Skip to content
Search

565 courses available

Microsoft

Implement resource management security in Azure

shield-halved-duotone-light-full Cyber Security
Learn how to secure resources using policy, role-based access control, and other Azure services

Modules in this learning path:

• Control and Organize with Resource Manager
• Secure Azure Resources with Rbac

Products: Azure, Azure Clis, Azure Portal, Azure Resource Manager, Azure Blueprints, Azure Policy, Azure Rbac

Roles: Solution Architect, Administrator, Security Engineer

Level: Beginner, Intermediate

Subjects: Security

Duration: 83 minutes

View full course details Cancel

Microsoft

Implement role-based security in finance and operations apps

shield-halved-duotone-light-full Cyber Security
Finance and operations apps use role-based security to assign access to components in the system. A user who is assigned to a security role has access to the set of privileges that is associated with that role.

Units in this learning path:

• 1 Introduction
• 2 Duties Privileges
• 3 Perm Policy
• 4 Xds
• 5 Security
• 6 Exercise
• Entra Id Oauth
• 7 Check
• 8 Summary

Products: Dynamics 365, Dynamics Finance, Dynamics Scm

Roles: Developer, Solution Architect

Level: Intermediate

Subjects: Identity Access

Duration: 75 minutes

View full course details Cancel

Microsoft

Implement secure Azure solutions

shield-halved-duotone-light-full Cyber Security
Learn how to more securely deploy apps in Azure by using Azure Key Vault, managed identities, and Azure App Configuration.

Modules in this learning path:

• Implement Azure Key Vault
• Implement Managed Identities
• Implement Azure App Configuration

Products: Azure, Azure App Configuration, Azure Key Vault, Azure Rbac

Roles: Developer

Level: Intermediate

Subjects: Cloud Security

Duration: 107 minutes

View full course details Cancel

Microsoft

Implement security in Azure Cosmos DB for NoSQL

shield-halved-duotone-light-full Cyber Security
We will learn the different security models that Azure Cosmos DB uses.

Units in this learning path:

• Introduction
• Implement Network Level Access Control
• Review Data Encryption Options
• Use Role Based Access Control Rbac
• Access Account Resources Using Aad
• Understand Always Encrypted
• Exercise Store Account Keys Azure Key Vault
• Knowledge Check
• Summary

Products: Azure Cosmos Db

Roles: Developer

Level: Intermediate

Subjects: Security

Duration: 60 minutes

View full course details Cancel

Microsoft

Implement shared access signatures

shield-halved-duotone-light-full Cyber Security
Implement shared access signatures

Units in this learning path:

• Introduction
• Discover
• Choose When to Use
• Explore Stored Access Policies
• Knowledge Check
• Summary

Products: Azure

Roles: Developer

Level: Intermediate

Subjects: Identity Access

Duration: 18 minutes

View full course details Cancel

Microsoft

Implement user authentication and authorization

shield-halved-duotone-light-full Cyber Security
Learn how to implement authentication and authorization to resources by using the Microsoft identity platform, Microsoft Authentication Library, shared access signatures, and use Microsoft Graph.

Modules in this learning path:

• Explore Microsoft Identity Platform
• Implement Authentication by Using Microsoft Authentication Library
• Implement Shared Access Signatures
• Microsoft Graph

Products: Azure Sdks, Microsoft Identity Web

Roles: Developer

Level: Intermediate

Subjects: Identity Access

Duration: 105 minutes

View full course details Cancel

Amazon Web Services

Implementing SaaS Tenant Isolation with ABAC and AWS IAM

shield-halved-duotone-light-full Cyber Security
This course was developed by members of AWS Technical Field Communities (TFC), an AWS community of technical experts. The content is intended to complement our standard training curriculum and augment your learning journey. This course teaches you…
View full course details Cancel

Amazon Web Services

In-memory Databases Learning Plan

shield-halved-duotone-light-full Cyber Security
A Learning Plan pulls together training content for a particular role or solution, and organizes those assets from foundational to advanced. Use Learning Plans as a starting point to discover training that matters to you. This Learning Plan covers…
View full course details Cancel

Amazon Web Services

In-memory Databases Learning Plan (includes labs)

shield-halved-duotone-light-full Cyber Security
A Learning Plan pulls together training content for a particular role or solution, and organizes those assets from foundational to advanced. Use Learning Plans as a starting point to discover training that matters to you. This Learning Plan covers…
View full course details Cancel

IBM

Incident Response and Systems Forensics

shield-halved-duotone-light-full Cyber Security
This credential earner has the advanced competencies to investigate incident reports through digital forensics. The individual has the technical knowledge and practical skills to apply an appropriate incident response framework given an organization’s need, analyze digital forensics evidence, and explain the preservation of digital forensics evidence. The earner has practiced essential workplace skills and explored cybersecurity career pathways.
View full course details Cancel

Amazon Web Services

Infrastructure Security Learning Plan

shield-halved-duotone-light-full Cyber Security
A Learning Plan pulls together training content for a particular role or solution, and organizes those assets from foundational to advanced. Use Learning Plans as a starting point to discover training that matters to you. This collection of…
View full course details Cancel

Amazon Web Services

Infrastructure Security Learning Plan (includes labs)

shield-halved-duotone-light-full Cyber Security
A Learning Plan pulls together training content for a particular role or solution, and organizes those assets from foundational to advanced. Use Learning Plans as a starting point to discover training that matters to you. This collection of…
View full course details Cancel

Viewing 313-324 of 565