Skip to content
Search

629 courses available

IBM

Conduct Threat Modeling for a Cloud Application

shield-halved-duotone-light-full Cyber Security
This credential earner demonstrated their applied knowledge in conducting threat modelling for a cloud application. The earner has created threat models, performed stakeholder interviews, and provided recommendations based on conducted models. The earner will build and develop their transferable skills and gain real industry experience.
View full course details Cancel

Microsoft

Configure Azure Storage security

shield-halved-duotone-light-full Cyber Security
Learn how to configure common Azure Storage security features like storage access signatures.

Units in this learning path:

• Introduction
• Review Strategies
• Create Shared Access Signatures
• Identify Uri Sas Parameters
• Determine Storage Service Encryption
• Create Customer Managed Keys
• Apply Best Practices
• Interactive Lab Simulation Storage
• Knowledge Check
• Summary Resources

Products: Azure Storage

Roles: Administrator

Level: Intermediate

Subjects: Security, Storage

Duration: 34 minutes

View full course details Cancel

Microsoft

Configure DLP policies for Microsoft Defender for Cloud Apps and Power Platform

shield-halved-duotone-light-full Cyber Security
Configure DLP policies for Microsoft Defender for Cloud Apps and Power Platform

Units in this learning path:

• Introduction
• Configure Data Loss Prevention Policies for Power Platform
• Integrate Data Loss Prevention
• Configure File Policies Microsoft Cloud App Security
• Manage Data Loss Prevention Violations
• Knowledge Check
• Summary Resources

Products: Microsoft Purview, M365

Roles: Auditor, Ip Admin, Risk Practitioner

Level: Intermediate

Subjects: Security

Duration: 29 minutes

View full course details Cancel

Microsoft

Configure Dependabot security updates on your GitHub repo

shield-halved-duotone-light-full Cyber Security
Learn how to configure Dependabot security updates on your GitHub repo.

Units in this learning path:

• Introduction
• Manage Your Dependencies Github
• Dependabot Alerts
• Dependabot Security Updates
• Manage Dependabot Notifications Reporting
• Dependency Review
• Exercise
• Knowledge Check
• Summary

Products: Github

Roles: Developer

Level: Intermediate

Subjects: Security

Duration: 36 minutes

View full course details Cancel

Microsoft

Configure SIEM security operations using Microsoft Sentinel

shield-halved-duotone-light-full Cyber Security
Configure Security Information and Event Management (SIEM) operations using Microsoft Sentinel. (SC-5001)

Modules in this learning path:

• Create Manage Azure Sentinel Workspaces
• Connect Microsoft Services to Azure Sentinel
• Connect Windows Hosts to Azure Sentinel
• Analyze Data in Sentinel
• Automation Microsoft Sentinel
• Configure Siem Security Operations Using Microsoft Sentinel Labs

Products: Azure, Microsoft Sentinel, Azure Log Analytics, Azure Logic Apps

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Threat Protection

Duration: 268 minutes

View full course details Cancel

Microsoft

Configure SIEM security operations using Microsoft Sentinel

shield-halved-duotone-light-full Cyber Security
Configure security information and event management (SIEM) security operations using Microsoft Sentinel.

Units in this learning path:

• Introduction
• Exercise
• Exercise
• Exercise
• Exercise
• Exercise
• Summary

Products: Azure, Microsoft Sentinel, Azure Log Analytics, Microsoft Defender

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Threat Protection, Cloud Security

Duration: 90 minutes

View full course details Cancel

Microsoft

Configure User Account Control

shield-halved-duotone-light-full Cyber Security
This module introduces how User Account Control works and how you can use UAC-related desktop features to reduce security risks.

Units in this learning path:

• Introduction
• Explore User Account Control
• Examine How Uac Works
• Understand Uac Elevation Prompts
• Configure Uac Notification Settings
• Knowledge Check
• Summary

Products: Windows

Roles: Administrator

Level: Beginner

Subjects: Identity Access

Duration: 19 minutes

View full course details Cancel

Microsoft

Configure administrative roles in Microsoft 365

shield-halved-duotone-light-full Cyber Security
This module examines the key functionality that's available in the more commonly used Microsoft 365 admin roles. It also provides instruction on how to configure these roles.

Units in this learning path:

• Introduction
• Explore Microsoft 365 Permission Model
• Explore Microsoft 365 Admin Roles
• Assign Admin Roles Users Microsoft 365
• Delegate Admin Roles Partners
• Manage Permissions Use Administrative Units
• Elevate Privileges Use Privileged Identity Management
• Examine Best Practices Administrative Roles
• Knowledge Check
• Summary

Products: Office 365

Roles: Administrator, Solution Architect, Technology Manager

Level: Intermediate

Subjects: Business Applications, Compliance, Identity Access, Insider Risk, It Management Monitoring, Productivity, Security, Threat Protection

Duration: 37 minutes

View full course details Cancel

Amazon Web Services

Configure and Deploy AWS PrivateLink

shield-halved-duotone-light-full Cyber Security
In this course, you will configure and deploy Amazon PrivateLink using the AWS Console. There is a video tutorial that shows how to create VPC endpoint services with network load balancers and private DNS. You will learn to provide permissions to…
View full course details Cancel

Microsoft

Configure and Provision Environments

shield-halved-duotone-light-full Cyber Security
Learn environment provisioning, service connection configuration, and automated testing infrastructure setup.

Units in this learning path:

• Introduction
• Provision Configure Target Environments
• Exercise Set Up Service Connections
• Configure Automated Integration Functional Test Automation
• Understand Shift Left
• Set Up Run Availability Tests
• Explore Azure Load Testing
• Set Up Run Functional Tests
• Knowledge Check
• Summary

Products: Azure, Azure Artifacts, Azure Boards, Azure Cloud Services, Azure Devops, Azure Pipelines, Azure Repos, Azure Test Plans, Github

Roles: Administrator, AI Engineer, Data Engineer, Developer, Devops Engineer, Platform Engineer, Security Engineer, Security Operations Analyst, Service Adoption Specialist, Solution Architect, Startup Founder, Technology Manager

Level: Advanced

Subjects: Devops, Cloud Security, Data Engineering

Duration: 120 minutes

View full course details Cancel

Microsoft

Configure and govern entitlement with Microsoft Entra ID

shield-halved-duotone-light-full Cyber Security
Use Microsoft Entra to manage access by using entitlements, access reviews, privileged access tools, and monitor access events. (SC-5008)

Modules in this learning path:

• Plan Implement Entitlement Management
• Plan Implement Manage Access Review
• Monitor Maintain Azure Active Directory
• Plan Implement Privileged Access

Products: Entra, Entra Identity Governance

Roles: Administrator, Identity Access Admin

Level: Intermediate

Subjects: Identity Access

Duration: 198 minutes

View full course details Cancel

Microsoft

Configure and manage automation using Microsoft Defender for Endpoint

shield-halved-duotone-light-full Cyber Security
Configure and manage automation using Microsoft Defender for Endpoint

Units in this learning path:

• Introduction
• Configure Advanced Features
• Upload Folder Settings
• Configure Automated Investigation Remediation Capabilities
• Block at Risk Devices
• Knowledge Check
• Summary Resources

Products: M365, M365 Security Center, Windows 11, Windows Security, Defender Endpoint, Intune, Entra Id

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Information Protection Governance, Threat Protection, Automation

Duration: 34 minutes

View full course details Cancel

Viewing 109-120 of 629