0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Microsoft Azure Security Technologies Certification and Beyond - Gain practical skills to secure your Azure environment and... Microsoft Azure Security Technologies Certification and Beyond - Gain practical skills to secure your Azure environment and pass the AZ-500 exam (Paperback)
David Okeyode
R1,388 Discovery Miles 13 880 Ships in 10 - 15 working days

Excel at AZ-500 and implement multi-layered security controls to protect against rapidly evolving threats to Azure environments - now with the the latest updates to the certification Key Features Master AZ-500 exam objectives and learn real-world Azure security strategies Develop practical skills to protect your organization from constantly evolving security threats Effectively manage security governance, policies, and operations in Azure Book DescriptionExam preparation for the AZ-500 means you'll need to master all aspects of the Azure cloud platform and know how to implement them. With the help of this book, you'll gain both the knowledge and the practical skills to significantly reduce the attack surface of your Azure workloads and protect your organization from constantly evolving threats to public cloud environments like Azure. While exam preparation is one of its focuses, this book isn't just a comprehensive security guide for those looking to take the Azure Security Engineer certification exam, but also a valuable resource for those interested in securing their Azure infrastructure and keeping up with the latest updates. Complete with hands-on tutorials, projects, and self-assessment questions, this easy-to-follow guide builds a solid foundation of Azure security. You'll not only learn about security technologies in Azure but also be able to configure and manage them. Moreover, you'll develop a clear understanding of how to identify different attack vectors and mitigate risks. By the end of this book, you'll be well-versed with implementing multi-layered security to protect identities, networks, hosts, containers, databases, and storage in Azure - and more than ready to tackle the AZ-500. What you will learn Manage users, groups, service principals, and roles effectively in Azure AD Explore Azure AD identity security and governance capabilities Understand how platform perimeter protection secures Azure workloads Implement network security best practices for IaaS and PaaS Discover various options to protect against DDoS attacks Secure hosts and containers against evolving security threats Configure platform governance with cloud-native tools Monitor security operations with Azure Security Center and Azure Sentinel Who this book is forThis book is a comprehensive resource aimed at those preparing for the Azure Security Engineer (AZ-500) certification exam, as well as security professionals who want to keep up to date with the latest updates. Whether you're a newly qualified or experienced security professional, cloud administrator, architect, or developer who wants to understand how to secure your Azure environment and workloads, this book is for you. Beginners without foundational knowledge of the Azure cloud platform might progress more slowly, but those who know the basics will have no trouble following along.

Penetration Testing Azure for Ethical Hackers - Develop practical skills to perform pentesting and risk assessment of Microsoft... Penetration Testing Azure for Ethical Hackers - Develop practical skills to perform pentesting and risk assessment of Microsoft Azure environments (Paperback, Ed)
David Okeyode, Karl Fosaaen, Charles Horton
R1,328 Discovery Miles 13 280 Ships in 10 - 15 working days

Simulate real-world attacks using tactics, techniques, and procedures that adversaries use during cloud breaches Key Features Understand the different Azure attack techniques and methodologies used by hackers Find out how you can ensure end-to-end cybersecurity in the Azure ecosystem Discover various tools and techniques to perform successful penetration tests on your Azure infrastructure Book Description"If you're looking for this book, you need it." - 5* Amazon Review Curious about how safe Azure really is? Put your knowledge to work with this practical guide to penetration testing. This book offers a no-faff, hands-on approach to exploring Azure penetration testing methodologies, which will get up and running in no time with the help of real-world examples, scripts, and ready-to-use source code. As you learn about the Microsoft Azure platform and understand how hackers can attack resources hosted in the Azure cloud, you'll find out how to protect your environment by identifying vulnerabilities, along with extending your pentesting tools and capabilities. First, you'll be taken through the prerequisites for pentesting Azure and shown how to set up a pentesting lab. You'll then simulate attacks on Azure assets such as web applications and virtual machines from anonymous and authenticated perspectives. In the later chapters, you'll learn about the opportunities for privilege escalation in Azure tenants and ways in which an attacker can create persistent access to an environment. By the end of this book, you'll be able to leverage your ethical hacking skills to identify and implement different tools and techniques to perform successful penetration tests on your own Azure infrastructure. What you will learn Identify how administrators misconfigure Azure services, leaving them open to exploitation Understand how to detect cloud infrastructure, service, and application misconfigurations Explore processes and techniques for exploiting common Azure security issues Use on-premises networks to pivot and escalate access within Azure Diagnose gaps and weaknesses in Azure security implementations Understand how attackers can escalate privileges in Azure AD Who this book is forThis book is for new and experienced infosec enthusiasts who want to learn how to simulate real-world Azure attacks using tactics, techniques, and procedures (TTPs) that adversaries use in cloud breaches. Any technology professional working with the Azure platform (including Azure administrators, developers, and DevOps engineers) interested in learning how attackers exploit vulnerabilities in Azure hosted infrastructure, applications, and services will find this book useful.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
40 Lives In 40 Days - Experiencing God's…
John MacArthur Hardcover R319 Discovery Miles 3 190
The ANC Spy Bible - My Alliance Across…
Moe Shaik Paperback R355 R305 Discovery Miles 3 050
Churchill & Smuts - The Friendship
Richard Steyn Paperback  (6)
R310 R248 Discovery Miles 2 480
Bounds Of Possibility - The Legacy Of…
Barney Pityana, Mamphela Ramphele, … Paperback R471 Discovery Miles 4 710
Ongeskonde
Alwyn Uys Paperback R240 R206 Discovery Miles 2 060
The Year Of Facing Fire - A Memoir
Helena Kriel Paperback R315 R271 Discovery Miles 2 710
Winged Messenger - Running Your First…
Bruce Fordyce Paperback  (1)
R303 Discovery Miles 3 030
Jump - A Memoir
Lenerd Louw Paperback R248 Discovery Miles 2 480
Geroep vir 'n Tyd Soos Hierdie
Farren Cloete Paperback R260 R189 Discovery Miles 1 890
Weerklink Van 'n Wanklank - Memoires Van…
Pieter-Dirk Uys Paperback R305 Discovery Miles 3 050

 

Partners