Skip to content
Search

5423 courses available

Microsoft

Examine and Configure Surface Security Options

Learn about advanced firmware and security features of Microsoft Surface devices, Surface UEFI, Project Mu, configuring Virtualization-based Security and Memory Integrity in Windows, and Firmware Attack Surface Reduction.

Units in this learning path:

• Introduction
• Understand Project Mu
• Configure Virtualized Based Security
• Configure Firmware Attack Surface Reduction
• Knowledge Check
• Summary

Products: Surface

Roles: Administrator

Level: Intermediate

Subjects: Infrastructure

Duration: 17 minutes

View full course details Cancel

Microsoft

Examine backup security licensing and support considerations for SAP HANA on Azure (Large Instances)

shield-halved-duotone-light-full Cyber Security
This module covers considerations for backup, security, licensing, and support of SAP HANA on Azure (Large Instances). Prepare for Exam AZ-120 Planning and Administering Microsoft Azure for SAP Workloads.

Units in this learning path:

• Introduction
• Explore Backup Large Instances
• Explore Storage Snapshots of Large Instances
• Examine Storage Snapshot Considerations
• Examine Large Instances Security Considerations
• Explore Large Instances Licensing Considerations
• Explore Large Instances Support Considerations
• Explore Division of Management Responsibilities
• Knowledge Check
• Summary

Products: Azure

Roles: Administrator, Solution Architect

Level: Advanced

Subjects: Security

Duration: 41 minutes

View full course details Cancel

Microsoft

Examine data governance solutions in Microsoft Purview

This module introduces Microsoft Purview, which is designed to meet the challenges of today’s decentralized, data-rich workplace by providing a comprehensive set of solutions that help organizations govern, protect, and manage their entire data estate. MS-102

Units in this learning path:

• Introduction
• Explore Microsoft Purview
• Protect Microsoft Purview Information Protection
• Govern Microsoft Purview Data Lifecycle Management
• Minimize Microsoft Purview Insider Risk Management
• Explore Microsoft Purview Ediscovery Solutions
• Knowledge Check
• Summary

Products: M365, Office 365

Roles: Administrator, Solution Architect, Technology Manager

Level: Intermediate

Subjects: Business Applications, Compliance, Identity Access, Insider Risk, It Management Monitoring, Productivity, Security, Threat Protection

Duration: 49 minutes

View full course details Cancel

Microsoft

Examine data security and compliance in Microsoft 365 Copilot

This module examines how Microsoft 365 Copilot adheres to existing privacy and compliance obligations, how it ensures data residency and compliance boundary, and how it protects sensitive business data.

Units in this learning path:

• Introduction
• Examine Copilot Uses Proprietary Business Data
• Examine Copilot Protects Sensitive Business Data
• Examine Microsoft 365 Isolation Controls
• Examine Copilot Meets Regulatory Compliance Mandates
• Knowledge Check
• Summary

Products: M365, Office 365

Roles: Administrator, Solution Architect, Technology Manager

Level: Intermediate

Duration: 29 minutes

View full course details Cancel

Microsoft

Examine email protection in Microsoft 365

This module examines how Exchange Online Protection (EOP) protects organizations from phishing and spoofing. It also explores how EOP blocks spam, bulk email, and malware before they arrive in users’ mailboxes.

Units in this learning path:

• Introduction
• Implement Anti Malware Policies
• Implement Anti Spam Policies
• Detect Messages Use Zero Hour Auto Purge
• Explore Anti Spoofing Protection
• Explore Other Anti Spoofing Protection
• Examine Outbound Spam Filtering
• Knowledge Check
• Summary

Products: M365, Office 365

Roles: Administrator, Solution Architect, Technology Manager

Level: Intermediate

Subjects: Business Applications, Compliance, Identity Access, Insider Risk, It Management Monitoring, Productivity, Security, Threat Protection

Duration: 57 minutes

View full course details Cancel

Microsoft

Examine ransomware and extortion-based threats

Ransomware and extortion-based attacks are a high-reward, low-cost business that has escalated from extorting money from individuals to targeting businesses and organizations. The modules in this learning path will provide you with insights and information to help you better understand this threat, including a broad look at ransomware and extortion-based threats, how cybercriminals exploit security weaknesses to gain access to your computers and devices, some of the steps you can take prevent ransomware threats, and finally, how to recover from an attack.

Modules in this learning path:

• Ransomware Extortion Based Threats
• Ransomware Identify Entry Points
• Ransomware Prevent Attacks
• Ransomware Recover

Products: M365

Roles: Business User, Student

Level: Beginner

Duration: 82 minutes

View full course details Cancel

Microsoft

Examine the Microsoft 365 Copilot design

This module examines the Microsoft 365 Copilot design, how it works, its service and tenant logical architecture, and how it generates searches and responses.

Units in this learning path:

• Introduction
• Examine Logical Architecture
• Examine Key Components
• Explore Service Tenant Architecture
• Extend Copilot Microsoft Graph Connectors
• Knowledge Check
• Summary

Products: Office 365

Roles: Administrator, Solution Architect, Technology Manager

Level: Intermediate

Duration: 25 minutes

View full course details Cancel

Microsoft

Examine the enterprise desktop

This module introduces the student to the concepts of modern management and the enterprise desktop lifecycle.

Units in this learning path:

• Introduction
• Examine Benefits Modern Management
• Examine Enterprise Desktop Life Cycle Model
• Examine Planning Purchasing
• Examine Desktop Deployment
• Plan Application Deployment
• Plan Operations Support
• Plan Upgrades Retirement
• Knowledge Check
• Summary

Products: Mem, Configuration Manager, Intune, Windows, Microsoft Deployment Toolkit

Roles: Administrator

Level: Intermediate

Subjects: It Management Monitoring

Duration: 24 minutes

View full course details Cancel

Microsoft

Examine threat vectors and data breaches

This module examines the types of threat vectors and their potential outcomes that organizations must deal with on a daily basis and how users can enable hackers to access targets by unwittingly executing malicious content. MS-102

Units in this learning path:

• Introduction
• Explore Work Threat Landscape
• Examine Phishing
• Examine Spoofing
• Compare Malware Spam
• Examine Account Breach
• Examine Elevation Privilege Attacks
• Examine Data Exfiltration
• Examine Attackers Delete Data
• Examine Data Spillage
• Examine Other Types Attacks
• Knowledge Check
• Summary

Products: M365, Office 365

Roles: Administrator, Solution Architect, Technology Manager

Level: Intermediate

Subjects: Business Applications, Compliance, Identity Access, Insider Risk, It Management Monitoring, Productivity, Security, Threat Protection

Duration: 46 minutes

View full course details Cancel

Microsoft

Excel automation in Power Automate for desktop

gear-duotone-light-full Software Development
Learn how to use Power Automate for desktop to open, read, and manipulate Excel files with various Microsoft Excel actions.

Units in this learning path:

• 1 Introduction
• 2 Launching Saving Closing
• 3 Reading Excel Document
• 4 Writing Excel Worksheet
• 5 Additional Actions
• 6 Managing Worksheets
• 7 Exercise
• 8 Check Knowledge
• 9 Summary

Products: Power Platform, Power Automate

Roles: Maker, Developer, Functional Consultant

Level: Beginner, Intermediate

Subjects: Process Workflow

Duration: 52 minutes

View full course details Cancel

Microsoft

Execute across warehouse operations in Dynamics 365 Supply Chain Management

Learn how to execute across warehouse operations.

Units in this learning path:

• Introduction
• Cycle Counting
• Material Handling Equipment Interface
• Exercise
• Check
• Summary

Products: Dynamics 365, Dynamics Scm

Roles: Functional Consultant, Business User

Level: Intermediate

Subjects: Business Applications

Duration: 58 minutes

View full course details Cancel

Microsoft

Execute device profiles

shield-halved-duotone-light-full Cyber Security
Students learn about the various types of device profiles, and how to create and manage them.

Units in this learning path:

• Introduction
• Explore Intune Device Profiles
• Create Device Profiles
• Create Custom Device Profile
• Knowledge Check
• Summary

Products: Windows, Configuration Manager, Intune

Roles: Administrator

Level: Intermediate

Subjects: Device Management, Identity Access

Duration: 18 minutes

View full course details Cancel

Viewing 2185-2196 of 5423