Skip to content
Search

629 courses available

Microsoft

Create and manage Insider Risk Management policies

shield-halved-duotone-light-full Cyber Security
Create and manage Insider Risk Management policies.

Units in this learning path:

• Introduction
• Policy Templates
• Compare Quick Custom Policies
• Create Custom Insider Risk Policy
• Manage Insider Risk Policy
• Knowledge Check
• Summary

Products: Microsoft Purview, M365

Roles: Auditor, Administrator, Risk Practitioner

Level: Intermediate

Subjects: Information Protection Governance, Security

Duration: 36 minutes

View full course details Cancel

Microsoft

Create and manage Microsoft Sentinel workspaces

shield-halved-duotone-light-full Cyber Security
Create and manage Microsoft Sentinel workspaces

Units in this learning path:

• Introduction
• Plan for Workspace
• Create Workspace
• Manage Workspaces Across Tenants Using Azure Lighthouse
• Understand Permissions Roles
• Settings
• Configure Logs
• Knowledge Check
• Summary Resources

Products: Azure, Microsoft Sentinel, Azure Log Analytics

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Threat Protection, Cloud Security

Duration: 41 minutes

View full course details Cancel

Microsoft

Create and manage eDiscovery cases

shield-halved-duotone-light-full Cyber Security
Create and manage eDiscovery cases.

Units in this learning path:

• Introduction
• Ediscovery Prerequisites
• Create Manage Ediscovery Case
• Case Access Permissions
• Configure Case Settings
• Knowledge Check
• Summary

Products: Microsoft Purview, M365

Roles: Administrator, Auditor

Level: Intermediate

Subjects: Security, Compliance

Duration: 31 minutes

View full course details Cancel

Microsoft

Create and manage sensitive information types

shield-halved-duotone-light-full Cyber Security
Create and manage sensitive information types.

Units in this learning path:

• Introduction
• Sensitive Info Type Overview
• Compare Built Versus Custom
• Create Manage Custom
• Describe Custom with Exact Data Match
• Implement Document Fingerprinting
• Describe Named Entities
• Create Keyword Dictionary
• Knowledge Check
• Summary Resources

Products: M365

Roles: Auditor, Ip Admin, Risk Practitioner

Level: Intermediate

Subjects: Information Protection Governance

Duration: 67 minutes

View full course details Cancel

Microsoft

Create detections and perform investigations using Microsoft Sentinel

shield-halved-duotone-light-full Cyber Security
Create detections and perform investigations using Microsoft Sentinel

Modules in this learning path:

• Analyze Data in Sentinel
• Automation Microsoft Sentinel
• Threat Response Sentinel Playbooks
• Incident Management Sentinel
• Use Entity Behavior Analytics Azure Sentinel
• Data Normalization Microsoft Sentinel
• Query Data Sentinel
• Manage Content Microsoft Sentinel

Products: Azure, Microsoft Sentinel, Microsoft Defender

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Threat Protection

Duration: 394 minutes

View full course details Cancel

Microsoft

Create queries for Microsoft Sentinel using Kusto Query Language (KQL)

shield-halved-duotone-light-full Cyber Security
Create queries for Microsoft Sentinel using Kusto Query Language (KQL)

Modules in this learning path:

• Construct Kql Statements
• Analyze Results Kql
• Build Multi Table Statements Kql
• Work with Data Kql

Products: Azure, Microsoft Sentinel

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Threat Protection, Data Analytics

Duration: 130 minutes

View full course details Cancel

Microsoft

Create security baselines

shield-halved-duotone-light-full Cyber Security
In this module, you learn how to create security baselines for your Azure services by ensuring that your settings meet the minimum requirements described in CIS Benchmarks for Azure v. 1.3.0.

Units in this learning path:

• Introduction
• Platform Security Baselines
• Create an Identity Access Management Iam
• Create an Azure Security Center Baseline
• Create a Storage Accounts Baseline
• Create an Azure SQL Database Baseline
• Create a Logging and Monitoring Baseline
• Create a Networking Baseline
• Create a Vms Baseline
• Other Security Considerations for a Baseline
• Summary

Products: Azure

Roles: Developer, Solution Architect, Security Engineer

Level: Beginner

Subjects: Security

Duration: 60 minutes

View full course details Cancel

Microsoft

Create, configure, and manage identities

shield-halved-duotone-light-full Cyber Security
Access to cloud-based workloads needs to be controlled centrally by providing a definitive identity for each user and resource. You can ensure employees and vendors have just enough access to do their job.

Units in this learning path:

• Introduction
• Users
• Exercise Assign Licenses Users
• Exercise Restore Remove Deleted Users
• Groups
• Exercise Add Groups Azure Active Directory
• Configure Manage Device Registration
• Manage Licenses
• Exercise Change Group License Assignments
• Exercise Change User License Assignments
• Create Custom Security Attributes
• Explore Automatic User Creation
• Knowledge Check
• Summary Resources

Products: Azure, Entra Id

Roles: Administrator, Identity Access Admin, Security Engineer

Level: Advanced

Subjects: Identity Access

Duration: 64 minutes

View full course details Cancel

Cisco Networking Academy

Cyber Threat Management

shield-halved-duotone-light-full Cyber Security
This course is the sixth in the six-course Junior Cybersecurity Analyst Pathway, aligned to the CCST (Cisco Certified Support Technician) Cybersecurity certification. Develop advanced knowledge that you will use in the workplace as a Junior Cybersecurity Analyst. This course explores governance in cybersecurity and threat management. Learn to develop policies and ensure your organization complies with ethics standards and legal and regulatory frameworks. You will also gain skills for managing threats, such as how to assess a network for vulnerabilities, manage risks, and respond to security incidents.
View full course details Cancel

IBM

Cybersecurity Academy Lärarfortbildning

shield-halved-duotone-light-full Cyber Security
This credential earner has knowledge of information technology security, awareness of security risks and threats online, and awareness of how to protect an individual’s data. The earner has an understanding of topics such as personal integrity, artificial intelligence, digital ethics, and critical thinking. The earner is prepared to deliver cybersecurity topics in their classrooms to their students.
View full course details Cancel

IBM

Cybersecurity Architecture

shield-halved-duotone-light-full Cyber Security
This credential earner has the advanced skills to design cybersecurity architecture. The individual has the technical knowledge and practical skills to secure network architecture, endpoint architecture, remote access, application architecture, data storage architecture, productivity software, and identity and access controls. The earner has practiced essential workplace skills.
View full course details Cancel

IBM

Cybersecurity Fundamentals

shield-halved-duotone-light-full Cyber Security
This credential earner demonstrates a foundational understanding of cybersecurity concepts, objectives, and practices. This includes cyber threat groups, types of attacks, social engineering, case studies, overall security strategies, cryptography, and common approaches that organizations take to prevent, detect, and respond to cyber attacks. This also includes an awareness of the job market. Earners can use this knowledge to pursue further education for a variety of roles in cybersecurity.
View full course details Cancel

Viewing 145-156 of 629