565 courses available
Amazon Web Services
Deep Dive with Security: AWS Identity and Access Management (IAM)
Cyber SecurityAmazon Web Services
Deep Dive: Managing and Monitoring Amazon Elastic Block Store (Amazon EBS)
Cyber SecurityMicrosoft
Defend against Cyberthreats with Microsoft Defender XDR lab exercises
Cyber SecurityUnits in this learning path:
• Introduction
• Initialize Defender Xdr Exercise
• Deploy Defender Endpoint Exercise
• Incidents Exercise
• Summary
Products: Microsoft Defender, Defender Endpoint, Defender Xdr
Roles: Security Operations Analyst
Level: Intermediate
Subjects: Security
Duration: 63 minutes
Microsoft
Defend against cyberthreats with Microsoft Defender XDR
Cyber SecurityModules in this learning path:
• Mitigate Incidents Microsoft 365 Defender
• Deploy Microsoft Defender for Endpoints Environment
• Configure Settings for Alerts Detections Microsoft Defender for Endpoint
• Configure Manage Automation Microsoft Defender for Endpoint
• Perform Device Investigations Microsoft Defender for Endpoints
• Defend Against Cyberthreats Microsoft Defender Xdr Labs
Products: Microsoft Defender, Defender Endpoint, Defender Xdr
Roles: Security Operations Analyst
Level: Intermediate
Subjects: Threat Protection
Duration: 285 minutes
Microsoft
Defend against threats with Microsoft 365
Cyber SecurityModules in this learning path:
• M365 Security Threat Protect
• M365 Threat Remediate
• M365 Threat Safeguard
Products: M365, Office 365, Defender Xdr
Roles: Administrator
Level: Intermediate
Subjects: Threat Protection
Duration: 189 minutes
Microsoft
Deploy Defender for IoT for OT monitoring
Cyber SecurityModules in this learning path:
• Defender Iot Plan Deployment
• Defender Iot Prepare Deployment
• Onboard Sensor Microsoft Defender Iot
• Defender Iot Deploy Sensor
• Defender Iot Fine Tune Deployment
Products: Defender For Iot
Roles: Solution Architect, Technology Manager
Level: Intermediate
Subjects: Security
Duration: 180 minutes
Microsoft
Deploy a sensor to Microsoft Defender for IoT for operational technology network monitoring
Cyber SecurityUnits in this learning path:
• Introduction
• Describe the Deployment Phase
• Plan to Deploy Sensor
• Exercise Deploy Software to Sensor
• Knowledge Check
• Summary
Products: Defender For Iot
Roles: Technology Manager
Level: Intermediate
Subjects: Security
Duration: 54 minutes
Microsoft
Deploy and manage identity infrastructure
Cyber SecurityModules in this learning path:
• Introduction to Ad Ds
• Manage Ad Ds Domain Controllers Fsmo Roles
• Implement Group Policy Objects
• Manage Advanced Features of Ad Ds
• Implement Hybrid Identity with Windows Server
• Deploy Manage Azure Iaas Active Directory Domain Controllers Azure
Products: Windows Server
Roles: Administrator, Solution Architect, Technology Manager
Level: Intermediate
Subjects: Identity Access
Duration: 377 minutes
Microsoft
Deploy the Microsoft Defender for Endpoint environment
Cyber SecurityUnits in this learning path:
• Introduction
• Create Your Environment
• Understand Operating Systems Compatibility Features
• Onboard Devices
• Manage Access
• Create Manage Roles for Role Based Access Control
• Configure Device Groups
• Configure Environment Advanced Features
• Knowledge Check
• Summary Resources
Products: M365, Defender Endpoint, Windows
Roles: Security Operations Analyst
Level: Intermediate
Subjects: Device Management, Information Protection Governance, Threat Protection
Duration: 46 minutes
Microsoft
Describe Microsoft Security Copilot
Cyber SecurityUnits in this learning path:
• Introduction
• Describe Security Copilot
• Describe Terminology
• Describe How Copilot Processes Prompts
• Create Effective Prompts
• Describe How to Enable Security Copilot
• Knowledge Check
• Summary
Products: Entra, Microsoft Purview, Microsoft Defender, Microsoft Sentinel, Defender Xdr, Intune, Defender For Threat Intelligence, Mdeasm, Ms Copilot
Roles: Security Engineer, Security Operations Analyst, Business Owner
Level: Beginner
Subjects: Cloud Security, Threat Protection
Duration: 32 minutes
Microsoft
Describe Microsoft Security Copilot agents
Cyber SecurityUnits in this learning path:
• Introduction
• Describe Agents
• Describe Threat Intelligence Briefing Agent
• Explore Threat Intelligence Briefing Agent
• Describe Conditional Access Optimization Agent
• Explore Conditional Access Optimization Agent
• Describe Phishing Triage Agent
• Build Agents
• Module Assessment
• Summary
Products: Defender For Threat Intelligence, Entra, Microsoft Defender, Ms Copilot
Roles: Security Operations Analyst, Security Engineer, Business Owner
Level: Beginner
Subjects: Security
Duration: 53 minutes
Microsoft
Describe access management capabilities of Microsoft Entra
Cyber SecurityUnits in this learning path:
• Introduction
• Describe Conditional Access Its Benefits
• Describe Global Secure Access
• Describe Azure Role Based Access Control Rbac
• Knowledge Check
• Summary Resources
Products: Azure, Entra Id, Entra
Roles: Business User, Student
Level: Beginner
Subjects: Identity Access
Duration: 34 minutes
Viewing 157-168 of 565