Skip to content
Search

594 courses available

Amazon Web Services

Cloud for Risk and Compliance Executives

shield-halved-duotone-light-full Cyber Security
This course provides a high-level picture of cloud computing technology from the risk management and compliance perspective. Learners explore why they should consider the cloud and how they can use the cloud to run effective governance, risk, and…
View full course details Cancel

IBM

Conduct Threat Modeling for a Cloud Application

shield-halved-duotone-light-full Cyber Security
This credential earner demonstrated their applied knowledge in conducting threat modelling for a cloud application. The earner has created threat models, performed stakeholder interviews, and provided recommendations based on conducted models. The earner will build and develop their transferable skills and gain real industry experience.
View full course details Cancel

Microsoft

Configure Azure Storage security

shield-halved-duotone-light-full Cyber Security
Learn how to configure common Azure Storage security features like storage access signatures.

Units in this learning path:

• Introduction
• Review Strategies
• Create Shared Access Signatures
• Identify Uri Sas Parameters
• Determine Storage Service Encryption
• Create Customer Managed Keys
• Apply Best Practices
• Interactive Lab Simulation Storage
• Knowledge Check
• Summary Resources

Products: Azure Storage

Roles: Administrator

Level: Intermediate

Subjects: Security, Storage

Duration: 34 minutes

View full course details Cancel

Microsoft

Configure DLP policies for Microsoft Defender for Cloud Apps and Power Platform

shield-halved-duotone-light-full Cyber Security
Configure DLP policies for Microsoft Defender for Cloud Apps and Power Platform

Units in this learning path:

• Introduction
• Configure Data Loss Prevention Policies for Power Platform
• Integrate Data Loss Prevention
• Configure File Policies Microsoft Cloud App Security
• Knowledge Check
• Summary Resources

Products: Microsoft Purview, M365

Roles: Auditor, Ip Admin, Risk Practitioner

Level: Intermediate

Subjects: Security

Duration: 26 minutes

View full course details Cancel

Microsoft

Configure Dependabot security updates on your GitHub repo

shield-halved-duotone-light-full Cyber Security
Learn how to configure Dependabot security updates on your GitHub repo.

Units in this learning path:

• Introduction
• Manage Your Dependencies Github
• Dependabot Alerts
• Dependabot Security Updates
• Manage Dependabot Notifications Reporting
• Dependency Review
• Exercise
• Knowledge Check
• Summary

Products: Github

Roles: Developer

Level: Intermediate

Subjects: Security

Duration: 36 minutes

View full course details Cancel

Microsoft

Configure Microsoft Defender Vulnerability Management settings for Azure VMs

shield-halved-duotone-light-full Cyber Security
Configure Microsoft Defender Vulnerability Management (MDVM) for Azure VMs by selecting scanning methods, enabling assessment at subscription and machine scope, managing findings with disable rules. Then you can apply Plan 2 premium capabilities including security baselines assessment and application blocking.

Units in this learning path:

• Introduction
• Explore Vulnerability Management Integration Defender Servers
• Configure Vulnerability Scanning Azure Vms
• Review Manage Vulnerability Findings
• Apply Premium Vulnerability Management Capabilities
• Knowledge Check
• Summary

Products: Defender For Cloud, Azure

Roles: Security Engineer

Level: Intermediate

Subjects: Security, Cloud Security

Duration: 35 minutes

View full course details Cancel

Microsoft

Configure SIEM security operations using Microsoft Sentinel

shield-halved-duotone-light-full Cyber Security
Configure Security Information and Event Management (SIEM) operations using Microsoft Sentinel. (SC-5001)

Modules in this learning path:

• Create Manage Azure Sentinel Workspaces
• Connect Microsoft Services to Azure Sentinel
• Connect Windows Hosts to Azure Sentinel
• Analyze Data in Sentinel
• Automation Microsoft Sentinel
• Configure Siem Security Operations Using Microsoft Sentinel Labs

Products: Azure, Microsoft Sentinel, Azure Log Analytics, Azure Logic Apps

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Threat Protection

Duration: 268 minutes

View full course details Cancel

Microsoft

Configure SIEM security operations using Microsoft Sentinel

shield-halved-duotone-light-full Cyber Security
Configure security information and event management (SIEM) security operations using Microsoft Sentinel.

Units in this learning path:

• Introduction
• Exercise
• Exercise
• Exercise
• Exercise
• Exercise
• Summary

Products: Azure, Microsoft Sentinel, Azure Log Analytics, Microsoft Defender

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Threat Protection, Cloud Security

Duration: 90 minutes

View full course details Cancel

Microsoft

Configure User Account Control

shield-halved-duotone-light-full Cyber Security
This module introduces how User Account Control works and how you can use UAC-related desktop features to reduce security risks.

Units in this learning path:

• Introduction
• Explore User Account Control
• Examine How Uac Works
• Understand Uac Elevation Prompts
• Configure Uac Notification Settings
• Knowledge Check
• Summary

Products: Windows

Roles: Administrator

Level: Beginner

Subjects: Identity Access

Duration: 19 minutes

View full course details Cancel

Amazon Web Services

Configure and Deploy AWS PrivateLink

shield-halved-duotone-light-full Cyber Security
In this course, you will configure and deploy Amazon PrivateLink using the AWS Console. There is a video tutorial that shows how to create VPC endpoint services with network load balancers and private DNS. You will learn to provide permissions to…
View full course details Cancel

Microsoft

Configure and Provision Environments

shield-halved-duotone-light-full Cyber Security
Learn environment provisioning, service connection configuration, and automated testing infrastructure setup.

Units in this learning path:

• Introduction
• Provision Configure Target Environments
• Exercise Set Up Service Connections
• Configure Automated Integration Functional Test Automation
• Understand Shift Left
• Set Up Run Availability Tests
• Explore Azure Load Testing
• Set Up Run Functional Tests
• Knowledge Check
• Summary

Products: Azure, Azure Artifacts, Azure Boards, Azure Cloud Services, Azure Devops, Azure Pipelines, Azure Repos, Azure Test Plans, Github

Roles: Administrator, AI Engineer, Data Engineer, Developer, Devops Engineer, Platform Engineer, Security Engineer, Security Operations Analyst, Service Adoption Specialist, Solution Architect, Startup Founder, Technology Manager

Level: Advanced

Subjects: Devops, Cloud Security, Data Engineering

Duration: 120 minutes

View full course details Cancel

Microsoft

Configure and govern entitlement with Microsoft Entra ID

shield-halved-duotone-light-full Cyber Security
Use Microsoft Entra to manage access by using entitlements, access reviews, privileged access tools, and monitor access events. (SC-5008)

Modules in this learning path:

• Plan Implement Entitlement Management
• Plan Implement Manage Access Review
• Monitor Maintain Azure Active Directory
• Plan Implement Privileged Access

Products: Entra, Entra Id, Entra Identity Governance

Roles: Administrator, Identity Access Admin

Level: Intermediate

Subjects: Identity Access

Duration: 203 minutes

View full course details Cancel

Viewing 109-120 of 594