629 courses available
IBM
IBM SkillsBuild Cybersecurity Certificate
Cyber SecurityIBM
IT Security and Compliance
Cyber SecurityMicrosoft
Identify and mitigate AI data security risks
Cyber SecurityUnits in this learning path:
• Introduction
• Understand AI Security Risks
• Dspm AI Overview
• Configure Dspm AI
• Dspm AI Recommendations
• Review AI Security Reports
• Data Assessments
• Knowledge Check
• Summary
Products: Microsoft Purview, M365
Roles: Auditor, Administrator, Risk Practitioner
Level: Intermediate
Subjects: Information Protection Governance, Security
Duration: 48 minutes
Microsoft
Identify security vulnerabilities in your codebase by using CodeQL
Cyber SecurityUnits in this learning path:
• 1 Introduction
• 2 How Prepare Database Codeql
• 3 Run Codeql Database
• 4 Understand Results
• 5 Troubleshoot Your Results
• 6 Knowledge Check
• 7 Summary
Products: Github
Roles: Devops Engineer, Administrator, Developer, Student
Level: Intermediate
Subjects: Threat Protection
Duration: 33 minutes
Microsoft
Identify threats with Behavioral Analytics
Cyber SecurityUnits in this learning path:
• Introduction
• Understand User Entity Behavior Analytics
• Explore Entities
• Display Information
• Use Anomaly Detection Analytical Rule Templates
• Knowledge Check
• Summary Resources
Products: Azure, Microsoft Sentinel
Roles: Security Operations Analyst
Level: Intermediate
Subjects: Threat Protection
Duration: 30 minutes
Microsoft
Implement Azure App Configuration
Cyber SecurityUnits in this learning path:
• Introduction
• Explore Service
• Create Paired Keys Values
• Manage Application Features
• Secure Data
• Retrieve Configuration Settings
• Knowledge Check
• Summary
Products: Azure App Configuration
Roles: Developer
Level: Intermediate
Subjects: Security
Duration: 36 minutes
Microsoft
Implement Azure Key Vault
Cyber SecurityUnits in this learning path:
• Introduction
• Explore
• Discover Best Practices
• Authenticate to
• Exercise Set Retrieve Secret from by Using Azure Cli
• Knowledge Check
• Summary
Products: Azure Key Vault
Roles: Developer
Level: Intermediate
Subjects: Cloud Security
Duration: 48 minutes
Microsoft
Implement Microsoft Purview Data Loss Prevention
Cyber SecurityUnits in this learning path:
• Introduction
• Plan Data Loss Prevention
• Implement Default Data Loss Prevention Policy
• Design Custom Data Loss Prevention Policy
• Create Custom Data Loss Prevention Policy
• Configure Email Notifications
• Configure Policy Tips
• Knowledge Check
• Summary
Products: M365, Office 365
Roles: Administrator, Solution Architect, Technology Manager
Level: Intermediate
Subjects: Business Applications, Compliance, Identity Access, Insider Risk, It Management Monitoring, Productivity, Security, Threat Protection
Duration: 54 minutes
Microsoft
Implement Microsoft Purview Information Barriers
Cyber SecurityUnits in this learning path:
• Introduction
• Explore Information Barriers
• Configure Information Barriers
• Examine Information Barriers Microsoft Teams
• Examine Information Barriers Onedrive
• Examine Information Barriers Sharepoint
• Knowledge Check
• Summary
Products: M365, Office 365
Roles: Administrator, Solution Architect, Technology Manager
Level: Intermediate
Subjects: Business Applications, Compliance, Identity Access, Insider Risk, It Management Monitoring, Productivity, Security, Threat Protection
Duration: 46 minutes
Microsoft
Implement Microsoft Purview Information Protection
Cyber SecurityModules in this learning path:
• Purview Protect Sensitive Data
• M365 Compliance Information Classify Data
• Purview Review Analyze Data Classification
• Create Manage Sensitive Information Types
• M365 Compliance Information Protect Information
• Apply Manage Sensitivity Labels
• Purview Protect on Premises Data
• Audit Encryption
• Deploy Message Encryption Microsoft 365
Products: Microsoft Purview, M365
Roles: Auditor, Administrator, Ip Admin
Level: Intermediate
Subjects: Security, Information Protection Governance
Duration: 366 minutes
Microsoft
Implement Microsoft Purview Insider Risk Management
Cyber SecurityUnits in this learning path:
• Introduction
• Explore Insider Risk Management
• Plan Insider Risk Management
• Explore Insider Risk Management Policies
• Create Insider Risk Management Policies
• Investigate Insider Risk Management Activities Alerts
• Explore Insider Risk Management Cases
• Knowledge Check
• Summary
Products: M365, Office 365
Roles: Administrator, Solution Architect, Technology Manager
Level: Intermediate
Subjects: Business Applications, Compliance, Identity Access, Insider Risk, It Management Monitoring, Productivity, Security, Threat Protection
Duration: 63 minutes
Microsoft
Implement Windows Server IaaS VM Identity
Cyber SecurityModules in this learning path:
• Implement Hybrid Identity with Windows Server
• Deploy Manage Azure Iaas Active Directory Domain Controllers Azure
Products: Azure, Entra Id, Azure Cloud Shell, Azure Portal, Azure Virtual Machines
Roles: Administrator, Solution Architect, Technology Manager
Level: Intermediate
Subjects: Identity Access, Virtual Machine
Duration: 148 minutes
Viewing 301-312 of 629