Author: ultroni1

  • Describe the Zero Trust model

    Zero Trust assumes everything is on an open and untrusted network, even resources behind the firewalls of the corporate network. The Zero Trust model operates on the principle of “trust no one, verify everything.

    Attackers’ ability to bypass conventional access controls is ending any illusion that traditional security strategies are sufficient. By no longer trusting the integrity of the corporate network, security is strengthened.

    In practice, this means that we no longer assume that a password is sufficient to validate a user but add multi-factor authentication to provide additional checks. Instead of granting access to all devices on the corporate network, users are allowed access only to the specific applications or data that they need.

    oracle database training courses malaysia

  • Describe defense in depth

    Defense in depth uses a layered approach to security, rather than relying on a single perimeter. A defense in-depth strategy uses a series of mechanisms to slow the advance of an attack. Each layer provides protection so that, if one layer is breached, a subsequent layer will prevent an attacker getting unauthorized access to data.

    Example layers of security might include:

    • Physical security such as limiting access to a datacenter to only authorized personnel.
    • Identity and access security controls, such as multifactor authentication or condition-based access, to control access to infrastructure and change control.
    • Perimeter security of your corporate network includes distributed denial of service (DDoS) protection to filter large-scale attacks before they can cause a denial of service for users.
    • Network security, such as network segmentation and network access controls, to limit communication between resources.
    • Compute layer security such as securing access to virtual machines either on-premises or in the cloud by closing certain ports.
    • Application layer security to ensure applications are secure and free of security vulnerabilities.
    • Data layer security including controls to manage access to business and customer data and encryption to protect data.

    oracle e business suite training courses malaysia

  • Describe the shared responsibility model

    In organizations running only on-premises hardware and software, the organization is 100 percent responsible for implementing security and compliance. With cloud-based services, that responsibility is shared between the customer and the cloud provider.

    The shared responsibility model identifies which security tasks are handled by the cloud provider, and which security tasks are handled by you, the customer. The responsibilities vary depending on where the workload is hosted:

    • Software as a Service (SaaS)
    • Platform as a Service (PaaS)
    • Infrastructure as a Service (IaaS)
    • On-premises datacenter

    The shared responsibility model makes responsibilities clear. When organizations move to the cloud, some responsibilities transfer to the cloud provider and some to the customer organization.

    oracle linux administration training courses malaysia

  • Access preview features

    Microsoft offers previews of Azure features for evaluation purposes. With Azure Preview Features, you can try out prerelease features and services before they’re rolled out to everyone.

    Some common types of previews that you might see include:

    • New storage types
    • New Azure services, such as Machine Learning enhancements
    • New or enhanced integration with other platforms
    • New APIs for services

    Azure feature previews are available under certain terms and conditions that are specific to each particular Azure preview. Some previews aren’t covered by customer support.

    Once a feature has been evaluated and tested successfully, it might be released to customers as part of Azure’s default product set. This release is referred to as General Availability (GA).

    oracle peoplesoft training courses malaysia

  • Azure portal dashboards

    Let’s look at how to create and modify dashboards in the Azure portal. In this unit, you learn about creating and using dashboards. In the next unit, you’ll try out the things you learned.

    What is a dashboard?

    dashboard is a customizable collection of UI tiles displayed in the Azure portal. You can add, remove, and position tiles to create the exact view you want, then save that view as a dashboard. You can configure multiple dashboards, and you can switch among them as needed. You can even share your dashboards with other team members.

    Dashboards give you flexibility in what information to display. For example, you can create dashboards for specific roles within the organization, then use role-based access control (RBAC) to control who can access each dashboard.

    Dashboards are stored as JavaScript Object Notation (JSON) files. This format means you can download a dashboard and edit the file directly, then upload it again to Azure or share it with other users. Azure stores dashboards within resource groups, just like any other resource that you can manage within the portal.

    oracle siebel crm training courses malaysia

  • Navigate the portal

    With an Azure account, you can sign into the Azure portal. The portal is a web-based administration site that lets you interact with Azure services and the resources you’ve created. Almost everything you do with Azure can be done through this web interface.

    Azure portal layout

    When you first sign in to the Azure portal, the default page is Home.You can change your default view to the customizable Dashboard in the portal’s settings. You’ll learn more about dashboards later in this module.

    Copilot in Azure

    Near the top of the screen, you see the Copilot button.

    Screenshot showing the Copilot for Azure button in the Azure portal.

    If your organization has made Microsoft Copilot in Azure (preview) available, you can select this button to ask questions, quickly navigate to services and resources, or get help with tasks. For example, Copilot in Azure can help you design, operate, optimize, and troubleshoot your Azure apps and infrastructure. Copilot for Azure can also help you gain new insights about which Azure services can help with your objectives.

    php programming training courses malaysia

  • Azure management options

    You can configure and manage Azure using a broad range of tools and platforms. There are tools available for the command line, language-specific Software Development Kits (SDKs), developer tools, tools for migration, and many others.

    Tools that are commonly used for day-to-day management and interaction include:

    • Azure portal for interacting with Azure via a Graphical User Interface (GUI)
    • Azure PowerShell and Azure Command-Line Interface (CLI) for command-line and automation-based interactions with Azure
    • Azure Cloud Shell for a web-based command-line interface
    • Azure mobile app for monitoring and managing your resources from your mobile device

    There are also Azure SDKs for a range of languages and frameworks and REST APIs to help manage and control Azure resources programmatically.

    When you’re starting out with Azure, you’ll probably use the Azure portal most often.

    power bi training courses malaysia

  • Create custom security attributes

    What is a custom security attribute?

    Custom security attributes in Microsoft Entra ID are business-specific attributes (key-value pairs) that you can define and assign to Microsoft Entra objects. These attributes can be used to store information, categorize objects, or enforce fine-grained access control over specific Azure resources.

    Why use custom security attributes?

    • Extend user profiles, such as add Employee Hire Date and Hourly Salary to all my employees.
    • Ensure only administrators can see the Hourly Salary attribute in my employees’ profiles.
    • Categorize hundreds or thousands of applications to easily create a filterable inventory for auditing.
    • Grant users access to the Azure Storage blobs belonging to a project.

    What can I do with custom security attributes?

    • Define business-specific information (attributes) for your tenant.
    • Add a set of custom security attributes on users, applications, Microsoft Entra resources, or Azure resources.
    • Manage Microsoft Entra objects using custom security attributes with queries and filters.
    • Provide attribute governance so attributes determine who can get access.

    prince2 certification training courses malaysia

  • Manage licenses

    Microsoft paid cloud services, such as Microsoft 365, Enterprise Mobility + Security, Dynamics 365, and other similar products, require licenses. These licenses are assigned to each user who needs access to these services. To manage licenses, administrators use one of the management portals (Office or Azure) and PowerShell cmdlets. Microsoft Entra ID is the underlying infrastructure that supports identity management for all Microsoft cloud services. Microsoft Entra ID stores information about license assignment states for users.

    Until now, licenses could only be assigned at the individual user level, which can make large-scale management difficult. For example, to add or remove user licenses based on organizational changes, such as users joining or leaving the organization or a department, an administrator often must write a complex PowerShell script. This script makes individual calls to the cloud service.

    To address those challenges, Microsoft Entra ID now includes group-based licensing. You can assign one or more product licenses to a group. Microsoft Entra ID ensures that the licenses are assigned to all members of the group. Any new members who join the group are assigned the appropriate licenses. When they leave the group, those licenses are removed. This licensing management eliminates the need for automating license management via PowerShell to reflect changes in the organization and departmental structure on a per-user basis.

    python programming training courses malaysia

  • Configure and manage device registration

    With the proliferation of devices of all shapes and sizes and the proliferation of bring-your-own-device (BYOD), IT professionals are faced with two somewhat opposing goals:

    • Allow end users to be productive wherever and whenever and on any device
    • Protect the organization’s assets

    To protect these assets, IT-staff needs to first manage the device identities. IT-staff can build on the device identity with tools like Microsoft Intune to ensure standards for security and compliance are met. Microsoft Entra ID enables single sign-on to devices, apps, and services from anywhere through these devices.

    • Your users get access to your organization’s assets they need.
    • Your IT-staff gets the controls they need to secure your organization.

    Microsoft Entra registered devices

    The goal of Microsoft Entra registered devices is to provide your users with support for the BYOD or mobile device scenarios. In these scenarios, a user can access your organization’s Microsoft Entra ID controlled resources using a personal device.

    red hat certified architect rhca malaysia