Category Archives: Uncategorized
6. Monitoring Performance Let us now discuss monitoring performance because we need the equipment to be running optimally at all times, and the IS auditor wants to ensure that the equipment, services, and processes are being monitored. There needs to be a performance monitoring plan, not just for hardware but also for software. In the […]
11. AZ-203/ 204 – Working with the Key Vault – .Net – Managed Service Identity Hi, and welcome back. So now let’s look at the programme and see how we can actually get a secret from the keyword using the managed service identity. So this programme is actually going to run on an Azure virtual […]
1. AZ-203/ 204 – What is the Azure Key Vault Service Hi, and welcome back. Now, in this chapter, I want to go ahead and talk about the Azure Keyword Service. So the Azure Keyword service is basically a managed service in Azure, which is basically used to manage all of your secrets. So let’s […]
36. AZ-203/204 – Lab – Azure CosmosDB Hi, and welcome back. Now in this chapter, let’s look at how we can work with Azure Cosmos DB. Now, before moving on ahead, there are a few concepts that are important to know. So in Azure, the first thing you do is create an Azure Cosmos DB […]
27. AZ-203/204 – Lab – Azure Functions – Queue and Table binding Hi, and welcome back. Now, in the earlier chapter, we saw how to work with the queue trigger. So we add the Azure function itself. It was going ahead and processing messages in a queue. Now we’ll go a step further. We’ll actually […]
15. AZ-203/204 – Lab – Storage Accounts – Blob snapshots Hi, and welcome back. Now in this chapter, we are going to look at something known as “snapshots,” which are available for your blobs. Let me go on to an existing storage account. So I’ll go on to my containers. Let me go ahead and […]
3. AZ-203/204 – More on storage accounts Hello and welcome back! Now, in this chapter, let’s go over some other aspects of storage accounts. The first distinction is between general purpose and two accounts. This is the most commonly used type of storage account. This is recommended by Microsoft for most scenarios. Now, when you […]
1. Cisco Statefull Firewalls – IOS – ASA Probably in this video, we’ll learn what a firewall is and then try to understand why we need one. And then we’ll also talk about modem firewall design. So definition-wise, a firewall is a system or a group of systems that manages the access between two or […]
10. Dynamic ARP Inspection – Configuration In this video, we’ll verify the dynamic art inspection feature on the Cisco switches. Now, “dynamic art inspection” is a feature on the Cisco switches that prevents ARP spoofing attacks. Let us now attempt to validate this. Let me give you some general ideas about the basic setup I’ll […]
6. DHCP Spoofing Attack – DHCP Spoofing In this video, we’ll talk about what a Misaddress proofing attack is and generally how it happens, how the port security feature is going to be used, and how it’s going to provide this kind of attack. That’s something we are going to see here. The first thing […]