594 courses available
Microsoft
Deploy Defender for IoT for OT monitoring
Cyber SecurityModules in this learning path:
• Defender Iot Plan Deployment
• Defender Iot Prepare Deployment
• Onboard Sensor Microsoft Defender Iot
• Defender Iot Deploy Sensor
• Defender Iot Fine Tune Deployment
Products: Defender For Iot
Roles: Solution Architect, Technology Manager
Level: Intermediate
Subjects: Security
Duration: 180 minutes
Microsoft
Deploy a sensor to Microsoft Defender for IoT for operational technology network monitoring
Cyber SecurityUnits in this learning path:
• Introduction
• Describe the Deployment Phase
• Plan to Deploy Sensor
• Exercise Deploy Software to Sensor
• Knowledge Check
• Summary
Products: Defender For Iot
Roles: Technology Manager
Level: Intermediate
Subjects: Security
Duration: 54 minutes
Microsoft
Deploy and manage identity infrastructure
Cyber SecurityModules in this learning path:
• Introduction to Ad Ds
• Manage Ad Ds Domain Controllers Fsmo Roles
• Implement Group Policy Objects
• Manage Advanced Features of Ad Ds
• Implement Hybrid Identity with Windows Server
• Deploy Manage Azure Iaas Active Directory Domain Controllers Azure
Products: Windows Server
Roles: Administrator, Solution Architect, Technology Manager
Level: Intermediate
Subjects: Identity Access
Duration: 377 minutes
Microsoft
Deploy and operate Microsoft Security Copilot
Cyber SecurityModules in this learning path:
• Security Copilot Getting Started
• Configure Security Copilot Workspaces
• Manage Plugins Agents Security Copilot
Products: Security Copilot, Microsoft Defender, Microsoft Sentinel, Defender Xdr, Entra
Roles: Security Engineer, Security Operations Analyst
Level: Intermediate
Subjects: Cloud Security, Security, Threat Protection
Duration: 101 minutes
Microsoft
Deploy the Microsoft Defender for Endpoint environment
Cyber SecurityUnits in this learning path:
• Introduction
• Create Your Environment
• Understand Operating Systems Compatibility Features
• Onboard Devices
• Manage Access
• Create Manage Roles for Role Based Access Control
• Configure Device Groups
• Configure Environment Advanced Features
• Knowledge Check
• Summary Resources
Products: M365, Defender Endpoint, Windows
Roles: Security Operations Analyst
Level: Intermediate
Subjects: Device Management, Information Protection Governance, Threat Protection
Duration: 46 minutes
Microsoft
Describe Microsoft Security Copilot
Cyber SecurityUnits in this learning path:
• Introduction
• Describe Security Copilot
• Describe Terminology
• Describe How Copilot Processes Prompts
• Create Effective Prompts
• Describe How to Enable Security Copilot
• Knowledge Check
• Summary
Products: Entra, Microsoft Purview, Microsoft Defender, Microsoft Sentinel, Defender Xdr, Intune, Defender For Threat Intelligence, Mdeasm, Ms Copilot
Roles: Security Engineer, Security Operations Analyst, Business Owner
Level: Beginner
Subjects: Cloud Security, Threat Protection
Duration: 32 minutes
Microsoft
Describe Microsoft Security Copilot agents
Cyber SecurityUnits in this learning path:
• Introduction
• Describe Agents
• Understand Agent Identities Permissions
• Describe Threat Intelligence Briefing Agent
• Explore Threat Intelligence Briefing Agent
• Describe Conditional Access Optimization Agent
• Explore Conditional Access Optimization Agent
• Describe Phishing Triage Agent
• Describe Purview Agents
• Describe Intune Agents
• Build Agents
• Module Assessment
• Summary
Products: Defender For Threat Intelligence, Entra, Microsoft Defender, Ms Copilot
Roles: Security Operations Analyst, Security Engineer, Business Owner
Level: Beginner
Subjects: Security
Duration: 78 minutes
Microsoft
Describe access management capabilities of Microsoft Entra
Cyber SecurityUnits in this learning path:
• Introduction
• Describe Conditional Access Its Benefits
• Describe Global Secure Access
• Describe Azure Role Based Access Control Rbac
• Knowledge Check
• Summary Resources
Products: Azure, Entra Id, Entra
Roles: Business User, Student
Level: Beginner
Subjects: Identity Access
Duration: 27 minutes
Microsoft
Describe application access in Zero Trust
Cyber SecurityUnits in this learning path:
• Introduction
• Describe Cloud Applications
• Protect Cloud Applications Using Zero Trust
• Knowledge Check
• Summary
Products: M365
Roles: Administrator, Student
Level: Beginner
Subjects: Security
Duration: 12 minutes
Microsoft
Describe application-based threats and how to protect against them
Cyber SecurityUnits in this learning path:
• Introduction
• Describe Topology Used Applications
• Describe Threat Landscape of Applications
• Describe How Application Hardening Improves Application Security
• Knowledge Check
• Summary Resources
Products: Azure, M365
Roles: Business Owner, Business User, Student
Level: Beginner
Subjects: Threat Protection
Duration: 20 minutes
Microsoft
Describe authentication and authorization in cybersecurity
Cyber SecurityUnits in this learning path:
• Introduction
• Define Authentication
• Based Attacks
• Describe Authorization Security Techniques
• Knowledge Check
• Summary Resources
Products: Azure, M365
Roles: Business Owner, Business User, Student
Level: Beginner
Subjects: Security
Duration: 18 minutes
Microsoft
Describe basic cybersecurity threats, attacks, and mitigations
Cyber SecurityUnits in this learning path:
• Introduction
• Describe What Is Cybersecurity
• Describe Threat Landscape
• Describe Malware
• Mitigation Strategies
• Knowledge Check
• Summary Resources
Products: Azure, M365
Roles: Business Owner, Business User, Student
Level: Beginner
Subjects: Threat Protection
Duration: 30 minutes
Viewing 169-180 of 594