594 courses available
Microsoft
Create a threat model using data-flow diagram elements
Cyber SecurityUnits in this learning path:
• 1 Introduction
• 1b Elements
• 2 Process the Task Element
• 3 Data Store the Storage Element
• 4 External Entity the No Control Element
• 5 Data Flow the Data in Transit Element
• 6 Trust Boundary the Trust Zone Change Element
• 7 Summary
Products: Azure, Defender For Cloud, M365 Security Center, Defender For Cloud Apps
Roles: Administrator, Developer, Devops Engineer, Security Engineer, Solution Architect
Level: Beginner
Subjects: Threat Protection
Duration: 42 minutes
IBM
Create and Implement Security Controls
Cyber SecurityMicrosoft
Create and configure sensitivity labels with Microsoft Purview
Cyber SecurityUnits in this learning path:
• Introduction
• Information Protection Overview
• Configure Sensitivity Labels
• Configure Sensitivity Label Encryption
• Configure Auto Labeling Policies
• Manage Monitor Remediate
• Knowledge Check
• Summary
Products: Microsoft Purview, M365, Office 365
Roles: Administrator
Level: Intermediate
Subjects: Information Protection Governance
Duration: 54 minutes
Microsoft
Create and manage Insider Risk Management policies
Cyber SecurityUnits in this learning path:
• Introduction
• Policy Templates
• Compare Quick Custom Policies
• Create Custom Insider Risk Policy
• Manage Insider Risk Policy
• Knowledge Check
• Summary
Products: Microsoft Purview, M365
Roles: Auditor, Administrator, Risk Practitioner
Level: Intermediate
Subjects: Information Protection Governance, Security
Duration: 36 minutes
Microsoft
Create and manage Microsoft Sentinel workspaces
Cyber SecurityUnits in this learning path:
• Introduction
• Plan for Workspace
• Create Workspace
• Manage Workspaces Across Tenants Using Azure Lighthouse
• Understand Permissions Roles
• Settings
• Configure Logs
• Knowledge Check
• Summary Resources
Products: Microsoft Defender, Microsoft Sentinel, Azure Log Analytics
Roles: Security Operations Analyst
Level: Intermediate
Subjects: Threat Protection, Cloud Security
Duration: 41 minutes
Microsoft
Create and manage data loss prevention policies
Cyber SecurityUnits in this learning path:
• Introduction
• Policy Intent
• Template Custom Policy
• Define Policy Detection
• Policy Scope
• Policy Actions
• Policy Validation
• Manage Policies
• Adaptive Protection Data Loss Prevention
• Guided Walkthrough Create Policy
• Knowledge Check
• Summary
Products: M365, Microsoft Purview
Roles: Administrator, Risk Practitioner
Level: Intermediate
Subjects: Threat Protection, Security
Duration: 61 minutes
Microsoft
Create and manage eDiscovery cases
Cyber SecurityUnits in this learning path:
• Introduction
• Ediscovery Prerequisites
• Create Manage Ediscovery Case
• Case Access Permissions
• Configure Case Settings
• Knowledge Check
• Summary
Products: Microsoft Purview, M365
Roles: Administrator, Auditor
Level: Intermediate
Subjects: Security, Compliance
Duration: 31 minutes
Microsoft
Create and manage sensitive information types
Cyber SecurityUnits in this learning path:
• Introduction
• Sensitive Info Type Overview
• Compare Built Versus Custom
• Create Manage Custom
• Describe Custom with Exact Data Match
• Implement Document Fingerprinting
• Describe Named Entities
• Create Keyword Dictionary
• Knowledge Check
• Summary Resources
Products: M365
Roles: Auditor, Ip Admin, Risk Practitioner
Level: Intermediate
Subjects: Information Protection Governance
Duration: 67 minutes
Microsoft
Create detections and perform investigations using Microsoft Sentinel
Cyber SecurityModules in this learning path:
• Analyze Data in Sentinel
• Automation Microsoft Sentinel
• Threat Response Sentinel Playbooks
• Incident Management Sentinel
• Use Entity Behavior Analytics Azure Sentinel
• Data Normalization Microsoft Sentinel
• Query Data Sentinel
• Manage Content Microsoft Sentinel
Products: Azure, Microsoft Sentinel, Microsoft Defender
Roles: Security Operations Analyst
Level: Intermediate
Subjects: Threat Protection
Duration: 394 minutes
Microsoft
Create queries for Microsoft Sentinel using Kusto Query Language (KQL)
Cyber SecurityModules in this learning path:
• Construct Kql Statements
• Analyze Results Kql
• Build Multi Table Statements Kql
• Work with Data Kql
Products: Azure, Microsoft Sentinel
Roles: Security Operations Analyst
Level: Intermediate
Subjects: Threat Protection, Data Analytics
Duration: 130 minutes
Microsoft
Create, configure, and manage identities
Cyber SecurityUnits in this learning path:
• Introduction
• Users
• Exercise Assign Licenses Users
• Exercise Restore Remove Deleted Users
• Groups
• Exercise Add Groups Azure Active Directory
• Configure Manage Device Registration
• Manage Licenses
• Exercise Change Group License Assignments
• Exercise Change User License Assignments
• Create Custom Security Attributes
• Explore Automatic User Creation
• Knowledge Check
• Summary Resources
Products: Azure, Entra Id
Roles: Administrator, Identity Access Admin, Security Engineer
Level: Advanced
Subjects: Identity Access
Duration: 64 minutes
Cisco Networking Academy
Cyber Threat Management
Cyber SecurityViewing 145-156 of 594