Skip to content
Search

594 courses available

Amazon Web Services

Domain 6 Review: AWS Certified Security - Specialty (SCS-C02 - English)

shield-halved-duotone-light-full Cyber Security
In this course, you will review Domain 6: Management and Security Governance of the AWS Certified Security - Specialty (SCS-C02) exam. Prepare for the exam by exploring these topics and how they align to AWS services and to specific areas of…
View full course details Cancel

Microsoft

Employ file recovery in Windows client

shield-halved-duotone-light-full Cyber Security
In this module, you will learn about the Windows file backup and recovery tools.

Units in this learning path:

• Introduction
• Explain Importance File Recovery
• Explain File History
• Protect Files Using Azure Backup
• Restore Files Using Backup Restore Windows 7
• Restore Files Using Previous Versions Tab
• Compare File Recovery Options
• Troubleshoot File Recovery Options
• Knowledge Check
• Summary

Products: Windows

Roles: Administrator

Level: Beginner

Subjects: Cloud Security, Device Management, Storage

Duration: 28 minutes

View full course details Cancel

Microsoft

Enable Defender for AI Services workload protection in Microsoft Defender for Cloud

shield-halved-duotone-light-full Cyber Security
Enable and configure the Defender for AI Services Cloud Workload Protection plan in Microsoft Defender for Cloud. The plan helps to detect threats targeting Azure AI services workloads and monitor AI security posture.

Units in this learning path:

• Introduction
• Enable Configure AI Services Plan
• Monitor AI Security Dashboard
• Knowledge Check
• Summary

Products: Defender For Cloud, Azure

Roles: Security Engineer

Level: Intermediate

Subjects: Cloud Security

Duration: 20 minutes

View full course details Cancel

Microsoft

Enable and configure workload protection plans in Microsoft Defender for Cloud

shield-halved-duotone-light-full Cyber Security
Learn to enable and configure Cloud Workload Protection Platform (CWPP) plans in Microsoft Defender for Cloud, including Defender for Servers, Storage, Databases, APIs, and AI Services — and how to deploy protection at scale and verify coverage.

Units in this learning path:

• Introduction
• Explore Workload Protection Plan Catalog
• Enable Plans Environment Settings
• Configure Storage Database Plans
• Deploy Plans Scale Verify Coverage
• Knowledge Check
• Summary

Products: Defender For Cloud, Azure

Roles: Security Engineer

Level: Intermediate

Subjects: Security, Cloud Security

Duration: 33 minutes

View full course details Cancel

Microsoft

Enable organizational access

shield-halved-duotone-light-full Cyber Security
This module describes how clients can be configured to access organizational resources using a virtual private network (VPN).

Units in this learning path:

• Introduction
• Enable Access Organization Resources
• Explore Vpn Types Configuration
• Explore Always on Vpn
• Deploy Always on Vpn
• Knowledge Check
• Summary

Products: Mem, Configuration Manager, Intune, Windows

Roles: Administrator

Level: Intermediate

Subjects: Identity Access, Process Workflow

Duration: 15 minutes

View full course details Cancel

Cisco Networking Academy

Endpoint Security

shield-halved-duotone-light-full Cyber Security
This course is the fourth in the six-course Junior Cybersecurity Analyst Pathway, aligned to the CCST (Cisco Certified Support Technician) Cybersecurity certification. In this course, you will learn how to assess the network, operating systems, and endpoints for vulnerabilities, and how to secure the network. You will also gain skills to maintain the integrity, confidentiality, and availability in your network and your data.
View full course details Cancel

Microsoft

Enhance security operations by using Microsoft Security Copilot

shield-halved-duotone-light-full Cyber Security
Enhance security operations by using Microsoft Security Copilot (SC-5006).

Modules in this learning path:

• Fundamentals Generative AI
• Security Copilot Getting Started
• Security Copilot Describe Core Features
• Security Copilot Embedded Experiences
• Security Copilot Describe Agents
• Security Copilot Exercises

Products: Defender Xdr, Microsoft Sentinel, Intune, Entra, Defender For Threat Intelligence, Ms Copilot

Roles: Student, Security Engineer, Security Operations Analyst, Business User, Business Owner

Level: Beginner

Subjects: Security, Artificial Intelligence

Duration: 466 minutes

View full course details Cancel

Microsoft

Enroll and validate devices with Microsoft Intune

shield-halved-duotone-light-full Cyber Security
Learn how to enroll devices in Microsoft Intune and validate successful enrollment using portal tools and troubleshooting techniques.

Units in this learning path:

• Introduction
• Enroll Windows Device
• Validate Device Join Management
• Apply Platform Ownership Restrictions
• Troubleshoot Device Enrollment
• Knowledge Check
• Summary

Products: M365, Intune, Entra Id

Roles: Administrator, Security Engineer

Level: Intermediate

Subjects: Identity Access, Cloud Computing

Duration: 40 minutes

View full course details Cancel

Microsoft

Enroll devices using Microsoft Intune

shield-halved-duotone-light-full Cyber Security
Students will learn how to configure and setup Intune to more easily manage Windows, Android and iOS devices.

Units in this learning path:

• Introduction
• Manage Mobile Devices with Intune
• Enable Mobile Device Management
• Explain Considerations Device Enrollment
• Manage Corporate Enrollment Policy
• Enroll Windows Devices Intune
• Enroll Android Devices Intune
• Enroll Ios Devices Intune
• Explore Device Enrollment Manager
• Monitor Device Enrollment
• Manage Devices Remotely
• Knowledge Check
• Summary

Products: Mem, Configuration Manager, Intune, Windows

Roles: Administrator

Level: Intermediate

Subjects: Device Management, It Management Monitoring, Security

Duration: 39 minutes

View full course details Cancel

IBM

Enterprise Security in Practice

shield-halved-duotone-light-full Cyber Security
This badge earner has completed all the learning activities included in this online learning experience, including hands-on experience, concepts, methods and tools related to the enterprise security domain. The individual has demonstrated skills and understanding in the approaches to elevate an organization’s overall security posture, by adopting practices, methods and tools that increase enterprise cyber resilience.
View full course details Cancel

Microsoft

Establish the guiding principles and core components of Zero Trust

shield-halved-duotone-light-full Cyber Security
Zero Trust is not a product or tool, but an essential security strategy that seeks to continuously verify every transaction, asserts least privilege access, and assumes that every transaction could be a possible attack. Through the modules in this learning path, you'll gain an understanding of Zero Trust and how it applies to identity, endpoints, applications, networks, infrastructure, and data.

Modules in this learning path:

• Zero Trust Introduction
• Zero Trust Identities
• Zero Trust Endpoints
• Zero Trust Applications
• Zero Trust Networks
• Zero Trust Infrastructure
• Zero Trust Data

Products: M365

Roles: Administrator, Student

Level: Beginner

Subjects: Security

Duration: 106 minutes

View full course details Cancel

Microsoft

Evaluate regulatory compliance in Defender for Cloud

shield-halved-duotone-light-full Cyber Security
Learn to use Microsoft Defender for Cloud to assess, investigate, and report on compliance posture against security frameworks including the Microsoft Cloud Security Benchmark, regulatory standards, and custom standards.

Units in this learning path:

• Introduction
• Understand Compliance Standards Controls
• Navigate Compliance Dashboard Investigate Gaps
• Assign Standards Communicate Compliance Posture
• Knowledge Check
• Summary

Products: Defender For Cloud, Azure

Roles: Security Engineer

Level: Intermediate

Subjects: Security, Cloud Security, Compliance

Duration: 23 minutes

View full course details Cancel

Viewing 229-240 of 594