Skip to content
Search

565 courses available

Microsoft

Hunt for threats using notebooks in Microsoft Sentinel

shield-halved-duotone-light-full Cyber Security
Hunt for threats using notebooks in Microsoft Sentinel

Units in this learning path:

• Introduction
• Access Azure Sentinel Data with External Tools
• Hunt
• Create Notebook
• Explore Notebook Code
• Knowledge Check
• Summary Resources

Products: Azure, Microsoft Sentinel

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Threat Protection

Duration: 31 minutes

View full course details Cancel

IBM

IBM SkillsBuild Cybersecurity Certificate

shield-halved-duotone-light-full Cyber Security
This certificate earner has advanced technical skills in cybersecurity, such as security posture evaluation, vulnerability assessment, network architecture, cloud infrastructure security, security operations, and incident reporting. Through completion of a comprehensive curriculum, application-based assessments, and authentic experiential learning, the earner has developed workplace and career management skills and industry knowledge, and is prepared for a cybersecurity career across industries.
View full course details Cancel

IBM

IT Security and Compliance

shield-halved-duotone-light-full Cyber Security
This credential earner has the advanced skills to implement, monitor, and troubleshoot security measures to ensure the protection of sensitive information and compliance with relevant policies and regulations. The individual has the technical knowledge and practical skills to secure hardware and software, implement technical controls, manage data, respond to security incidents, implement disaster recovery plans, and troubleshoot issues. The earner has practiced essential workplace skills.
View full course details Cancel

Microsoft

Identify and mitigate AI data security risks

shield-halved-duotone-light-full Cyber Security
Identify and mitigate AI data security risks.

Units in this learning path:

• Introduction
• Understand AI Security Risks
• Dspm AI Overview
• Configure Dspm AI
• Dspm AI Recommendations
• Review AI Security Reports
• Data Assessments
• Knowledge Check
• Summary

Products: Microsoft Purview, M365

Roles: Auditor, Administrator, Risk Practitioner

Level: Intermediate

Subjects: Information Protection Governance, Security

Duration: 48 minutes

View full course details Cancel

Microsoft

Identify security vulnerabilities in your codebase by using CodeQL

shield-halved-duotone-light-full Cyber Security
Learn how to use CodeQL to analyze the code in your GitHub repository and identify security vulnerabilities.

Units in this learning path:

• 1 Introduction
• 2 How Prepare Database Codeql
• 3 Run Codeql Database
• 4 Understand Results
• 5 Troubleshoot Your Results
• 6 Knowledge Check
• 7 Summary

Products: Github

Roles: Devops Engineer, Administrator, Developer, Student

Level: Intermediate

Subjects: Threat Protection

Duration: 33 minutes

View full course details Cancel

Microsoft

Identify threats with Behavioral Analytics

shield-halved-duotone-light-full Cyber Security
Identify threats with Behavioral Analytics

Units in this learning path:

• Introduction
• Understand User Entity Behavior Analytics
• Explore Entities
• Display Information
• Use Anomaly Detection Analytical Rule Templates
• Knowledge Check
• Summary Resources

Products: Azure, Microsoft Sentinel

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Threat Protection

Duration: 30 minutes

View full course details Cancel

Microsoft

Implement Azure App Configuration

shield-halved-duotone-light-full Cyber Security
Learn how to use Azure App Configuration service to centrally manage and secure your configuration settings, and to manage app features.

Units in this learning path:

• Introduction
• Explore Service
• Create Paired Keys Values
• Manage Application Features
• Secure Data
• Retrieve Configuration Settings
• Knowledge Check
• Summary

Products: Azure App Configuration

Roles: Developer

Level: Intermediate

Subjects: Security

Duration: 36 minutes

View full course details Cancel

Microsoft

Implement Azure Key Vault

shield-halved-duotone-light-full Cyber Security
Implement Azure Key Vault

Units in this learning path:

• Introduction
• Explore
• Discover Best Practices
• Authenticate to
• Exercise Set Retrieve Secret from by Using Azure Cli
• Knowledge Check
• Summary

Products: Azure Key Vault

Roles: Developer

Level: Intermediate

Subjects: Cloud Security

Duration: 48 minutes

View full course details Cancel

Microsoft

Implement Microsoft Purview Information Protection

shield-halved-duotone-light-full Cyber Security
Organizations need to classify, label, and protect sensitive data to prevent exposure and ensure compliance. Microsoft Purview solutions provide data classification, sensitivity labels, and encryption to secure information across Microsoft 365 and on-premises storage. This learning path aligns with exam SC-401: Microsoft Information Security Administrator.

Modules in this learning path:

• Purview Protect Sensitive Data
• M365 Compliance Information Classify Data
• Purview Review Analyze Data Classification
• Create Manage Sensitive Information Types
• M365 Compliance Information Protect Information
• Apply Manage Sensitivity Labels
• Purview Protect on Premises Data
• Audit Encryption
• Deploy Message Encryption Microsoft 365

Products: Microsoft Purview, M365

Roles: Auditor, Administrator, Ip Admin

Level: Intermediate

Subjects: Security, Information Protection Governance

Duration: 366 minutes

View full course details Cancel

Microsoft

Implement Windows Server IaaS VM Identity

shield-halved-duotone-light-full Cyber Security
After completing this learning path, you’ll know how to implement identity in Azure. You’ll be able to extend an existing on-premises Active Directory identity service into Azure.

Modules in this learning path:

• Implement Hybrid Identity with Windows Server
• Deploy Manage Azure Iaas Active Directory Domain Controllers Azure

Products: Azure, Entra Id, Azure Cloud Shell, Azure Portal, Azure Virtual Machines

Roles: Administrator, Solution Architect, Technology Manager

Level: Intermediate

Subjects: Identity Access, Virtual Machine

Duration: 148 minutes

View full course details Cancel

Microsoft

Implement Windows Server IaaS VM Security

shield-halved-duotone-light-full Cyber Security
This learning path deals with securing your Azure resources. After completing the learning path, you’ll be able to determine if your Azure IaaS workloads have any security vulnerabilities, and remediate those potential security vulnerabilities.

Modules in this learning path:

• Audit Security of Windows Server Iaas Vms
• Manage Azure Updates
• Configure Bitlocker Disk Encryption for Windows Iaas Vms
• Implement Change Tracking File Integrity Monitoring for Windows Iaas Vms
• Implement Windows Server Iaas Vm Network Security

Products: Azure, Azure Cloud Shell, Azure Monitor, Azure Portal, Azure Virtual Machines

Roles: Administrator, Solution Architect, Technology Manager

Level: Intermediate

Subjects: Security

Duration: 234 minutes

View full course details Cancel

Microsoft

Implement Windows Server IaaS VM network security

shield-halved-duotone-light-full Cyber Security
Implement Windows Server IaaS VM network security

Units in this learning path:

• Introduction
• Groups Windows Iaas Vms
• Azure Firewall Windows Iaas Vms
• Windows Firewall Windows Iaas Vms
• Choose Appropriate Filtering Solution
• Deploy Configure Azure Firewall Using Azure Portal
• Capture Network Traffic with Network Watcher
• Log Network Traffic Using Azure Portal
• Knowledge Check
• Summary

Products: Azure, Azure Cloud Shell, Azure Portal, Azure Virtual Machines

Roles: Administrator, Solution Architect, Technology Manager

Level: Intermediate

Subjects: Cloud Security, Virtual Machine

Duration: 64 minutes

View full course details Cancel

Viewing 277-288 of 565