Skip to content
Search

594 courses available

Microsoft

Deploy Defender for IoT for OT monitoring

shield-halved-duotone-light-full Cyber Security
Learn how to deploy Defender for IoT to discover and secure IoT and OT devices.

Modules in this learning path:

• Defender Iot Plan Deployment
• Defender Iot Prepare Deployment
• Onboard Sensor Microsoft Defender Iot
• Defender Iot Deploy Sensor
• Defender Iot Fine Tune Deployment

Products: Defender For Iot

Roles: Solution Architect, Technology Manager

Level: Intermediate

Subjects: Security

Duration: 180 minutes

View full course details Cancel

Microsoft

Deploy a sensor to Microsoft Defender for IoT for operational technology network monitoring

shield-halved-duotone-light-full Cyber Security
Learn how to deploy an OT sensor to Microsoft Defender for IoT

Units in this learning path:

• Introduction
• Describe the Deployment Phase
• Plan to Deploy Sensor
• Exercise Deploy Software to Sensor
• Knowledge Check
• Summary

Products: Defender For Iot

Roles: Technology Manager

Level: Intermediate

Subjects: Security

Duration: 54 minutes

View full course details Cancel

Microsoft

Deploy and manage identity infrastructure

shield-halved-duotone-light-full Cyber Security
Deploy and manage identity infrastructure

Modules in this learning path:

• Introduction to Ad Ds
• Manage Ad Ds Domain Controllers Fsmo Roles
• Implement Group Policy Objects
• Manage Advanced Features of Ad Ds
• Implement Hybrid Identity with Windows Server
• Deploy Manage Azure Iaas Active Directory Domain Controllers Azure

Products: Windows Server

Roles: Administrator, Solution Architect, Technology Manager

Level: Intermediate

Subjects: Identity Access

Duration: 377 minutes

View full course details Cancel

Microsoft

Deploy and operate Microsoft Security Copilot

shield-halved-duotone-light-full Cyber Security
Build hands-on expertise with Microsoft Security Copilot. Start with enabling the solution and writing effective prompts to configuring enterprise workspaces and managing plugins and agents at scale.

Modules in this learning path:

• Security Copilot Getting Started
• Configure Security Copilot Workspaces
• Manage Plugins Agents Security Copilot

Products: Security Copilot, Microsoft Defender, Microsoft Sentinel, Defender Xdr, Entra

Roles: Security Engineer, Security Operations Analyst

Level: Intermediate

Subjects: Cloud Security, Security, Threat Protection

Duration: 101 minutes

View full course details Cancel

Microsoft

Deploy the Microsoft Defender for Endpoint environment

shield-halved-duotone-light-full Cyber Security
Deploy the Microsoft Defender for Endpoint environment

Units in this learning path:

• Introduction
• Create Your Environment
• Understand Operating Systems Compatibility Features
• Onboard Devices
• Manage Access
• Create Manage Roles for Role Based Access Control
• Configure Device Groups
• Configure Environment Advanced Features
• Knowledge Check
• Summary Resources

Products: M365, Defender Endpoint, Windows

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Device Management, Information Protection Governance, Threat Protection

Duration: 46 minutes

View full course details Cancel

Microsoft

Describe Microsoft Security Copilot

shield-halved-duotone-light-full Cyber Security
Describe Microsoft Security Copilot.

Units in this learning path:

• Introduction
• Describe Security Copilot
• Describe Terminology
• Describe How Copilot Processes Prompts
• Create Effective Prompts
• Describe How to Enable Security Copilot
• Knowledge Check
• Summary

Products: Entra, Microsoft Purview, Microsoft Defender, Microsoft Sentinel, Defender Xdr, Intune, Defender For Threat Intelligence, Mdeasm, Ms Copilot

Roles: Security Engineer, Security Operations Analyst, Business Owner

Level: Beginner

Subjects: Cloud Security, Threat Protection

Duration: 32 minutes

View full course details Cancel

Microsoft

Describe Microsoft Security Copilot agents

shield-halved-duotone-light-full Cyber Security
Describe Microsoft Security Copilot agents.

Units in this learning path:

• Introduction
• Describe Agents
• Understand Agent Identities Permissions
• Describe Threat Intelligence Briefing Agent
• Explore Threat Intelligence Briefing Agent
• Describe Conditional Access Optimization Agent
• Explore Conditional Access Optimization Agent
• Describe Phishing Triage Agent
• Describe Purview Agents
• Describe Intune Agents
• Build Agents
• Module Assessment
• Summary

Products: Defender For Threat Intelligence, Entra, Microsoft Defender, Ms Copilot

Roles: Security Operations Analyst, Security Engineer, Business Owner

Level: Beginner

Subjects: Security

Duration: 78 minutes

View full course details Cancel

Microsoft

Describe access management capabilities of Microsoft Entra

shield-halved-duotone-light-full Cyber Security
Describe access management capabilities of Microsoft Entra

Units in this learning path:

• Introduction
• Describe Conditional Access Its Benefits
• Describe Global Secure Access
• Describe Azure Role Based Access Control Rbac
• Knowledge Check
• Summary Resources

Products: Azure, Entra Id, Entra

Roles: Business User, Student

Level: Beginner

Subjects: Identity Access

Duration: 27 minutes

View full course details Cancel

Microsoft

Describe application access in Zero Trust

shield-halved-duotone-light-full Cyber Security
Learn how to use Zero Trust to secure your applications and to protect your organization and its users.

Units in this learning path:

• Introduction
• Describe Cloud Applications
• Protect Cloud Applications Using Zero Trust
• Knowledge Check
• Summary

Products: M365

Roles: Administrator, Student

Level: Beginner

Subjects: Security

Duration: 12 minutes

View full course details Cancel

Microsoft

Describe application-based threats and how to protect against them

shield-halved-duotone-light-full Cyber Security
Describe application-based threats and security controls.

Units in this learning path:

• Introduction
• Describe Topology Used Applications
• Describe Threat Landscape of Applications
• Describe How Application Hardening Improves Application Security
• Knowledge Check
• Summary Resources

Products: Azure, M365

Roles: Business Owner, Business User, Student

Level: Beginner

Subjects: Threat Protection

Duration: 20 minutes

View full course details Cancel

Microsoft

Describe authentication and authorization in cybersecurity

shield-halved-duotone-light-full Cyber Security
Describe authentication and authorization in cybersecurity.

Units in this learning path:

• Introduction
• Define Authentication
• Based Attacks
• Describe Authorization Security Techniques
• Knowledge Check
• Summary Resources

Products: Azure, M365

Roles: Business Owner, Business User, Student

Level: Beginner

Subjects: Security

Duration: 18 minutes

View full course details Cancel

Microsoft

Describe basic cybersecurity threats, attacks, and mitigations

shield-halved-duotone-light-full Cyber Security
Describe basic cybersecurity threats, attacks, and mitigations.

Units in this learning path:

• Introduction
• Describe What Is Cybersecurity
• Describe Threat Landscape
• Describe Malware
• Mitigation Strategies
• Knowledge Check
• Summary Resources

Products: Azure, M365

Roles: Business Owner, Business User, Student

Level: Beginner

Subjects: Threat Protection

Duration: 30 minutes

View full course details Cancel

Viewing 169-180 of 594