Détail de l'auteur
Auteur David OKEYODE |
Documents disponibles écrits par cet auteur (2)
![](./images/expand_all.gif)
![](./images/collapse_all.gif)
![Tris disponibles](./images/orderby_az.gif)
Microsoft Azure Security Technologies Certification and Beyond / David OKEYODE / PACKT PUBLISHING (2021)
![]()
Titre : Microsoft Azure Security Technologies Certification and Beyond Type de document : e-book Auteurs : David OKEYODE Editeur : PACKT PUBLISHING Année de publication : 2021 ISBN/ISSN/EAN : 9781800562653 Note générale : copyrighted Langues : Anglais (eng) Résumé : Learn how to implement multi-layered security controls to protect against rapidly evolving threats to Azure environmentsKey FeaturesDevelop practical skills to protect your organization from constantly evolving security threatsBecome well-versed with real-world Azure security strategies and AZ-500 exam objectivesEffectively manage security governance, policies, and operations in AzureBook DescriptionSecurity is a key part of any well-architected design. With the help of this book, you'll gain both the knowledge and the practical skills to significantly reduce the attack surface of your Azure workloads and protect your organization from constantly evolving threats to public cloud environments like Azure. This book is a comprehensive security guide for those looking to take the Azure Security Engineer certification exam as well as for those interested in securing their Azure infrastructure. Beyond preparing you for the Azure Security (AZ-500) exam, this book will guide you in securing your Azure environments and workloads using native Azure security capabilities. Complete with hands-on tutorials, projects, and self-assessment questions, this easy-to-follow guide builds a solid foundation of Azure security. You'll not only learn about security technologies in Azure but also be able to configure and manage them. Moreover, you'll develop a clear understanding of how to identify different attack vectors and mitigate risks. By the end of this book, you'll be well-versed with implementing multi-layered security to protect identities, networks, hosts, containers, databases, and storage in Azure.What you will learnManage users, groups, service principals, and roles effectively in Azure ADExplore Azure AD identity security and governance capabilitiesUnderstand how platform perimeter protection secures Azure workloadsImplement network security best practices for IaaS and PaaSDiscover various options to protect against DDoS attacksSecure hosts and containers against evolving security threatsConfigure platform governance with cloud-native toolsMonitor security operations with Azure Security Center and Azure SentinelWho this book is forIf you are a newly qualified or experienced security professional, cloud administrator, architect, or developer who wants to understand how to secure your Azure environment and workloads, this book is for you. The book is a handy resource for anyone preparing to take the Azure Security Engineer (AZ-500) certification exam. Foundational knowledge of the Azure cloud platform will be helpful but not necessary to understand the concepts covered in this book. Nombre d'accès : Illimité En ligne : http://library.ez.neoma-bs.fr/login?url=https://www.scholarvox.com/book/88919628 Permalink : https://cataloguelibrary.neoma-bs.fr/index.php?lvl=notice_display&id=538040
Titre : Penetration Testing Azure for Ethical Hackers Type de document : e-book Auteurs : David OKEYODE Editeur : PACKT PUBLISHING Année de publication : 2021 ISBN/ISSN/EAN : 9781839212932 Note générale : copyrighted Langues : Anglais (eng) Résumé : Simulate real-world attacks using tactics, techniques, and procedures that adversaries use during cloud breachesKey FeaturesUnderstand the different Azure attack techniques and methodologies used by hackersFind out how you can ensure end-to-end cybersecurity in the Azure ecosystemDiscover various tools and techniques to perform successful penetration tests on your Azure infrastructureBook DescriptionSecurity professionals working with Azure will be able to put their knowledge to work with this practical guide to penetration testing. The book provides a hands-on approach to exploring Azure penetration testing methodologies that will help you get up and running in no time with the help of a variety of real-world examples, scripts, and ready-to-use source code. As you learn about the Microsoft Azure platform and understand how hackers can attack resources hosted in the Azure cloud, you'll find out how to protect your environment by identifying vulnerabilities, along with extending your pentesting tools and capabilities. This book starts by taking you through the prerequisites for pentesting Azure and shows you how to set up a pentesting lab. You'll then simulate attacks on Azure assets such as web applications and virtual machines from anonymous and authenticated perspectives. Finally, you'll learn about the opportunities for privilege escalation in Azure tenants and ways in which an attacker can create persistent access to an environment. By the end of this book, you'll be able to leverage your ethical hacking skills to identify and implement different tools and techniques to perform successful penetration tests on your own Azure infrastructure.What you will learnIdentify how administrators misconfigure Azure services, leaving them open to exploitationUnderstand how to detect cloud infrastructure, service, and application misconfigurationsExplore processes and techniques for exploiting common Azure security issuesUse on-premises networks to pivot and escalate access within AzureDiagnose gaps and weaknesses in Azure security implementationsUnderstand how attackers can escalate privileges in Azure ADWho this book is forThis book is for new and experienced infosec enthusiasts who want to learn how to simulate real-world Azure attacks using tactics, techniques, and procedures (TTPs) that adversaries use in cloud breaches. Any technology professional working with the Azure platform (including Azure administrators, developers, and DevOps engineers) interested in learning how attackers exploit vulnerabilities in Azure hosted infrastructure, applications, and services will find this book useful. Nombre d'accès : Illimité En ligne : http://library.ez.neoma-bs.fr/login?url=https://www.scholarvox.com/book/88922098 Permalink : https://cataloguelibrary.neoma-bs.fr/index.php?lvl=notice_display&id=538777
![rss](https://cataloguelibrary.neoma-bs.fr/images/rss.png)
-
59 Rue Taittinger, 51100 Reims
-
00 33 (0)3 26 77 46 15
-
Library Campus Reims
-
1 Rue du Maréchal Juin, BP 215
76825 Mont Saint Aignan cedex -
00 33 (0)2 32 82 58 26
-