Skip to content
Search

629 courses available

Microsoft

Deploy and manage identity infrastructure

shield-halved-duotone-light-full Cyber Security
Deploy and manage identity infrastructure

Modules in this learning path:

• Introduction to Ad Ds
• Manage Ad Ds Domain Controllers Fsmo Roles
• Implement Group Policy Objects
• Manage Advanced Features of Ad Ds
• Implement Hybrid Identity with Windows Server
• Deploy Manage Azure Iaas Active Directory Domain Controllers Azure

Products: Windows Server

Roles: Administrator, Solution Architect, Technology Manager

Level: Intermediate

Subjects: Identity Access

Duration: 377 minutes

View full course details Cancel

Microsoft

Deploy the Microsoft Defender for Endpoint environment

shield-halved-duotone-light-full Cyber Security
Deploy the Microsoft Defender for Endpoint environment

Units in this learning path:

• Introduction
• Create Your Environment
• Understand Operating Systems Compatibility Features
• Onboard Devices
• Manage Access
• Create Manage Roles for Role Based Access Control
• Configure Device Groups
• Configure Environment Advanced Features
• Knowledge Check
• Summary Resources

Products: M365, Defender Endpoint, Windows

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Device Management, Information Protection Governance, Threat Protection

Duration: 46 minutes

View full course details Cancel

Microsoft

Describe Microsoft Security Copilot

shield-halved-duotone-light-full Cyber Security
Describe Microsoft Security Copilot.

Units in this learning path:

• Introduction
• Describe Security Copilot
• Describe Terminology
• Describe How Copilot Processes Prompts
• Create Effective Prompts
• Describe How to Enable Security Copilot
• Knowledge Check
• Summary

Products: Entra, Microsoft Purview, Microsoft Defender, Microsoft Sentinel, Defender Xdr, Intune, Defender For Threat Intelligence, Mdeasm, Ms Copilot

Roles: Security Engineer, Security Operations Analyst, Business Owner

Level: Beginner

Subjects: Cloud Security, Threat Protection

Duration: 32 minutes

View full course details Cancel

Microsoft

Describe Microsoft Security Copilot agents

shield-halved-duotone-light-full Cyber Security
Describe Microsoft Security Copilot agents.

Units in this learning path:

• Introduction
• Describe Agents
• Describe Threat Intelligence Briefing Agent
• Explore Threat Intelligence Briefing Agent
• Describe Conditional Access Optimization Agent
• Explore Conditional Access Optimization Agent
• Describe Phishing Triage Agent
• Build Agents
• Module Assessment
• Summary

Products: Defender For Threat Intelligence, Entra, Microsoft Defender, Ms Copilot

Roles: Security Operations Analyst, Security Engineer, Business Owner

Level: Beginner

Subjects: Security

Duration: 53 minutes

View full course details Cancel

Microsoft

Describe access management capabilities of Microsoft Entra

shield-halved-duotone-light-full Cyber Security
Describe access management capabilities of Microsoft Entra

Units in this learning path:

• Introduction
• Describe Conditional Access Its Benefits
• Describe Global Secure Access
• Describe Azure Role Based Access Control Rbac
• Knowledge Check
• Summary Resources

Products: Azure, Entra Id, Entra

Roles: Business User, Student

Level: Beginner

Subjects: Identity Access

Duration: 34 minutes

View full course details Cancel

Microsoft

Describe application access in Zero Trust

shield-halved-duotone-light-full Cyber Security
Learn how to use Zero Trust to secure your applications and to protect your organization and its users.

Units in this learning path:

• Introduction
• Describe Cloud Applications
• Protect Cloud Applications Using Zero Trust
• Knowledge Check
• Summary

Products: M365

Roles: Administrator, Student

Level: Beginner

Subjects: Security

Duration: 12 minutes

View full course details Cancel

Microsoft

Describe application-based threats and how to protect against them

shield-halved-duotone-light-full Cyber Security
Describe application-based threats and security controls.

Units in this learning path:

• Introduction
• Describe Topology Used Applications
• Describe Threat Landscape of Applications
• Describe How Application Hardening Improves Application Security
• Knowledge Check
• Summary Resources

Products: Azure, M365

Roles: Business Owner, Business User, Student

Level: Beginner

Subjects: Threat Protection

Duration: 20 minutes

View full course details Cancel

Microsoft

Describe authentication and authorization in cybersecurity

shield-halved-duotone-light-full Cyber Security
Describe authentication and authorization in cybersecurity.

Units in this learning path:

• Introduction
• Define Authentication
• Based Attacks
• Describe Authorization Security Techniques
• Knowledge Check
• Summary Resources

Products: Azure, M365

Roles: Business Owner, Business User, Student

Level: Beginner

Subjects: Security

Duration: 18 minutes

View full course details Cancel

Microsoft

Describe basic cybersecurity threats, attacks, and mitigations

shield-halved-duotone-light-full Cyber Security
Describe basic cybersecurity threats, attacks, and mitigations.

Units in this learning path:

• Introduction
• Describe What Is Cybersecurity
• Describe Threat Landscape
• Describe Malware
• Mitigation Strategies
• Knowledge Check
• Summary Resources

Products: Azure, M365

Roles: Business Owner, Business User, Student

Level: Beginner

Subjects: Threat Protection

Duration: 30 minutes

View full course details Cancel

Microsoft

Describe core infrastructure security services in Azure

shield-halved-duotone-light-full Cyber Security
Describe core infrastructure security services in Azure.

Units in this learning path:

• Introduction
• Describe Azure Ddos Protection
• Describe What Is Azure Firewall
• Describe What Is Web Application Firewall
• Describe Network Segmentation
• Describe Azure Network Security Groups
• Describe What Is Azure Bastion
• Describe Ways Azure Encrypts Data
• Knowledge Check
• Summary Resources

Products: Azure, Azure Bastion, Azure Ddos Protection, Azure Firewall, Azure Web Application Firewall

Roles: Business User, Student

Level: Beginner

Subjects: Cloud Security

Duration: 29 minutes

View full course details Cancel

Microsoft

Describe device-based threats and security controls

shield-halved-duotone-light-full Cyber Security
Describe device-based threats and security controls.

Units in this learning path:

• Introduction
• Describe What Your Device Knows About You
• Describe How Devices Become Cybersecurity Threats
• Describe How to Mitigate Against Device Related Threats
• Knowledge Check
• Summary Resources

Products: Azure, M365

Roles: Business Owner, Business User, Student

Level: Beginner

Subjects: Threat Protection

Duration: 17 minutes

View full course details Cancel

Microsoft

Describe identities in Zero Trust

shield-halved-duotone-light-full Cyber Security
With the advent of cloud applications and the increase in employees working remotely, or bringing their own devices, it's critical to verify identities with strong authentication and ensure access is compliant.

Units in this learning path:

• Introduction
• Identities Zero Trust
• Identity Access Management
• Knowledge Check
• Summary

Products: M365

Roles: Administrator, Student

Level: Beginner

Subjects: Security

Duration: 14 minutes

View full course details Cancel

Viewing 169-180 of 629