565 courses available
Microsoft
Connect logs to Microsoft Sentinel
Cyber SecurityModules in this learning path:
• Connect Data to Azure Sentinel with Data Connectors
• Connect Microsoft Services to Azure Sentinel
• Connect Microsoft Defender 365 to Azure Sentinel
• Connect Windows Hosts to Azure Sentinel
• Connect Common Event Format Cef Logs to Azure Sentinel
• Connect Syslog Data Sources to Azure Sentinel
• Connect Threat Indicators to Azure Sentinel
Products: Azure, Azure Log Analytics, Microsoft Sentinel
Roles: Security Operations Analyst
Level: Intermediate
Subjects: Cloud Security
Duration: 184 minutes
Microsoft
Connect non-Azure resources to Microsoft Defender for Cloud
Cyber SecurityUnits in this learning path:
• Introduction
• Protect Resources
• Azure Resources
• Connect Your Aws Accounts
• Connect Your Gcp Accounts
• Knowledge Check
• Summary Resources
Products: Azure, Azure Arc, Defender For Cloud
Roles: Security Operations Analyst
Level: Intermediate
Subjects: Cloud Security
Duration: 44 minutes
Microsoft
Connect syslog data sources to Microsoft Sentinel
Cyber SecurityUnits in this learning path:
• Introduction
• Plan for Syslog Connector
• Collect Data from Linux Based Sources Using Syslog
• Configure Log Analytics Agent
• Parse Syslog Data
• Knowledge Check
• Summary Resources
Products: Azure, Microsoft Sentinel, Azure Log Analytics, Azure Monitor
Roles: Security Operations Analyst
Level: Intermediate
Subjects: Threat Protection
Duration: 28 minutes
Microsoft
Connect threat indicators to Microsoft Sentinel
Cyber SecurityUnits in this learning path:
• Introduction
• Plan for Threat Intelligence Connectors
• Defender Threat Intelligence Connector
• Intelligence Taxii Connector
• Intelligence Upload API Connector
• View Your Threat Indicators
• Knowledge Check
• Summary Resources
Products: Microsoft Defender, Microsoft Sentinel, Defender For Threat Intelligence
Roles: Security Operations Analyst
Level: Intermediate
Subjects: Security, Cloud Security, Threat Protection
Duration: 33 minutes
Microsoft
Construct KQL statements for Microsoft Sentinel
Cyber SecurityUnits in this learning path:
• Introduction
• Understand Kql Statement Structure
• Use Search Operator
• Use Where Operator
• Use Let Statement
• Use Extend Operator
• Use Order by Operator
• Use Project Operators
• Knowledge Check
• Summary Resources
Products: Defender Xdr, Azure Data Explorer, Azure Log Analytics, Microsoft Sentinel
Roles: Security Operations Analyst
Level: Intermediate
Subjects: Threat Protection
Duration: 36 minutes
Microsoft
Create a threat model using data-flow diagram elements
Cyber SecurityUnits in this learning path:
• 1 Introduction
• 1b Elements
• 2 Process the Task Element
• 3 Data Store the Storage Element
• 4 External Entity the No Control Element
• 5 Data Flow the Data in Transit Element
• 6 Trust Boundary the Trust Zone Change Element
• 7 Summary
Products: Azure, Defender For Cloud, M365 Security Center, Defender For Cloud Apps
Roles: Administrator, Developer, Devops Engineer, Security Engineer, Solution Architect
Level: Beginner
Subjects: Threat Protection
Duration: 42 minutes
IBM
Create and Implement Security Controls
Cyber SecurityMicrosoft
Create and configure sensitivity labels with Microsoft Purview
Cyber SecurityUnits in this learning path:
• Introduction
• Information Protection Overview
• Configure Sensitivity Labels
• Configure Sensitivity Label Encryption
• Configure Auto Labeling Policies
• Manage Monitor Remediate
• Knowledge Check
• Summary
Products: Microsoft Purview, M365, Office 365
Roles: Administrator
Level: Intermediate
Subjects: Information Protection Governance
Duration: 54 minutes
Microsoft
Create and manage Insider Risk Management policies
Cyber SecurityUnits in this learning path:
• Introduction
• Policy Templates
• Compare Quick Custom Policies
• Create Custom Insider Risk Policy
• Manage Insider Risk Policy
• Knowledge Check
• Summary
Products: Microsoft Purview, M365
Roles: Auditor, Administrator, Risk Practitioner
Level: Intermediate
Subjects: Information Protection Governance, Security
Duration: 36 minutes
Microsoft
Create and manage Microsoft Sentinel workspaces
Cyber SecurityUnits in this learning path:
• Introduction
• Plan for Workspace
• Create Workspace
• Manage Workspaces Across Tenants Using Azure Lighthouse
• Understand Permissions Roles
• Settings
• Configure Logs
• Knowledge Check
• Summary Resources
Products: Microsoft Defender, Microsoft Sentinel, Azure Log Analytics
Roles: Security Operations Analyst
Level: Intermediate
Subjects: Threat Protection, Cloud Security
Duration: 41 minutes
Microsoft
Create and manage eDiscovery cases
Cyber SecurityUnits in this learning path:
• Introduction
• Ediscovery Prerequisites
• Create Manage Ediscovery Case
• Case Access Permissions
• Configure Case Settings
• Knowledge Check
• Summary
Products: Microsoft Purview, M365
Roles: Administrator, Auditor
Level: Intermediate
Subjects: Security, Compliance
Duration: 31 minutes
Microsoft
Create and manage sensitive information types
Cyber SecurityUnits in this learning path:
• Introduction
• Sensitive Info Type Overview
• Compare Built Versus Custom
• Create Manage Custom
• Describe Custom with Exact Data Match
• Implement Document Fingerprinting
• Describe Named Entities
• Create Keyword Dictionary
• Knowledge Check
• Summary Resources
Products: M365
Roles: Auditor, Ip Admin, Risk Practitioner
Level: Intermediate
Subjects: Information Protection Governance
Duration: 67 minutes
Viewing 133-144 of 565