629 courses available
Microsoft
Configure and manage file access
Cyber SecurityUnits in this learning path:
• Introduction
• Explore Tools Used Managing Files Folders
• Understand File Folder Permissions
• Understand Permission Inheritance
• Implement Conditions Limit File Folder Access
• Understand Effective Permissions
• Use Effective Access Feature
• Examine Permissions When Copying Moving Files
• Knowledge Check
• Summary
Products: Windows
Roles: Administrator
Level: Beginner
Subjects: Information Protection Governance
Duration: 29 minutes
Microsoft
Configure and manage guardrails in Microsoft Foundry
Cyber SecurityUnits in this learning path:
• Introduction
• Understand Guardrails
• Understand Safety Controls
• Try Guardrails
• Create Manage Blocklist
• Configure Content Filter
• Choose Refine Guardrails
• Knowledge Check
• Summary
Products: Azure, Azure AI Foundry, Defender For Cloud
Roles: Security Engineer, Developer
Level: Intermediate
Subjects: Security, Cloud Security
Duration: 48 minutes
Microsoft
Configure and manage secrets in Azure Key Vault
Cyber SecurityUnits in this learning path:
• Introduction
• Key Vault Usage
• Manage Access and Permissions to Secrets
• Store Secrets in Akv
• Manage Certificates
• Summary
Products: Azure
Roles: Administrator, Security Engineer
Level: Beginner
Subjects: Identity Access, Cloud Security
Duration: 29 minutes
Microsoft
Configure and manage security monitoring and automation solutions
Cyber SecurityUnits in this learning path:
• Introduction
• Security Alerts Incidents
• Automate Responses Microsoft Defender Cloud Triggers
• Log Retention Plans in Microsoft Sentinel
• Alerts Incidents Microsoft Sentinel
• Microsoft Sentinel Data Connectors
• Enable Analytics Rules Microsoft Sentinel
• Respond Threats by Using Playbooks with Automation Rules Microsoft Sentinel
• Automating Threat Response with Microsoft Sentinel
• Knowledge Check
• Summary
Products: Azure, Microsoft Sentinel
Roles: Administrator, Security Engineer
Level: Intermediate
Subjects: Threat Protection
Duration: 72 minutes
Microsoft
Configure client connectivity to Microsoft 365
Cyber SecurityUnits in this learning path:
• Introduction
• Examine Automatic Client Configuration
• Explore Dns Records Required Client Configuration
• Configure Outlook Clients
• Troubleshoot Client Connectivity
• Knowledge Check
• Summary
Products: M365, Office 365
Roles: Administrator, Solution Architect, Technology Manager
Level: Intermediate
Subjects: Business Applications, Compliance, Identity Access, Insider Risk, It Management Monitoring, Productivity, Security, Threat Protection
Duration: 25 minutes
Microsoft
Configure for alerts and detections in Microsoft Defender for Endpoint
Cyber SecurityUnits in this learning path:
• Introduction
• Configure Advanced Features
• Configure Alert Notifications
• Manage Alert Suppression
• Manage Indicators
• Knowledge Check
• Summary Resources
Products: M365, M365 Security Center, Defender Endpoint, Defender Xdr
Roles: Security Operations Analyst
Level: Intermediate
Subjects: Threat Protection
Duration: 32 minutes
Microsoft
Configure network security groups
Cyber SecurityUnits in this learning path:
• Introduction
• Implement
• Determine Nsg Rules
• Determine Nsg Effective Rules
• Create Nsg Rules
• Implement Asgs New
• Interactive Lab Simulation Network Groups
• Knowledge Check
• Summary Resources
Products: Azure
Roles: Administrator
Level: Intermediate
Subjects: Identity Access, Networking
Duration: 43 minutes
Microsoft
Configure your Microsoft 365 experience
Cyber SecurityUnits in this learning path:
• Introduction
• Explore Your Microsoft 365 Cloud Environment
• Configure Organizational Profile Microsoft 365
• Manage Tenant Subscriptions Microsoft 365
• Integrate Customer Engagement Apps
• Configure Sharing Settings Sharepoint Onedrive
• Configure Teams Settings
• Enable Unified Audit Logging
• Complete Tenant Configuration Microsoft 365
• Knowledge Check
• Summary
Products: Office 365
Roles: Administrator, Solution Architect, Technology Manager
Level: Intermediate
Subjects: Business Applications, Compliance, Identity Access, Insider Risk, It Management Monitoring, Productivity, Security, Threat Protection
Duration: 56 minutes
Microsoft
Configure your Microsoft Sentinel environment
Cyber SecurityModules in this learning path:
• Intro to Azure Sentinel
• Create Manage Azure Sentinel Workspaces
• Query Logs Azure Sentinel
• Use Watchlists Azure Sentinel
• Utilize Threat Intelligence Azure Sentinel
• Integrate Microsoft Defender Xdr with Microsoft Sentinel
Products: Azure, Microsoft Sentinel, Microsoft Defender
Roles: Security Operations Analyst
Level: Intermediate
Subjects: Threat Protection
Duration: 215 minutes
Microsoft
Connect Azure assets to Microsoft Defender for Cloud
Cyber SecurityUnits in this learning path:
• Introduction
• Explore Manage Your Resources with Asset Inventory
• Configure Auto Provisioning
• Manual Azure Monitor Agent Provisioning
• Knowledge Check
• Summary Resources
Products: Azure, Defender For Cloud
Roles: Security Operations Analyst
Level: Intermediate
Subjects: Cloud Security, Threat Protection, Asset Management, Inventory Management
Duration: 35 minutes
Microsoft
Connect Common Event Format logs to Microsoft Sentinel
Cyber SecurityUnits in this learning path:
• Introduction
• Plan for Connector
• Connect Your External Solution Use Connector
• Knowledge Check
• Summary Resources
Products: Azure, Microsoft Sentinel, Azure Log Analytics
Roles: Security Operations Analyst
Level: Intermediate
Subjects: Security, Cloud Security, Threat Protection
Duration: 20 minutes
Microsoft
Connect Microsoft Defender XDR to Microsoft Sentinel
Cyber SecurityUnits in this learning path:
• Introduction
• Plan for Microsoft 365 Defender Connectors
• 365 Defender Connector
• Connect Microsoft Defender Cloud Connector
• Connect Microsoft Defender Iot
• Connect Microsoft Defender Legacy Connectors
• Knowledge Check
• Summary Resources
Products: Azure, Microsoft Sentinel, Defender For Cloud, Defender For Iot, Defender Xdr
Roles: Security Operations Analyst
Level: Intermediate
Subjects: Threat Protection, Cloud Security
Duration: 29 minutes
Viewing 121-132 of 629