This three-day advanced course covers advanced development topics such as architecting for a cloud-native environment; deconstructing on-premises, legacy applications and repackaging them into cloud-based, cloud-native architectures; and applying the...
Day 1 Module 0: Introduction to Migrating to AWS Course introduction Module 1: What Is a Cloud Migration? Summarize the drivers and desired outcomes of a cloud migration, Identify the elements of a successful migration journey, Describe the three-pha...
Defender for CloudÜberblick über Defender for Cloud, Voraussetzungen und Einrichtung, Sichern von Azure Workloads, Sichern von on-premises Workloads, Cloud Security Posture Management Überblick, Automatisch auf Alarme reagieren, Implementieren von Az...
Defender for CloudÜberblick über Defender for Cloud, Voraussetzungen und Einrichtung, Sichern von Azure Workloads, Sichern von on-premises Workloads, Cloud Security Posture Management Überblick, Automatisch auf Alarme reagieren, Implementieren von Az...
SAP systems have unique characteristics and potential vulnerabilities that are distinctive to SAP technology. Learning to conduct threat modeling specifically for your landscape can significantly improve how you identify and prioritize threats and vu...
Data is growing faster in massive stages than ever before. New data is created every second by big data analytics, mobile devices, and social applications. At the rate which data has increased, businesses of all sizes are faced with challenges like c...