure Load Balancer.mp4 (77.36 MB)5 -Azure Application Gateway.mp4 (12.25 MB)6 -Demo Configure an Azure Application Gateway.mp4 (31.45 MB)7 -Azure Front Door.mp4 (20.49 MB)8 -Demo Configure Front Door.mp4 (16.75 MB)9 -Azure Web Application Firewall (WAF).mp4 (38.49 MB)1 -Azure Compute Services.mp4 (13.89 MB)10 -Demo Configure Confidential Disk Encryption.mp4 (15.69 MB)2 -Azure Virtual Machines (VMs).mp4 (16.04 MB)3 -Demo Configure Azure VMs.mp4 (82.4 MB)4 -Disk Encryption Options in Azure.mp4 (20.75 MB)5 -Azure Disk Encryption (ADE).mp4 (7.8 MB)6 -Demo Configure ADE.mp4 (9.7 MB)7 -Encryption at Host.mp4 (5.93 MB)8 -Demo Encryption at Host.mp4 (30.71 MB)9 -Confidential Disk Encryption.mp4 (9.18 MB)1 -Azure Storage Services.mp4 (32.29 MB)2 -Demo Azure Storage Account.mp4 (46.2 MB)3 -Authentication and Authorization for Azure Storage.mp4 (12 MB)4 -Storage Account Access Keys.mp4 (17.58 MB)5 -Demo Storage Account Access Keys.mp4 (11.75 MB)6 -Shared Access Signatures (SAS).mp4 (11.02 MB)7 -Demo Shared Access Signatures (SAS).mp4 (21.49 MB)1 -Azure SQL.mp4 (10.61 MB)2 -Demo Azure SQL Database.mp4 (28.27 MB)3 -Azure SQL Transparent Data Encryption (TDE).mp4 (21.92 MB)4 -Demo Configure TDE.mp4 (6.51 MB)5 -Azure SQL Always Encrypted.mp4 (21.63 MB)6 -Demo Configure Always Encrypted.mp4 (5.86 MB)7 -Azure SQL Dynamic Data Masking.mp4 (18 MB)1 -Azure Policy.mp4 (15.11 MB)2 -Azure Policy Effects.mp4 (9.64 MB)3 -Azure Resource Manager & Azure Policy Engine.mp4 (9.95 MB)4 -Demo Azure Policy.mp4 (15.04 MB)5 -Azure Landing Zones.mp4 (37.95 MB)6 -Azure Key Vault.mp4 (19.35 MB)7 -Demo Configure Azure Key Vault.mp4 (31.63 MB)8 -Azure Hardware Security Modules (HSMs).mp4 (18.37 MB)1 -What is Microsoft Defender for Cloud.mp4 (13.07 MB)10 -Demo Security Recommendations.mp4 (19.68 MB)11 -Secure Score.mp4 (5.01 MB)12 -Demo Secure Score.mp4 (12.32 MB)13 -Demo Azure Workbooks in Defender for Cloud.mp4 (18.35 MB)14 -Data Exporting.mp4 (6.25 MB)15 -Demo Data Exporting.mp4 (18.56 MB)16 -Remediation.mp4 (12.32 MB)17 -Demo Remediation.mp4 (24.77 MB)18 -Microsoft Cloud Security Benchmark.mp4 (5.56 MB)19 -Demo Microsoft Cloud Security Benchmark.mp4 (23.91 MB)2 -CSPM & CWP.mp4 (10.01 MB)20 -Governance Management.mp4 (4.47 MB)21 -Demo Governance Management.mp4 (18 MB)22 -Regulatory Compliance.mp4 (8.8 MB)23 -Demo Regulatory Compliance.mp4 (45.97 MB)24 -Cloud Security Explorer.mp4 (6.56 MB)25 -Demo Cloud Security Explorer.mp4 (23.38 MB)26 -Attack Path Analysis.mp4 (6.36 MB)27 -Agentless Vulnerability Scanning.mp4 (9.41 MB)28 -Agentless Discovery for Kubernetes.mp4 (4.51 MB)29 -Container Registry Vulnerability Assessment.mp4 (3.95 MB)3 -Defender for Cloud RBAC.mp4 (9.23 MB)30 -Data Aware Security Posture.mp4 (6.91 MB)31 -EASM Insights in Network Exposure.mp4 (5.87 MB)32 -DevOps Security.mp4 (13.84 MB)4 -Demo Enable All Plans in Defender for Cloud.mp4 (27.82 MB)5 -What is CSPM.mp4 (6.75 MB)6 -CSPM Plans.mp4 (11.09 MB)7 -Asset Inventory.mp4 (6.4 MB)8 -Demo Asset Inventory.mp4 (32.96 MB)9 -Security Recommendations.mp4 (4.87 MB)1 -What is CWP.mp4 (8.92 MB)10 -Demo Create Suppression Rules.mp4 (17.75 MB)11 -Demo Setup Email Notifications.mp4 (10.17 MB)12 -What is Defender for Servers.mp4 (14.16 MB)13 -Agents.mp4 (7.96 MB)14 -Defender for Servers Plans.mp4 (6.61 MB)15 -Defender for Endpoint Integration.mp4 (7.75 MB)16 -Licensing.mp4 (5.11 MB)17 -Defender for Endpoint Provisioning.mp4 (3.66 MB)18 -Threat Detection for OS-Level.mp4 (6.38 MB)19 -Alerts for Windows Machines.mp4 (11.7 MB)2 -Demo Install VirtualBox.mp4 (10.11 MB)20 -Alerts for Linux Machines.mp4 (11.49 MB)21 -Demo Create Virtual Machines.mp4 (29.05 MB)22 -Demo Brute Force SSH.mp4 (108.54 MB)23 -Threat Detection for Network Level.mp4 (17.9 MB)24 -Adaptive Application Controls.mp4 (9.99 MB)25 -Demo Adaptive Application Controls.mp4 (14.64 MB)26 -Just-in-time VM access.mp4 (26.5 MB)27 -Demo Just-in-time VM access.mp4 (26.5 MB)28 -Adaptive Network Hardening.mp4 (7.69 MB)29 -File Integrity Monitoring.mp4 (7.82 MB)3 -Demo Install Kali Linux.mp4 (25.86 MB)30 -Demo File Integrity Monitoring.mp4 (11.81 MB)31 -Network Map.mp4 (4.67 MB)32 -Demo Network Map.mp4 (12.57 MB)33 -Overview - Defender for Databases.mp4 (9.23 MB)34 -Defender for SQL Databases.mp4 (6.43 MB)35 -Defender for Open-Source Relational Databases.mp4 (4.87 MB)36 -Defender for Cosmos DB.mp4 (3.88 MB)37 -Overview - Defender for Storage.mp4 (19.26 MB)38 -Demo Create a Storage Account.mp4 (13.29 MB)39 -Demo Defender for Storage.mp4 (59.5 MB)4 -Demo Configure Kali Keyboard Layout.mp4 (17.04 MB)40 -Overview - Defender for Containers.mp4 (27.75 MB)41 -Environment Hardening.mp4 (25.3 MB)42 -Vulnerability Assessment.mp4 (14.4 MB)43 -Threat Protection.mp4 (6.7 MB)44 -Demo Create an AKS Cluster.mp4 (7.3 MB)45 -Demo Defender for Containers.mp4 (14.85 MB)46 -Overview - Defender for Key Vault.mp4 (18.05 MB)47 -Demo Create an Azure Key Vault.mp4 (5.75 MB)48 -Demo Defender for Key Vault.mp4 (12.02 MB)49 -Overview - Defender for Resource Manager.mp4 (13.79 MB)5 -Demo Install Tor Browser in Kali.mp4 (24.24 MB)50 -Demo Defender for Resource Manager.mp4 (43.3 MB)51 -Workflow Automation.mp4 (5.99 MB)52 -Azure Logic Apps.mp4 (21.39 MB)53 -Demo Malware Scanning Response with Workflow Automation & Azure Logic Apps.mp4 (50.9 MB)54 -Integration with Azure DDoS Protection.mp4 (5.6 MB)55 -Integration with Azure WAF.mp4 (9.24 MB)56 -Integration with Sentinel.mp4 (6.92 MB)57 -Integration with other SIEMs.mp4 (2.22 MB)6 -Demo Create Resource Group.mp4 (4.89 MB)7 -Alert Queue.mp4 (5.17 MB)8 -Demo Alert Queue.mp4 (5.17 MB)9 -Demo Create Sample Alerts.mp4 (14.94 MB)1 -Complexity and Cyber Security Challenges.mp4 (52.49 MB)2 -What is a SOC.mp4 (17.89 MB)3 -SOC Tier Model.mp4 (14.18 MB)4 -Cyber Security Incident Response Process.mp4 (10.67 MB)5 -EDR, XDR, SIEM & SOAR.mp4 (22.29 MB)6 -Blue, Red & Purple Teaming.mp4 (40.87 MB)1 -Azure Monitor.mp4 (28.92 MB)10 -Sentinel RBAC.mp4 (9.77 MB)11 -Demo Azure RBAC for Sentinel.mp4 (14.82 MB)12 -Dedicated Cluster.mp4 (10.09 MB)13 -Data Connectors.mp4 (11.82 MB)14 -Typical data sources for a SIEM.mp4 (12.52 MB)15 -Demo Content Hub.mp4 (37.58 MB)16 -Demo Ingesting Threat Intelligence into Sentinel.mp4 (31.74 MB)17 -Demo Verify Threat Intelligence Log Ingestion.mp4 (11.53 MB)18 -Demo Ingesting Entra ID into Sentinel.mp4 (17.56 MB)19 -Demo Verify Entra ID Ingestion.mp4 (12.38 MB)2 -What is Microsoft Sentinel.mp4 (4.98 MB)20 -Demo Deploy Sentinel Training Lab.mp4 (13.31 MB)21 -AMA and DCR.mp4 (15.52 MB)22 -Demo Ingesting Windows Security Event Logs with AMA and DCR.mp4 (53.3 MB)23 -Sentinel Workflow.mp4 (13.62 MB)24 -Analytic Rules.mp4 (6.41 MB)25 -Demo Analytic Rules.mp4 (21.72 MB)26 -Scheduled Analytic Rules.mp4 (4.19 MB)27 -Demo Scheduled Analytic Rules - Entra ID.mp4 (32.28 MB)28 -Demo Scheduled Analytic Rules - Windows Security Events.mp4 (18.58 MB)29 -Near-Real-Time-Rules (NRT).mp4 (3.17 MB)3 -Sentinel as SaaS.mp4 (11.17 MB)30 -Demo Near-Real-Time-Rules (NRT).mp4 (13.6 MB)31 -Fusion.mp4 (6.17 MB)32 -Demo Fusion.mp4 (31.13 MB)33 -ML Behavior Analytics.mp4 (10.35 MB)34 -Demo ML Behavior Analytics.mp4 (17.32 MB)35 -Threat Intelligence Rules.mp4 (3.68 MB)36 -Demo Threat Intelligence Rules.mp4 (11.8 MB)37 -Microsoft Security Rules.mp4 (2.64 MB)38 -Demo Microsoft Security Rules.mp4 (7.62 MB)39 -Demo Incident Dashboard.mp4 (65.05 MB)4 -Sentinel Architecture.mp4 (12.34 MB)40 -Ingestion Delay.mp4 (28.66 MB)41 -Demo Countering Ingestion Delay.mp4 (18.44 MB)42 -What is Threat Hunting.mp4 (11.47 MB)43 -KQL 101.mp4 (16.03 MB)44 -Demo KQL Playground.mp4 (24.97 MB)45 -Demo KQL - search.mp4 (11.41 MB)46 -Demo KQL - where.mp4 (65.94 MB)47 -Demo KQL - datetime & timespans.mp4 (33 MB)48 -Demo KQL - count, dcount, summarize & top.mp4 (32.06 MB)49 -Demo KQL - order, sort, take.mp4 (14.92 MB)5 -Deployment Prerequisites.mp4 (3.28 MB)50 -Demo KQL - extend, project.mp4 (45.47 MB)51 -Demo KQL - contains, startswith, endswith.mp4 (15.49 MB)52 -Demo KQL - let.mp4 (13.29 MB)53 -Demo KQL - render.mp4 (11.7 MB)54 -Demo KQL - union.mp4 (8.66 MB)55 -Demo KQL - inner join.mp4 (11.1 MB)56 -Demo Threat Hunting in Sentinel.mp4 (21.33 MB)57 -Demo Hunt for Entra ID Events.mp4 (47.52 MB)58 -Automation Capabilities in Sentinel.mp4 (12.65 MB)59 -Automation Rules.mp4 (2.68 MB)6 -Demo Create an Azure Resource Group.mp4 (6.16 MB)60 -Demo Automation Rules.mp4 (66.1 MB)61 -Playbooks.mp4 (3.78 MB)62 -Automation Rules vs Playbooks.mp4 (8.61 MB)63 -Azure Logic Apps.mp4 (14.23 MB)64 -Demo Playbooks & Azure Logic Apps.mp4 (50.81 MB)65 -Demo Playbook with MITRE ATT&CK & ChatGPT.mp4 (64.63 MB)66 -Sentinel REST API.mp4 (6.99 MB)67 -Notebooks in Sentinel.mp4 (6.93 MB)68 -Demo Notebooks with MSTICPy.mp4 (148.77 MB)7 -Demo Create a Log Analytics Workspace.mp4 (9.6 MB)8 -Demo Create a Sentinel Workspace.mp4 (7.37 MB)9 -Azure RBAC.mp4 (4.4 MB)1 -Bonus.mp4 (17.97 MB)1 -What is a Threat.mp4 (7.29 MB)2 -Intelligence, Threat Intelligence & Cyber Threat Intelligence (CTI).mp4 (9.12 MB)3 -What is CTI.mp4 (10.79 MB)4 -Threat, Vulnerability & Risk.mp4 (5.58 MB)5 -Threat-Informed Defense.mp4 (11.61 MB)6 -Tactics, Techniques & Procedures (TTPs).mp4 (16.53 MB)7 -IOCs & IOAs.mp4 (14.08 MB)8 -Pyramid of Pain.mp4 (13.08 MB)9 -CTI Sources.mp4 (7.66 MB)1 -What is a Vulnerability.mp4 (7.29 MB)2 -Common Vulnerabilities and Exposures (CVE).mp4 (12.45 MB)3 -Common Vulnerability Scoring System (CVSS).mp4 (25.79 MB)1 -Cloud Computing Properties.mp4 (18.12 MB)2 -Cloud Computing Types.mp4 (11.09 MB)3 -Azure Global Backbone.mp4 (21.31 MB)4 -Shared Responsibility Model.mp4 (19.66 MB)5 -Azure Resource Hierarchy.mp4 (10.28 MB)6 -Azure Subscription Types.mp4 (10.14 MB)7 -Entra ID Tenants and Azure Subscriptions.mp4 (7.1 MB)8 -Demo Create Your Azure Subscription.mp4 (6.52 MB)1 -Zero Trust.mp4 (31.02 MB)2 -The Microsoft Security Cosmos.mp4 (19.4 MB)3 -Defending Across Attack Chains.mp4 (13.48 MB)1 -Microsoft Entra.mp4 (76 MB)10 -Demo Administrative Units.mp4 (15.06 MB)11 -External Identities.mp4 (25.6 MB)12 -Demo External Collaboration Settings.mp4 (31.33 MB)13 -Identity Protection.mp4 (65.64 MB)14 -Demo Identity Protection.mp4 (31.21 MB)2 -Microsoft Entra ID.mp4 (34.5 MB)3 -User Identities.mp4 (8.79 MB)4 -Demo User Identities.mp4 (27.72 MB)5 -Managed Identities.mp4 (31.66 MB)6 -Demo Managed Identities.mp4 (53.75 MB)7 -Groups.mp4 (44.46 MB)8 -Demo Groups.mp4 (8.97 MB)9 -Administrative Units.mp4 (23.74 MB)1 -Authentication Methods.mp4 (28.43 MB)10 -Entra Verified ID.mp4 (10.83 MB)11 -Self-Service Password Reset (SSPR).mp4 (24.8 MB)12 -Demo SSPR.mp4 (13.89 MB)13 -Entra Connect.mp4 (31.03 MB)14 -Demo Deploy Azure Resources for Hybrid Identity.mp4 (46.21 MB)15 -Demo Setup Custom Domain.mp4 (44.55 MB)16 -Demo Setup Active Directory.mp4 (35.15 MB)17 -Demo Entra Connect.mp4 (79.15 MB)18 -Hybrid Authentication.mp4 (13.57 MB)19 -Entra Domain Services.mp4 (19.81 MB)2 -Attacks on Passwords.mp4 (21.25 MB)3 -Multi-Factor Authentication (MFA).mp4 (32.88 MB)4 -Demo MFA.mp4 (19.26 MB)5 -Passwordless Authentication.mp4 (16.17 MB)6 -Demo Passwordless Authentication.mp4 (17.04 MB)7 -Password Protection.mp4 (16.3 MB)8 -Demo Password Protection.mp4 (15.6 MB)9 -Single-Sign-on (SSO).mp4 (6.55 MB)1 -Entra ID Roles.mp4 (20.18 MB)10 -Privileged Identity Management (PIM).mp4 (33.82 MB)11 -Demo Configure PIM.mp4 (44.71 MB)12 -Access Reviews.mp4 (23.73 MB)13 -Demo Access Reviews.mp4 (20.78 MB)14 -Entra Permissions Management (EPM).mp4 (44.36 MB)15 -Conditional Access.mp4 (26.05 MB)16 -Demo Conditional Access.mp4 (70.7 MB)2 -Demo Entra ID Roles.mp4 (28.4 MB)3 -Demo Custom Entra ID Roles.mp4 (13.26 MB)4 -Azure Role-Based-Acces-Control (RBAC).mp4 (70.14 MB)5 -Demo Custom Azure RBAC.mp4 (23.52 MB)6 -Demo Built-in Azure RBAC.mp4 (17.02 MB)7 -Azure RBAC vs Entra ID Roles.mp4 (24.86 MB)8 -Entra ID Governance.mp4 (14.05 MB)9 -Entra ID Entitlement Management.mp4 (15.44 MB)]ScreenshotAusFilehttps://ausfile.com/gh3p0w7amh0ghttps://ausfile.com/whm50ro06tpdhttps://ausfile.com/lav2qmj8mlcthttps://ausfile.com/qq8khfagdbn6https://ausfile.com/f38vsw4n4t7uhttps://ausfile.com/87k4ndw3hcm9https://ausfile.com/7ayqn3ms7p4sRapidGatorhttps://rapidgator.net/file/1b10ef6c88e089d936c162d2db4d9d4e/https://rapidgator.net/file/aef9f929395ad1590f51afb13f7a90e7/https://rapidgator.net/file/500dd021f62b2f0b273b21a38bba0f4a/https://rapidgator.net/file/82cab39ac20d317108c952843e735807/https://rapidgator.net/file/baf4fe568a46f653f8ef4ae4842c2f8a/https://rapidgator.net/file/f88146f79d52e0e6b80f1db71bebaa8e/https://rapidgator.net/file/b1d0f4f3008136f5018f6f885d0bca91/TurboBithttps://turbobit.net/82y2hf212m8k.htmlhttps://turbobit.net/2tnio075cnx1.htmlhttps://turbobit.net/178k58u8nbp2.htmlhttps://turbobit.net/4a7sylkxlgj4.htmlhttps://turbobit.net/c2non4cvq42g.htmlhttps://turbobit.net/6z34xzirimop.htmlhttps://turbobit.net/iae0c15rpvqo.html Link to comment Share on other sites More sharing options...
Recommended Posts
Please sign in to comment
You will be able to leave a comment after signing in
Sign In Now