Skip to content
Search

5424 courses available

Microsoft

Implement remote access

Implement remote access

Units in this learning path:

• Introduction
• Examine Remote Access Options
• Select Set Up Vpns
• Use Nps to Create Enforce Network Access Policies
• Plan Implement Nps
• Deploy Pki Remote Access
• Use Wap As Reverse Web Proxy
• Knowledge Check
• Summary

Products: Windows Server

Roles: Administrator, Solution Architect, Technology Manager

Level: Intermediate

Subjects: Remote Hybrid Work

Duration: 59 minutes

View full course details Cancel

Microsoft

Implement resiliency in a cloud-native .NET microservice

gear-duotone-light-full Software Development
This module guides you through implementing resiliency in an .NET microservices app in a Kubernetes Service.

Units in this learning path:

• 1 Introduction
• 2 Application Infrastructure Resiliency
• 3 Implement Application Resiliency
• 4 Exercise Implement Resiliency
• 5 Implement Infrastructure Resiliency
• 6 Exercise Implement Infrastructure Resiliency
• 7 Knowledge Check
• 8 Summary

Products: Aspnet Core, Azure, Azure Container Registry, Azure Kubernetes Service

Roles: Developer, Solution Architect

Level: Advanced

Subjects: Serverless Computing

Duration: 60 minutes

View full course details Cancel

Microsoft

Implement resilient AI-ready infrastructure

This module explains building resilient, multi-region AI infrastructure using Microsoft Foundry hubs, geo-redundant storage, and Azure Container Registry geo-replication. It shows how coordinated replication and failover protect data, model images, and AI services during regional outages.

Units in this learning path:

• Introduction
• Configure Microsoft Foundry Hubs Region
• Implement Geo Redundant Storage Data
• Deploy Azure Container Registry Replication
• Exercise Configure Resilient Infrastructure
• Knowledge Check
• Summary

Products: Azure

Roles: Administrator

Level: Intermediate

Subjects: Infrastructure

Duration: 91 minutes

View full course details Cancel

Microsoft

Implement resource management security in Azure

shield-halved-duotone-light-full Cyber Security
Learn how to secure resources using policy, role-based access control, and other Azure services

Modules in this learning path:

• Control and Organize with Resource Manager
• Secure Azure Resources with Rbac

Products: Azure, Azure Clis, Azure Portal, Azure Resource Manager, Azure Blueprints, Azure Policy, Azure Rbac

Roles: Solution Architect, Administrator, Security Engineer

Level: Beginner, Intermediate

Subjects: Security

Duration: 83 minutes

View full course details Cancel

Microsoft

Implement retention, eDiscovery, and Communication compliance in Microsoft Purview

Manage data lifecycle, records management, eDiscovery, and communication compliance with Microsoft Purview. (SC-5007)

Modules in this learning path:

• Purview Implement Manage Retention
• Purview Manage Records
• Purview Ediscovery Understand
• Purview Ediscovery Create Case
• Purview Ediscovery Manage Data Sources Holds
• Purview Ediscovery Search
• Purview Ediscovery Review Set
• M365 Compliance Insider Prepare Communication Compliance
• Purview Exercise Implement Retention Ediscovery Communication Compliance

Products: Microsoft Purview

Roles: Auditor

Level: Intermediate

Subjects: Compliance

Duration: 470 minutes

View full course details Cancel

Microsoft

Implement retention, eDiscovery, and Communication compliance in Microsoft Purview

chart-line-duotone-light-full Data Science
This module guides you through implementing data compliance and governance using Microsoft Purview, ensuring your organization meets regulatory requirements and manages data effectively.

Units in this learning path:

• Introduction
• Create Retention Policy
• Create Retention Label
• Search Ediscovery
• Create Communication Compliance Policy
• Summary

Products: M365, Microsoft Purview

Roles: Administrator, Auditor

Level: Intermediate

Subjects: Data Management, Threat Protection

Duration: 64 minutes

View full course details Cancel

Microsoft

Implement role-based security in finance and operations apps

shield-halved-duotone-light-full Cyber Security
Finance and operations apps use role-based security to assign access to components in the system. A user who is assigned to a security role has access to the set of privileges that is associated with that role.

Units in this learning path:

• 1 Introduction
• 2 Duties Privileges
• 3 Perm Policy
• 4 Xds
• 5 Security
• 6 Exercise
• Entra Id Oauth
• 7 Check
• 8 Summary

Products: Dynamics 365, Dynamics Finance, Dynamics Scm

Roles: Developer, Solution Architect

Level: Intermediate

Subjects: Identity Access

Duration: 75 minutes

View full course details Cancel

Microsoft

Implement scale and high availability with Windows Server VM

gear-duotone-light-full Software Development
Learn how to implement scaling for virtual machine scale sets and load-balanced VMs. Also learn how to implement Azure Site Recovery.

Units in this learning path:

• Introduction
• Describe Virtual Machine Scale Sets
• Implement Scaling
• Implement Load Balancing Vms
• Create Vm Scale Set Azure Portal
• Describe Azure Site Recovery
• Implement Azure Site Recovery
• Knowledge Check
• Summary

Products: Azure, Azure Cloud Shell, Azure Portal, Azure Virtual Machines

Roles: Administrator, Solution Architect, Technology Manager

Level: Intermediate

Subjects: Virtual Machine

Duration: 58 minutes

View full course details Cancel

Microsoft

Implement secure AI-ready infrastructure with Azure services

shield-halved-duotone-light-full Cyber Security
This course explains how to design secure AI platforms using Microsoft Foundry, applying centralized governance, managed identities, private networking, Azure OpenAI security controls, and container image protection to ensure compliant, production‑ready AI workloads across enterprise environments.

Units in this learning path:

• Introduction
• Understand Microsoft Foundry Security Architecture
• Secure Azure Openai Cognitive Services
• Secure AI Container Images Azure Container
• Exercise Configure Secure AI Infrastructure
• Knowledge Check
• Summary

Products: Azure, Azure Openai, Azure Container Registry, Azure AI Foundry, Azure Machine Learning

Roles: Security Engineer, Administrator, Database Administrator, Data Scientist, Security Operations Analyst

Level: Intermediate

Subjects: Security, Cloud Security, Infrastructure, Information Protection Governance, Artificial Intelligence

Duration: 61 minutes

View full course details Cancel

Microsoft

Implement secure Azure solutions

shield-halved-duotone-light-full Cyber Security
Learn how to more securely deploy apps in Azure by using Azure Key Vault, managed identities, and Azure App Configuration.

Modules in this learning path:

• Implement Azure Key Vault
• Implement Managed Identities
• Implement Azure App Configuration

Products: Azure, Azure App Configuration, Azure Key Vault, Azure Rbac

Roles: Developer

Level: Intermediate

Subjects: Cloud Security

Duration: 107 minutes

View full course details Cancel

Microsoft

Implement security controls for Azure AI-ready infrastructure

shield-halved-duotone-light-full Cyber Security
This module equips you to configure Azure's foundational security controls for AI workloads. You'll start by configuring Microsoft Entra ID security principals that define *who* and *what* can access your AI resources—from data scientists needing interactive workspace access to managed identities enabling secure service-to-service communication.

Units in this learning path:

• Introduction
• Configure Microsoft Entra Id Security Principals
• Implement Azure Governance Scopes AI Resources
• Apply Azure Policy Primary Governance
• Exercise Configure Secure AI Infrastructure
• Knowledge Check
• Summary

Products: Azure, Azure Machine Learning, Azure Machine Learning Studio, Azure Machine Learning Designer, Azure Data Science Vm

Roles: Data Scientist, Database Administrator, Business Owner, Administrator, Developer

Level: Intermediate

Subjects: Security, Cloud Security, Infrastructure, Information Protection Governance, Devops

Duration: 63 minutes

View full course details Cancel

Microsoft

Implement security for Microsoft Teams

Learn about different security capabilities for Microsoft Teams, including Conditional Access, multifactor authentication, Safe Attachments, Safe Links, and Defender for Cloud Apps.

Units in this learning path:

• Introduction
• Configure Conditional Access Multifactor Authentication
• Configure Safe Attachments
• Configure Safe Links
• Examine Defender Cloud App
• Monitor Security Reports
• Enhanced Encryption Policies
• Knowledge Check
• Summary

Products: M365, Office Teams

Roles: Administrator

Level: Intermediate

Subjects: Collaboration, Security

Duration: 40 minutes

View full course details Cancel

Viewing 3061-3072 of 5424