Skip to content
Search

565 courses available

Amazon Web Services

Deep Dive with Security: AWS Identity and Access Management (IAM)

shield-halved-duotone-light-full Cyber Security
As you build and deploy on AWS, granting developers and applications the right access to the right resources is critical to security. This self-paced course provides a deep dive into AWS Identity and Access Management (IAM) and best practices for…
View full course details Cancel

Amazon Web Services

Deep Dive: Managing and Monitoring Amazon Elastic Block Store (Amazon EBS)

shield-halved-duotone-light-full Cyber Security
Amazon Elastic Block Store (Amazon EBS) supports a wide range of both transaction-intensive and throughput-intensive workloads on Amazon Web Services (AWS). In this fourth course of the Amazon EBS deep dive, you learn how to manage your EBS…
View full course details Cancel

Microsoft

Defend against Cyberthreats with Microsoft Defender XDR lab exercises

shield-halved-duotone-light-full Cyber Security
Learn how to configure Microsoft Defender XDR, deploy Microsoft Defender for Endpoint and onboard devices, configure policies, mitigate threats, and respond to incidents with Defender XDR.

Units in this learning path:

• Introduction
• Initialize Defender Xdr Exercise
• Deploy Defender Endpoint Exercise
• Incidents Exercise
• Summary

Products: Microsoft Defender, Defender Endpoint, Defender Xdr

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Security

Duration: 63 minutes

View full course details Cancel

Microsoft

Defend against cyberthreats with Microsoft Defender XDR

shield-halved-duotone-light-full Cyber Security
To earn this Microsoft Applied Skills credential, learners demonstrate the ability to use Microsoft Defender XDR to detect and respond to cyberthreats. Candidates for this credential should be familiar with investigating and gathering evidence about attacks on endpoints. They should also have experience using Microsoft Defender for Endpoint and Kusto Query Language (KQL).

Modules in this learning path:

• Mitigate Incidents Microsoft 365 Defender
• Deploy Microsoft Defender for Endpoints Environment
• Configure Settings for Alerts Detections Microsoft Defender for Endpoint
• Configure Manage Automation Microsoft Defender for Endpoint
• Perform Device Investigations Microsoft Defender for Endpoints
• Defend Against Cyberthreats Microsoft Defender Xdr Labs

Products: Microsoft Defender, Defender Endpoint, Defender Xdr

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Threat Protection

Duration: 285 minutes

View full course details Cancel

Microsoft

Defend against threats with Microsoft 365

shield-halved-duotone-light-full Cyber Security
Microsoft 365 includes security technologies that enterprises can use to secure email, data, devices, and identities against the risk of cyber threats. This learning path provides an introduction to Microsoft Defender XDR, Microsoft Defender for Endpoint, Microsoft Defender for Identity, and Microsoft Defender for Office 365.

Modules in this learning path:

• M365 Security Threat Protect
• M365 Threat Remediate
• M365 Threat Safeguard

Products: M365, Office 365, Defender Xdr

Roles: Administrator

Level: Intermediate

Subjects: Threat Protection

Duration: 189 minutes

View full course details Cancel

Microsoft

Deploy Defender for IoT for OT monitoring

shield-halved-duotone-light-full Cyber Security
Learn how to deploy Defender for IoT to discover and secure IoT and OT devices.

Modules in this learning path:

• Defender Iot Plan Deployment
• Defender Iot Prepare Deployment
• Onboard Sensor Microsoft Defender Iot
• Defender Iot Deploy Sensor
• Defender Iot Fine Tune Deployment

Products: Defender For Iot

Roles: Solution Architect, Technology Manager

Level: Intermediate

Subjects: Security

Duration: 180 minutes

View full course details Cancel

Microsoft

Deploy a sensor to Microsoft Defender for IoT for operational technology network monitoring

shield-halved-duotone-light-full Cyber Security
Learn how to deploy an OT sensor to Microsoft Defender for IoT

Units in this learning path:

• Introduction
• Describe the Deployment Phase
• Plan to Deploy Sensor
• Exercise Deploy Software to Sensor
• Knowledge Check
• Summary

Products: Defender For Iot

Roles: Technology Manager

Level: Intermediate

Subjects: Security

Duration: 54 minutes

View full course details Cancel

Microsoft

Deploy and manage identity infrastructure

shield-halved-duotone-light-full Cyber Security
Deploy and manage identity infrastructure

Modules in this learning path:

• Introduction to Ad Ds
• Manage Ad Ds Domain Controllers Fsmo Roles
• Implement Group Policy Objects
• Manage Advanced Features of Ad Ds
• Implement Hybrid Identity with Windows Server
• Deploy Manage Azure Iaas Active Directory Domain Controllers Azure

Products: Windows Server

Roles: Administrator, Solution Architect, Technology Manager

Level: Intermediate

Subjects: Identity Access

Duration: 377 minutes

View full course details Cancel

Microsoft

Deploy the Microsoft Defender for Endpoint environment

shield-halved-duotone-light-full Cyber Security
Deploy the Microsoft Defender for Endpoint environment

Units in this learning path:

• Introduction
• Create Your Environment
• Understand Operating Systems Compatibility Features
• Onboard Devices
• Manage Access
• Create Manage Roles for Role Based Access Control
• Configure Device Groups
• Configure Environment Advanced Features
• Knowledge Check
• Summary Resources

Products: M365, Defender Endpoint, Windows

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Device Management, Information Protection Governance, Threat Protection

Duration: 46 minutes

View full course details Cancel

Microsoft

Describe Microsoft Security Copilot

shield-halved-duotone-light-full Cyber Security
Describe Microsoft Security Copilot.

Units in this learning path:

• Introduction
• Describe Security Copilot
• Describe Terminology
• Describe How Copilot Processes Prompts
• Create Effective Prompts
• Describe How to Enable Security Copilot
• Knowledge Check
• Summary

Products: Entra, Microsoft Purview, Microsoft Defender, Microsoft Sentinel, Defender Xdr, Intune, Defender For Threat Intelligence, Mdeasm, Ms Copilot

Roles: Security Engineer, Security Operations Analyst, Business Owner

Level: Beginner

Subjects: Cloud Security, Threat Protection

Duration: 32 minutes

View full course details Cancel

Microsoft

Describe Microsoft Security Copilot agents

shield-halved-duotone-light-full Cyber Security
Describe Microsoft Security Copilot agents.

Units in this learning path:

• Introduction
• Describe Agents
• Describe Threat Intelligence Briefing Agent
• Explore Threat Intelligence Briefing Agent
• Describe Conditional Access Optimization Agent
• Explore Conditional Access Optimization Agent
• Describe Phishing Triage Agent
• Build Agents
• Module Assessment
• Summary

Products: Defender For Threat Intelligence, Entra, Microsoft Defender, Ms Copilot

Roles: Security Operations Analyst, Security Engineer, Business Owner

Level: Beginner

Subjects: Security

Duration: 53 minutes

View full course details Cancel

Microsoft

Describe access management capabilities of Microsoft Entra

shield-halved-duotone-light-full Cyber Security
Describe access management capabilities of Microsoft Entra

Units in this learning path:

• Introduction
• Describe Conditional Access Its Benefits
• Describe Global Secure Access
• Describe Azure Role Based Access Control Rbac
• Knowledge Check
• Summary Resources

Products: Azure, Entra Id, Entra

Roles: Business User, Student

Level: Beginner

Subjects: Identity Access

Duration: 34 minutes

View full course details Cancel

Viewing 157-168 of 565