Skip to content
Search

565 courses available

IBM

Enterprise Security in Practice

shield-halved-duotone-light-full Cyber Security
This badge earner has completed all the learning activities included in this online learning experience, including hands-on experience, concepts, methods and tools related to the enterprise security domain. The individual has demonstrated skills and understanding in the approaches to elevate an organization’s overall security posture, by adopting practices, methods and tools that increase enterprise cyber resilience.
View full course details Cancel

Microsoft

Establish the guiding principles and core components of Zero Trust

shield-halved-duotone-light-full Cyber Security
Zero Trust is not a product or tool, but an essential security strategy that seeks to continuously verify every transaction, asserts least privilege access, and assumes that every transaction could be a possible attack. Through the modules in this learning path, you'll gain an understanding of Zero Trust and how it applies to identity, endpoints, applications, networks, infrastructure, and data.

Modules in this learning path:

• Zero Trust Introduction
• Zero Trust Identities
• Zero Trust Endpoints
• Zero Trust Applications
• Zero Trust Networks
• Zero Trust Infrastructure
• Zero Trust Data

Products: M365

Roles: Administrator, Student

Level: Beginner

Subjects: Security

Duration: 106 minutes

View full course details Cancel

Amazon Web Services

Exam Prep Overview: AWS Certified Security - Specialty (SCS-C02 - English)

shield-halved-duotone-light-full Cyber Security
In this course, you will review the scope of the AWS Certified Security - Specialty (SCS-C02) exam, including the intended audience and exam topics.This course is part of 4 steps that you can use to prepare for your exam with confidence. To follow…
View full course details Cancel

Amazon Web Services

Exam Prep Plan Overview: AWS Certified Security - Specialty (SCS-C02 - English)

shield-halved-duotone-light-full Cyber Security
This course is an overview to the Exam Prep Plan. It outlines each of the 4 steps. It also provides guidance on how much time you should spend on each step.
View full course details Cancel

Amazon Web Services

Exam Prep Plan: AWS Certified Security - Specialty (SCS-C02 - English)

shield-halved-duotone-light-full Cyber Security
From start to certified. Use the Exam Prep Plan to follow 4 steps to prepare for your exam with confidence. The plan contains practice assessments with more than 125 exam-style questions. It also includes hands-on labs, videos reviewing each exam…
View full course details Cancel

Amazon Web Services

Exam Prep Summary: AWS Certified Security - Specialty (SCS-C02 - English)

shield-halved-duotone-light-full Cyber Security
This course concludes the Exam Prep Plan: AWS Certified Security - Specialty (SCS-C02). This course is part of 4 steps that you can use to prepare for your exam with confidence. To follow the 4 steps, enroll in the Exam Prep Plan: AWS Certified…
View full course details Cancel

Microsoft

Examine backup security licensing and support considerations for SAP HANA on Azure (Large Instances)

shield-halved-duotone-light-full Cyber Security
This module covers considerations for backup, security, licensing, and support of SAP HANA on Azure (Large Instances). Prepare for Exam AZ-120 Planning and Administering Microsoft Azure for SAP Workloads.

Units in this learning path:

• Introduction
• Explore Backup Large Instances
• Explore Storage Snapshots of Large Instances
• Examine Storage Snapshot Considerations
• Examine Large Instances Security Considerations
• Explore Large Instances Licensing Considerations
• Explore Large Instances Support Considerations
• Explore Division of Management Responsibilities
• Knowledge Check
• Summary

Products: Azure

Roles: Administrator, Solution Architect

Level: Advanced

Subjects: Security

Duration: 41 minutes

View full course details Cancel

Microsoft

Execute device profiles

shield-halved-duotone-light-full Cyber Security
Students learn about the various types of device profiles, and how to create and manage them.

Units in this learning path:

• Introduction
• Explore Intune Device Profiles
• Create Device Profiles
• Create Custom Device Profile
• Knowledge Check
• Summary

Products: Windows, Configuration Manager, Intune

Roles: Administrator

Level: Intermediate

Subjects: Device Management, Identity Access

Duration: 18 minutes

View full course details Cancel

Microsoft

Explain cloud workload protections in Microsoft Defender for Cloud

shield-halved-duotone-light-full Cyber Security
Explain cloud workload protections in Microsoft Defender for Cloud

Units in this learning path:

• Introduction
• For Servers
• For App Service
• For Storage
• For SQL
• Understand Azure Defender for Open Source Databases
• For Key Vault
• For Resource Manager
• For Dns
• For Container Registries
• Additional Protection
• Knowledge Check
• Summary Resources

Products: Azure, Defender For Cloud

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Cloud Security, Security

Duration: 54 minutes

View full course details Cancel

Microsoft

Explain threat hunting concepts in Microsoft Sentinel

shield-halved-duotone-light-full Cyber Security
Explain threat hunting concepts in Microsoft Sentinel

Units in this learning path:

• Introduction
• Understand Cybersecurity
• Develop Hypothesis
• Explore Mitre Att Ck
• Knowledge Check
• Summary Resources

Products: Azure, Defender Xdr, Microsoft Sentinel

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Security, Cloud Security, Threat Protection

Duration: 23 minutes

View full course details Cancel

Microsoft

Explore DevOps Continuous Security and Continuous Operations

shield-halved-duotone-light-full Cyber Security
Explore two capabilities in the DevOps taxonomy, Continuous Security and Continuous Operations.

Units in this learning path:

• Introduction
• Explore Continuous Security
• Explore Continuous Operations
• Knowledge Check
• Summary

Products: Azure

Roles: Administrator, Business Analyst, Business Owner, Business User, Developer, Devops Engineer, Functional Consultant, Maker, Security Engineer, Solution Architect, Technology Manager

Level: Beginner

Subjects: Security

Duration: 22 minutes

View full course details Cancel

Microsoft

Explore Microsoft Defender

shield-halved-duotone-light-full Cyber Security
The module explains how Microsoft Defender can be used to protect against malware and reduce exposure to attacks using a firewall.

Units in this learning path:

• Introduction
• Explain Microsoft Defender Antivirus
• Understand Firewalls
• Explain Windows Defender Firewall
• Examine Network Location Profiles
• Explain Windows Defender Firewall Advanced Security
• Knowledge Check
• Summary

Products: Windows

Roles: Administrator

Level: Beginner

Subjects: Cloud Security, Threat Protection

Duration: 22 minutes

View full course details Cancel

Viewing 229-240 of 565