Skip to content
Search

629 courses available

IBM

IBM SkillsBuild Cybersecurity Certificate

shield-halved-duotone-light-full Cyber Security
This certificate earner has advanced technical skills in cybersecurity, such as security posture evaluation, vulnerability assessment, network architecture, cloud infrastructure security, security operations, and incident reporting. Through completion of a comprehensive curriculum, application-based assessments, and authentic experiential learning, the earner has developed workplace and career management skills and industry knowledge, and is prepared for a cybersecurity career across industries.
View full course details Cancel

IBM

IT Security and Compliance

shield-halved-duotone-light-full Cyber Security
This credential earner has the advanced skills to implement, monitor, and troubleshoot security measures to ensure the protection of sensitive information and compliance with relevant policies and regulations. The individual has the technical knowledge and practical skills to secure hardware and software, implement technical controls, manage data, respond to security incidents, implement disaster recovery plans, and troubleshoot issues. The earner has practiced essential workplace skills.
View full course details Cancel

Microsoft

Identify and mitigate AI data security risks

shield-halved-duotone-light-full Cyber Security
Identify and mitigate AI data security risks.

Units in this learning path:

• Introduction
• Understand AI Security Risks
• Dspm AI Overview
• Configure Dspm AI
• Dspm AI Recommendations
• Review AI Security Reports
• Data Assessments
• Knowledge Check
• Summary

Products: Microsoft Purview, M365

Roles: Auditor, Administrator, Risk Practitioner

Level: Intermediate

Subjects: Information Protection Governance, Security

Duration: 48 minutes

View full course details Cancel

Microsoft

Identify security vulnerabilities in your codebase by using CodeQL

shield-halved-duotone-light-full Cyber Security
Learn how to use CodeQL to analyze the code in your GitHub repository and identify security vulnerabilities.

Units in this learning path:

• 1 Introduction
• 2 How Prepare Database Codeql
• 3 Run Codeql Database
• 4 Understand Results
• 5 Troubleshoot Your Results
• 6 Knowledge Check
• 7 Summary

Products: Github

Roles: Devops Engineer, Administrator, Developer, Student

Level: Intermediate

Subjects: Threat Protection

Duration: 33 minutes

View full course details Cancel

Microsoft

Identify threats with Behavioral Analytics

shield-halved-duotone-light-full Cyber Security
Identify threats with Behavioral Analytics

Units in this learning path:

• Introduction
• Understand User Entity Behavior Analytics
• Explore Entities
• Display Information
• Use Anomaly Detection Analytical Rule Templates
• Knowledge Check
• Summary Resources

Products: Azure, Microsoft Sentinel

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Threat Protection

Duration: 30 minutes

View full course details Cancel

Microsoft

Implement Azure App Configuration

shield-halved-duotone-light-full Cyber Security
Learn how to use Azure App Configuration service to centrally manage and secure your configuration settings, and to manage app features.

Units in this learning path:

• Introduction
• Explore Service
• Create Paired Keys Values
• Manage Application Features
• Secure Data
• Retrieve Configuration Settings
• Knowledge Check
• Summary

Products: Azure App Configuration

Roles: Developer

Level: Intermediate

Subjects: Security

Duration: 36 minutes

View full course details Cancel

Microsoft

Implement Azure Key Vault

shield-halved-duotone-light-full Cyber Security
Implement Azure Key Vault

Units in this learning path:

• Introduction
• Explore
• Discover Best Practices
• Authenticate to
• Exercise Set Retrieve Secret from by Using Azure Cli
• Knowledge Check
• Summary

Products: Azure Key Vault

Roles: Developer

Level: Intermediate

Subjects: Cloud Security

Duration: 48 minutes

View full course details Cancel

Microsoft

Implement Microsoft Purview Data Loss Prevention

shield-halved-duotone-light-full Cyber Security
This module examines how organizations can use Microsoft Purview Data Loss Prevention to help protect sensitive data and define the protective actions that organizations can take when a DLP rule is violated. MS-102

Units in this learning path:

• Introduction
• Plan Data Loss Prevention
• Implement Default Data Loss Prevention Policy
• Design Custom Data Loss Prevention Policy
• Create Custom Data Loss Prevention Policy
• Configure Email Notifications
• Configure Policy Tips
• Knowledge Check
• Summary

Products: M365, Office 365

Roles: Administrator, Solution Architect, Technology Manager

Level: Intermediate

Subjects: Business Applications, Compliance, Identity Access, Insider Risk, It Management Monitoring, Productivity, Security, Threat Protection

Duration: 54 minutes

View full course details Cancel

Microsoft

Implement Microsoft Purview Information Barriers

shield-halved-duotone-light-full Cyber Security
This module examines how Microsoft Purview uses information barriers to restrict communication and collaboration in Microsoft Teams, SharePoint Online, and OneDrive for Business. MS-102

Units in this learning path:

• Introduction
• Explore Information Barriers
• Configure Information Barriers
• Examine Information Barriers Microsoft Teams
• Examine Information Barriers Onedrive
• Examine Information Barriers Sharepoint
• Knowledge Check
• Summary

Products: M365, Office 365

Roles: Administrator, Solution Architect, Technology Manager

Level: Intermediate

Subjects: Business Applications, Compliance, Identity Access, Insider Risk, It Management Monitoring, Productivity, Security, Threat Protection

Duration: 46 minutes

View full course details Cancel

Microsoft

Implement Microsoft Purview Information Protection

shield-halved-duotone-light-full Cyber Security
Organizations need to classify, label, and protect sensitive data to prevent exposure and ensure compliance. Microsoft Purview solutions provide data classification, sensitivity labels, and encryption to secure information across Microsoft 365 and on-premises storage. This learning path aligns with exam SC-401: Microsoft Information Security Administrator.

Modules in this learning path:

• Purview Protect Sensitive Data
• M365 Compliance Information Classify Data
• Purview Review Analyze Data Classification
• Create Manage Sensitive Information Types
• M365 Compliance Information Protect Information
• Apply Manage Sensitivity Labels
• Purview Protect on Premises Data
• Audit Encryption
• Deploy Message Encryption Microsoft 365

Products: Microsoft Purview, M365

Roles: Auditor, Administrator, Ip Admin

Level: Intermediate

Subjects: Security, Information Protection Governance

Duration: 366 minutes

View full course details Cancel

Microsoft

Implement Microsoft Purview Insider Risk Management

shield-halved-duotone-light-full Cyber Security
This module examines how Microsoft Purview Insider Risk Management helps organizations minimize internal risks by enabling them to detect, investigate, and act on malicious and inadvertent activities. MS-102

Units in this learning path:

• Introduction
• Explore Insider Risk Management
• Plan Insider Risk Management
• Explore Insider Risk Management Policies
• Create Insider Risk Management Policies
• Investigate Insider Risk Management Activities Alerts
• Explore Insider Risk Management Cases
• Knowledge Check
• Summary

Products: M365, Office 365

Roles: Administrator, Solution Architect, Technology Manager

Level: Intermediate

Subjects: Business Applications, Compliance, Identity Access, Insider Risk, It Management Monitoring, Productivity, Security, Threat Protection

Duration: 63 minutes

View full course details Cancel

Microsoft

Implement Windows Server IaaS VM Identity

shield-halved-duotone-light-full Cyber Security
After completing this learning path, you’ll know how to implement identity in Azure. You’ll be able to extend an existing on-premises Active Directory identity service into Azure.

Modules in this learning path:

• Implement Hybrid Identity with Windows Server
• Deploy Manage Azure Iaas Active Directory Domain Controllers Azure

Products: Azure, Entra Id, Azure Cloud Shell, Azure Portal, Azure Virtual Machines

Roles: Administrator, Solution Architect, Technology Manager

Level: Intermediate

Subjects: Identity Access, Virtual Machine

Duration: 148 minutes

View full course details Cancel

Viewing 301-312 of 629