Skip to content
Search

565 courses available

Microsoft

Implement and manage data privacy with Microsoft Priva

shield-halved-duotone-light-full Cyber Security
Implement Microsoft Priva to help your organization manage personal data responsibly and meet compliance requirements. Use Privacy Risk Management to identify and mitigate potential risks, and manage subject rights requests to respond accurately and on time. With Microsoft Priva, you can build a structured approach to data privacy that supports compliance and strengthens trust with employees and customers.

Modules in this learning path:

• Priva Understand Microsoft Priva
• Priva Privacy Risk Management
• Priva Subject Rights Requests

Products: Priva, Microsoft Purview, M365

Roles: Auditor, Administrator, Privacy Manager

Level: Intermediate

Subjects: Security, Compliance

Duration: 90 minutes

View full course details Cancel

Microsoft

Implement and manage external identities

shield-halved-duotone-light-full Cyber Security
Inviting external users to use company Azure resources is a great benefit, but you want to do it in a secure way. Explore how to enable secure external collaboration.

Units in this learning path:

• Introduction
• Describe Guess Access Business to Business Accounts
• Collaboration
• Exercise Configure External Collaboration
• Invite External Users Individually Bulk
• Exercise Add Guest Users to Directory
• Exercise Invite Guest Users Bulk
• Demo Invite Guest Users to App
• User Accounts Azure Active Directory
• Manage Extern Users Microsoft 365 Workload
• Exercise Explore Dynamic Groups
• Implement Manager Entra Verified Id
• Configure Identity Providers
• Implement Cross Tenant Access Controls
• Knowledge Check
• Summary Resources

Products: Azure, Entra, Entra Verified Id, Entra External Id

Roles: Administrator, Identity Access Admin, Security Engineer

Level: Advanced

Subjects: Identity Access

Duration: 72 minutes

View full course details Cancel

Microsoft

Implement and manage hybrid identity

shield-halved-duotone-light-full Cyber Security
Creating a hybrid-identity solution to use your on-premises active directory can be challenging. Explore how to implement a secure hybrid-identity solution.

Units in this learning path:

• Introduction
• Plan Design Implement Azure Active Directory Connect
• Password Hash Synchronization
• Pass Through Authentication
• Demo Manage Pass Through Authentication Seamless Single Sign
• Federation
• Trouble Shoot Synchronization Errors
• Implement Azure Active Directory Connect Health
• Manage Azure Active Directory Connect Health
• Knowledge Check
• Summary Resources

Products: Azure, Entra, Entra External Id, Entra Id

Roles: Administrator, Identity Access Admin, Security Engineer

Level: Advanced

Subjects: Identity Access

Duration: 70 minutes

View full course details Cancel

Microsoft

Implement and manage retention with Microsoft Purview

shield-halved-duotone-light-full Cyber Security
Implement and manage retention with Microsoft Purview.

Units in this learning path:

• Introduction
• Retention Overview
• Create Configure Retention Policy
• Create Configure Adaptive Scope
• Exercise Retention Policies
• Create Publish Retention Label
• Apply Retention Labels
• Configure Event Based Retention
• Exercise Retention Labels
• Knowledge Check
• Summary

Products: Microsoft Purview, M365

Roles: Risk Practitioner

Level: Intermediate

Subjects: Information Protection Governance

Duration: 85 minutes

View full course details Cancel

Microsoft

Implement authentication by using the Microsoft Authentication Library

shield-halved-duotone-light-full Cyber Security
Implement authentication by using the Microsoft Authentication Library

Units in this learning path:

• Introduction
• Explore
• Initialize Client Applications
• Exercise Implement Interactive Msal Net
• Knowledge Check
• Summary

Products: Azure Sdks

Roles: Developer

Level: Intermediate

Subjects: Identity Access

Duration: 30 minutes

View full course details Cancel

Microsoft

Implement device data protection

shield-halved-duotone-light-full Cyber Security
This module describes how you can use Intune to create and manage WIP policies that manage this protection. The module also covers implementing BitLocker and Encrypting File System.

Units in this learning path:

• Introduction
• Explore Windows Information Protection
• Plan Windows Information Protection
• Implement Use Windows Information Protection
• Explore Encrypting File System Windows Client
• Explore Bitlocker
• Knowledge Check
• Summary

Products: Mem, Configuration Manager, Intune, Windows

Roles: Administrator

Level: Intermediate

Subjects: Information Protection Governance

Duration: 23 minutes

View full course details Cancel

Microsoft

Implement device profiles

shield-halved-duotone-light-full Cyber Security
Students will learn about the various types of device profiles, and how to create and manage them.

Units in this learning path:

• Introduction
• Explore Intune Device Profiles
• Create Device Profiles
• Create Custom Device Profile
• Knowledge Check
• Summary

Products: Mem, Configuration Manager, Intune, Windows

Roles: Administrator

Level: Intermediate

Subjects: Device Management, Identity Access

Duration: 15 minutes

View full course details Cancel

Microsoft

Implement information protection and data loss prevention by using Microsoft Purview

shield-halved-duotone-light-full Cyber Security
Gain the skills to use Microsoft Purview to improve your data security in Microsoft 365. In this training, you learn how to create sensitive information types, create sensitivity labels, and use auto-labeling policies based on these labels. You also learn how to set up DLP (Data Loss Prevention) policies to safeguard your organization's data. (SC-5003)

Modules in this learning path:

• M365 Compliance Information Governance
• Create Manage Sensitive Information Types
• M365 Compliance Information Protect Information
• M365 Compliance Information Prevent Data Loss
• Purview Exercise Information Protection Data Loss Prevention

Products: Microsoft Purview, Office 365

Roles: Auditor

Level: Intermediate

Subjects: Information Protection Governance

Duration: 295 minutes

View full course details Cancel

Microsoft

Implement initial configuration of Microsoft Entra ID

shield-halved-duotone-light-full Cyber Security
Learn to create an initial Azure Active Directory configuration to ensure all the identity solutions available in Azure are ready to use. This module explores how to build and configure an Azure AD system.

Units in this learning path:

• Introduction
• Configure Company Brand
• Configure Manage Roles
• Exercise Manage Users Roles
• Configure Delegation by Using Administrative Units
• Analyze Azure Ad Role Permissions
• Configure Manage Custom Domains
• Configure Tenant Wide Setting
• Exercise Setting Tenant Wide Properties
• Knowledge Check
• Summary Resources

Products: Azure

Roles: Administrator, Identity Access Admin, Security Engineer

Level: Advanced

Subjects: Identity Access

Duration: 50 minutes

View full course details Cancel

Microsoft

Implement managed identities

shield-halved-duotone-light-full Cyber Security
Implement managed identities

Units in this learning path:

• Introduction
• Explore
• Discover Authentication Flow
• Configure
• Acquire Access Token
• Knowledge Check
• Summary

Products: Azure

Roles: Developer

Level: Intermediate

Subjects: Identity Access

Duration: 23 minutes

View full course details Cancel

Microsoft

Implement network security in Azure

shield-halved-duotone-light-full Cyber Security
Learn how to configure, protect, and isolate your networks in Azure.

Modules in this learning path:

• Configure the Network for Your Virtual Machines
• Secure and Isolate with Nsg and Service Endpoints
• Troubleshoot Azure Network Infrastructure

Products: Azure, Azure Clis, Azure Portal, Azure Application Gateway, Azure Expressroute, Azure Virtual Network, Azure Vpn Gateway

Roles: Solution Architect, Administrator, Security Engineer

Level: Beginner, Intermediate

Subjects: Security

Duration: 199 minutes

View full course details Cancel

Microsoft

Implement privileged access management

shield-halved-duotone-light-full Cyber Security
Privileged access management allows granular access control over privileged admin tasks in Office 365. Privileged access management requires users to request just-in-time access to complete elevated and privileged tasks through a highly scoped and time-bound approval workflow. This configuration gives users just-enough-access to perform the task at hand without risking exposure of sensitive data or critical configuration settings.

Units in this learning path:

• Introduction
• Understand Privileged Access Management
• Configure Privileged Access Management
• Manage Privileged Access Management
• Case Study
• Knowledge Check
• Summary

Products: M365, Office 365

Roles: Administrator

Level: Intermediate

Subjects: Identity Access, Data Management

Duration: 44 minutes

View full course details Cancel

Viewing 301-312 of 565