Skip to content
Search

565 courses available

Microsoft

Configure Azure Storage security

shield-halved-duotone-light-full Cyber Security
Learn how to configure common Azure Storage security features like storage access signatures.

Units in this learning path:

• Introduction
• Review Strategies
• Create Shared Access Signatures
• Identify Uri Sas Parameters
• Determine Storage Service Encryption
• Create Customer Managed Keys
• Apply Best Practices
• Interactive Lab Simulation Storage
• Knowledge Check
• Summary Resources

Products: Azure Storage

Roles: Administrator

Level: Intermediate

Subjects: Security, Storage

Duration: 34 minutes

View full course details Cancel

Microsoft

Configure DLP policies for Microsoft Defender for Cloud Apps and Power Platform

shield-halved-duotone-light-full Cyber Security
Configure DLP policies for Microsoft Defender for Cloud Apps and Power Platform

Units in this learning path:

• Introduction
• Configure Data Loss Prevention Policies for Power Platform
• Integrate Data Loss Prevention
• Configure File Policies Microsoft Cloud App Security
• Manage Data Loss Prevention Violations
• Knowledge Check
• Summary Resources

Products: Microsoft Purview, M365

Roles: Auditor, Ip Admin, Risk Practitioner

Level: Intermediate

Subjects: Security

Duration: 29 minutes

View full course details Cancel

Microsoft

Configure Dependabot security updates on your GitHub repo

shield-halved-duotone-light-full Cyber Security
Learn how to configure Dependabot security updates on your GitHub repo.

Units in this learning path:

• Introduction
• Manage Your Dependencies Github
• Dependabot Alerts
• Dependabot Security Updates
• Manage Dependabot Notifications Reporting
• Dependency Review
• Exercise
• Knowledge Check
• Summary

Products: Github

Roles: Developer

Level: Intermediate

Subjects: Security

Duration: 36 minutes

View full course details Cancel

Microsoft

Configure SIEM security operations using Microsoft Sentinel

shield-halved-duotone-light-full Cyber Security
Configure Security Information and Event Management (SIEM) operations using Microsoft Sentinel. (SC-5001)

Modules in this learning path:

• Create Manage Azure Sentinel Workspaces
• Connect Microsoft Services to Azure Sentinel
• Connect Windows Hosts to Azure Sentinel
• Analyze Data in Sentinel
• Automation Microsoft Sentinel
• Configure Siem Security Operations Using Microsoft Sentinel Labs

Products: Azure, Microsoft Sentinel, Azure Log Analytics, Azure Logic Apps

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Threat Protection

Duration: 268 minutes

View full course details Cancel

Microsoft

Configure SIEM security operations using Microsoft Sentinel

shield-halved-duotone-light-full Cyber Security
Configure security information and event management (SIEM) security operations using Microsoft Sentinel.

Units in this learning path:

• Introduction
• Exercise
• Exercise
• Exercise
• Exercise
• Exercise
• Summary

Products: Azure, Microsoft Sentinel, Azure Log Analytics, Microsoft Defender

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Threat Protection, Cloud Security

Duration: 90 minutes

View full course details Cancel

Microsoft

Configure User Account Control

shield-halved-duotone-light-full Cyber Security
This module introduces how User Account Control works and how you can use UAC-related desktop features to reduce security risks.

Units in this learning path:

• Introduction
• Explore User Account Control
• Examine How Uac Works
• Understand Uac Elevation Prompts
• Configure Uac Notification Settings
• Knowledge Check
• Summary

Products: Windows

Roles: Administrator

Level: Beginner

Subjects: Identity Access

Duration: 19 minutes

View full course details Cancel

Amazon Web Services

Configure and Deploy AWS PrivateLink

shield-halved-duotone-light-full Cyber Security
In this course, you will configure and deploy Amazon PrivateLink using the AWS Console. There is a video tutorial that shows how to create VPC endpoint services with network load balancers and private DNS. You will learn to provide permissions to…
View full course details Cancel

Microsoft

Configure and Provision Environments

shield-halved-duotone-light-full Cyber Security
Learn environment provisioning, service connection configuration, and automated testing infrastructure setup.

Units in this learning path:

• Introduction
• Provision Configure Target Environments
• Exercise Set Up Service Connections
• Configure Automated Integration Functional Test Automation
• Understand Shift Left
• Set Up Run Availability Tests
• Explore Azure Load Testing
• Set Up Run Functional Tests
• Knowledge Check
• Summary

Products: Azure, Azure Artifacts, Azure Boards, Azure Cloud Services, Azure Devops, Azure Pipelines, Azure Repos, Azure Test Plans, Github

Roles: Administrator, AI Engineer, Data Engineer, Developer, Devops Engineer, Platform Engineer, Security Engineer, Security Operations Analyst, Service Adoption Specialist, Solution Architect, Startup Founder, Technology Manager

Level: Advanced

Subjects: Devops, Cloud Security, Data Engineering

Duration: 120 minutes

View full course details Cancel

Microsoft

Configure and govern entitlement with Microsoft Entra ID

shield-halved-duotone-light-full Cyber Security
Use Microsoft Entra to manage access by using entitlements, access reviews, privileged access tools, and monitor access events. (SC-5008)

Modules in this learning path:

• Plan Implement Entitlement Management
• Plan Implement Manage Access Review
• Monitor Maintain Azure Active Directory
• Plan Implement Privileged Access

Products: Entra, Entra Identity Governance

Roles: Administrator, Identity Access Admin

Level: Intermediate

Subjects: Identity Access

Duration: 203 minutes

View full course details Cancel

Microsoft

Configure and manage automation using Microsoft Defender for Endpoint

shield-halved-duotone-light-full Cyber Security
Configure and manage automation using Microsoft Defender for Endpoint

Units in this learning path:

• Introduction
• Configure Advanced Features
• Upload Folder Settings
• Configure Automated Investigation Remediation Capabilities
• Block at Risk Devices
• Knowledge Check
• Summary Resources

Products: M365, M365 Security Center, Windows 11, Windows Security, Defender Endpoint, Intune, Entra Id

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Information Protection Governance, Threat Protection, Automation

Duration: 34 minutes

View full course details Cancel

Microsoft

Configure and manage file access

shield-halved-duotone-light-full Cyber Security
This module describes how to control access to files and folders using permissions.

Units in this learning path:

• Introduction
• Explore Tools Used Managing Files Folders
• Understand File Folder Permissions
• Understand Permission Inheritance
• Implement Conditions Limit File Folder Access
• Understand Effective Permissions
• Use Effective Access Feature
• Examine Permissions When Copying Moving Files
• Knowledge Check
• Summary

Products: Windows

Roles: Administrator

Level: Beginner

Subjects: Information Protection Governance

Duration: 29 minutes

View full course details Cancel

Microsoft

Configure and manage guardrails in Microsoft Foundry

shield-halved-duotone-light-full Cyber Security
Safeguard your AI workloads with Microsoft Foundry guardrails. Discover how to configure and validate content filters, blocklists, and Prompt Shields to protect sensitive data, ensure responsible model behavior, and continuously improve AI safety.

Units in this learning path:

• Introduction
• Understand Guardrails
• Understand Safety Controls
• Try Guardrails
• Create Manage Blocklist
• Configure Content Filter
• Choose Refine Guardrails
• Knowledge Check
• Summary

Products: Azure, Azure AI Foundry, Defender For Cloud

Roles: Security Engineer, Developer

Level: Intermediate

Subjects: Security, Cloud Security

Duration: 48 minutes

View full course details Cancel

Viewing 109-120 of 565