Skip to content
Search

594 courses available

Microsoft

Create a threat model using data-flow diagram elements

shield-halved-duotone-light-full Cyber Security
Data-flow diagrams are graphical representations of your system and should specify each element, their interactions, and context.

Units in this learning path:

• 1 Introduction
• 1b Elements
• 2 Process the Task Element
• 3 Data Store the Storage Element
• 4 External Entity the No Control Element
• 5 Data Flow the Data in Transit Element
• 6 Trust Boundary the Trust Zone Change Element
• 7 Summary

Products: Azure, Defender For Cloud, M365 Security Center, Defender For Cloud Apps

Roles: Administrator, Developer, Devops Engineer, Security Engineer, Solution Architect

Level: Beginner

Subjects: Threat Protection

Duration: 42 minutes

View full course details Cancel

IBM

Create and Implement Security Controls

shield-halved-duotone-light-full Cyber Security
This credential earner demonstrated their applied knowledge in creating and implementing security measures for a technology company. The earner has implemented essential security controls, identified common threats and attacks, and understood data and access controls. The earner will build and develop their transferable skills and gain real industry experience.
View full course details Cancel

Microsoft

Create and configure sensitivity labels with Microsoft Purview

shield-halved-duotone-light-full Cyber Security
Microsoft Purview sensitivity labels enable you to classify and protect sensitive data throughout your organization, including in the cloud and on devices. This module covers how to classify and protect sensitive information to ensure its security and compliance.

Units in this learning path:

• Introduction
• Information Protection Overview
• Configure Sensitivity Labels
• Configure Sensitivity Label Encryption
• Configure Auto Labeling Policies
• Manage Monitor Remediate
• Knowledge Check
• Summary

Products: Microsoft Purview, M365, Office 365

Roles: Administrator

Level: Intermediate

Subjects: Information Protection Governance

Duration: 54 minutes

View full course details Cancel

Microsoft

Create and manage Insider Risk Management policies

shield-halved-duotone-light-full Cyber Security
Create and manage Insider Risk Management policies.

Units in this learning path:

• Introduction
• Policy Templates
• Compare Quick Custom Policies
• Create Custom Insider Risk Policy
• Manage Insider Risk Policy
• Knowledge Check
• Summary

Products: Microsoft Purview, M365

Roles: Auditor, Administrator, Risk Practitioner

Level: Intermediate

Subjects: Information Protection Governance, Security

Duration: 36 minutes

View full course details Cancel

Microsoft

Create and manage Microsoft Sentinel workspaces

shield-halved-duotone-light-full Cyber Security
Create and manage Microsoft Sentinel workspaces

Units in this learning path:

• Introduction
• Plan for Workspace
• Create Workspace
• Manage Workspaces Across Tenants Using Azure Lighthouse
• Understand Permissions Roles
• Settings
• Configure Logs
• Knowledge Check
• Summary Resources

Products: Microsoft Defender, Microsoft Sentinel, Azure Log Analytics

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Threat Protection, Cloud Security

Duration: 41 minutes

View full course details Cancel

Microsoft

Create and manage data loss prevention policies

shield-halved-duotone-light-full Cyber Security
Create and manage data loss prevention policies.

Units in this learning path:

• Introduction
• Policy Intent
• Template Custom Policy
• Define Policy Detection
• Policy Scope
• Policy Actions
• Policy Validation
• Manage Policies
• Adaptive Protection Data Loss Prevention
• Guided Walkthrough Create Policy
• Knowledge Check
• Summary

Products: M365, Microsoft Purview

Roles: Administrator, Risk Practitioner

Level: Intermediate

Subjects: Threat Protection, Security

Duration: 61 minutes

View full course details Cancel

Microsoft

Create and manage eDiscovery cases

shield-halved-duotone-light-full Cyber Security
Create and manage eDiscovery cases.

Units in this learning path:

• Introduction
• Ediscovery Prerequisites
• Create Manage Ediscovery Case
• Case Access Permissions
• Configure Case Settings
• Knowledge Check
• Summary

Products: Microsoft Purview, M365

Roles: Administrator, Auditor

Level: Intermediate

Subjects: Security, Compliance

Duration: 31 minutes

View full course details Cancel

Microsoft

Create and manage sensitive information types

shield-halved-duotone-light-full Cyber Security
Create and manage sensitive information types.

Units in this learning path:

• Introduction
• Sensitive Info Type Overview
• Compare Built Versus Custom
• Create Manage Custom
• Describe Custom with Exact Data Match
• Implement Document Fingerprinting
• Describe Named Entities
• Create Keyword Dictionary
• Knowledge Check
• Summary Resources

Products: M365

Roles: Auditor, Ip Admin, Risk Practitioner

Level: Intermediate

Subjects: Information Protection Governance

Duration: 67 minutes

View full course details Cancel

Microsoft

Create detections and perform investigations using Microsoft Sentinel

shield-halved-duotone-light-full Cyber Security
Create detections and perform investigations using Microsoft Sentinel

Modules in this learning path:

• Analyze Data in Sentinel
• Automation Microsoft Sentinel
• Threat Response Sentinel Playbooks
• Incident Management Sentinel
• Use Entity Behavior Analytics Azure Sentinel
• Data Normalization Microsoft Sentinel
• Query Data Sentinel
• Manage Content Microsoft Sentinel

Products: Azure, Microsoft Sentinel, Microsoft Defender

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Threat Protection

Duration: 394 minutes

View full course details Cancel

Microsoft

Create queries for Microsoft Sentinel using Kusto Query Language (KQL)

shield-halved-duotone-light-full Cyber Security
Create queries for Microsoft Sentinel using Kusto Query Language (KQL)

Modules in this learning path:

• Construct Kql Statements
• Analyze Results Kql
• Build Multi Table Statements Kql
• Work with Data Kql

Products: Azure, Microsoft Sentinel

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Threat Protection, Data Analytics

Duration: 130 minutes

View full course details Cancel

Microsoft

Create, configure, and manage identities

shield-halved-duotone-light-full Cyber Security
Access to cloud-based workloads needs to be controlled centrally by providing a definitive identity for each user and resource. You can ensure employees and vendors have just enough access to do their job.

Units in this learning path:

• Introduction
• Users
• Exercise Assign Licenses Users
• Exercise Restore Remove Deleted Users
• Groups
• Exercise Add Groups Azure Active Directory
• Configure Manage Device Registration
• Manage Licenses
• Exercise Change Group License Assignments
• Exercise Change User License Assignments
• Create Custom Security Attributes
• Explore Automatic User Creation
• Knowledge Check
• Summary Resources

Products: Azure, Entra Id

Roles: Administrator, Identity Access Admin, Security Engineer

Level: Advanced

Subjects: Identity Access

Duration: 64 minutes

View full course details Cancel

Cisco Networking Academy

Cyber Threat Management

shield-halved-duotone-light-full Cyber Security
This course is the sixth in the six-course Junior Cybersecurity Analyst Pathway, aligned to the CCST (Cisco Certified Support Technician) Cybersecurity certification. Develop advanced knowledge that you will use in the workplace as a Junior Cybersecurity Analyst. This course explores governance in cybersecurity and threat management. Learn to develop policies and ensure your organization complies with ethics standards and legal and regulatory frameworks. You will also gain skills for managing threats, such as how to assess a network for vulnerabilities, manage risks, and respond to security incidents.
View full course details Cancel

Viewing 145-156 of 594