629 courses available
IBM
Conduct Threat Modeling for a Cloud Application
Cyber SecurityMicrosoft
Configure Azure Storage security
Cyber SecurityUnits in this learning path:
• Introduction
• Review Strategies
• Create Shared Access Signatures
• Identify Uri Sas Parameters
• Determine Storage Service Encryption
• Create Customer Managed Keys
• Apply Best Practices
• Interactive Lab Simulation Storage
• Knowledge Check
• Summary Resources
Products: Azure Storage
Roles: Administrator
Level: Intermediate
Subjects: Security, Storage
Duration: 34 minutes
Microsoft
Configure DLP policies for Microsoft Defender for Cloud Apps and Power Platform
Cyber SecurityUnits in this learning path:
• Introduction
• Configure Data Loss Prevention Policies for Power Platform
• Integrate Data Loss Prevention
• Configure File Policies Microsoft Cloud App Security
• Manage Data Loss Prevention Violations
• Knowledge Check
• Summary Resources
Products: Microsoft Purview, M365
Roles: Auditor, Ip Admin, Risk Practitioner
Level: Intermediate
Subjects: Security
Duration: 29 minutes
Microsoft
Configure Dependabot security updates on your GitHub repo
Cyber SecurityUnits in this learning path:
• Introduction
• Manage Your Dependencies Github
• Dependabot Alerts
• Dependabot Security Updates
• Manage Dependabot Notifications Reporting
• Dependency Review
• Exercise
• Knowledge Check
• Summary
Products: Github
Roles: Developer
Level: Intermediate
Subjects: Security
Duration: 36 minutes
Microsoft
Configure SIEM security operations using Microsoft Sentinel
Cyber SecurityModules in this learning path:
• Create Manage Azure Sentinel Workspaces
• Connect Microsoft Services to Azure Sentinel
• Connect Windows Hosts to Azure Sentinel
• Analyze Data in Sentinel
• Automation Microsoft Sentinel
• Configure Siem Security Operations Using Microsoft Sentinel Labs
Products: Azure, Microsoft Sentinel, Azure Log Analytics, Azure Logic Apps
Roles: Security Operations Analyst
Level: Intermediate
Subjects: Threat Protection
Duration: 268 minutes
Microsoft
Configure SIEM security operations using Microsoft Sentinel
Cyber SecurityUnits in this learning path:
• Introduction
• Exercise
• Exercise
• Exercise
• Exercise
• Exercise
• Summary
Products: Azure, Microsoft Sentinel, Azure Log Analytics, Microsoft Defender
Roles: Security Operations Analyst
Level: Intermediate
Subjects: Threat Protection, Cloud Security
Duration: 90 minutes
Microsoft
Configure User Account Control
Cyber SecurityUnits in this learning path:
• Introduction
• Explore User Account Control
• Examine How Uac Works
• Understand Uac Elevation Prompts
• Configure Uac Notification Settings
• Knowledge Check
• Summary
Products: Windows
Roles: Administrator
Level: Beginner
Subjects: Identity Access
Duration: 19 minutes
Microsoft
Configure administrative roles in Microsoft 365
Cyber SecurityUnits in this learning path:
• Introduction
• Explore Microsoft 365 Permission Model
• Explore Microsoft 365 Admin Roles
• Assign Admin Roles Users Microsoft 365
• Delegate Admin Roles Partners
• Manage Permissions Use Administrative Units
• Elevate Privileges Use Privileged Identity Management
• Examine Best Practices Administrative Roles
• Knowledge Check
• Summary
Products: Office 365
Roles: Administrator, Solution Architect, Technology Manager
Level: Intermediate
Subjects: Business Applications, Compliance, Identity Access, Insider Risk, It Management Monitoring, Productivity, Security, Threat Protection
Duration: 37 minutes
Amazon Web Services
Configure and Deploy AWS PrivateLink
Cyber SecurityMicrosoft
Configure and Provision Environments
Cyber SecurityUnits in this learning path:
• Introduction
• Provision Configure Target Environments
• Exercise Set Up Service Connections
• Configure Automated Integration Functional Test Automation
• Understand Shift Left
• Set Up Run Availability Tests
• Explore Azure Load Testing
• Set Up Run Functional Tests
• Knowledge Check
• Summary
Products: Azure, Azure Artifacts, Azure Boards, Azure Cloud Services, Azure Devops, Azure Pipelines, Azure Repos, Azure Test Plans, Github
Roles: Administrator, AI Engineer, Data Engineer, Developer, Devops Engineer, Platform Engineer, Security Engineer, Security Operations Analyst, Service Adoption Specialist, Solution Architect, Startup Founder, Technology Manager
Level: Advanced
Subjects: Devops, Cloud Security, Data Engineering
Duration: 120 minutes
Microsoft
Configure and govern entitlement with Microsoft Entra ID
Cyber SecurityModules in this learning path:
• Plan Implement Entitlement Management
• Plan Implement Manage Access Review
• Monitor Maintain Azure Active Directory
• Plan Implement Privileged Access
Products: Entra, Entra Identity Governance
Roles: Administrator, Identity Access Admin
Level: Intermediate
Subjects: Identity Access
Duration: 198 minutes
Microsoft
Configure and manage automation using Microsoft Defender for Endpoint
Cyber SecurityUnits in this learning path:
• Introduction
• Configure Advanced Features
• Upload Folder Settings
• Configure Automated Investigation Remediation Capabilities
• Block at Risk Devices
• Knowledge Check
• Summary Resources
Products: M365, M365 Security Center, Windows 11, Windows Security, Defender Endpoint, Intune, Entra Id
Roles: Security Operations Analyst
Level: Intermediate
Subjects: Information Protection Governance, Threat Protection, Automation
Duration: 34 minutes
Viewing 109-120 of 629