Skip to content
Search

594 courses available

Microsoft

Design solutions for regulatory compliance

shield-halved-duotone-light-full Cyber Security
Learn how to design security solutions that address regulatory compliance requirements across multicloud environments. Translate compliance requirements into security controls using Zero Trust principles, Microsoft Purview, Microsoft Priva, Azure Policy, and Microsoft Defender for Cloud.

Units in this learning path:

• Introduction Regulatory Compliance
• Translate Compliance Requirements Security Solution
• AI Compliance Considerations
• Address Compliance Requirements Microsoft Purview
• Address Privacy Requirements Microsoft Priva
• Address Security Compliance Requirements Azure Policy
• Evaluate Infrastructure Compliance Defender Cloud
• Knowledge Check
• Summary

Products: Azure, Defender For Cloud, Defender For Cloud Apps, Defender Identity, Microsoft Sentinel

Roles: Security Engineer, Solution Architect

Level: Advanced

Subjects: Security, Cloud Security

Duration: 60 minutes

View full course details Cancel

Microsoft

Design solutions for securing an organization's data

shield-halved-duotone-light-full Cyber Security
You learn about designing solutions that secure an organization's data using capabilities like Microsoft Purview, Defender for SQL, Defender for Storage.

Units in this learning path:

• Introduction
• Introduction Data Security
• Design Solution Data Discovery Classification Microsoft Purview
• Specify Priorities Mitigating Threats Data
• Design Solution Data Protection
• Design Data Security Azure Workloads
• Design Security Data AI Workloads
• Design Security Azure Storage
• Design Security Defender SQL Storage
• Knowledge Check
• Summary

Products: Azure, Defender For Cloud, Defender For Cloud Apps, Defender Identity, Microsoft Sentinel

Roles: Security Engineer, Solution Architect

Level: Advanced

Subjects: Security, Cloud Security

Duration: 77 minutes

View full course details Cancel

Microsoft

Design solutions for securing applications

shield-halved-duotone-light-full Cyber Security
You learn how to secure applications, APIs and the development process using techniques like posture management, threat modeling, and secure access for workload identities.

Units in this learning path:

• Introduction Application Security
• Design Implement Standards Secure Application Development
• Design Full Lifecycle Strategy Application Security
• Evaluate Security Posture Existing Application Portfolios
• Evaluate Application Threats Threat Modeling
• Secure Access Workload Identities
• Design Solution API Management Security
• Design Solution Secure Access Applications
• Map Technologies Application Security Requirements
• Knowledge Check
• Summary

Products: Azure, Defender For Cloud, Defender For Cloud Apps, Defender Identity, Microsoft Sentinel

Roles: Security Engineer, Solution Architect

Level: Advanced

Subjects: Security, Cloud Security

Duration: 78 minutes

View full course details Cancel

Microsoft

Design solutions for securing privileged access

shield-halved-duotone-light-full Cyber Security
You learn advanced techniques for designing solutions that secure privileged access using Zero Trust principles, the Enterprise Access Model, and Microsoft security frameworks.

Units in this learning path:

• Introduction
• Introduction Privileged Access
• Enterprise Access Model
• Design Identity Governance Solutions
• Design Solution Secure Tenant Administration
• Design Cloud Infrastructure Entitlement Management
• Design Solution Privileged Access Workstations Bastion Services
• Evaluate Access Review Management Solution
• Knowledge Check
• Summary

Products: Azure, Defender For Cloud, Defender For Cloud Apps, Defender Identity, Microsoft Sentinel

Roles: Security Engineer, Solution Architect

Level: Advanced

Subjects: Security, Cloud Security

Duration: 58 minutes

View full course details Cancel

Microsoft

Design solutions for securing server and client endpoints

shield-halved-duotone-light-full Cyber Security
You learn how to analyze the security requirements for different types of endpoints including servers, clients, IoT, OT, mobile, and embedded devices. These requirements take into account different platforms and operating systems and set standards for endpoint protection, hardening, and configuration.

Units in this learning path:

• Introduction Endpoint Security
• Specify Server Security Requirements
• Specify Requirements Mobile Devices Clients
• Specify Embedded Device Security Requirements
• Design Solution Securing Operational Technology Industrial Control Systems
• Specify Security Baselines Server Client Endpoints
• Design Solution Secure Remote Access
• Evaluate Windows Local Admin Password Solution
• Knowledge Check
• Summary

Products: Azure, Defender For Cloud, Defender For Cloud Apps, Defender Identity, Microsoft Sentinel

Roles: Security Engineer, Solution Architect

Level: Advanced

Subjects: Security, Cloud Security

Duration: 88 minutes

View full course details Cancel

Microsoft

Design solutions for security operations

shield-halved-duotone-light-full Cyber Security
You learn techniques to design security operations capabilities including logging, auditing, Security Information, and Event Management (SIEM), Security Orchestration and Automated Response (SOAR), and security workflows.

Units in this learning path:

• Introduction
• Introduction Security Operations Secops
• Design Security Operations Capabilities Hybrid Multicloud Environments
• Design Centralized Logging Auditing
• Design Solutions Detection Response
• Design Solution Security Orchestration Automation Response
• Design Security Workflows
• Design Threat Detection Coverage
• Knowledge Check
• Summary

Products: Azure, Defender For Cloud, Defender For Cloud Apps, Defender Identity, Microsoft Sentinel

Roles: Security Engineer, Solution Architect

Level: Advanced

Subjects: Security, Cloud Security

Duration: 87 minutes

View full course details Cancel

Microsoft

Design solutions for security posture management in hybrid and multicloud environments

shield-halved-duotone-light-full Cyber Security
You learn how to design security posture management solutions that integrate into hybrid and multicloud scenarios using capabilities in Microsoft Defender for Cloud, Azure Arc, and Microsoft Cloud Security Benchmark (MCSB).

Units in this learning path:

• Introduction Hybrid Multi Cloud Posture Management
• Evaluate Security Posture Microsoft Cloud Security Benchmark
• Evaluate Security Posture Microsoft Defender Cloud
• Design Integrated Posture Management Workload Protection
• Design Cloud Workload Protection Microsoft Defender Cloud
• Integrate Hybrid Multi Cloud Environments Azure Arc
• Design Solution External Attack Surface Management
• Posture Management Using Exposure Management Attack Paths
• Knowledge Check
• Summary

Products: Azure, Defender For Cloud, Defender For Cloud Apps, Defender Identity, Microsoft Sentinel

Roles: Security Engineer, Solution Architect

Level: Advanced

Subjects: Security, Cloud Security

Duration: 70 minutes

View full course details Cancel

Microsoft

Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB)

shield-halved-duotone-light-full Cyber Security
You learn about the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft Cloud Security Benchmark (MCSB) and how you can use them to design more secure solutions.

Units in this learning path:

• Introduction
• Introduction Reference Architecture Benchmark
• Describe Microsoft Cloud Security Benchmark
• Design Solutions Best Practices Capabilities Controls
• Design Solutions Best Practices Attack Protection
• Design Solutions AI Security
• Design Solutions Rapid Modernization Plan
• Knowledge Check
• Summary

Products: Azure, Defender For Cloud, Defender For Cloud Apps, Defender Identity, Microsoft Sentinel

Roles: Security Engineer, Solution Architect

Level: Advanced

Subjects: Security, Cloud Security

Duration: 67 minutes

View full course details Cancel

Microsoft

Develop a security and compliance plan

shield-halved-duotone-light-full Cyber Security
Build strategies around security and compliance and prepare for Exam AZ-400: Designing and Implementing Microsoft DevOps Solutions.

Modules in this learning path:

• Intro to Azure Ad
• Manage Users and Groups in Aad
• Monitor Report Aad Security Events
• Maintain Secure Repository Github
• Improve Reliability Failure
• Improve Reliability Incidents

Products: Azure, Entra Id, Azure Key Vault, Azure API Management, Azure Monitor

Roles: Devops Engineer, Administrator, Developer, Solution Architect, Security Engineer

Level: Beginner

Subjects: Information Protection Governance, Site Reliability Engineering, Security

Duration: 253 minutes

View full course details Cancel

Amazon Web Services

Developing with Amazon DynamoDB

shield-halved-duotone-light-full Cyber Security
Amazon DynamoDB reflects a paradigm shift away from relational databases in terms of management, usage, and schema design. To fully take advantage of DynamoDB and its feature set, developers and architects need to understand how applications…
View full course details Cancel

Amazon Web Services

Differences Between Security Groups and NACLs

shield-halved-duotone-light-full Cyber Security
This is an introductory course on the differences between security groups and NACLs, or Network Access Control Lists. In this course, we discuss how to secure the networking of your applications in AWS by using these two resources. We also review…
View full course details Cancel

Amazon Web Services

Digital Sovereignty on AWS

shield-halved-duotone-light-full Cyber Security
Organizations are facing increasing complexity in an evolving sovereignty landscape. As a result, you may be concerned with how to remain compliant and acquire the right tools and services without sacrificing the benefits of working in the cloud.…
View full course details Cancel

Viewing 205-216 of 594