594 courses available
Microsoft
Configure and manage automation using Microsoft Defender for Endpoint
Cyber SecurityUnits in this learning path:
• Introduction
• Configure Advanced Features
• Upload Folder Settings
• Configure Automated Investigation Remediation Capabilities
• Block at Risk Devices
• Knowledge Check
• Summary Resources
Products: M365, M365 Security Center, Windows 11, Windows Security, Defender Endpoint, Intune, Entra Id
Roles: Security Operations Analyst
Level: Intermediate
Subjects: Information Protection Governance, Threat Protection, Automation
Duration: 34 minutes
Microsoft
Configure and manage file access
Cyber SecurityUnits in this learning path:
• Introduction
• Explore Tools Used Managing Files Folders
• Understand File Folder Permissions
• Understand Permission Inheritance
• Implement Conditions Limit File Folder Access
• Understand Effective Permissions
• Use Effective Access Feature
• Examine Permissions When Copying Moving Files
• Knowledge Check
• Summary
Products: Windows
Roles: Administrator
Level: Beginner
Subjects: Information Protection Governance
Duration: 29 minutes
Microsoft
Configure and manage guardrails in Microsoft Foundry
Cyber SecurityUnits in this learning path:
• Introduction
• Understand Guardrails
• Understand Safety Controls
• Try Guardrails
• Create Manage Blocklist
• Configure Content Filter
• Choose Refine Guardrails
• Knowledge Check
• Summary
Products: Azure, Microsoft Foundry, Defender For Cloud
Roles: Security Engineer, Developer
Level: Intermediate
Subjects: Security, Cloud Security
Duration: 48 minutes
Microsoft
Configure and manage security monitoring and automation solutions
Cyber SecurityUnits in this learning path:
• Introduction
• Security Alerts Incidents
• Automate Responses Microsoft Defender Cloud Triggers
• Log Retention Plans in Microsoft Sentinel
• Alerts Incidents Microsoft Sentinel
• Microsoft Sentinel Data Connectors
• Enable Analytics Rules Microsoft Sentinel
• Respond Threats by Using Playbooks with Automation Rules Microsoft Sentinel
• Automating Threat Response with Microsoft Sentinel
• Knowledge Check
• Summary
Products: Azure, Microsoft Sentinel
Roles: Administrator, Security Engineer
Level: Intermediate
Subjects: Threat Protection
Duration: 72 minutes
Microsoft
Configure and secure Azure Key Vault
Cyber SecurityUnits in this learning path:
• Introduction
• Deploy Key Vault
• Configure Access
• Configure Firewall Network
• Knowledge Check
• Summary
Products: Azure Key Vault, Azure, Azure Virtual Network, Azure Private Link
Roles: Security Engineer
Level: Intermediate
Subjects: Security, Cloud Security
Duration: 27 minutes
Microsoft
Configure and secure devices with Microsoft Intune policies
Cyber SecurityUnits in this learning path:
• Introduction
• Create Assign Configuration Profiles
• Create Assign Compliance Policies
• Target Policies Dynamic Groups
• Exercise Assign Validate Policies
• Automate Remediation Noncompliance
• Knowledge Check
• Summary
Products: Intune, Entra Id, M365
Roles: Administrator, Security Engineer
Level: Intermediate
Subjects: Security, Cloud Computing
Duration: 45 minutes
Microsoft
Configure auditing for Azure SQL Database and SQL Managed Instance
Cyber SecurityUnits in this learning path:
• Introduction
• Describe Azure SQL Auditing Capabilities
• Configure Audit Destinations
• Configure Auditing SQL Managed Instance
• Design Compliant Audit Strategy
• Knowledge Check
• Summary
Products: Azure, Azure SQL Database, Azure SQL Managed Instance, Azure Monitor
Roles: Security Engineer
Level: Intermediate
Subjects: Security, Cloud Security, Databases
Duration: 20 minutes
Microsoft
Configure for alerts and detections in Microsoft Defender for Endpoint
Cyber SecurityUnits in this learning path:
• Introduction
• Configure Advanced Features
• Configure Alert Notifications
• Manage Alert Suppression
• Manage Indicators
• Knowledge Check
• Summary Resources
Products: M365, M365 Security Center, Defender Endpoint, Defender Xdr
Roles: Security Operations Analyst
Level: Intermediate
Subjects: Threat Protection
Duration: 32 minutes
Microsoft
Configure network security groups
Cyber SecurityUnits in this learning path:
• Introduction
• Implement
• Determine Nsg Rules
• Determine Nsg Effective Rules
• Create Nsg Rules
• Implement Asgs New
• Interactive Lab Simulation Network Groups
• Knowledge Check
• Summary Resources
Products: Azure
Roles: Administrator
Level: Intermediate
Subjects: Identity Access, Networking
Duration: 43 minutes
Microsoft
Configure platform-level security for Azure SQL
Cyber SecurityUnits in this learning path:
• Introduction
• Configure Authentication Managed Identity
• Implement Network Isolation
• Encrypt Protect Data
• Apply Data Masking Row Level Security
• Knowledge Check
• Summary
Products: Azure, Azure SQL Database, Azure SQL Managed Instance
Roles: Security Engineer
Level: Intermediate
Subjects: Security, Cloud Security, Databases
Duration: 21 minutes
Microsoft
Configure workspaces for Microsoft Security Copilot
Cyber SecurityUnits in this learning path:
• Introduction
• Plan Workspace Deployment
• Create Workspace
• Configure Workspace Access Settings
• Assign Workspaces Integrated Agents
• Monitor Manage Workspace Capacity
• Knowledge Check
• Summary
Products: Security Copilot
Roles: Security Engineer
Level: Intermediate
Subjects: Security, Cloud Security
Duration: 45 minutes
Microsoft
Configure your Microsoft Sentinel environment
Cyber SecurityModules in this learning path:
• Intro to Azure Sentinel
• Create Manage Azure Sentinel Workspaces
• Query Logs Azure Sentinel
• Use Watchlists Azure Sentinel
• Utilize Threat Intelligence Azure Sentinel
• Integrate Microsoft Defender Xdr with Microsoft Sentinel
Products: Azure Log Analytics, Microsoft Sentinel, Microsoft Defender
Roles: Security Operations Analyst
Level: Intermediate
Subjects: Threat Protection
Duration: 215 minutes
Viewing 121-132 of 594