SlideShare a Scribd company logo
1 of 15
Module 7: Configuring
Network Security
Overview
Configure Windows Defender in Windows 7
Configure Microsoft Security Essentials
Configure Windows Firewall Settings
Lesson 1: Configuring Windows Defender in
Windows 7
What Is Windows Defender in Windows 7?
Tools and Settings for Windows Defender
Using Windows Vista to configure Windows Defender
Guidelines for configuring Windows Defender
What Is Windows Defender in Windows 7?
Real-time scanning
Automated scanning and removal
Real-time scanning
Automated scanning and removal
Tools and Settings for Windows Defender
Quarantined Items
Remove or restore software that Windows Defender has prevented
from running
Software Explorer
View detailed information about software that is running on the
computer
Allowed Items
View software that you have chosen not to monitor with Windows
Defender
Windows Defender Website
Get more tools and the latest security information online
Microsoft Spynet
Join online community of users reporting how they deal with
unclassified software
Demonstration: Using Windows 7 to Configure
Windows Defender
In this demonstration, you will see how to
configure Windows Defender Tools and
Settings
Guidelines for Configuring Windows Defender
Configure Automated Spyware Definition Updates
Configure a nightly full scan of your system
Place suspect files into quarantine for further inspection
Configure continuous real-time protection
Join the Microsoft Spynet community
Lesson 2: Configuring Windows Firewall Settings
What is Windows Firewall
Windows Firewall Settings
Windows Firewall with Advanced Security feature
Configuring inbound rules
Configuring outbound rules
Configuring computer connection security rules
What Is Windows Firewall?
Windows Firewall Settings
Windows Firewall with Advanced Security Feature
Inbound Rules
Outbound Rules
Connection Security Rules
Monitoring
Configuring Inbound Rules
Connection
Requirement
Connection
Requirement
Network
Environment
Network
Environment
Allow or BlockAllow or Block Connecting
Computers
Connecting
Computers
Program or
Port
Program or
Port
Configuring Outbound Rules
Connection
Requirement
Connection
Requirement
Network
Environment
Network
Environment
Allow or BlockAllow or Block Connecting
Computers
Connecting
Computers
Connection
Type
Connection
Type
Configuring Computer Connection Security Rules
Security
Requirements
Security
Requirements
Connection
Endpoints
Connection
Endpoints
Authentication
Type
Authentication
Type
Incoming or
Outgoing
Incoming or
Outgoing
Security LevelSecurity LevelExemptionsExemptions
Lab: Configuring Network Security
Exercise 1: Configuring Windows Defender
Exercise 2: Configuring Windows Firewall

More Related Content

What's hot

so big
so bigso big
so bigcainem
 
Enhance Virtual Machine Security in OpenStack Using Suricata IPS
Enhance Virtual Machine Security in OpenStack Using Suricata IPSEnhance Virtual Machine Security in OpenStack Using Suricata IPS
Enhance Virtual Machine Security in OpenStack Using Suricata IPSShila044184
 
July 2017 Patch Tuesday - Ivanti
July 2017 Patch Tuesday - IvantiJuly 2017 Patch Tuesday - Ivanti
July 2017 Patch Tuesday - IvantiIvanti
 
Nessus Software
Nessus SoftwareNessus Software
Nessus SoftwareMegha Sahu
 
September 2017 Patch Tuesday
September 2017 Patch TuesdaySeptember 2017 Patch Tuesday
September 2017 Patch TuesdayIvanti
 
Windows 7 Security--Windows 7 password reset
Windows 7 Security--Windows 7 password resetWindows 7 Security--Windows 7 password reset
Windows 7 Security--Windows 7 password resetPassreset
 
Ch08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System VulnerabilitiesCh08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System Vulnerabilitiesphanleson
 
Patch Tuesday - August 2017 - Ivanti
Patch Tuesday - August 2017 - IvantiPatch Tuesday - August 2017 - Ivanti
Patch Tuesday - August 2017 - IvantiErica Azad
 
January2017 patchtuesdayshavlik
January2017 patchtuesdayshavlikJanuary2017 patchtuesdayshavlik
January2017 patchtuesdayshavlikLANDESK
 
Wittyvirusabic
WittyvirusabicWittyvirusabic
Wittyvirusabicabisai09
 
Defending Against the Dark Arts of LOLBINS
Defending Against the Dark Arts of LOLBINS Defending Against the Dark Arts of LOLBINS
Defending Against the Dark Arts of LOLBINS Brent Muir
 
How to fix Bitdefender threat scanner error Message
How to fix Bitdefender threat scanner error MessageHow to fix Bitdefender threat scanner error Message
How to fix Bitdefender threat scanner error Messagejimmyjonsan
 
April 2017 patch tuesday ivanti
April 2017 patch tuesday ivantiApril 2017 patch tuesday ivanti
April 2017 patch tuesday ivantiChris Goettl
 
May 2017 Patch Tuesday Ivanti
May 2017 Patch Tuesday IvantiMay 2017 Patch Tuesday Ivanti
May 2017 Patch Tuesday IvantiIvanti
 
June2017 patchtuesdayivanti
June2017 patchtuesdayivantiJune2017 patchtuesdayivanti
June2017 patchtuesdayivantiIvanti
 

What's hot (17)

Eset TOP10 USP
Eset TOP10 USPEset TOP10 USP
Eset TOP10 USP
 
so big
so bigso big
so big
 
Enhance Virtual Machine Security in OpenStack Using Suricata IPS
Enhance Virtual Machine Security in OpenStack Using Suricata IPSEnhance Virtual Machine Security in OpenStack Using Suricata IPS
Enhance Virtual Machine Security in OpenStack Using Suricata IPS
 
July 2017 Patch Tuesday - Ivanti
July 2017 Patch Tuesday - IvantiJuly 2017 Patch Tuesday - Ivanti
July 2017 Patch Tuesday - Ivanti
 
Nessus Software
Nessus SoftwareNessus Software
Nessus Software
 
September 2017 Patch Tuesday
September 2017 Patch TuesdaySeptember 2017 Patch Tuesday
September 2017 Patch Tuesday
 
Windows 7 Security--Windows 7 password reset
Windows 7 Security--Windows 7 password resetWindows 7 Security--Windows 7 password reset
Windows 7 Security--Windows 7 password reset
 
Ch08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System VulnerabilitiesCh08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System Vulnerabilities
 
Patch Tuesday - August 2017 - Ivanti
Patch Tuesday - August 2017 - IvantiPatch Tuesday - August 2017 - Ivanti
Patch Tuesday - August 2017 - Ivanti
 
January2017 patchtuesdayshavlik
January2017 patchtuesdayshavlikJanuary2017 patchtuesdayshavlik
January2017 patchtuesdayshavlik
 
Wittyvirusabic
WittyvirusabicWittyvirusabic
Wittyvirusabic
 
Defending Against the Dark Arts of LOLBINS
Defending Against the Dark Arts of LOLBINS Defending Against the Dark Arts of LOLBINS
Defending Against the Dark Arts of LOLBINS
 
How to fix Bitdefender threat scanner error Message
How to fix Bitdefender threat scanner error MessageHow to fix Bitdefender threat scanner error Message
How to fix Bitdefender threat scanner error Message
 
April 2017 patch tuesday ivanti
April 2017 patch tuesday ivantiApril 2017 patch tuesday ivanti
April 2017 patch tuesday ivanti
 
May 2017 Patch Tuesday Ivanti
May 2017 Patch Tuesday IvantiMay 2017 Patch Tuesday Ivanti
May 2017 Patch Tuesday Ivanti
 
June2017 patchtuesdayivanti
June2017 patchtuesdayivantiJune2017 patchtuesdayivanti
June2017 patchtuesdayivanti
 
Effective
EffectiveEffective
Effective
 

Similar to Module 7 configuring network security

IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10blusmurfydot1
 
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docxeugeniadean34240
 
Module 8 configuring internet explorer 9.0
Module 8   configuring internet explorer 9.0Module 8   configuring internet explorer 9.0
Module 8 configuring internet explorer 9.0xeroxk
 
Vista Presentation
Vista PresentationVista Presentation
Vista Presentationsdrayin
 
Mobile App Security Testing
Mobile App Security TestingMobile App Security Testing
Mobile App Security TestingSarwar Jahan M
 
Windows 7 Optimized Desktop
Windows 7 Optimized DesktopWindows 7 Optimized Desktop
Windows 7 Optimized DesktopKeith Combs
 
50321 a windows 7 - configuring technology specialist
50321 a   windows 7 - configuring technology specialist50321 a   windows 7 - configuring technology specialist
50321 a windows 7 - configuring technology specialistbestip
 
Online Security
Online Security Online Security
Online Security JimWhite
 
Reversing & malware analysis training part 9 advanced malware analysis
Reversing & malware analysis training part 9   advanced malware analysisReversing & malware analysis training part 9   advanced malware analysis
Reversing & malware analysis training part 9 advanced malware analysisAbdulrahman Bassam
 
AV-Comparatives Performance Test
AV-Comparatives Performance TestAV-Comparatives Performance Test
AV-Comparatives Performance TestHerbert Rodriguez
 
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07blusmurfydot1
 
Windows 8.1 Training
Windows 8.1 Training Windows 8.1 Training
Windows 8.1 Training Bagnan IT HUB
 
so big ppt
so big pptso big ppt
so big pptcainem
 
Lab #2 Managing Host Based Security Purpose To develop .docx
Lab #2  Managing Host Based Security Purpose To develop .docxLab #2  Managing Host Based Security Purpose To develop .docx
Lab #2 Managing Host Based Security Purpose To develop .docxsmile790243
 
Adavanced maintenance diploma
Adavanced maintenance diplomaAdavanced maintenance diploma
Adavanced maintenance diplomaelshiekh1980
 

Similar to Module 7 configuring network security (20)

IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
 
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
 
Module 8 configuring internet explorer 9.0
Module 8   configuring internet explorer 9.0Module 8   configuring internet explorer 9.0
Module 8 configuring internet explorer 9.0
 
Vista Presentation
Vista PresentationVista Presentation
Vista Presentation
 
Mobile App Security Testing
Mobile App Security TestingMobile App Security Testing
Mobile App Security Testing
 
Avc prot 2012b_en
Avc prot 2012b_enAvc prot 2012b_en
Avc prot 2012b_en
 
Lecture10.pptx
Lecture10.pptxLecture10.pptx
Lecture10.pptx
 
Windows 7 Optimized Desktop
Windows 7 Optimized DesktopWindows 7 Optimized Desktop
Windows 7 Optimized Desktop
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
50321 a windows 7 - configuring technology specialist
50321 a   windows 7 - configuring technology specialist50321 a   windows 7 - configuring technology specialist
50321 a windows 7 - configuring technology specialist
 
Online Security
Online Security Online Security
Online Security
 
Reversing & malware analysis training part 9 advanced malware analysis
Reversing & malware analysis training part 9   advanced malware analysisReversing & malware analysis training part 9   advanced malware analysis
Reversing & malware analysis training part 9 advanced malware analysis
 
Windows 7 Training
Windows 7 Training Windows 7 Training
Windows 7 Training
 
AV-Comparatives Performance Test
AV-Comparatives Performance TestAV-Comparatives Performance Test
AV-Comparatives Performance Test
 
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07
 
Windows 8.1 Training
Windows 8.1 Training Windows 8.1 Training
Windows 8.1 Training
 
so big ppt
so big pptso big ppt
so big ppt
 
Lab #2 Managing Host Based Security Purpose To develop .docx
Lab #2  Managing Host Based Security Purpose To develop .docxLab #2  Managing Host Based Security Purpose To develop .docx
Lab #2 Managing Host Based Security Purpose To develop .docx
 
Adavanced maintenance diploma
Adavanced maintenance diplomaAdavanced maintenance diploma
Adavanced maintenance diploma
 
Avc per 201206_en
Avc per 201206_enAvc per 201206_en
Avc per 201206_en
 

More from xeroxk

Báo cáo NetCitizens Việt Nam- Tình hình sử dụng và tốc độ phát triển...
Báo cáo NetCitizens Việt Nam- Tình hình sử dụng và tốc độ phát triển...Báo cáo NetCitizens Việt Nam- Tình hình sử dụng và tốc độ phát triển...
Báo cáo NetCitizens Việt Nam- Tình hình sử dụng và tốc độ phát triển...xeroxk
 
Hiệu ứng Nước trên Photoshop
Hiệu ứng Nước trên PhotoshopHiệu ứng Nước trên Photoshop
Hiệu ứng Nước trên Photoshopxeroxk
 
Powerpoint 2010
Powerpoint 2010Powerpoint 2010
Powerpoint 2010xeroxk
 
Một Số Thuật Ngữ Kinh Tế
Một Số Thuật Ngữ Kinh TếMột Số Thuật Ngữ Kinh Tế
Một Số Thuật Ngữ Kinh Tếxeroxk
 
Xây Dựng Thương Hiệu
Xây Dựng Thương HiệuXây Dựng Thương Hiệu
Xây Dựng Thương Hiệuxeroxk
 
Trò Chơi Tập Thể
Trò Chơi Tập ThểTrò Chơi Tập Thể
Trò Chơi Tập Thểxeroxk
 
Toefl grammar
Toefl grammarToefl grammar
Toefl grammarxeroxk
 
Thơ Tình Thế Giới
Thơ Tình Thế GiớiThơ Tình Thế Giới
Thơ Tình Thế Giớixeroxk
 
Lab linux phần iv- Internet Services
Lab linux phần iv- Internet ServicesLab linux phần iv- Internet Services
Lab linux phần iv- Internet Servicesxeroxk
 
Lab linux phan iii
Lab linux phan iiiLab linux phan iii
Lab linux phan iiixeroxk
 
Lab linux phan i, ii.doc
Lab linux phan i, ii.docLab linux phan i, ii.doc
Lab linux phan i, ii.docxeroxk
 
huong dan PHP-2
huong dan PHP-2huong dan PHP-2
huong dan PHP-2xeroxk
 
Hướng Dẫn Php
Hướng Dẫn  PhpHướng Dẫn  Php
Hướng Dẫn Phpxeroxk
 
Hướng Dẫn Sử Dụng excel 2010
Hướng Dẫn Sử Dụng excel 2010Hướng Dẫn Sử Dụng excel 2010
Hướng Dẫn Sử Dụng excel 2010xeroxk
 
Athena lab Hướng Dẫn Học CCNA
Athena lab Hướng Dẫn Học CCNAAthena lab Hướng Dẫn Học CCNA
Athena lab Hướng Dẫn Học CCNAxeroxk
 
Hướng Dẫn Php-3
Hướng Dẫn Php-3Hướng Dẫn Php-3
Hướng Dẫn Php-3xeroxk
 
Athena Bài Giảng Mạng Lan
Athena Bài Giảng Mạng LanAthena Bài Giảng Mạng Lan
Athena Bài Giảng Mạng Lanxeroxk
 
Athena Bài Giảng Mạng WLan
Athena Bài Giảng Mạng WLanAthena Bài Giảng Mạng WLan
Athena Bài Giảng Mạng WLanxeroxk
 
Module 10 configuring windows 7 media applications
Module 10   configuring windows 7 media applicationsModule 10   configuring windows 7 media applications
Module 10 configuring windows 7 media applicationsxeroxk
 

More from xeroxk (20)

Báo cáo NetCitizens Việt Nam- Tình hình sử dụng và tốc độ phát triển...
Báo cáo NetCitizens Việt Nam- Tình hình sử dụng và tốc độ phát triển...Báo cáo NetCitizens Việt Nam- Tình hình sử dụng và tốc độ phát triển...
Báo cáo NetCitizens Việt Nam- Tình hình sử dụng và tốc độ phát triển...
 
Hiệu ứng Nước trên Photoshop
Hiệu ứng Nước trên PhotoshopHiệu ứng Nước trên Photoshop
Hiệu ứng Nước trên Photoshop
 
Powerpoint 2010
Powerpoint 2010Powerpoint 2010
Powerpoint 2010
 
Một Số Thuật Ngữ Kinh Tế
Một Số Thuật Ngữ Kinh TếMột Số Thuật Ngữ Kinh Tế
Một Số Thuật Ngữ Kinh Tế
 
Xây Dựng Thương Hiệu
Xây Dựng Thương HiệuXây Dựng Thương Hiệu
Xây Dựng Thương Hiệu
 
Trò Chơi Tập Thể
Trò Chơi Tập ThểTrò Chơi Tập Thể
Trò Chơi Tập Thể
 
Toefl grammar
Toefl grammarToefl grammar
Toefl grammar
 
Thơ Tình Thế Giới
Thơ Tình Thế GiớiThơ Tình Thế Giới
Thơ Tình Thế Giới
 
Xml
XmlXml
Xml
 
Lab linux phần iv- Internet Services
Lab linux phần iv- Internet ServicesLab linux phần iv- Internet Services
Lab linux phần iv- Internet Services
 
Lab linux phan iii
Lab linux phan iiiLab linux phan iii
Lab linux phan iii
 
Lab linux phan i, ii.doc
Lab linux phan i, ii.docLab linux phan i, ii.doc
Lab linux phan i, ii.doc
 
huong dan PHP-2
huong dan PHP-2huong dan PHP-2
huong dan PHP-2
 
Hướng Dẫn Php
Hướng Dẫn  PhpHướng Dẫn  Php
Hướng Dẫn Php
 
Hướng Dẫn Sử Dụng excel 2010
Hướng Dẫn Sử Dụng excel 2010Hướng Dẫn Sử Dụng excel 2010
Hướng Dẫn Sử Dụng excel 2010
 
Athena lab Hướng Dẫn Học CCNA
Athena lab Hướng Dẫn Học CCNAAthena lab Hướng Dẫn Học CCNA
Athena lab Hướng Dẫn Học CCNA
 
Hướng Dẫn Php-3
Hướng Dẫn Php-3Hướng Dẫn Php-3
Hướng Dẫn Php-3
 
Athena Bài Giảng Mạng Lan
Athena Bài Giảng Mạng LanAthena Bài Giảng Mạng Lan
Athena Bài Giảng Mạng Lan
 
Athena Bài Giảng Mạng WLan
Athena Bài Giảng Mạng WLanAthena Bài Giảng Mạng WLan
Athena Bài Giảng Mạng WLan
 
Module 10 configuring windows 7 media applications
Module 10   configuring windows 7 media applicationsModule 10   configuring windows 7 media applications
Module 10 configuring windows 7 media applications
 

Recently uploaded

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 

Recently uploaded (20)

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 

Module 7 configuring network security