Skip to content
Search

594 courses available

Microsoft

Implement and manage Microsoft Purview Data Loss Prevention

shield-halved-duotone-light-full Cyber Security
Organizations need to prevent data loss and safeguard sensitive information to meet security and compliance goals. Microsoft Purview provides DLP capabilities to detect and respond to risky activities across cloud and endpoint environments. Learn how to design, configure, and manage DLP policies using Microsoft Purview. This learning path aligns with exam SC-401: Microsoft Information Security Administrator.

Modules in this learning path:

• Purview Data Loss Prevention Understand Plan
• Purview Data Loss Prevention Create Manage Policies
• Purview Implement Endpoint Dlp
• Create Configure Data Loss Prevention Policies
• Purview Data Loss Prevention Alerts

Products: Microsoft Purview

Roles: Auditor, Administrator, Ip Admin

Level: Intermediate

Subjects: Security

Duration: 250 minutes

View full course details Cancel

Microsoft

Implement and manage Microsoft Purview Insider Risk Management

shield-halved-duotone-light-full Cyber Security
Implement Microsoft Purview Insider Risk Management to detect, investigate, and respond to internal risks while protecting data, ensuring compliance, and maintaining employee trust.

Modules in this learning path:

• Purview Explore Insider Risk Management
• Purview Prepare Insider Risk Management
• Purview Create Manage Insider Risk Policy
• Purview Insider Risk Investigate Alerts
• M365 Compliance Irm Adaptive Protection

Products: Microsoft Purview

Roles: Auditor, Administrator, Risk Practitioner

Level: Intermediate

Subjects: Security

Duration: 239 minutes

View full course details Cancel

Microsoft

Implement and manage data privacy with Microsoft Priva

shield-halved-duotone-light-full Cyber Security
Implement Microsoft Priva to help your organization manage personal data responsibly and meet compliance requirements. Use Privacy Risk Management to identify and mitigate potential risks, and manage subject rights requests to respond accurately and on time. With Microsoft Priva, you can build a structured approach to data privacy that supports compliance and strengthens trust with employees and customers.

Modules in this learning path:

• Priva Understand Microsoft Priva
• Priva Privacy Risk Management
• Priva Subject Rights Requests

Products: Priva, Microsoft Purview, M365

Roles: Auditor, Administrator, Privacy Manager

Level: Intermediate

Subjects: Security, Compliance

Duration: 90 minutes

View full course details Cancel

Microsoft

Implement and manage external identities

shield-halved-duotone-light-full Cyber Security
Inviting external users to use company Azure resources is a great benefit, but you want to do it in a secure way. Explore how to enable secure external collaboration.

Units in this learning path:

• Introduction
• Describe Guess Access Business to Business Accounts
• Collaboration
• Exercise Configure External Collaboration
• Invite External Users Individually Bulk
• Exercise Add Guest Users to Directory
• Exercise Invite Guest Users Bulk
• Demo Invite Guest Users to App
• User Accounts Azure Active Directory
• Manage Extern Users Microsoft 365 Workload
• Exercise Explore Dynamic Groups
• Implement Manager Entra Verified Id
• Configure Identity Providers
• Implement Cross Tenant Access Controls
• Knowledge Check
• Summary Resources

Products: Azure, Entra, Entra Verified Id, Entra External Id

Roles: Administrator, Identity Access Admin, Security Engineer

Level: Advanced

Subjects: Identity Access

Duration: 72 minutes

View full course details Cancel

Microsoft

Implement and manage hybrid identity

shield-halved-duotone-light-full Cyber Security
Creating a hybrid-identity solution to use your on-premises active directory can be challenging. Explore how to implement a secure hybrid-identity solution.

Units in this learning path:

• Introduction
• Plan Design Implement Azure Active Directory Connect
• Password Hash Synchronization
• Pass Through Authentication
• Demo Manage Pass Through Authentication Seamless Single Sign
• Federation
• Trouble Shoot Synchronization Errors
• Implement Azure Active Directory Connect Health
• Manage Azure Active Directory Connect Health
• Knowledge Check
• Summary Resources

Products: Azure, Entra, Entra External Id, Entra Id

Roles: Administrator, Identity Access Admin, Security Engineer

Level: Advanced

Subjects: Identity Access

Duration: 70 minutes

View full course details Cancel

Microsoft

Implement and manage retention with Microsoft Purview

shield-halved-duotone-light-full Cyber Security
Implement and manage retention with Microsoft Purview.

Units in this learning path:

• Introduction
• Retention Overview
• Create Configure Retention Policy
• Create Configure Adaptive Scope
• Exercise Retention Policies
• Create Publish Retention Label
• Apply Retention Labels
• Configure Event Based Retention
• Exercise Retention Labels
• Knowledge Check
• Summary

Products: Microsoft Purview, M365

Roles: Risk Practitioner

Level: Intermediate

Subjects: Information Protection Governance

Duration: 85 minutes

View full course details Cancel

Microsoft

Implement authentication by using the Microsoft Authentication Library

shield-halved-duotone-light-full Cyber Security
Implement authentication by using the Microsoft Authentication Library

Units in this learning path:

• Introduction
• Explore
• Initialize Client Applications
• Exercise Implement Interactive Msal Net
• Knowledge Check
• Summary

Products: Azure Sdks

Roles: Developer

Level: Intermediate

Subjects: Identity Access

Duration: 30 minutes

View full course details Cancel

Microsoft

Implement device data protection

shield-halved-duotone-light-full Cyber Security
This module describes how you can use Intune to create and manage WIP policies that manage this protection. The module also covers implementing BitLocker and Encrypting File System.

Units in this learning path:

• Introduction
• Explore Windows Information Protection
• Plan Windows Information Protection
• Implement Use Windows Information Protection
• Explore Encrypting File System Windows Client
• Explore Bitlocker
• Knowledge Check
• Summary

Products: Mem, Configuration Manager, Intune, Windows

Roles: Administrator

Level: Intermediate

Subjects: Information Protection Governance

Duration: 23 minutes

View full course details Cancel

Microsoft

Implement device profiles

shield-halved-duotone-light-full Cyber Security
Students will learn about the various types of device profiles, and how to create and manage them.

Units in this learning path:

• Introduction
• Explore Intune Device Profiles
• Create Device Profiles
• Create Custom Device Profile
• Knowledge Check
• Summary

Products: Mem, Configuration Manager, Intune, Windows

Roles: Administrator

Level: Intermediate

Subjects: Device Management, Identity Access

Duration: 15 minutes

View full course details Cancel

Microsoft

Implement identity-based security for Azure Machine Learning workspaces

shield-halved-duotone-light-full Cyber Security
This course teaches how to govern AI platforms using Microsoft Entra and Azure Machine Learning, covering security groups, Conditional Access, managed identities, enterprise application integration, and audit logging to continuously monitor, enforce, and improve identity‑centric security for AI workloads.

Units in this learning path:

• Introduction
• Configure Microsoft Entra Security Groups
• Implement Conditional Access Policies Azure
• Integrate Enterprise Applications Azure
• Evaluate Security Posture Microsoft Entra
• Exercise Configure Secure Access Azure Machine
• Knowledge Check
• Summary

Products: Azure, Azure Rbac, Azure Policy, Azure Managed Applications, Azure Information Protection

Roles: Administrator, Data Scientist, Data Analyst, Database Administrator, Business Analyst

Level: Intermediate

Subjects: Security, Cloud Security, Information Protection Governance, Identity Access, Data Management

Duration: 73 minutes

View full course details Cancel

Microsoft

Implement information protection and data loss prevention by using Microsoft Purview

shield-halved-duotone-light-full Cyber Security
Gain the skills to use Microsoft Purview to improve your data security in Microsoft 365. In this training, you learn how to create sensitive information types, create sensitivity labels, and use auto-labeling policies based on these labels. You also learn how to set up DLP (Data Loss Prevention) policies to safeguard your organization's data. (SC-5003)

Modules in this learning path:

• M365 Compliance Information Governance
• Create Manage Sensitive Information Types
• M365 Compliance Information Protect Information
• M365 Compliance Information Prevent Data Loss
• Purview Exercise Information Protection Data Loss Prevention

Products: Microsoft Purview, Office 365

Roles: Auditor

Level: Intermediate

Subjects: Information Protection Governance

Duration: 295 minutes

View full course details Cancel

Microsoft

Implement initial configuration of Microsoft Entra ID

shield-halved-duotone-light-full Cyber Security
Learn to create an initial Azure Active Directory configuration to ensure all the identity solutions available in Azure are ready to use. This module explores how to build and configure an Azure AD system.

Units in this learning path:

• Introduction
• Configure Company Brand
• Configure Manage Roles
• Exercise Manage Users Roles
• Configure Delegation by Using Administrative Units
• Analyze Azure Ad Role Permissions
• Configure Manage Custom Domains
• Configure Tenant Wide Setting
• Exercise Setting Tenant Wide Properties
• Knowledge Check
• Summary Resources

Products: Azure

Roles: Administrator, Identity Access Admin, Security Engineer

Level: Advanced

Subjects: Identity Access

Duration: 50 minutes

View full course details Cancel

Viewing 313-324 of 594