Skip to content
Search

594 courses available

Microsoft

Describe the embedded experiences of Microsoft Security Copilot

shield-halved-duotone-light-full Cyber Security
Microsoft Security Copilot is accessible directly from some Microsoft security products. This is referred to the embedded experience. Learn about the scenarios supported by the Copilot embedded experience in Microsoft’s security solutions.

Units in this learning path:

• Introduction
• Copilot for Defender
• Copilot for Purview
• Copilot for Entra
• Copilot for Intune
• Copilot for Defender Cloud
• Knowledge Check
• Summary

Products: Ms Copilot, Defender Xdr, Microsoft Purview

Roles: Security Engineer, Security Operations Analyst, Business Owner

Level: Beginner

Subjects: Security

Duration: 52 minutes

View full course details Cancel

Microsoft

Describe the function and identity types of Microsoft Entra ID

shield-halved-duotone-light-full Cyber Security
Describe the function and identity types of Microsoft Entra ID

Units in this learning path:

• Introduction
• Describe Microsoft Entra
• Describe What Is
• Describe Identity Types
• Describe Microsoft Entra Agent Id
• Describe Concept of Hybrid Identities
• Describe External Identities
• Knowledge Check
• Summary Resources

Products: Azure, Entra Id, Entra

Roles: Business User, Student

Level: Beginner

Subjects: Identity Access

Duration: 46 minutes

View full course details Cancel

Microsoft

Describe the identity protection and governance capabilities of Microsoft Entra

shield-halved-duotone-light-full Cyber Security
Describe the identity protection and governance capabilities of Microsoft Entra.

Units in this learning path:

• Introduction
• Describe Identity Governance
• Describe What Is Entitlement Management Access Reviews
• Describe Entitlement Management Terms Use
• Describe Privileged Identity Management
• Describe Azure
• Describe Entra Verified Id
• Describe Entra Integration in Copilot
• Knowledge Check
• Summary Resources

Products: Entra Id

Roles: Business User, Student

Level: Beginner

Subjects: Information Protection Governance

Duration: 44 minutes

View full course details Cancel

Microsoft

Describe the security management capabilities in Azure

shield-halved-duotone-light-full Cyber Security
Describe the security management capabilities in Azure.

Units in this learning path:

• Introduction
• Describe & Explore Azure Security Center
• Baselines for Azure
• Describe Cloud Security Posture Management Cspm
• Describe Benefit Use Cases Defender
• Describe Dev Ops Security Management
• Knowledge Check
• Summary Resources

Products: Defender For Cloud

Roles: Business User, Student

Level: Beginner

Subjects: Security

Duration: 29 minutes

View full course details Cancel

Microsoft

Describe threat protection with Microsoft Defender XDR

shield-halved-duotone-light-full Cyber Security
Describe threat protection with Microsoft Defender XDR

Units in this learning path:

• Introduction
• Describe Services
• Describe Microsoft Defender for Office 365 Formerly Office 365 Atp
• Describe Microsoft Defender for Endpoint Formerly Microsoft Defender Atp
• Describe Microsoft Cloud App Security
• Describe Microsoft Defender for Identity Formerly Azure Atp
• Describe Defender Vulnerability Management
• Describe Defender Threat Intelligence
• Describe Security Exposure Management
• Describe Microsoft Defender Portal
• Describe Copilot in Defender Xdr
• Knowledge Check
• Summary Resources

Products: Defender For Cloud Apps, Defender Identity, Defender Office365, Defender Endpoint, Microsoft Defender, Defender For Threat Intelligence

Roles: Business User, Student

Level: Beginner

Subjects: Threat Protection

Duration: 112 minutes

View full course details Cancel

Microsoft

Design a resiliency strategy for ransomware and other attacks based on Microsoft Security Best Practices

shield-halved-duotone-light-full Cyber Security
You learn about common cyberthreats like ransomware and what kinds of attack patterns an organization must be prepared for.

Units in this learning path:

• Introduction
• Common Cyberthreats Attack Patterns
• Support Business Resiliency
• Ransomware Protection
• Configurations Secure Backup Restore
• Security Updates
• Knowledge Check
• Summary

Products: Azure, Defender For Cloud, Defender For Cloud Apps, Defender Identity, Microsoft Sentinel

Roles: Security Engineer, Solution Architect

Level: Advanced

Subjects: Security, Cloud Security

Duration: 49 minutes

View full course details Cancel

Microsoft

Design authentication and authorization solutions

shield-halved-duotone-light-full Cyber Security
Azure Architects design and recommend authentication and authorization solutions.

Units in this learning path:

• Introduction
• Design for Identity Access Management
• Design for Azure Active Directory
• Design for Azure Ad B2b
• Design for Azure Ad B2c
• Design for Conditional Access
• Design for Identity Protection
• Design for Access Reviews
• Design Service Principles
• Design Managed Identities
• Design Key Secret Management Azure Key Vault
• Knowledge Check
• Summary Resources

Products: Entra Id, Azure Rbac

Roles: Solution Architect

Level: Advanced

Subjects: Identity Access

Duration: 70 minutes

View full course details Cancel

Microsoft

Design for user identities and profiles

shield-halved-duotone-light-full Cyber Security
Design for user identities and profiles

Units in this learning path:

• Introduction
• Select Appropriate Licensing Model for Azure Virtual Desktop Based Requirements
• Personal Multi Session Desktop Scenarios
• Recommend Appropriate Storage Solution
• Plan for Desktop Client Deployment
• Plan for Azure Virtual Desktop Client Deployment Remote Desktop Protocol Rdp
• Windows Desktop Client to Multiple Devices
• Hybrid Identity Azure Active Directory
• Plan for Azure Ad Connect
• Knowledge Check
• Summary

Products: Azure, Azure Virtual Desktop, Azure Virtual Machines

Roles: Administrator, Solution Architect

Level: Intermediate

Subjects: Identity Access

Duration: 64 minutes

View full course details Cancel

Microsoft

Design governance

shield-halved-duotone-light-full Cyber Security
Azure Architects design and recommend governance solutions.

Units in this learning path:

• Introduction
• Design for Governance
• Design for Management Groups
• Design for Subscriptions
• Design for Resource Groups
• Design for Resource Tags
• Design for Azure Policy
• Design for Role Based Access Control
• Design for Azure Landing Zones
• Knowledge Check
• Summary Resources

Products: Azure Policy, Azure Resource Manager

Roles: Solution Architect

Level: Advanced

Subjects: Information Protection Governance

Duration: 49 minutes

View full course details Cancel

Microsoft

Design security solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)

shield-halved-duotone-light-full Cyber Security
You'll learn about the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF) and how you can use them to design more secure solutions.

Units in this learning path:

• Introduction
• Introduction Cloud Adoption Framework
• Cloud Adoption Framework Secure Methodology
• Introduction Azure Landing Zones
• Design Security with Azure Landing Zones
• Introduction Well Architected Framework
• Well Architected Framework Security Pillar
• Evaluate Security Strategy
• Define Security Strategy
• Design Security Governance Strategy
• Design Devsecops Processes
• Cloud Adoption Framework Secure AI
• Knowledge Check
• Summary

Products: Azure, Defender For Cloud, Defender For Cloud Apps, Defender Identity, Microsoft Sentinel

Roles: Security Engineer, Solution Architect

Level: Advanced

Subjects: Security, Cloud Security

Duration: 120 minutes

View full course details Cancel

Microsoft

Design solutions for identity and access management

shield-halved-duotone-light-full Cyber Security
Learn how to design identity and access management solutions for cloud, hybrid, and multicloud environments, including external identities, Conditional Access, and secrets management.

Units in this learning path:

• Introduction
• Design Cloud Hybrid Multi Cloud Access Strategies
• Design Solution Entra Hybrid Multicloud
• Design Solution External Identities
• Design Modern Authentication Authorization Strategies
• Design Solution Agent Identities
• Conditional Access Agent Id
• Align Conditional Access Zero Trust
• Specify Requirements Secure Active Directory Domain Services
• Design Solution Manage Secrets Keys Certificates
• Knowledge Check
• Summary

Products: Azure, Defender For Cloud, Defender For Cloud Apps, Defender Identity, Microsoft Sentinel, Entra Id

Roles: Security Engineer, Solution Architect

Level: Advanced

Subjects: Security, Cloud Security, Identity Access

Duration: 111 minutes

View full course details Cancel

Microsoft

Design solutions for network security

shield-halved-duotone-light-full Cyber Security
You learn how to design secure network solutions using techniques like network segmentation, traffic filtering, network monitoring, and posture management.

Units in this learning path:

• Introduction
• Evaluate Network Designs Best Practices
• Design Solutions Network Segmentation
• Design Solutions Traffic Filtering Network Security Groups
• Design Solutions Network Posture Management
• Design Solutions Network Monitoring
• Evaluate Solutions Entra Internet Access
• Evaluate Solutions Entra Private Access
• Knowledge Check
• Summary

Products: Azure, Defender For Cloud, Defender For Cloud Apps, Defender Identity, Microsoft Sentinel

Roles: Security Engineer, Solution Architect

Level: Advanced

Subjects: Security, Cloud Security

Duration: 76 minutes

View full course details Cancel

Viewing 193-204 of 594