Published by : Baturi | Views: 22 | Category: Tutorials


Oracle Apps Technical R12 Training (Beginner to Expert) (Updated 10.2021)
Genre: eLearning | MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 11.9 GB | Duration: 28h 45m
Oracle Apps Techno Functional Course (Expert Level) (2021) Latest Version



Read More     
Published by : Baturi | Views: 30 | Category: Tutorials


Nick DeNardis - Introduction to User Experience Design
MP4 | Video: AVC 1280 x 720 | Audio: AAC 48 Khz 2ch | Duration: 09:43:43 | 17.12 GB
Genre: eLearning | Language: English
8+ Hours of Video Instruction



Read More     
Published by : Baturi | Views: 26 | Category: Tutorials


NEW AWS Certified Solutions Architect Associate 2021 SAA-C02 (Update 10.2021)
MP4 | Video: h264, yuv420p, 1920x1080 | Audio: aac, 22050 Hz | Duration: 21h 33m | File Size: 7.86 GB
Genre: eLearning | Language: English
NEW Course Sept 2021 - AWS Certified Solutions Architect Associate + AWS Solutions Architect Associate Practice Test



Read More     
Published by : Baturi | Views: 19 | Category: Tutorials


Microsoft Information Protection Administrator (SC-400)
Michael Brown, JS Padoan | Duration: 7:34 h | Video: H264 1280x720 | Audio: AAC 48 kHz 2ch | 865 MB | Language: English + SUB
One of the key ingredients in having a secure enterprise is controlling information protection. These courses will show you how to use Microsoft information protection solutions to make sure your data is safe.
These courses cover the objectives of the SC-400 certification exam and can help you prepare.



Read More     
Published by : Baturi | Views: 49 | Category: Tutorials


Microsoft Identity and Access Implementing an Identity Governance Strategy
Sahil Malik | Duration: 1:09 h | Video: H264 1280x720 | Audio: AAC 48 kHz 2ch | 159 MB | Language: English + SUB
This course will teach you how to manage entitlements, perform access reviews, set up PIM, and monitor your AAD via logs.
Security and governance should be at the forefront of every responsible IT administrator. In this course, Implement an Identity Governance Strategy, you'll learn to manage and govern your Azure Active Directory or AAD. First, you'll explore entitlement management where we will understand catalogs, access packages, and user lifecycle management. Next, you'll discover important concepts such as access reviews and privileged identity management. Finally, you'll learn how to how to make the best use of the logs that AAD produces. When you're finished with this course, you'll have the skills and knowledge of implement an identity governance strategy needed to govern and manage your AAD.



Read More     
Published by : Baturi | Views: 37 | Category: Tutorials


Microsoft Identity and Access Implementing an Authentication and Access Management Solution
Reza Salehi | Duration: 2:09 h | Video: H264 1280x720 | Audio: AAC 48 kHz 2ch | 280 MB | Language: English + SUB
Are you an Azure Active Directory administrator? This course will teach you how to use MFA, conditional access, and identity protection to manage your identity solution.
Do you need to manage your identity solution in Microsoft Azure? In this course, Microsoft Identity and Access: Implementing an Authentication and Access Management Solution, you'll learn to manage identities in Azure AD. First, you'll explore how to secure Azure AD users with MFA. Next, you'll discover managing user authentication and conditional access. Finally, you'll learn how to manage Azure AD identity protection. When you're finished with this course, you'll have the skills and knowledge of Microsoft identity and access needed to implement an authentication and access management solution.



Read More     
Published by : Baturi | Views: 31 | Category: Tutorials


Microsoft Identity and Access Implementing Access Management for Apps
Reza Salehi | Duration: 1:26 h | Video: H264 1280x720 | Audio: AAC 48 kHz 2ch | 198 MB | Language: English + SUB
Are you an Azure Active Directory (AD) administrator? This course will teach you how applications can be added to your identity and access solution with application registration in Azure AD.
Applications can use Azure Active Directory identities to secure access to resources in the cloud. In this course, Microsoft Identity and Access: Implementing Access Management for Apps, you'll learn to add your applications to Azure AD identity solutions. First, you'll explore designing enterprise apps integration for SSO. Next, you'll discover how to implement and monitor these integrations. Finally, you'll learn how to implement app registrations in Azure AD. When you're finished with this course, you'll have the skills and knowledge of Azure Active Directory needed to implement access management for apps.



Read More     
Published by : Baturi | Views: 24 | Category: Tutorials


Microsoft Endpoint Manager Package Software for Deployment with MECM and Intune
Greg Shields | Duration: 1:02 h | Video: H264 1280x720 | Audio: AAC 48 kHz 2ch | 128 MB | Language: English + SUB
Step away from MECM and Intune as you explore the art and science of software packaging in this course.
At exactly the midpoint of this learning path, we have completed the steps necessary to build both an Intune and MECM environment, including their integration together. The second half of this learning path turns its attentions to actually using this environment. It begins with this course, which explores the tactics and techniques in software packaging -- all of which are needed to be successful in deploying software to devices via either half of Microsoft Endpoint Manager.



Read More     
Published by : Baturi | Views: 29 | Category: Tutorials


Microsoft Endpoint Manager Inventory, QueriesCollections, and CMPivot with MECM
Greg Shields | Duration: 2:13 h | Video: H264 1280x720 | Audio: AAC 48 kHz 2ch | 392 MB | Language: English + SUB
Explore the data collection and presentation side of Configuration Manager in this course as you customize hardware and software inventory, create queries and collections, and get to know the CMPivot tool.
The previous course finishes most of the foundational configurations to get an MECM primary site operational. But one final preparation involves the settings required to configure and customize hardware and software inventory collection. Enabling this data collection delivers access to an impressive range of machine characteristics. Understanding both the art and the science of then querying that data is arguably the most important and the most difficult part of the job.



Read More     
Published by : Baturi | Views: 32 | Category: Tutorials


Microsoft Endpoint Manager Intune Co-management with Cloud Attach
Greg Shields | Duration: 2:15 h | Video: H264 1280x720 | Audio: AAC 48 kHz 2ch | 341 MB | Language: English + SUB
Integrate Intune with MECM via Cloud Attach and Co-management, configure Tenant Attach and Client Attach, get introduced to Endpoint Analytics, and explore enrolling devices into Intune in this course.
Seven courses in, and this learning path finally gets around to the Microsoft Endpoint Manager integration between MECM and Intune. Delaying this topic to nearly the midpoint in the learning path was intentional, as the setup processes for MECM are so complex in nature. What results from their co-management interconnection is the ability to select which workload accomplishes each major category of activities.



Read More     
← Previous    1 ... 10 11 12 13 14 15 16 17 18 ... 38    Next →

To Page :

Recent

Searches