[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/32. Another example on Application Objects.mp4 137.0 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/17. Lab - Microsoft Sentinel - Generating Incidents.mp4 121.2 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/29. Building a Docker Image.mp4 113.9 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/31. Deploying the container.mp4 108.4 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/4. Design a strategy for data and applications/15. Review of the Azure Firewall service.mp4 102.9 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/23. Microsoft Sentinel - Automation.mp4 102.4 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/32.1 AuthApp.zip 101.6 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/18. Example on using Azure Blueprints.mp4 91.4 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/7. Microsoft Defender for Cloud - Secure Management Ports.mp4 89.1 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/6. Microsoft Defender for Cloud - Servers.mp4 88.7 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/30. Example on using Application Objects.mp4 86.6 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/24. Storing Azure Cosmos DB keys.mp4 85.2 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/14. Microsoft Defender for Cloud - AWS resources.mp4 84.6 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/25. NSG Flow logs.mp4 82.4 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/15. Lab - Microsoft Sentinel - Data connectors.mp4 76.3 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/39. Review - Azure AD Privileged Identity Management.mp4 74.1 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/35. Example on Enterprise Applications.mp4 73.5 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/6. Azure Storage Accounts - Azure AD Authentication.mp4 71.6 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/4. Design a strategy for data and applications/3. Lab - Azure SQL database - Dynamic data masking.mp4 70.8 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/16. Lab - Microsoft Sentinel - Azure Activity.mp4 61.7 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/14. Azure Web Apps - Enabling Diagnostics.mp4 59.7 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/11. Creating an Azure SQL database.mp4 59.5 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/4. Design a strategy for data and applications/17. Simple implementation of Azure Front Door.mp4 59.4 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/4. Microsoft Defender for Cloud - Initial Look.mp4 57.7 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/4. Design a strategy for data and applications/5. Azure SQL database - Classification of data.mp4 57.1 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/5. Azure Storage Account Authorization - Shared Access Signature.mp4 56.6 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/37. Review - Conditional Access Policies.mp4 56.3 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/37. Quick look at Microsoft Defender for Endpoint.mp4 56.1 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/2. Review of Azure Policy service.mp4 52.1 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/2. How are we approaching this course.mp4 51.8 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/20. Lab - Microsoft Sentinel - Virtual Machines - Incidents.mp4 51.7 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/41. Azure B2C.mp4 51.3 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/9. Microsoft Defender for Cloud - Workflow Automation.mp4 48.4 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/36. Microsoft 365 Admin Center.mp4 48.2 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/14. Lab - Microsoft Sentinel - Setup.mp4 48.0 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/12. Microsoft Defender for Cloud - Regulatory compliance.mp4 46.7 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/20. Lab - Creating an Azure Cosmos DB Account.mp4 46.5 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/8. Azure Storage Account - Service Endpoint.mp4 46.2 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/27. Review on Role-based access control.mp4 45.6 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/4. Azure Storage Accounts Authorization - Access keys.mp4 44.9 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/4. Design a strategy for data and applications/18. Azure Front Door - Web Application Firewall.mp4 43.2 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/28. Identity Governance - Entitlement Management.mp4 43.1 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/19. Lab - Using the Azure Bastion Service.mp4 42.9 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/12. Security logging - Building a simple infrastructure.mp4 38.8 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/10. Microsoft Defender for Cloud - Vulnerability assessment.mp4 38.4 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/9. Azure Storage Accounts - Deny use of Access keys.mp4 35.5 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/22. Example of an application connecting to Azure Cosmos DB.mp4 35.4 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/25.1 keyvault.zip 34.1 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/34. Enterprise Applications.mp4 33.3 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/10. Azure Storage accounts - Azure Policy use case.mp4 32.6 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/34. Network Security Groups - Quick Review.mp4 31.8 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/18. Azure Bastion - Creating the environment.mp4 31.7 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/4. Design a strategy for data and applications/9. Azure SQL Database - Always Encrypted feature.mp4 30.7 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/12. Azure SQL Database - Auditing.mp4 30.5 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/7. Azure Storage Accounts - Firewalls.mp4 29.6 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/38. Hybrid Identities - Azure AD Connect.mp4 28.8 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/16. Azure Web Apps - Virtual Network Integration.mp4 27.2 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/28. Containers - What are we going to implement.mp4 25.1 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/40. Azure B2B.mp4 25.0 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/22. Microsoft Sentinel - Workbooks.mp4 24.8 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/36. Review - Azure AD Identity Protection.mp4 24.4 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/26. Our next focus - Azure Active Directory.mp4 23.8 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/4. Design a strategy for data and applications/10. Managed Disks Encryption.mp4 23.4 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/19. Incidents.mp4 23.3 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/3. Azure Storage Accounts - Authorization.mp4 22.8 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/4. Design a strategy for data and applications/11. Note on Azure Backups.mp4 22.3 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/13. Azure SQL Database - Log output.mp4 22.2 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/4. Zero Trust.mp4 22.0 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/15. Quick note on other AWS aspects.mp4 21.6 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/15. Azure Web Apps - Diagnostics results.mp4 19.7 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/4. Design a strategy for data and applications/7. Azure Storage Service Encryption.mp4 19.7 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/17. Using the Azure Bastion Service.mp4 19.5 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/4. Design a strategy for data and applications/14. Quick Note on securing applications.mp4 19.4 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/6. Cloud Adoption Framework.mp4 19.4 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/3. Introduction to Microsoft Defender for Cloud.mp4 19.3 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/2. Quick overview of the services.mp4 18.1 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/43. Azure AD Logs.mp4 17.4 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/8. Security Strategy - Hybrid environments.mp4 17.4 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/5. Security - Integration endpoints.mp4 16.5 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/24. Microsoft Sentinel - Note on threat protection.mp4 16.5 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/4. Design a strategy for data and applications/13. Note on your DevOps pipeline.mp4 15.9 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/23.1 sqlapp.zip 15.8 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/4. Design a strategy for data and applications/12. Protecting your workloads.mp4 15.1 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/10. Let's start using the tools.mp4 14.9 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/13. About Microsoft Sentinel.mp4 14.3 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/4. Design a strategy for data and applications/6. Encryption of data.mp4 14.2 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/8. Microsoft Defender for Cloud - Workload Protection features.mp4 14.0 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/11. Security logging - Our next steps.mp4 13.3 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/7. Security Strategy.mp4 12.0 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/4. Design a strategy for data and applications/8. Azure SQL Database Encryption.mp4 11.8 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/4. Design a strategy for data and applications/20. Quick Note - Microsoft 365 Defender - Web Content Filtering.mp4 11.0 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/42. Which service to choose.mp4 10.3 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/44. Quick note before moving along.mp4 9.7 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/29. Review of Application Objects.mp4 9.7 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/1. What are we going to cover.mp4 9.1 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/9. Security logging - tools.mp4 9.0 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/3. About this section.mp4 9.0 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/35. Introduction to Microsoft Defender.mp4 8.9 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/4. Design a strategy for data and applications/2. Protecting your data.mp4 8.6 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/27. Microsoft Defender for Containers.mp4 8.2 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/4. Design a strategy for data and applications/16. Quick Note on Azure Web App - Azure Firewall.mp4 8.2 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/1. Compliance of your resources.mp4 7.9 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/33. Quick Note on protecting domain controllers.mp4 7.0 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/4. Design a strategy for data and applications/1. What are we going to cover.mp4 5.5 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/1.1 Diagrams.pdf 1.5 MB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/1.2 PPT's.pdf 1.1 MB
.pad/89 1021.6 KB
.pad/91 1019.4 KB
.pad/106 1018.5 KB
.pad/94 1018.3 KB
.pad/69 997.4 KB
.pad/99 985.4 KB
.pad/60 982.6 KB
.pad/35 973.8 KB
.pad/85 969.8 KB
.pad/48 968.1 KB
.pad/29 965.7 KB
.pad/77 947.8 KB
.pad/24 925.6 KB
.pad/8 924.4 KB
.pad/42 923.2 KB
.pad/98 922.2 KB
.pad/59 905.8 KB
.pad/15 892.2 KB
.pad/28 882.5 KB
.pad/38 856.5 KB
.pad/11 854.4 KB
.pad/1 835.4 KB
.pad/34 825.4 KB
.pad/104 824.6 KB
.pad/41 820.1 KB
.pad/68 810.0 KB
.pad/58 795.0 KB
.pad/103 785.4 KB
.pad/88 770.0 KB
.pad/50 752.2 KB
.pad/32 728.0 KB
.pad/14 716.1 KB
.pad/67 703.7 KB
.pad/27 689.7 KB
.pad/87 687.5 KB
.pad/90 686.5 KB
.pad/65 684.3 KB
.pad/95 681.7 KB
.pad/76 668.8 KB
.pad/75 660.3 KB
.pad/3 658.8 KB
.pad/22 641.7 KB
.pad/74 632.3 KB
.pad/79 609.5 KB
.pad/7 608.9 KB
.pad/13 605.2 KB
.pad/93 589.5 KB
.pad/5 588.6 KB
.pad/47 585.9 KB
.pad/33 584.0 KB
.pad/62 581.6 KB
.pad/64 578.7 KB
.pad/45 572.0 KB
.pad/78 565.2 KB
.pad/81 552.9 KB
.pad/46 547.7 KB
.pad/107 533.4 KB
.pad/21 517.4 KB
.pad/80 517.3 KB
.pad/16 506.3 KB
.pad/49 505.2 KB
.pad/108 498.5 KB
.pad/55 488.3 KB
.pad/73 477.2 KB
.pad/37 473.6 KB
.pad/26 452.8 KB
.pad/39 451.0 KB
.pad/102 439.7 KB
.pad/51 437.4 KB
.pad/84 431.5 KB
.pad/70 402.9 KB
.pad/17 398.9 KB
.pad/6 397.4 KB
.pad/56 396.5 KB
.pad/10 396.4 KB
.pad/12 372.3 KB
.pad/72 344.2 KB
.pad/97 334.1 KB
.pad/36 330.9 KB
.pad/9 328.4 KB
.pad/53 315.7 KB
.pad/54 305.1 KB
.pad/71 304.6 KB
.pad/20 298.3 KB
.pad/19 291.9 KB
.pad/23 290.7 KB
.pad/96 273.6 KB
.pad/31 259.4 KB
.pad/63 253.5 KB
.pad/92 245.0 KB
.pad/83 224.0 KB
.pad/18 223.6 KB
.pad/52 222.6 KB
.pad/61 210.0 KB
.pad/57 205.9 KB
.pad/66 204.2 KB
.pad/30 181.5 KB
.pad/44 177.7 KB
.pad/4 145.4 KB
.pad/105 139.4 KB
.pad/2 129.9 KB
.pad/82 122.7 KB
.pad/43 107.4 KB
.pad/40 83.3 KB
.pad/101 82.6 KB
.pad/86 76.5 KB
.pad/25 69.6 KB
.pad/100 18.4 KB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/19. Example on using Azure Blueprints - Resources.html 6.8 KB
.pad/0 6.4 KB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/31. Installing the Postman tool.html 2.4 KB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/33. Installing Visual Studio 2022.html 1.5 KB
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/4. Design a strategy for data and applications/19. Azure Front Door Log details.html 1018 bytes
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/4. Design a strategy for data and applications/4. Lab - Azure SQL database - Dynamic data masking - Resources.html 733 bytes
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/30.1 commands.txt 628 bytes
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/21. Lab - Creating an Azure Cosmos DB Account - Resources.html 587 bytes
[TGx]Downloaded from torrentgalaxy.to .txt 585 bytes
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/13. Microsoft Defender for Cloud - Remediations.html 576 bytes
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/26. Azure Cosmos DB logs.html 463 bytes
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/32.1 Deployment.yml 362 bytes
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/18. Lab - Microsoft Sentinel - Generating Incidents - Resources.html 303 bytes
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/21. Lab - Microsoft Sentinel - Virtual Machines - Incidents - Resources.html 229 bytes
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/4. Design a strategy for data and applications/17.1 Restricting access to Front Door.html 194 bytes
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/23. Example of an application connecting to Azure Cosmos DB - Resources.html 187 bytes
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/32.2 Service.yml 187 bytes
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/2. Evaluate Governance Risk Compliance/15.1 Azure and AWS Security.html 162 bytes
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/25. Storing Azure Cosmos DB keys - Resources.html 160 bytes
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/45. Section Quiz.html 159 bytes
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/38. Section Quiz.html 159 bytes
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/5. Practice Section/1. Practice Test 1.html 159 bytes
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/5. Practice Section/2. Practice Test 2.html 159 bytes
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/25.1 NSG Flow Logs.html 157 bytes
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/30. Building a Docker Image - Resources.html 155 bytes
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/32. Deploying the container - Resources.html 155 bytes
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/1. Slides and Diagrams download.html 141 bytes
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/27.1 RBAC in-built roles.html 140 bytes
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/1. Design a Zero Trust strategy and architecture/24.1 Microsoft Sentinel - Threat Intelligence.html 139 bytes
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/4. Design a strategy for data and applications/14.1 Developing secure applications.html 131 bytes
[TutsNode.net] - SC-100 Microsoft Cybersecurity Architect/3. Design security for infrastructure/30.2 Dockerfile.original 114 bytes