Skip to content
Search

565 courses available

Microsoft

Create detections and perform investigations using Microsoft Sentinel

shield-halved-duotone-light-full Cyber Security
Create detections and perform investigations using Microsoft Sentinel

Modules in this learning path:

• Analyze Data in Sentinel
• Automation Microsoft Sentinel
• Threat Response Sentinel Playbooks
• Incident Management Sentinel
• Use Entity Behavior Analytics Azure Sentinel
• Data Normalization Microsoft Sentinel
• Query Data Sentinel
• Manage Content Microsoft Sentinel

Products: Azure, Microsoft Sentinel, Microsoft Defender

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Threat Protection

Duration: 394 minutes

View full course details Cancel

Microsoft

Create queries for Microsoft Sentinel using Kusto Query Language (KQL)

shield-halved-duotone-light-full Cyber Security
Create queries for Microsoft Sentinel using Kusto Query Language (KQL)

Modules in this learning path:

• Construct Kql Statements
• Analyze Results Kql
• Build Multi Table Statements Kql
• Work with Data Kql

Products: Azure, Microsoft Sentinel

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Threat Protection, Data Analytics

Duration: 130 minutes

View full course details Cancel

Microsoft

Create security baselines

shield-halved-duotone-light-full Cyber Security
In this module, you learn how to create security baselines for your Azure services by ensuring that your settings meet the minimum requirements described in CIS Benchmarks for Azure v. 1.3.0.

Units in this learning path:

• Introduction
• Platform Security Baselines
• Create an Identity Access Management Iam
• Create an Azure Security Center Baseline
• Create a Storage Accounts Baseline
• Create an Azure SQL Database Baseline
• Create a Logging and Monitoring Baseline
• Create a Networking Baseline
• Create a Vms Baseline
• Other Security Considerations for a Baseline
• Summary

Products: Azure

Roles: Developer, Solution Architect, Security Engineer

Level: Beginner

Subjects: Security

Duration: 60 minutes

View full course details Cancel

Microsoft

Create, configure, and manage identities

shield-halved-duotone-light-full Cyber Security
Access to cloud-based workloads needs to be controlled centrally by providing a definitive identity for each user and resource. You can ensure employees and vendors have just enough access to do their job.

Units in this learning path:

• Introduction
• Users
• Exercise Assign Licenses Users
• Exercise Restore Remove Deleted Users
• Groups
• Exercise Add Groups Azure Active Directory
• Configure Manage Device Registration
• Manage Licenses
• Exercise Change Group License Assignments
• Exercise Change User License Assignments
• Create Custom Security Attributes
• Explore Automatic User Creation
• Knowledge Check
• Summary Resources

Products: Azure, Entra Id

Roles: Administrator, Identity Access Admin, Security Engineer

Level: Advanced

Subjects: Identity Access

Duration: 64 minutes

View full course details Cancel

Cisco Networking Academy

Cyber Threat Management

shield-halved-duotone-light-full Cyber Security
This course is the sixth in the six-course Junior Cybersecurity Analyst Pathway, aligned to the CCST (Cisco Certified Support Technician) Cybersecurity certification. Develop advanced knowledge that you will use in the workplace as a Junior Cybersecurity Analyst. This course explores governance in cybersecurity and threat management. Learn to develop policies and ensure your organization complies with ethics standards and legal and regulatory frameworks. You will also gain skills for managing threats, such as how to assess a network for vulnerabilities, manage risks, and respond to security incidents.
View full course details Cancel

IBM

Cybersecurity Academy Lärarfortbildning

shield-halved-duotone-light-full Cyber Security
This credential earner has knowledge of information technology security, awareness of security risks and threats online, and awareness of how to protect an individual’s data. The earner has an understanding of topics such as personal integrity, artificial intelligence, digital ethics, and critical thinking. The earner is prepared to deliver cybersecurity topics in their classrooms to their students.
View full course details Cancel

IBM

Cybersecurity Architecture

shield-halved-duotone-light-full Cyber Security
This credential earner has the advanced skills to design cybersecurity architecture. The individual has the technical knowledge and practical skills to secure network architecture, endpoint architecture, remote access, application architecture, data storage architecture, productivity software, and identity and access controls. The earner has practiced essential workplace skills.
View full course details Cancel

IBM

Cybersecurity Fundamentals

shield-halved-duotone-light-full Cyber Security
This credential earner demonstrates a foundational understanding of cybersecurity concepts, objectives, and practices. This includes cyber threat groups, types of attacks, social engineering, case studies, overall security strategies, cryptography, and common approaches that organizations take to prevent, detect, and respond to cyber attacks. This also includes an awareness of the job market. Earners can use this knowledge to pursue further education for a variety of roles in cybersecurity.
View full course details Cancel

IBM

Cybersecurity Fundamentals with Capstone Project

shield-halved-duotone-light-full Cyber Security
This credential earner demonstrates a solid understanding of cybersecurity concepts, objectives, and practices, including cyber threat groups, attack types, social engineering, cryptography and security strategies. The credential verifies the ability to apply cybersecurity knowledge in real-world scenarios, as demonstrated through the completion of a simulated cybersecurity investigation. Badge earners can pursue further education for a variety of roles in cybersecurity.
View full course details Cancel

IBM

Cybersecurity Pre-Apprenticeship - V3

shield-halved-duotone-light-full Cyber Security
The credential earner demonstrates basic proficiency in security tools used to configure, monitor, track, and analyze network systems and applications. The individual has gained foundational knowledge of security compliance standards along with a demonstrated soft skill for design thinking, agile, and professional skills including problem solving and collaboration. The earner is prepared for an apprenticeship and has completed all the foundational skills.
View full course details Cancel

Amazon Web Services

Cybersecurity for Small Business Owners

shield-halved-duotone-light-full Cyber Security
This course was developed by members of AWS Technical Field Communities (TFC), an AWS community of technical experts. The content is intended to complement our standard training curriculum and augment your AWS learning journey. We are aware some…
View full course details Cancel

Amazon Web Services

Deep Dive on Container Security

shield-halved-duotone-light-full Cyber Security
Security should be the first concern for any project – maintaining the confidentiality, integrity and availability of your architecture. Containers present a unique middle ground between full instance management and pure services. Bertram Dorn,…
View full course details Cancel

Viewing 145-156 of 565