565 courses available
Microsoft
Configure Azure Storage security
Cyber SecurityUnits in this learning path:
• Introduction
• Review Strategies
• Create Shared Access Signatures
• Identify Uri Sas Parameters
• Determine Storage Service Encryption
• Create Customer Managed Keys
• Apply Best Practices
• Interactive Lab Simulation Storage
• Knowledge Check
• Summary Resources
Products: Azure Storage
Roles: Administrator
Level: Intermediate
Subjects: Security, Storage
Duration: 34 minutes
Microsoft
Configure DLP policies for Microsoft Defender for Cloud Apps and Power Platform
Cyber SecurityUnits in this learning path:
• Introduction
• Configure Data Loss Prevention Policies for Power Platform
• Integrate Data Loss Prevention
• Configure File Policies Microsoft Cloud App Security
• Manage Data Loss Prevention Violations
• Knowledge Check
• Summary Resources
Products: Microsoft Purview, M365
Roles: Auditor, Ip Admin, Risk Practitioner
Level: Intermediate
Subjects: Security
Duration: 29 minutes
Microsoft
Configure Dependabot security updates on your GitHub repo
Cyber SecurityUnits in this learning path:
• Introduction
• Manage Your Dependencies Github
• Dependabot Alerts
• Dependabot Security Updates
• Manage Dependabot Notifications Reporting
• Dependency Review
• Exercise
• Knowledge Check
• Summary
Products: Github
Roles: Developer
Level: Intermediate
Subjects: Security
Duration: 36 minutes
Microsoft
Configure SIEM security operations using Microsoft Sentinel
Cyber SecurityModules in this learning path:
• Create Manage Azure Sentinel Workspaces
• Connect Microsoft Services to Azure Sentinel
• Connect Windows Hosts to Azure Sentinel
• Analyze Data in Sentinel
• Automation Microsoft Sentinel
• Configure Siem Security Operations Using Microsoft Sentinel Labs
Products: Azure, Microsoft Sentinel, Azure Log Analytics, Azure Logic Apps
Roles: Security Operations Analyst
Level: Intermediate
Subjects: Threat Protection
Duration: 268 minutes
Microsoft
Configure SIEM security operations using Microsoft Sentinel
Cyber SecurityUnits in this learning path:
• Introduction
• Exercise
• Exercise
• Exercise
• Exercise
• Exercise
• Summary
Products: Azure, Microsoft Sentinel, Azure Log Analytics, Microsoft Defender
Roles: Security Operations Analyst
Level: Intermediate
Subjects: Threat Protection, Cloud Security
Duration: 90 minutes
Microsoft
Configure User Account Control
Cyber SecurityUnits in this learning path:
• Introduction
• Explore User Account Control
• Examine How Uac Works
• Understand Uac Elevation Prompts
• Configure Uac Notification Settings
• Knowledge Check
• Summary
Products: Windows
Roles: Administrator
Level: Beginner
Subjects: Identity Access
Duration: 19 minutes
Amazon Web Services
Configure and Deploy AWS PrivateLink
Cyber SecurityMicrosoft
Configure and Provision Environments
Cyber SecurityUnits in this learning path:
• Introduction
• Provision Configure Target Environments
• Exercise Set Up Service Connections
• Configure Automated Integration Functional Test Automation
• Understand Shift Left
• Set Up Run Availability Tests
• Explore Azure Load Testing
• Set Up Run Functional Tests
• Knowledge Check
• Summary
Products: Azure, Azure Artifacts, Azure Boards, Azure Cloud Services, Azure Devops, Azure Pipelines, Azure Repos, Azure Test Plans, Github
Roles: Administrator, AI Engineer, Data Engineer, Developer, Devops Engineer, Platform Engineer, Security Engineer, Security Operations Analyst, Service Adoption Specialist, Solution Architect, Startup Founder, Technology Manager
Level: Advanced
Subjects: Devops, Cloud Security, Data Engineering
Duration: 120 minutes
Microsoft
Configure and govern entitlement with Microsoft Entra ID
Cyber SecurityModules in this learning path:
• Plan Implement Entitlement Management
• Plan Implement Manage Access Review
• Monitor Maintain Azure Active Directory
• Plan Implement Privileged Access
Products: Entra, Entra Identity Governance
Roles: Administrator, Identity Access Admin
Level: Intermediate
Subjects: Identity Access
Duration: 203 minutes
Microsoft
Configure and manage automation using Microsoft Defender for Endpoint
Cyber SecurityUnits in this learning path:
• Introduction
• Configure Advanced Features
• Upload Folder Settings
• Configure Automated Investigation Remediation Capabilities
• Block at Risk Devices
• Knowledge Check
• Summary Resources
Products: M365, M365 Security Center, Windows 11, Windows Security, Defender Endpoint, Intune, Entra Id
Roles: Security Operations Analyst
Level: Intermediate
Subjects: Information Protection Governance, Threat Protection, Automation
Duration: 34 minutes
Microsoft
Configure and manage file access
Cyber SecurityUnits in this learning path:
• Introduction
• Explore Tools Used Managing Files Folders
• Understand File Folder Permissions
• Understand Permission Inheritance
• Implement Conditions Limit File Folder Access
• Understand Effective Permissions
• Use Effective Access Feature
• Examine Permissions When Copying Moving Files
• Knowledge Check
• Summary
Products: Windows
Roles: Administrator
Level: Beginner
Subjects: Information Protection Governance
Duration: 29 minutes
Microsoft
Configure and manage guardrails in Microsoft Foundry
Cyber SecurityUnits in this learning path:
• Introduction
• Understand Guardrails
• Understand Safety Controls
• Try Guardrails
• Create Manage Blocklist
• Configure Content Filter
• Choose Refine Guardrails
• Knowledge Check
• Summary
Products: Azure, Azure AI Foundry, Defender For Cloud
Roles: Security Engineer, Developer
Level: Intermediate
Subjects: Security, Cloud Security
Duration: 48 minutes
Viewing 109-120 of 565