Skip to content
Search

629 courses available

IBM

Cybersecurity Fundamentals with Capstone Project

shield-halved-duotone-light-full Cyber Security
This credential earner demonstrates a solid understanding of cybersecurity concepts, objectives, and practices, including cyber threat groups, attack types, social engineering, cryptography and security strategies. The credential verifies the ability to apply cybersecurity knowledge in real-world scenarios, as demonstrated through the completion of a simulated cybersecurity investigation. Badge earners can pursue further education for a variety of roles in cybersecurity.
View full course details Cancel

IBM

Cybersecurity Pre-Apprenticeship - V3

shield-halved-duotone-light-full Cyber Security
The credential earner demonstrates basic proficiency in security tools used to configure, monitor, track, and analyze network systems and applications. The individual has gained foundational knowledge of security compliance standards along with a demonstrated soft skill for design thinking, agile, and professional skills including problem solving and collaboration. The earner is prepared for an apprenticeship and has completed all the foundational skills.
View full course details Cancel

Amazon Web Services

Cybersecurity for Small Business Owners

shield-halved-duotone-light-full Cyber Security
This course was developed by members of AWS Technical Field Communities (TFC), an AWS community of technical experts. The content is intended to complement our standard training curriculum and augment your AWS learning journey. We are aware some…
View full course details Cancel

Amazon Web Services

Deep Dive on Container Security

shield-halved-duotone-light-full Cyber Security
Security should be the first concern for any project – maintaining the confidentiality, integrity and availability of your architecture. Containers present a unique middle ground between full instance management and pure services. Bertram Dorn,…
View full course details Cancel

Amazon Web Services

Deep Dive with Security: AWS Identity and Access Management (IAM)

shield-halved-duotone-light-full Cyber Security
As you build and deploy on AWS, granting developers and applications the right access to the right resources is critical to security. This self-paced course provides a deep dive into AWS Identity and Access Management (IAM) and best practices for…
View full course details Cancel

Amazon Web Services

Deep Dive: Managing and Monitoring Amazon Elastic Block Store (Amazon EBS)

shield-halved-duotone-light-full Cyber Security
Amazon Elastic Block Store (Amazon EBS) supports a wide range of both transaction-intensive and throughput-intensive workloads on Amazon Web Services (AWS). In this fourth course of the Amazon EBS deep dive, you learn how to manage your EBS…
View full course details Cancel

Microsoft

Defend against Cyberthreats with Microsoft Defender XDR lab exercises

shield-halved-duotone-light-full Cyber Security
Learn how to configure Microsoft Defender XDR, deploy Microsoft Defender for Endpoint and onboard devices, configure policies, mitigate threats, and respond to incidents with Defender XDR.

Units in this learning path:

• Introduction
• Initialize Defender Xdr Exercise
• Deploy Defender Endpoint Exercise
• Incidents Exercise
• Summary

Products: Microsoft Defender, Defender Endpoint, Defender Xdr

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Security

Duration: 63 minutes

View full course details Cancel

Microsoft

Defend against cyberthreats with Microsoft Defender XDR

shield-halved-duotone-light-full Cyber Security
To earn this Microsoft Applied Skills credential, learners demonstrate the ability to use Microsoft Defender XDR to detect and respond to cyberthreats. Candidates for this credential should be familiar with investigating and gathering evidence about attacks on endpoints. They should also have experience using Microsoft Defender for Endpoint and Kusto Query Language (KQL).

Modules in this learning path:

• Mitigate Incidents Microsoft 365 Defender
• Deploy Microsoft Defender for Endpoints Environment
• Configure Settings for Alerts Detections Microsoft Defender for Endpoint
• Configure Manage Automation Microsoft Defender for Endpoint
• Perform Device Investigations Microsoft Defender for Endpoints
• Defend Against Cyberthreats Microsoft Defender Xdr Labs

Products: Microsoft Defender, Defender Endpoint, Defender Xdr

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Threat Protection

Duration: 285 minutes

View full course details Cancel

Microsoft

Defend against threats with Microsoft 365

shield-halved-duotone-light-full Cyber Security
Microsoft 365 includes security technologies that enterprises can use to secure email, data, devices, and identities against the risk of cyber threats. This learning path provides an introduction to Microsoft Defender XDR, Microsoft Defender for Endpoint, Microsoft Defender for Identity, and Microsoft Defender for Office 365.

Modules in this learning path:

• M365 Security Threat Protect
• M365 Threat Remediate
• M365 Threat Safeguard

Products: M365, Office 365, Defender Xdr

Roles: Administrator

Level: Intermediate

Subjects: Threat Protection

Duration: 189 minutes

View full course details Cancel

Microsoft

Deploy Defender for IoT for OT monitoring

shield-halved-duotone-light-full Cyber Security
Learn how to deploy Defender for IoT to discover and secure IoT and OT devices.

Modules in this learning path:

• Defender Iot Plan Deployment
• Defender Iot Prepare Deployment
• Onboard Sensor Microsoft Defender Iot
• Defender Iot Deploy Sensor
• Defender Iot Fine Tune Deployment

Products: Defender For Iot

Roles: Solution Architect, Technology Manager

Level: Intermediate

Subjects: Security

Duration: 180 minutes

View full course details Cancel

Microsoft

Deploy Microsoft 365 Apps for enterprise

shield-halved-duotone-light-full Cyber Security
This module examines how to implement the Microsoft 365 Apps for enterprise productivity suite in both user-driven and centralized deployments.

Units in this learning path:

• Introduction
• Explore Microsoft 365 Apps Enterprise
• Complete Installation Microsoft 365 Apps Enterprise
• Deploy Apps Enterprise Use Configuration Manager
• Deploy Apps Enterprise from Cloud
• Deploy Apps Enterprise from Local Source
• Manage Updates Microsoft 365 Apps Enterprise
• Explore Update Channels Microsoft 365 Apps Enterprise
• Manage Cloud Apps Microsoft 365 Apps Admin Center
• Add Microsoft 365 Apps Microsoft Intune
• Deploy Microsoft 365 Apps Enterprise Security Baseline
• Knowledge Check
• Summary

Products: M365, Office 365

Roles: Administrator, Solution Architect, Technology Manager

Level: Intermediate

Subjects: Business Applications, Compliance, Identity Access, Insider Risk, It Management Monitoring, Productivity, Security, Threat Protection

Duration: 58 minutes

View full course details Cancel

Microsoft

Deploy a sensor to Microsoft Defender for IoT for operational technology network monitoring

shield-halved-duotone-light-full Cyber Security
Learn how to deploy an OT sensor to Microsoft Defender for IoT

Units in this learning path:

• Introduction
• Describe the Deployment Phase
• Plan to Deploy Sensor
• Exercise Deploy Software to Sensor
• Knowledge Check
• Summary

Products: Defender For Iot

Roles: Technology Manager

Level: Intermediate

Subjects: Security

Duration: 54 minutes

View full course details Cancel

Viewing 157-168 of 629