87Results for "Event Monitoring"
-
Monitoring event driven systems8m
Monitoring event driven systems
From: Building Event-Driven Applications In Go
Video
-
Set up monitoring tools and dashboards2m
Set up monitoring tools and dashboards
From: Modern Cloud Security: Shift-Left, Observability, and Automated Defense
Video
-
Tracing, monitoring, and evaluating with LangSmith9m
Tracing, monitoring, and evaluating with LangSmith
From: OpenAI API and MCP Development
Video
-
Monitoring for problems3m
Monitoring for problems
From: High-Velocity Decision-Making for Senior Leaders and Executives
Video
-
Utilizing Event Logs to monitor and maintain a server7m
Utilizing Event Logs to monitor and maintain a server
From: Career Essentials in System Administration by Microsoft and LinkedIn
Video
-
Splunk for Security Analytics and Monitoring3h 18m
Splunk for Security Analytics and Monitoring
By: Daniel Lachance
Course
-
Creating a custom operator8m
Creating a custom operator
From: Automating Kubernetes with GitOps
Video
-
Monitor by using Extended Events5m
Monitor by using Extended Events
From: Microsoft Azure Database Administrator Associate (DP-300) Cert Prep by Microsoft Press
Video
-
Monitoring Autonomous Database instances: Events and alarms6m
Monitoring Autonomous Database instances: Events and alarms
From: Oracle Autonomous Database Professional Workshop
Video
-
Overview of Event Viewer3m
Overview of Event Viewer
From: Windows Server 2016: Manage, Monitor, and Maintain Servers
Video
-
Server health and extended events7m
Server health and extended events
From: SQL Server 2016: Administer a Database Infrastructure
Video
-
Setting up alerts: Monitoring your LLM integration3m
Setting up alerts: Monitoring your LLM integration
From: Integrating AI into the Product Architecture
Video
-
Monitoring cluster event logs1m
Monitoring cluster event logs
From: Certified Kubernetes Application Developer (CKAD) Cert Prep
Video
-
Security monitoring for microservices3m
Security monitoring for microservices
From: Microservices and API Security for Security Architects: From Gateway Protection to Container Security
Video
-
Monitor Autonomous Database instances: Events and alarms6m
Monitor Autonomous Database instances: Events and alarms
From: Oracle Autonomous Database Professional Workshop (January 2025)
Video
-
Monitoring and auditing IAM3m
Monitoring and auditing IAM
From: Modern Cloud Security: Shift-Left, Observability, and Automated Defense
Video
-
Ganging the monitors3m
Ganging the monitors
From: Media Composer 2019 Essential Training: 110 Fundamentals 2
Video
-
Practice effective event budget management3m
Practice effective event budget management
From: Organization Tips for Event Marketing
Video
-
Monitoring security events2m
Monitoring security events
From: SecOps on Google Distributed Cloud (GDC) for Tier 1 and Tier 2 Analysts by Google
Video
-
Ganging the monitors3m
Ganging the monitors
From: Media Composer 2020 Essential Training: 110 Fundamentals 2
Video
-
Create a monitor script3m
Create a monitor script
From: LPIC-1 Exam 102 (Version 5.0) Cert Prep
Video
-
Monitoring and logging best practices4m
Monitoring and logging best practices
From: Advanced SQL for Application Development
Video
-
Logging and monitoring (Controls 8.15–8.17)4m
Logging and monitoring (Controls 8.15–8.17)
From: ISO 27001:2022-Compliant Cybersecurity: The Annex A Controls
Video
-
Network security monitoring to detect cyber threats5m
Network security monitoring to detect cyber threats
From: Building and Auditing a Cybersecurity Program
Video
-
Forwarding Windows log events to Splunk10m
Forwarding Windows log events to Splunk
From: Splunk for Security Analytics and Monitoring
Video
-
Exploring CC7.2 - Monitoring system components: Detecting anomalies and analyzing security events for objective fulfillment2m
Exploring CC7.2 - Monitoring system components: Detecting anomalies and analyzing security events for objective fulfillment
From: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs
Video
-
Real-time event analysis: Microsoft Defender for Cloud Apps6m
Real-time event analysis: Microsoft Defender for Cloud Apps
From: Managed Detection and Response (MDR) Fundamentals
Video
-
Azure Log Analytics: Setup and usage9m
Azure Log Analytics: Setup and usage
From: Managed Detection and Response (MDR) Fundamentals
Video
-
User event history5m
User event history
From: Building Customer Identity and Access Management (CIAM) in Your Applications on AWS
Video
-
Managing performance with Reliability Monitor2m
Managing performance with Reliability Monitor
From: Windows 11: Manage and Maintain
Video
-
Monitor security events using Azure Monitor1m
Monitor security events using Azure Monitor
From: Microsoft Azure Security Technology (AZ-500) Cert Prep by Microsoft Press
Video
-
Windows Event Logs and Finding Evil: Cybersecurity Labs Powered by Hack The Box5h 4m
Windows Event Logs and Finding Evil: Cybersecurity Labs Powered by Hack The Box
By: Hack The Box
Course
-
Monitor local machine logs with Splunk4m
Monitor local machine logs with Splunk
From: Integrating Splunk with Microsoft Purview
Video
-
The Reliability Monitor and problem history3m
The Reliability Monitor and problem history
From: Windows Server 2022: Manage, Monitor, and Maintain Servers
Video
-
Gathering and uploading logs10m
Gathering and uploading logs
From: VMware vSphere 6.5 Essential Training
Video
-
Service management practices, part 32m
Service management practices, part 3
From: Putting ITIL® Into Practice: Applying ITIL® 4 Foundation Concepts
Video
-
Kubernetes: Monitoring with Prometheus46m
Kubernetes: Monitoring with Prometheus
By: Sarah Conway Schnurr
Course
-
Know when things are off2m
Know when things are off
From: Translating Cybersecurity for SMBs - Using the NIST Cybersecurity Framework 2.0
Video
-
Using Group Policy to audit actions in Window 115m
Using Group Policy to audit actions in Window 11
From: Windows 11: Security
Video
-
Using Group Policy to audit actions in Window 103m
Using Group Policy to audit actions in Window 10
From: Windows 10: Security
Video
-
Introduction to Security Information and Event Management (SIEM)1h 2m
Introduction to Security Information and Event Management (SIEM)
By: Fatimah Adelodun
Course
-
Managed Detection and Response (MDR) Fundamentals2h 57m
Managed Detection and Response (MDR) Fundamentals
By: Liam Cleary
Course
-
Forwarding Microsoft AD events to Splunk Cloud9m
Forwarding Microsoft AD events to Splunk Cloud
From: Splunk for Security Analytics and Monitoring
Video
-
What are the benefits of outsourcing?2m
What are the benefits of outsourcing?
From: Cybersecurity Outsourcing: Vendor Selection and Management
Video
-
Security Monitoring and SIEM Fundamentals: Cybersecurity Labs Powered by Hack The Box5h 34m
Security Monitoring and SIEM Fundamentals: Cybersecurity Labs Powered by Hack The Box
By: Hack The Box
Course