Jacobs / Copeland | Cyber Security on Azure | Buch | 978-1-4842-6530-7 | sack.de

Buch, Englisch, 278 Seiten, Paperback, Format (B × H): 178 mm x 254 mm, Gewicht: 561 g

Jacobs / Copeland

Cyber Security on Azure

An IT Professional¿s Guide to Microsoft Azure Security

Buch, Englisch, 278 Seiten, Paperback, Format (B × H): 178 mm x 254 mm, Gewicht: 561 g

ISBN: 978-1-4842-6530-7
Verlag: Apress


Prevent destructive attacks to your Azure public cloud infrastructure, remove vulnerabilities, and instantly report cloud security readiness. This book provides comprehensive guidance from a security insider's perspective.

Cyber Security on Azure supports cloud security operations and cloud security architects by supplying a path to clearly identify potential vulnerabilities to business assets and reduce security risk in Microsoft Azure subscription. This updated edition explores how to “lean-in” and recognize challenges with IaaS and PaaS for identity, networks, applications, virtual machines, databases, and data encryption to use the variety of Azure security tools. You will dive into Azure Cloud Security to guide cloud operations teams to become more security focused in many areas and laser focused on security configuration. New chapters cover Azure Kubernetes Service and Container security and you will get up and running quickly with an overview of Azure Sentinel SIEM Solution.

What You'll Learn
- Understand enterprise privileged identity and security policies

- "Shift left" with security controls in Microsoft Azure

- Configure intrusion detection and alerts
- Reduce security risks using Azure Security Service

Who This Book Is For
IT, cloud, and security administrators in Azure
Jacobs / Copeland Cyber Security on Azure jetzt bestellen!

Zielgruppe


Professional/practitioner

Weitere Infos & Material


Part I: Zero Trust Cloud Security. - Chapter 1. Reduce Cybersecurity Vulnerabilities: Identity Layer. - Chapter 2. Azure Network Security Configuration. - Chapter 3. Reduce Cyber Security Vulnerabilities: IaaS and Data. - Part II: Azure Cloud Security Operations.- Chapter 4. Configure Azure Monitoring for Blue Team Hunting. - Chapter 5. Azure Security Center and Azure Sentinel. - Chapter 6. Azure Kubernetes Services: Container Security. - Chapter 7. Security Governance Operations.


Marshall Copeland is a cloud security architect focused on helping customers “shift left” with cloud security defenses in Azure public cloud using cloud-native services and third-party network security appliances. He uses Infrastructure as Code (IaC) with ARM templates or Terraform HCL to build cloud infrastructure and disaster recovery solutions. Marshall's Azure security design skills include Azure Sentinel, Security Center, Policy, Firewall and ACL networking, and a few open-source solutions such as ELK stack, Wireshark, and Snort. He partners with security operations to guide cloud investigations to enhance “blue team hunting” efficiencies.

Matthew Jacobs is a system engineer focused on cloud architecture technologies needed to support identity management, security, and collaboration tool sets for small and medium businesses, including enterprise organizations. His work has focused on digital transformation, including on-premise only, hybrid cloud networks, and complete public cloud-only deployment. Matthew brings a hands-on cloud architecture approach for Identity Management (IAM) and enhanced engineering to enable business agility that secures and supports a global remote work force. His current work in the Nashville, Tennessee area includes Fortune 500 media, entertainment, and hospitality companies, and his work history extends into public cloud federal compliance requirements for the banking and healthcare industries.


Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.