Skip to content
Search

629 courses available

Microsoft

Configure and manage file access

shield-halved-duotone-light-full Cyber Security
This module describes how to control access to files and folders using permissions.

Units in this learning path:

• Introduction
• Explore Tools Used Managing Files Folders
• Understand File Folder Permissions
• Understand Permission Inheritance
• Implement Conditions Limit File Folder Access
• Understand Effective Permissions
• Use Effective Access Feature
• Examine Permissions When Copying Moving Files
• Knowledge Check
• Summary

Products: Windows

Roles: Administrator

Level: Beginner

Subjects: Information Protection Governance

Duration: 29 minutes

View full course details Cancel

Microsoft

Configure and manage guardrails in Microsoft Foundry

shield-halved-duotone-light-full Cyber Security
Safeguard your AI workloads with Microsoft Foundry guardrails. Discover how to configure and validate content filters, blocklists, and Prompt Shields to protect sensitive data, ensure responsible model behavior, and continuously improve AI safety.

Units in this learning path:

• Introduction
• Understand Guardrails
• Understand Safety Controls
• Try Guardrails
• Create Manage Blocklist
• Configure Content Filter
• Choose Refine Guardrails
• Knowledge Check
• Summary

Products: Azure, Azure AI Foundry, Defender For Cloud

Roles: Security Engineer, Developer

Level: Intermediate

Subjects: Security, Cloud Security

Duration: 48 minutes

View full course details Cancel

Microsoft

Configure and manage secrets in Azure Key Vault

shield-halved-duotone-light-full Cyber Security
Configure and manage secrets in Azure Key Vault

Units in this learning path:

• Introduction
• Key Vault Usage
• Manage Access and Permissions to Secrets
• Store Secrets in Akv
• Manage Certificates
• Summary

Products: Azure

Roles: Administrator, Security Engineer

Level: Beginner

Subjects: Identity Access, Cloud Security

Duration: 29 minutes

View full course details Cancel

Microsoft

Configure and manage security monitoring and automation solutions

shield-halved-duotone-light-full Cyber Security
Learn to set up Azure Monitor and Microsoft Sentinel for automatic security monitoring and response in cloud settings.

Units in this learning path:

• Introduction
• Security Alerts Incidents
• Automate Responses Microsoft Defender Cloud Triggers
• Log Retention Plans in Microsoft Sentinel
• Alerts Incidents Microsoft Sentinel
• Microsoft Sentinel Data Connectors
• Enable Analytics Rules Microsoft Sentinel
• Respond Threats by Using Playbooks with Automation Rules Microsoft Sentinel
• Automating Threat Response with Microsoft Sentinel
• Knowledge Check
• Summary

Products: Azure, Microsoft Sentinel

Roles: Administrator, Security Engineer

Level: Intermediate

Subjects: Threat Protection

Duration: 72 minutes

View full course details Cancel

Microsoft

Configure client connectivity to Microsoft 365

shield-halved-duotone-light-full Cyber Security
This module examines how clients connect to Microsoft 365. It also provides instruction on how to configure name resolution and Outlook clients, and how to troubleshoot client connectivity.

Units in this learning path:

• Introduction
• Examine Automatic Client Configuration
• Explore Dns Records Required Client Configuration
• Configure Outlook Clients
• Troubleshoot Client Connectivity
• Knowledge Check
• Summary

Products: M365, Office 365

Roles: Administrator, Solution Architect, Technology Manager

Level: Intermediate

Subjects: Business Applications, Compliance, Identity Access, Insider Risk, It Management Monitoring, Productivity, Security, Threat Protection

Duration: 25 minutes

View full course details Cancel

Microsoft

Configure for alerts and detections in Microsoft Defender for Endpoint

shield-halved-duotone-light-full Cyber Security
Configure for alerts and detections in Microsoft Defender for Endpoint

Units in this learning path:

• Introduction
• Configure Advanced Features
• Configure Alert Notifications
• Manage Alert Suppression
• Manage Indicators
• Knowledge Check
• Summary Resources

Products: M365, M365 Security Center, Defender Endpoint, Defender Xdr

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Threat Protection

Duration: 32 minutes

View full course details Cancel

Microsoft

Configure network security groups

shield-halved-duotone-light-full Cyber Security
Learn how to implement network security groups, and ensure network security group rules are correctly applied.

Units in this learning path:

• Introduction
• Implement
• Determine Nsg Rules
• Determine Nsg Effective Rules
• Create Nsg Rules
• Implement Asgs New
• Interactive Lab Simulation Network Groups
• Knowledge Check
• Summary Resources

Products: Azure

Roles: Administrator

Level: Intermediate

Subjects: Identity Access, Networking

Duration: 43 minutes

View full course details Cancel

Microsoft

Configure your Microsoft 365 experience

shield-halved-duotone-light-full Cyber Security
This module examines each of the tasks that an organization must complete to successfully configure its Microsoft 365 experience.

Units in this learning path:

• Introduction
• Explore Your Microsoft 365 Cloud Environment
• Configure Organizational Profile Microsoft 365
• Manage Tenant Subscriptions Microsoft 365
• Integrate Customer Engagement Apps
• Configure Sharing Settings Sharepoint Onedrive
• Configure Teams Settings
• Enable Unified Audit Logging
• Complete Tenant Configuration Microsoft 365
• Knowledge Check
• Summary

Products: Office 365

Roles: Administrator, Solution Architect, Technology Manager

Level: Intermediate

Subjects: Business Applications, Compliance, Identity Access, Insider Risk, It Management Monitoring, Productivity, Security, Threat Protection

Duration: 56 minutes

View full course details Cancel

Microsoft

Configure your Microsoft Sentinel environment

shield-halved-duotone-light-full Cyber Security
Configure your Microsoft Sentinel environment

Modules in this learning path:

• Intro to Azure Sentinel
• Create Manage Azure Sentinel Workspaces
• Query Logs Azure Sentinel
• Use Watchlists Azure Sentinel
• Utilize Threat Intelligence Azure Sentinel
• Integrate Microsoft Defender Xdr with Microsoft Sentinel

Products: Azure, Microsoft Sentinel, Microsoft Defender

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Threat Protection

Duration: 215 minutes

View full course details Cancel

Microsoft

Connect Azure assets to Microsoft Defender for Cloud

shield-halved-duotone-light-full Cyber Security
Connect Azure assets to Microsoft Defender for Cloud

Units in this learning path:

• Introduction
• Explore Manage Your Resources with Asset Inventory
• Configure Auto Provisioning
• Manual Azure Monitor Agent Provisioning
• Knowledge Check
• Summary Resources

Products: Azure, Defender For Cloud

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Cloud Security, Threat Protection, Asset Management, Inventory Management

Duration: 35 minutes

View full course details Cancel

Microsoft

Connect Common Event Format logs to Microsoft Sentinel

shield-halved-duotone-light-full Cyber Security
Connect Common Event Format logs to Microsoft Sentinel

Units in this learning path:

• Introduction
• Plan for Connector
• Connect Your External Solution Use Connector
• Knowledge Check
• Summary Resources

Products: Azure, Microsoft Sentinel, Azure Log Analytics

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Security, Cloud Security, Threat Protection

Duration: 20 minutes

View full course details Cancel

Microsoft

Connect Microsoft Defender XDR to Microsoft Sentinel

shield-halved-duotone-light-full Cyber Security
Connect Microsoft Defender XDR to Microsoft Sentinel

Units in this learning path:

• Introduction
• Plan for Microsoft 365 Defender Connectors
• 365 Defender Connector
• Connect Microsoft Defender Cloud Connector
• Connect Microsoft Defender Iot
• Connect Microsoft Defender Legacy Connectors
• Knowledge Check
• Summary Resources

Products: Azure, Microsoft Sentinel, Defender For Cloud, Defender For Iot, Defender Xdr

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Threat Protection, Cloud Security

Duration: 29 minutes

View full course details Cancel

Viewing 121-132 of 629