Category: Courses

What is Azure HSM?

 tonyhughes  March 8, 2023

An Azure HSM, or Azure Dedicated HSM, is a cloud-based hardware security module (HSM) service provided by Microsoft Azure. It…

What is FIPS 140-2 Level 2?

 tonyhughes  March 8, 2023

FIPS 140-2 is a US government standard that specifies security requirements for cryptographic modules, such as hardware security modules (HSMs)…

What is FIPS 140-2 Level 3

 tonyhughes  March 8, 2023

FIPS 140-2 is a US government standard that specifies security requirements for cryptographic modules, such as hardware security modules (HSMs)…

Azure Key Vault Permissions

 tonyhughes  March 8, 2023

Azure Key Vault policy Azure Key Vault Policy is a feature of Azure Key Vault that enables you to enforce…

What is Azure Key Vault?

 tonyhughes  March 8, 2023

Azure Key Vault is a cloud-based service provided by Microsoft that enables users to store and manage cryptographic keys, secrets,…

What are ACR Authentication methods ?

 tonyhughes  March 5, 2023

Azure Container Registry (ACR) supports several authentication methods to securely access container images. Here are the authentication methods supported by…

What is Azure DSC?

 tonyhughes  March 5, 2023

Azure DSC (Desired State Configuration) is a cloud-based service that enables you to define and manage the configuration of your…

How do I configure Powershell DSC?

 tonyhughes  March 5, 2023

To configure PowerShell DSC, you need to create a DSC configuration script and apply it to the target node(s). Here…

What is Powershell DSC?

 tonyhughes  March 5, 2023

PowerShell Desired State Configuration (DSC) is a configuration management tool that is built into Windows PowerShell. It enables the creation…

What is the Azure Bastion Service?

 tonyhughes  March 5, 2023

What is Azure Bastion Service? Azure Bastion Service is a fully managed Platform-as-a-Service (PaaS) that provides secure and seamless remote…