Skip to content
Search

565 courses available

Microsoft

Implement Windows Server hybrid cloud management, monitoring, and security

shield-halved-duotone-light-full Cyber Security
This learning path addresses problems related to managing, monitoring, and securing a hybrid environment. After completing the learning path, you’ll be able to manage and maintain hybrid Azure and on-premises workloads.

Modules in this learning path:

• Manage Hybrid Workloads with Azure Arc
• Monitor Windows Server Iaas Vms Hybrid Instances
• Audit Security of Windows Server Iaas Vms
• Manage Azure Updates

Products: Azure, Azure Cloud Shell, Azure Monitor, Azure Portal

Roles: Administrator, Solution Architect, Technology Manager

Level: Intermediate

Subjects: Security

Duration: 175 minutes

View full course details Cancel

Microsoft

Implement Windows security enhancements with Microsoft Defender for Endpoint

shield-halved-duotone-light-full Cyber Security
Implement Windows security enhancements with Microsoft Defender for Endpoint

Units in this learning path:

• Introduction
• Understand Attack Surface Reduction
• Enable Attack Surface Reduction Rules
• Knowledge Check
• Summary Resources

Products: Defender Xdr, Windows, Defender Endpoint

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Cloud Security, Compliance, Security, Threat Protection

Duration: 31 minutes

View full course details Cancel

IBM

Implement Zero Trust Security

shield-halved-duotone-light-full Cyber Security
This credential earner has the advanced competencies to implement a zero trust security architecture based on insights gathered from a simulated stakeholder interview. The earner has knowledge of modeling a zero trust framework and the practical strategies to enhance organizational security. The earner has developed transferable employability skills and gained real industry experience in a project-based learning opportunity.
View full course details Cancel

Microsoft

Implement a secure environment for a database service

shield-halved-duotone-light-full Cyber Security
Implement a secure environment for a database service

Modules in this learning path:

• Configure Database Authentication Authorization
• Protect Data Transit at Rest
• Implement Compliance Controls for Sensitive Data

Products: Azure, Azure SQL Database, SQL Server

Roles: Data Analyst, Data Engineer, Database Administrator

Level: Intermediate

Subjects: Security

Duration: 238 minutes

View full course details Cancel

Microsoft

Implement access management for Azure resources

shield-halved-duotone-light-full Cyber Security
Explore how to use built-in Azure roles, managed identities, and RBAC-policy to control access to Azure resources. Identity is the key to secure solutions.

Units in this learning path:

• Introduction
• Assign Azure Roles
• Configure Custom Azure Roles
• Create Configure Managed Identities
• Access Managed Identities
• Analyze Azure Role Permissions
• Configure Azure Key Vault Rbac Policies
• Retrieve Objects from Azure Key Vault
• Knowledge Check
• Summary Resources

Products: Azure, Entra, Entra Id

Roles: Administrator, Identity Access Admin, Security Engineer

Level: Advanced

Subjects: Identity Access, Infrastructure, Security

Duration: 30 minutes

View full course details Cancel

Microsoft

Implement access management for apps

shield-halved-duotone-light-full Cyber Security
Implement access management for apps

Modules in this learning path:

• Plan Design Integration of Enterprise Apps for Sso
• Implement Monitor Integration of Enterprise Apps for Sso
• Implement App Registration
• Register Apps Use Microsoft Entra Id

Products: Azure, Entra Id

Roles: Administrator, Security Engineer

Level: Intermediate

Subjects: Identity Access

Duration: 154 minutes

View full course details Cancel

Microsoft

Implement an authentication and access management solution

shield-halved-duotone-light-full Cyber Security
Implement an authentication and access management solution

Modules in this learning path:

• Secure Aad Users with Mfa
• Manage User Authentication
• Plan Implement Administer Conditional Access
• Manage Azure Ad Identity Protection
• Implement Access Management for Azure Resources
• Deploy Configure Microsoft Entra Global Secure Access

Products: Azure, Entra Id

Roles: Administrator, Security Engineer

Level: Intermediate

Subjects: Identity Access

Duration: 293 minutes

View full course details Cancel

Microsoft

Implement an identity management solution using Microsoft Entra ID'

shield-halved-duotone-light-full Cyber Security
Implement an identity management solution using Microsoft Entra ID'

Modules in this learning path:

• Implement Initial Configuration of Azure Active Directory
• Create Configure Manage Identities
• Implement Manage External Identities
• Implement Manage Hybrid Identity

Products: Azure, Entra Id, Entra External Id, Entra, Entra Workload Identities

Roles: Administrator, Identity Access Admin, Security Engineer

Level: Intermediate

Subjects: Identity Access

Duration: 256 minutes

View full course details Cancel

Microsoft

Implement and manage Microsoft 365 retention and recovery

shield-halved-duotone-light-full Cyber Security
Implement and manage Microsoft 365 retention and recovery.

Units in this learning path:

• Introduction
• Plan Retention Disposition
• Create Publish Retention Label
• Auto Apply Retention Label
• Create Configure Adaptive Scope
• Create Configure Retention Policy
• Principles Retention
• Recover Content Microsoft 365 Workloads
• Knowledge Check
• Summary

Products: Microsoft Purview, M365

Roles: Risk Practitioner

Level: Intermediate

Subjects: Information Protection Governance

Duration: 55 minutes

View full course details Cancel

Microsoft

Implement and manage Microsoft 365 retention and recovery

shield-halved-duotone-light-full Cyber Security
Retention helps organizations meet compliance requirements and manage the lifecycle of data in Microsoft 365. This learning path shows how to configure retention labels and policies, apply them with adaptive scopes, and recover deleted content in Microsoft 365 workloads. It aligns with exam SC-401: Microsoft Information Security Administrator.

Modules in this learning path:

• Purview Understand Retention
• Purview Retention Recovery

Products: Microsoft Purview

Roles: Auditor, Administrator, Ip Admin

Level: Intermediate

Subjects: Security

Duration: 79 minutes

View full course details Cancel

Microsoft

Implement and manage Microsoft Purview Data Loss Prevention

shield-halved-duotone-light-full Cyber Security
Organizations need to prevent data loss and safeguard sensitive information to meet security and compliance goals. Microsoft Purview provides DLP capabilities to detect and respond to risky activities across cloud and endpoint environments. Learn how to design, configure, and manage DLP policies using Microsoft Purview. This learning path aligns with exam SC-401: Microsoft Information Security Administrator.

Modules in this learning path:

• M365 Compliance Information Prevent Data Loss
• Purview Implement Endpoint Dlp
• Create Configure Data Loss Prevention Policies
• Purview Data Loss Prevention Alerts

Products: Microsoft Purview

Roles: Auditor, Administrator, Ip Admin

Level: Intermediate

Subjects: Security

Duration: 231 minutes

View full course details Cancel

Microsoft

Implement and manage Microsoft Purview Insider Risk Management

shield-halved-duotone-light-full Cyber Security
Implement Microsoft Purview Insider Risk Management to detect, investigate, and respond to internal risks while protecting data, ensuring compliance, and maintaining employee trust.

Modules in this learning path:

• Purview Explore Insider Risk Management
• Purview Prepare Insider Risk Management
• Purview Create Manage Insider Risk Policy
• Purview Insider Risk Investigate Alerts
• M365 Compliance Irm Adaptive Protection

Products: Microsoft Purview

Roles: Auditor, Administrator, Risk Practitioner

Level: Intermediate

Subjects: Security

Duration: 224 minutes

View full course details Cancel

Viewing 289-300 of 565