https://www.bconcepts.pt/cloud-security/
https://docs.microsoft.com/en-us/azure/security/fundamentals/overview
https://docs.microsoft.com/en-us/azure/security/fundamentals/end-to-end
https://docs.microsoft.com/en-us/learn/modules/azure-well-architected-security/
https://docs.microsoft.com/en-us/azure/azure-government/documentation-government-plan-security
https://docs.microsoft.com/en-us/learn/modules/network-fundamentals-2/
https://docs.microsoft.com/en-us/learn/paths/implement-network-security/
https://docs.microsoft.com/en-us/learn/modules/secure-aad-users-with-mfa/
https://docs.microsoft.com/en-us/learn/modules/secure-your-azure-sql-database/
https://docs.microsoft.com/en-us/learn/modules/configure-security-policies-to-manage-data/
https://docs.microsoft.com/en-us/learn/modules/top-5-security-items-to-consider/
https://docs.microsoft.com/en-us/learn/modules/secure-vms-with-azure-security-center/
https://docs.microsoft.com/en-us/learn/modules/capture-application-logs-app-service/
https://docs.microsoft.com/en-us/learn/paths/manage-identity-and-access/
https://docs.microsoft.com/en-us/learn/paths/manage-security-operations/
https://docs.microsoft.com/en-us/learn/modules/tm-create-a-threat-model-using-foundational-data-flow-diagram-elements/
No comments:
Post a Comment