Skip to content
Search

629 courses available

Amazon Web Services

Getting Started with AWS Audit Manager

shield-halved-duotone-light-full Cyber Security
AWS Audit Manager helps you continuously audit your AWS usage and simplify risk and compliance assessment against regulations, internal control frameworks, and industry standards. Audit Manager automates evidence collection to reduce the manual…
View full course details Cancel

Amazon Web Services

Getting Started with AWS Cloud Essentials

shield-halved-duotone-light-full Cyber Security
This course introduces you to cloud computing and the benefits of choosing AWS Cloud for your global infrastructure. Throughout this course, you will learn the key benefits of cloud computing and the core services offered by AWS Cloud. If you or…
View full course details Cancel

Amazon Web Services

Getting Started with AWS Config

shield-halved-duotone-light-full Cyber Security
AWS Config monitors and records your Amazon Web Services (AWS) resource configurations so you can automate the evaluation of recorded configurations against desired configurations. With AWS Config, you can examine detailed resource configuration…
View full course details Cancel

Amazon Web Services

Getting Started with Amazon GuardDuty

shield-halved-duotone-light-full Cyber Security
Amazon GuardDuty provides visibility into security threats to help you identify and remediate anomalous or suspicious activities. This course will provide you with a fundamental understanding of the purpose, benefits, architecture, pricing…
View full course details Cancel

Amazon Web Services

Getting Started with Amazon Location Service

shield-halved-duotone-light-full Cyber Security
You can use Amazon Location Service to add location data to applications using maps, places, trackers, and geofences without compromising data security. In this course, you will learn the benefits, typical use cases, and technical concepts of…
View full course details Cancel

IBM

Getting Started with Cybersecurity

shield-halved-duotone-light-full Cyber Security
This credential earner demonstrates a foundational understanding of cybersecurity key elements and the threats it addresses, including concepts of data privacy, and how to evaluate data security using the CIA triad model. The earner is aware of the job outlook in cybersecurity and is familiar with the skills required for success in various roles. The individual understands how a cybersecurity tool works.
View full course details Cancel

IBM

Getting Started with Threat Intelligence and Hunting

shield-halved-duotone-light-full Cyber Security
This badge earner has completed all the learning activities included in this online learning experience, including hands-on experience, concepts, methods and tools related to the threat intelligence and hunting domain. The individual has demonstrated domain knowledge and understanding in adopting practices, methods and tools that relates to the activities performed in cyber threat hunting.
View full course details Cancel

Microsoft

GitHub administration for GitHub Advanced Security

shield-halved-duotone-light-full Cyber Security
Understand where GitHub Advanced Security fits in your software development lifecycle and how to enable and roll it out in your organization.

Units in this learning path:

• Introduction
• What Is Github Advanced Security
• Enable Github Advanced Security
• Manage Access Github Advanced Security
• Manage Github Advanced Security Features Alerts
• Knowledge Check
• Summary

Products: Github

Roles: Developer, Administrator, Security Engineer

Level: Advanced

Subjects: Security

Duration: 21 minutes

View full course details Cancel

Microsoft

Govern and protect sensitive information in the age of AI

shield-halved-duotone-light-full Cyber Security
Develop skills in securing and governing data within AI-driven environments, using Microsoft Purview to navigate AI risks and ensure compliance. This path enhances your understanding of adapting security and governance strategies in response to the evolving landscape of AI technology.

Modules in this learning path:

• Purview AI Data Security
• Purview AI Data Compliance
• Purview Identify Mitigate AI Risks

Products: M365, Microsoft Purview

Roles: Administrator, Auditor, Ip Admin

Level: Intermediate

Subjects: Information Protection Governance

Duration: 128 minutes

View full course details Cancel

Microsoft

Guide to Secure .NET Development with OWASP Top 10

shield-halved-duotone-light-full Cyber Security
Evaluate security risks that come with insecure application development patterns and practices

Units in this learning path:

• Introduction
• What Is Owasp Top 10
• Broken Access Control
• Cryptographic Failures
• Injection
• Insecure Design
• Security Misconfiguration
• Vulnerable Outdated Components
• Identification Authentication Failures
• Software Data Integrity Failures
• Security Logging Monitoring
• Server Side Request Forgery
• Summary

Products: Azure, Aspnet, Dotnet, Blazor

Roles: Developer, Devops Engineer, Security Engineer

Level: Beginner

Subjects: Security, Backend Development, Frontend Development, Cloud Security, Devops

Duration: 44 minutes

View full course details Cancel

Microsoft

Guided project – Build a sample app to evaluate Microsoft Entra External ID for seamless and secure sign-up and sign-in for consumers and business customers

shield-halved-duotone-light-full Cyber Security
Discover how Microsoft Entra External ID can provide secure, seamless sign-in experiences for your consumers and business customers. Explore tenant creation, app registration, flow customization, and account security.

Units in this learning path:

• Introduction
• Prepare
• Create External Tenant
• Register Application
• Create Sign Up Sign in User Flow
• Add Admin Account
• Collect User Attributes During Sign Up
• Customize Look Feel
• Enable Social Identity Provider Sign in
• Validate Attributes Collected During Sign Up
• Enable Multifactor Authentication
• Knowledge Check
• Summary

Products: Entra External Id

Roles: Administrator, Developer, Identity Access Admin, Service Adoption Specialist, Solution Architect, Startup Founder

Level: Intermediate

Subjects: Identity Access

Duration: 108 minutes

View full course details Cancel

Microsoft

Hunt for threats using notebooks in Microsoft Sentinel

shield-halved-duotone-light-full Cyber Security
Hunt for threats using notebooks in Microsoft Sentinel

Units in this learning path:

• Introduction
• Access Azure Sentinel Data with External Tools
• Hunt
• Create Notebook
• Explore Notebook Code
• Knowledge Check
• Summary Resources

Products: Azure, Microsoft Sentinel

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Threat Protection

Duration: 31 minutes

View full course details Cancel

Viewing 289-300 of 629