Skip to content
Search

565 courses available

Microsoft

Describe application access in Zero Trust

shield-halved-duotone-light-full Cyber Security
Learn how to use Zero Trust to secure your applications and to protect your organization and its users.

Units in this learning path:

• Introduction
• Describe Cloud Applications
• Protect Cloud Applications Using Zero Trust
• Knowledge Check
• Summary

Products: M365

Roles: Administrator, Student

Level: Beginner

Subjects: Security

Duration: 12 minutes

View full course details Cancel

Microsoft

Describe application-based threats and how to protect against them

shield-halved-duotone-light-full Cyber Security
Describe application-based threats and security controls.

Units in this learning path:

• Introduction
• Describe Topology Used Applications
• Describe Threat Landscape of Applications
• Describe How Application Hardening Improves Application Security
• Knowledge Check
• Summary Resources

Products: Azure, M365

Roles: Business Owner, Business User, Student

Level: Beginner

Subjects: Threat Protection

Duration: 20 minutes

View full course details Cancel

Microsoft

Describe authentication and authorization in cybersecurity

shield-halved-duotone-light-full Cyber Security
Describe authentication and authorization in cybersecurity.

Units in this learning path:

• Introduction
• Define Authentication
• Based Attacks
• Describe Authorization Security Techniques
• Knowledge Check
• Summary Resources

Products: Azure, M365

Roles: Business Owner, Business User, Student

Level: Beginner

Subjects: Security

Duration: 18 minutes

View full course details Cancel

Microsoft

Describe basic cybersecurity threats, attacks, and mitigations

shield-halved-duotone-light-full Cyber Security
Describe basic cybersecurity threats, attacks, and mitigations.

Units in this learning path:

• Introduction
• Describe What Is Cybersecurity
• Describe Threat Landscape
• Describe Malware
• Mitigation Strategies
• Knowledge Check
• Summary Resources

Products: Azure, M365

Roles: Business Owner, Business User, Student

Level: Beginner

Subjects: Threat Protection

Duration: 30 minutes

View full course details Cancel

Microsoft

Describe core infrastructure security services in Azure

shield-halved-duotone-light-full Cyber Security
Describe core infrastructure security services in Azure.

Units in this learning path:

• Introduction
• Describe Azure Ddos Protection
• Describe What Is Azure Firewall
• Describe What Is Web Application Firewall
• Describe Network Segmentation
• Describe Azure Network Security Groups
• Describe What Is Azure Bastion
• Describe Ways Azure Encrypts Data
• Knowledge Check
• Summary Resources

Products: Azure, Azure Bastion, Azure Ddos Protection, Azure Firewall, Azure Web Application Firewall

Roles: Business User, Student

Level: Beginner

Subjects: Cloud Security

Duration: 29 minutes

View full course details Cancel

Microsoft

Describe device-based threats and security controls

shield-halved-duotone-light-full Cyber Security
Describe device-based threats and security controls.

Units in this learning path:

• Introduction
• Describe What Your Device Knows About You
• Describe How Devices Become Cybersecurity Threats
• Describe How to Mitigate Against Device Related Threats
• Knowledge Check
• Summary Resources

Products: Azure, M365

Roles: Business Owner, Business User, Student

Level: Beginner

Subjects: Threat Protection

Duration: 17 minutes

View full course details Cancel

Microsoft

Describe identities in Zero Trust

shield-halved-duotone-light-full Cyber Security
With the advent of cloud applications and the increase in employees working remotely, or bringing their own devices, it's critical to verify identities with strong authentication and ensure access is compliant.

Units in this learning path:

• Introduction
• Identities Zero Trust
• Identity Access Management
• Knowledge Check
• Summary

Products: M365

Roles: Administrator, Student

Level: Beginner

Subjects: Security

Duration: 14 minutes

View full course details Cancel

Microsoft

Describe identity concepts

shield-halved-duotone-light-full Cyber Security
Describe identity concepts.

Units in this learning path:

• Introduction
• Define Authentication and Authorization
• Define Identity As Primary Security Perimeter
• Describe Modern Authentication Role Identity Provider
• Describe Concept of Directory Services Active Directory
• Describe Concept Federated Services
• Knowledge Check
• Summary Resources

Products: Entra Id

Roles: Business User, Student

Level: Beginner

Subjects: Identity Access

Duration: 20 minutes

View full course details Cancel

Microsoft

Describe security and compliance concepts

shield-halved-duotone-light-full Cyber Security
Describe security and compliance concepts.

Units in this learning path:

• Introduction
• Describe Shared Responsibility Model
• Describe Defense Depth
• Describe Zero Trust Methodology
• Describe Ways Encryption, Hashing, Signing Can Secure Your Data
• Describe Compliance Concepts
• Knowledge Check
• Summary Resources

Products: Azure, M365

Roles: Business User, Student

Level: Beginner

Subjects: Security

Duration: 32 minutes

View full course details Cancel

Microsoft

Describe security capabilities of Microsoft Sentinel

shield-halved-duotone-light-full Cyber Security
Describe the capabilities in Microsoft Sentinel

Units in this learning path:

• Introduction
• Define Concepts of Siem, Soar, Xdr
• Describe Role Value of Sentinel Providing Integrated Threat Protection
• Describe Security Copilot
• Knowledge Check
• Summary Resources

Products: Microsoft Sentinel

Roles: Business User, Student

Level: Beginner

Subjects: Security

Duration: 23 minutes

View full course details Cancel

Microsoft

Describe the authentication capabilities of Microsoft Entra ID

shield-halved-duotone-light-full Cyber Security
Describe the authentication capabilities of Microsoft Entra ID

Units in this learning path:

• Introduction
• Describe Different Authentication Methods
• Describe Multi Factor Authentication Mfa
• Describe Self Service Password Reset
• Describe Password Protection & Management
• Knowledge Check
• Summary Resources

Products: Azure, Entra Id, Entra

Roles: Business User, Student

Level: Beginner

Subjects: Identity Access

Duration: 27 minutes

View full course details Cancel

Microsoft

Describe the concepts behind Microsoft Entra Verified ID

shield-halved-duotone-light-full Cyber Security
Describe the core concepts behind Microsoft Entra Verified ID. Gain an understanding of decentralized identifiers and how they're used to issue and verify credentials.

Units in this learning path:

• Introduction
• Describe Challenges with Digital Identities Credentials
• Describe Decentralized Identifiers
• Describe Why Dids Are Different
• Describe How Verifiable Credentials Work
• Knowledge Check
• Summary

Products: Entra, Entra Verified Id

Roles: Identity Access Admin, Business User, Student

Level: Beginner, Intermediate

Subjects: Identity Access

Duration: 27 minutes

View full course details Cancel

Viewing 169-180 of 565