Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Azure Cloud Security with Microsoft Azure For Beginners
Intro to Cloud
What We Will Learn in Secure Cloud for MS Azure (1:10)
Secure Cloud for MS Azure (1:37)
Secure Cloud for MS Azure - 2 (8:47)
Secure Cloud for MS Azure Module (2:15)
Cloud Fundamentals
Introduction into the Cloud (4:47)
Cloud Definitions Essential Characteristics (3:14)
Cloud Service and Deployment Models (7:01)
Cloud Terminologies (5:30)
Cloud Architecture Frameworks (7:20)
CSA Cloud Reference Model (4:38)
CSA Cloud Logical Model (1:51)
Cloud Security Scopes and Responsibilities (2:01)
Cloud Responsibility Matrix (0:34)
Cloud Security Models
CSA Cloud Security Model (2:43)
NIST Cloud Security Model (2:05)
Management in the Cloud - CSA (2:56)
Recommendations of CSA for Secure Cloud and Risk Management (3:14)
Cloud Computing Threats (36:50)
Approaches to struggle with Cloud Threats (10:14)
Data Security, Data Security Lifecycle (3:07)
Data Security Entitlement Matrix and Mapping Control (2:40)
Recommendations for Data Security (3:15)
CIS Application Security Framework (4:12)
Application Layer Security Control -WAF (3:11)
Network Layer Security Controls (2:22)
Azure Basics - Intro Cloud Security
Azure Cloud Security - Introduction (3:04)
Azure Identity and Access Management (4:26)
Azure AD PIM (1:44)
Azure AD PIM Configuration (4:28)
Azure Key Vault, Introduction and It's Benefits (2:47)
Configure Azure Key Vault (1:31)
Configure HSM Keygen Solution (1:19)
Active Directory Authentication with Key Vault (1:55)
Key Vault and RBAC Implementation Scenario (4:55)
Role Based Access Control Demo (10:04)
Key Vault Best Practices (2:57)
Creating Key Vault and Backup Methods (9:41)
Azure Identity and Access Management
Configure Azure MFA (9:08)
Create User, Group and Resource (5:55)
Manage Membership and Ownership (1:57)
Manage User Profile (2:27)
Other Authentication Methods (4:11)
Harden Your Organization's Security Posture with Combining Authentication (21:17)
Harden the User's Password Recovery Management (11:49)
Trying to Breach a User with a Password and MFA (18:55)
Creating and Auditing Access Review for a user (4:46)
What We Will Learn in Secure Cloud for MS Azure
Complete and Continue