Skip to content
Search

5423 courses available

Microsoft

Implement and manage Microsoft 365 retention and recovery

shield-halved-duotone-light-full Cyber Security
Implement and manage Microsoft 365 retention and recovery.

Units in this learning path:

• Introduction
• Plan Retention Disposition
• Create Publish Retention Label
• Auto Apply Retention Label
• Create Configure Adaptive Scope
• Create Configure Retention Policy
• Principles Retention
• Recover Content Microsoft 365 Workloads
• Knowledge Check
• Summary

Products: Microsoft Purview, M365

Roles: Risk Practitioner

Level: Intermediate

Subjects: Information Protection Governance

Duration: 55 minutes

View full course details Cancel

Microsoft

Implement and manage Microsoft 365 retention and recovery

shield-halved-duotone-light-full Cyber Security
Retention helps organizations meet compliance requirements and manage the lifecycle of data in Microsoft 365. This learning path shows how to configure retention labels and policies, apply them with adaptive scopes, and recover deleted content in Microsoft 365 workloads. It aligns with exam SC-401: Microsoft Information Security Administrator.

Modules in this learning path:

• Purview Understand Retention
• Purview Retention Recovery

Products: Microsoft Purview

Roles: Auditor, Administrator, Ip Admin

Level: Intermediate

Subjects: Security

Duration: 79 minutes

View full course details Cancel

Microsoft

Implement and manage Microsoft Purview Data Loss Prevention

shield-halved-duotone-light-full Cyber Security
Organizations need to prevent data loss and safeguard sensitive information to meet security and compliance goals. Microsoft Purview provides DLP capabilities to detect and respond to risky activities across cloud and endpoint environments. Learn how to design, configure, and manage DLP policies using Microsoft Purview. This learning path aligns with exam SC-401: Microsoft Information Security Administrator.

Modules in this learning path:

• Purview Data Loss Prevention Understand Plan
• Purview Data Loss Prevention Create Manage Policies
• Purview Implement Endpoint Dlp
• Create Configure Data Loss Prevention Policies
• Purview Data Loss Prevention Alerts

Products: Microsoft Purview

Roles: Auditor, Administrator, Ip Admin

Level: Intermediate

Subjects: Security

Duration: 255 minutes

View full course details Cancel

Microsoft

Implement and manage Microsoft Purview Insider Risk Management

shield-halved-duotone-light-full Cyber Security
Implement Microsoft Purview Insider Risk Management to detect, investigate, and respond to internal risks while protecting data, ensuring compliance, and maintaining employee trust.

Modules in this learning path:

• Purview Explore Insider Risk Management
• Purview Prepare Insider Risk Management
• Purview Create Manage Insider Risk Policy
• Purview Insider Risk Investigate Alerts
• M365 Compliance Irm Adaptive Protection

Products: Microsoft Purview

Roles: Auditor, Administrator, Risk Practitioner

Level: Intermediate

Subjects: Security

Duration: 224 minutes

View full course details Cancel

Microsoft

Implement and manage Microsoft Purview Privacy Risk Management

Implement and manage Microsoft Purview Privacy Risk Management.

Units in this learning path:

• Introduction
• Understand Privacy Risk Management
• Create Policy from Template
• Create Custom Policy
• Manage Policies
• Investigate Alerts
• Review Reports
• Knowledge Check
• Summary

Products: Priva, Microsoft Purview, Azure, M365

Roles: Auditor, Administrator, Privacy Manager

Level: Intermediate

Subjects: Compliance, Security

Duration: 36 minutes

View full course details Cancel

Microsoft

Implement and manage data privacy with Microsoft Priva

shield-halved-duotone-light-full Cyber Security
Implement Microsoft Priva to help your organization manage personal data responsibly and meet compliance requirements. Use Privacy Risk Management to identify and mitigate potential risks, and manage subject rights requests to respond accurately and on time. With Microsoft Priva, you can build a structured approach to data privacy that supports compliance and strengthens trust with employees and customers.

Modules in this learning path:

• Priva Understand Microsoft Priva
• Priva Privacy Risk Management
• Priva Subject Rights Requests

Products: Priva, Microsoft Purview, M365

Roles: Auditor, Administrator, Privacy Manager

Level: Intermediate

Subjects: Security, Compliance

Duration: 90 minutes

View full course details Cancel

Microsoft

Implement and manage data quality constraints with Azure Databricks

chart-line-duotone-light-full Data Science
Learn how to implement and manage data quality constraints in Azure Databricks using Unity Catalog, including validation checks, schema enforcement, and pipeline expectations.

Units in this learning path:

• Introduction
• Implement Validation Checks
• Implement Data Type Checks
• Detect Manage Schema Drift
• Manage Data Quality Pipeline Expectations
• Knowledge Check
• Summary

Products: Azure Databricks

Roles: Data Engineer

Level: Intermediate

Subjects: Data Engineering

Duration: 38 minutes

View full course details Cancel

Microsoft

Implement and manage enforcement of cloud governance policies

This module equips administrators with the skills to design, deploy, and oversee security governance in Azure, ensuring alignment with organizational policies and industry best practices.

Units in this learning path:

• Introduction
• Access Data Identity Network Endpoint
• Azure Governance
• Create Custom Azure Security Initiatives Policies
• Deploy Secure Infrastructures
• Azure Key Vault
• Azure Key Vault Security
• Azure Key Vault Authentication
• Create Key Vault Use Azure Portal
• Azure Dedicated Hardware Security Module
• Configure Access Key Vault Azure Role Based Access Control
• Azure Key Vault Keys Secrets Certificates
• Configure Cryptographic Key Auto Rotation Azure Key Vault
• Azure Key Vault Backup Restore
• Implement Security Controls Protect Backups
• Implement Security Controls Asset Management
• Knowledge Check
• Summary

Products: Azure, Azure Blueprints, Azure Dedicated Hsm, Azure Key Vault, Azure Policy

Roles: Administrator, Security Engineer

Level: Intermediate

Duration: 117 minutes

View full course details Cancel

Microsoft

Implement and manage external identities

shield-halved-duotone-light-full Cyber Security
Inviting external users to use company Azure resources is a great benefit, but you want to do it in a secure way. Explore how to enable secure external collaboration.

Units in this learning path:

• Introduction
• Describe Guess Access Business to Business Accounts
• Collaboration
• Exercise Configure External Collaboration
• Invite External Users Individually Bulk
• Exercise Add Guest Users to Directory
• Exercise Invite Guest Users Bulk
• Demo Invite Guest Users to App
• User Accounts Azure Active Directory
• Manage Extern Users Microsoft 365 Workload
• Exercise Explore Dynamic Groups
• Implement Manager Entra Verified Id
• Configure Identity Providers
• Implement Cross Tenant Access Controls
• Knowledge Check
• Summary Resources

Products: Azure, Entra, Entra Verified Id, Entra External Id

Roles: Administrator, Identity Access Admin, Security Engineer

Level: Advanced

Subjects: Identity Access

Duration: 72 minutes

View full course details Cancel

Microsoft

Implement and manage hybrid identity

shield-halved-duotone-light-full Cyber Security
Creating a hybrid-identity solution to use your on-premises active directory can be challenging. Explore how to implement a secure hybrid-identity solution.

Units in this learning path:

• Introduction
• Plan Design Implement Azure Active Directory Connect
• Password Hash Synchronization
• Pass Through Authentication
• Demo Manage Pass Through Authentication Seamless Single Sign
• Federation
• Trouble Shoot Synchronization Errors
• Implement Azure Active Directory Connect Health
• Manage Azure Active Directory Connect Health
• Knowledge Check
• Summary Resources

Products: Azure, Entra, Entra External Id, Entra Id

Roles: Administrator, Identity Access Admin, Security Engineer

Level: Advanced

Subjects: Identity Access

Duration: 70 minutes

View full course details Cancel

Microsoft

Implement and manage networking for Azure Virtual Desktop

gear-duotone-light-full Software Development
Implement and manage networking for Azure Virtual Desktop

Units in this learning path:

• Introduction
• Plan Implement Remote Desktop Protocol Shortpath
• Analyze Connection Quality Azure Virtual Desktop
• Remote Desktop Protocol Bandwidth
• Remote Desktop Protocol Shortpath Azure Virtual Desktop
• Remote Desktop Protocol Shortpath Azure Virtual Desktop Scenarios
• Manage Connectivity to Internet Premises Networks
• Configure Remote Desktop Protocol Shortpath Managed Networks
• Plan Implement Quality Service Azure Virtual Desktop
• Monitor and Troubleshoot Network Connectivity
• Knowledge Check
• Summary

Products: Azure, Azure Virtual Desktop, Azure Virtual Machines

Roles: Administrator, Solution Architect

Level: Intermediate

Subjects: Networking

Duration: 71 minutes

View full course details Cancel

Microsoft

Implement and manage retention with Microsoft Purview

shield-halved-duotone-light-full Cyber Security
Implement and manage retention with Microsoft Purview.

Units in this learning path:

• Introduction
• Retention Overview
• Create Configure Retention Policy
• Create Configure Adaptive Scope
• Exercise Retention Policies
• Create Publish Retention Label
• Apply Retention Labels
• Configure Event Based Retention
• Exercise Retention Labels
• Knowledge Check
• Summary

Products: Microsoft Purview, M365

Roles: Risk Practitioner

Level: Intermediate

Subjects: Information Protection Governance

Duration: 85 minutes

View full course details Cancel

Viewing 2965-2976 of 5423