Cyber Security on Azure

An IT Professional's Guide to Microsoft Azure Security Center
Nicht lieferbar | Lieferzeit: Nicht lieferbar I
Alle Preise inkl. MwSt. | Versandkostenfrei
Nicht verfügbar Zum Merkzettel
Gewicht:
468 g
Format:
256x178x15 mm
Beschreibung:

Marshall Copeland is a cloud solution architect at Microsoft focusing on cloud identity and cyber security. His work with Microsoft Azure cloud includes hybrid cloud supporting software defined networks, Windows Server, and Linux systems. Marshall provides cloud identity authentication guidance with on-premises Active Directory Domain Services, Azure Active Directory, OAuth2, and OpenID Connect. Marshall holds a Master of Science degree in information assurance (MSIA) specializing in cyber security from Dakota State University. He maintains an MCSD Azure Solution Architect Certification and CISSP. Marshall co-wrote 'Microsoft Azure: Planning, Deploying, and Managing Your Datacenter in the Cloud' and 'Microsoft Office 365 Administration Inside Out'.
Teaches you how to prevent destructive attacks, remove vulnerabilities, and instantly report cloud security readiness
Part I: All Business Roles Chapter 1: Cybersecurity: How Security Vulnerabilities Affect Your Business Chapter 2: Azure Security Center Cost Model Part II: Cloud Security Operations Chapter 3: Azure Security Center Getting Started Chapter 4: Azure Security Center Configuration Chapter 5: Azure Security Center Scenarios Chapter 6: Azure Security Center Extensions Appendix A: Troubleshooting & Cyber Reference Appendix B: Know Your Enemy Appendix C: Security Frameworks
Prevent destructive attacks to your Azure public cloud infrastructure, remove vulnerabilities, and instantly report cloud security readiness. This book provides comprehensive guidance from a security insider's perspective.
Cyber Security on Azure explains how this 'security as a service' (SECaaS) business solution can help you better manage security risk and enable data security control using encryption options such as Advanced Encryption Standard (AES) cryptography. Discover best practices to support network security groups, web application firewalls, and database auditing for threat protection. Configure custom security notifications of potential cyberattack vectors to prevent unauthorized access by hackers, hacktivists, and industrial spies.

What You'll Learn
This book provides step-by-step guidance on how to:
  • Support enterprise security policies
  • Improve cloud security
  • Configure intrusion detection
  • Identify potential vulnerabilities
  • Prevent enterprise security failures

Who This Book Is For
IT, cloud, and security administrators; CEOs, CIOs, and other business professionals

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.