Category Archives: Uncategorized
31. What is CASB Today’s IT operations are not limited to on-premises installations. They’ve relocated to the cloud. And that’s one very good reason why organizations need better ways to bring security and access controls from internal data centers to cloud operations. One of the tools that they found was CASB, which is Cloud Access […]
21. Define the concepts of SIEM, SOAR and XDR At the end of the day, as a security engineer, it’s your job to protect, defend, and respond. And how you do it is what’s going to make a significant difference in how effectively or quickly you can put out those fires. There are many different […]
11. Lesson Summary By this time, you already know about the different kinds of services that Microsoft Azure provides to protect your systems. You know that the traditional network security perimeter model to protect your assets, resources, and data is very essential. Azure provides a wide range of security tools that will secure your data […]
1. Module Introduction Welcome to the third module of SC 900 Certification Preparation. Describe the capabilities of Microsoft security solutions. Let’s understand what you’ll be learning in this module. Well, the first thing is that we’re going to start with understanding the basic security capabilities in Azure. How you will be protecting the networks, how […]
27. Conditional access in Azure AD Gone are the days when security was focused on a strong perimeter defense. In order to keep malicious hackers away, anything outside the perimeter was treated as hostile, whereas inside the walls, the organizations were trusted. Today’s security mantra is to assume a breach. Now, assume that breach is […]
116. AWS Config – Part 02 Hi everyone, and welcome back to the Knowledge for the video series. So, continuing our journey today, we’ll be speaking about Elastic Beanstalk. Now, since the past year, Elastic Beanstalk has gained a good amount of popularity, specifically among startups, because Elastic Beanstalk makes it quite easy to launch […]
111. OpsWorks LifeCycle Events Hey everyone, and welcome back. In today’s video, we will be discussing the OpsWorks lifecycle events. Now, Ops Works has basically five events that occur during the entire event lifecycle. Now, these events are set up, configured, deployed, undeployed, and shut down. Now, each of these events can be associated with […]
106. Auto Scaling – Scaling Down Operations Hey everyone, and thanks for joining in. Now, in the previous lecture, we examined and confirmed that the scaling up policy is flawless. And in today’s lecture, we will look into whether the scaling down policy is also working perfectly or not. Now, there are two instances that […]
101. Queue Types in SQS Everyone is welcome back. Up until now, we have been discussing a lot of configuration-related parameters for SQS queues, and in today’s lecture, we will be speaking about two types of SQS queues that are available. One is the standard queue, and the other is the FAFO-based queue. So the […]
96. Creating the first Code Deploy configuration Hey everyone, and welcome back. In today’s video, we will be doing the Code Deploy configuration from scratch. So basically, there are certain steps that are needed in order to configure Code Deploy. The first step is to create the IAM role with S 3 and EC 2 […]