Skip to content
Search

594 courses available

Microsoft

Configure and manage automation using Microsoft Defender for Endpoint

shield-halved-duotone-light-full Cyber Security
Configure and manage automation using Microsoft Defender for Endpoint

Units in this learning path:

• Introduction
• Configure Advanced Features
• Upload Folder Settings
• Configure Automated Investigation Remediation Capabilities
• Block at Risk Devices
• Knowledge Check
• Summary Resources

Products: M365, M365 Security Center, Windows 11, Windows Security, Defender Endpoint, Intune, Entra Id

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Information Protection Governance, Threat Protection, Automation

Duration: 34 minutes

View full course details Cancel

Microsoft

Configure and manage file access

shield-halved-duotone-light-full Cyber Security
This module describes how to control access to files and folders using permissions.

Units in this learning path:

• Introduction
• Explore Tools Used Managing Files Folders
• Understand File Folder Permissions
• Understand Permission Inheritance
• Implement Conditions Limit File Folder Access
• Understand Effective Permissions
• Use Effective Access Feature
• Examine Permissions When Copying Moving Files
• Knowledge Check
• Summary

Products: Windows

Roles: Administrator

Level: Beginner

Subjects: Information Protection Governance

Duration: 29 minutes

View full course details Cancel

Microsoft

Configure and manage guardrails in Microsoft Foundry

shield-halved-duotone-light-full Cyber Security
Safeguard your AI workloads with Microsoft Foundry guardrails. Discover how to configure and validate content filters, blocklists, and Prompt Shields to protect sensitive data, ensure responsible model behavior, and continuously improve AI safety.

Units in this learning path:

• Introduction
• Understand Guardrails
• Understand Safety Controls
• Try Guardrails
• Create Manage Blocklist
• Configure Content Filter
• Choose Refine Guardrails
• Knowledge Check
• Summary

Products: Azure, Microsoft Foundry, Defender For Cloud

Roles: Security Engineer, Developer

Level: Intermediate

Subjects: Security, Cloud Security

Duration: 48 minutes

View full course details Cancel

Microsoft

Configure and manage security monitoring and automation solutions

shield-halved-duotone-light-full Cyber Security
Learn to set up Azure Monitor and Microsoft Sentinel for automatic security monitoring and response in cloud settings.

Units in this learning path:

• Introduction
• Security Alerts Incidents
• Automate Responses Microsoft Defender Cloud Triggers
• Log Retention Plans in Microsoft Sentinel
• Alerts Incidents Microsoft Sentinel
• Microsoft Sentinel Data Connectors
• Enable Analytics Rules Microsoft Sentinel
• Respond Threats by Using Playbooks with Automation Rules Microsoft Sentinel
• Automating Threat Response with Microsoft Sentinel
• Knowledge Check
• Summary

Products: Azure, Microsoft Sentinel

Roles: Administrator, Security Engineer

Level: Intermediate

Subjects: Threat Protection

Duration: 72 minutes

View full course details Cancel

Microsoft

Configure and secure Azure Key Vault

shield-halved-duotone-light-full Cyber Security
Configure a security-hardened Azure Key Vault for enterprise workloads. Apply soft delete and purge protection, enforce least-privilege RBAC access with just-in-time activation, and secure the network perimeter using firewall rules and private endpoints.

Units in this learning path:

• Introduction
• Deploy Key Vault
• Configure Access
• Configure Firewall Network
• Knowledge Check
• Summary

Products: Azure Key Vault, Azure, Azure Virtual Network, Azure Private Link

Roles: Security Engineer

Level: Intermediate

Subjects: Security, Cloud Security

Duration: 27 minutes

View full course details Cancel

Microsoft

Configure and secure devices with Microsoft Intune policies

shield-halved-duotone-light-full Cyber Security
Learn how to configure and secure devices using Microsoft Intune configuration profiles, compliance policies, and dynamic group targeting.

Units in this learning path:

• Introduction
• Create Assign Configuration Profiles
• Create Assign Compliance Policies
• Target Policies Dynamic Groups
• Exercise Assign Validate Policies
• Automate Remediation Noncompliance
• Knowledge Check
• Summary

Products: Intune, Entra Id, M365

Roles: Administrator, Security Engineer

Level: Intermediate

Subjects: Security, Cloud Computing

Duration: 45 minutes

View full course details Cancel

Microsoft

Configure auditing for Azure SQL Database and SQL Managed Instance

shield-halved-duotone-light-full Cyber Security
Configure audit logging for Azure SQL Database and SQL Managed Instance to create tamper-resistant compliance records. Set audit action groups, route logs to Azure Monitor, Event Hubs, and immutable blob storage, and configure SQL Managed Instance–specific auditing to meet financial regulatory audit requirements.

Units in this learning path:

• Introduction
• Describe Azure SQL Auditing Capabilities
• Configure Audit Destinations
• Configure Auditing SQL Managed Instance
• Design Compliant Audit Strategy
• Knowledge Check
• Summary

Products: Azure, Azure SQL Database, Azure SQL Managed Instance, Azure Monitor

Roles: Security Engineer

Level: Intermediate

Subjects: Security, Cloud Security, Databases

Duration: 20 minutes

View full course details Cancel

Microsoft

Configure for alerts and detections in Microsoft Defender for Endpoint

shield-halved-duotone-light-full Cyber Security
Configure for alerts and detections in Microsoft Defender for Endpoint

Units in this learning path:

• Introduction
• Configure Advanced Features
• Configure Alert Notifications
• Manage Alert Suppression
• Manage Indicators
• Knowledge Check
• Summary Resources

Products: M365, M365 Security Center, Defender Endpoint, Defender Xdr

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Threat Protection

Duration: 32 minutes

View full course details Cancel

Microsoft

Configure network security groups

shield-halved-duotone-light-full Cyber Security
Learn how to implement network security groups, and ensure network security group rules are correctly applied.

Units in this learning path:

• Introduction
• Implement
• Determine Nsg Rules
• Determine Nsg Effective Rules
• Create Nsg Rules
• Implement Asgs New
• Interactive Lab Simulation Network Groups
• Knowledge Check
• Summary Resources

Products: Azure

Roles: Administrator

Level: Intermediate

Subjects: Identity Access, Networking

Duration: 43 minutes

View full course details Cancel

Microsoft

Configure platform-level security for Azure SQL

shield-halved-duotone-light-full Cyber Security
Configure authentication, network isolation, encryption, and access controls for Azure SQL Database and SQL Managed Instance. Implement Microsoft Entra ID–only authentication with managed identity access for AI workloads, deploy private endpoints, and apply transparent data encryption, dynamic data masking, and row-level security to protect sensitive financial data.

Units in this learning path:

• Introduction
• Configure Authentication Managed Identity
• Implement Network Isolation
• Encrypt Protect Data
• Apply Data Masking Row Level Security
• Knowledge Check
• Summary

Products: Azure, Azure SQL Database, Azure SQL Managed Instance

Roles: Security Engineer

Level: Intermediate

Subjects: Security, Cloud Security, Databases

Duration: 21 minutes

View full course details Cancel

Microsoft

Configure workspaces for Microsoft Security Copilot

shield-halved-duotone-light-full Cyber Security
Learn how to plan, create, and configure Security Copilot workspaces for enterprise segmentation. Configure capacity, data residency, roles, plugins, and agent routing for multi-team deployments.

Units in this learning path:

• Introduction
• Plan Workspace Deployment
• Create Workspace
• Configure Workspace Access Settings
• Assign Workspaces Integrated Agents
• Monitor Manage Workspace Capacity
• Knowledge Check
• Summary

Products: Security Copilot

Roles: Security Engineer

Level: Intermediate

Subjects: Security, Cloud Security

Duration: 45 minutes

View full course details Cancel

Microsoft

Configure your Microsoft Sentinel environment

shield-halved-duotone-light-full Cyber Security
Configure your Microsoft Sentinel environment

Modules in this learning path:

• Intro to Azure Sentinel
• Create Manage Azure Sentinel Workspaces
• Query Logs Azure Sentinel
• Use Watchlists Azure Sentinel
• Utilize Threat Intelligence Azure Sentinel
• Integrate Microsoft Defender Xdr with Microsoft Sentinel

Products: Azure Log Analytics, Microsoft Sentinel, Microsoft Defender

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Threat Protection

Duration: 215 minutes

View full course details Cancel

Viewing 121-132 of 594