Skip to content
Search

571 courses available

Microsoft

Implement resource management security in Azure

shield-halved-duotone-light-full Cyber Security
Learn how to secure resources using policy, role-based access control, and other Azure services

Modules in this learning path:

• Control and Organize with Resource Manager
• Secure Azure Resources with Rbac

Products: Azure, Azure Clis, Azure Portal, Azure Resource Manager, Azure Blueprints, Azure Policy, Azure Rbac

Roles: Solution Architect, Administrator, Security Engineer

Level: Beginner, Intermediate

Subjects: Security

Duration: 83 minutes

View full course details Cancel

Microsoft

Implement role-based security in finance and operations apps

shield-halved-duotone-light-full Cyber Security
Finance and operations apps use role-based security to assign access to components in the system. A user who is assigned to a security role has access to the set of privileges that is associated with that role.

Units in this learning path:

• 1 Introduction
• 2 Duties Privileges
• 3 Perm Policy
• 4 Xds
• 5 Security
• 6 Exercise
• Entra Id Oauth
• 7 Check
• 8 Summary

Products: Dynamics 365, Dynamics Finance, Dynamics Scm

Roles: Developer, Solution Architect

Level: Intermediate

Subjects: Identity Access

Duration: 75 minutes

View full course details Cancel

Microsoft

Implement secure AI-ready infrastructure with Azure services

shield-halved-duotone-light-full Cyber Security
This course explains how to design secure AI platforms using Microsoft Foundry, applying centralized governance, managed identities, private networking, Azure OpenAI security controls, and container image protection to ensure compliant, production‑ready AI workloads across enterprise environments.

Units in this learning path:

• Introduction
• Understand Microsoft Foundry Security Architecture
• Secure Azure Openai Cognitive Services
• Secure AI Container Images Azure Container
• Exercise Configure Secure AI Infrastructure
• Knowledge Check
• Summary

Products: Azure, Azure Openai, Azure Container Registry, Azure AI Foundry, Azure Machine Learning

Roles: Security Engineer, Administrator, Database Administrator, Data Scientist, Security Operations Analyst

Level: Intermediate

Subjects: Security, Cloud Security, Infrastructure, Information Protection Governance, Artificial Intelligence

Duration: 61 minutes

View full course details Cancel

Microsoft

Implement secure Azure solutions

shield-halved-duotone-light-full Cyber Security
Learn how to more securely deploy apps in Azure by using Azure Key Vault, managed identities, and Azure App Configuration.

Modules in this learning path:

• Implement Azure Key Vault
• Implement Managed Identities
• Implement Azure App Configuration

Products: Azure, Azure App Configuration, Azure Key Vault, Azure Rbac

Roles: Developer

Level: Intermediate

Subjects: Cloud Security

Duration: 107 minutes

View full course details Cancel

Microsoft

Implement security controls for Azure AI-ready infrastructure

shield-halved-duotone-light-full Cyber Security
This module equips you to configure Azure's foundational security controls for AI workloads. You'll start by configuring Microsoft Entra ID security principals that define *who* and *what* can access your AI resources—from data scientists needing interactive workspace access to managed identities enabling secure service-to-service communication.

Units in this learning path:

• Introduction
• Configure Microsoft Entra Id Security Principals
• Implement Azure Governance Scopes AI Resources
• Apply Azure Policy Primary Governance
• Exercise Configure Secure AI Infrastructure
• Knowledge Check
• Summary

Products: Azure, Azure Machine Learning, Azure Machine Learning Studio, Azure Machine Learning Designer, Azure Data Science Vm

Roles: Data Scientist, Database Administrator, Business Owner, Administrator, Developer

Level: Intermediate

Subjects: Security, Cloud Security, Infrastructure, Information Protection Governance, Devops

Duration: 63 minutes

View full course details Cancel

Microsoft

Implement security in Azure Cosmos DB for NoSQL

shield-halved-duotone-light-full Cyber Security
We will learn the different security models that Azure Cosmos DB uses.

Units in this learning path:

• Introduction
• Implement Network Level Access Control
• Review Data Encryption Options
• Use Role Based Access Control Rbac
• Access Account Resources Using Aad
• Understand Always Encrypted
• Exercise Store Account Keys Azure Key Vault
• Knowledge Check
• Summary

Products: Azure Cosmos Db

Roles: Developer

Level: Intermediate

Subjects: Security

Duration: 60 minutes

View full course details Cancel

Microsoft

Implement shared access signatures

shield-halved-duotone-light-full Cyber Security
Implement shared access signatures

Units in this learning path:

• Introduction
• Discover
• Choose When to Use
• Explore Stored Access Policies
• Knowledge Check
• Summary

Products: Azure

Roles: Developer

Level: Intermediate

Subjects: Identity Access

Duration: 18 minutes

View full course details Cancel

Microsoft

Implement user authentication and authorization

shield-halved-duotone-light-full Cyber Security
Learn how to implement authentication and authorization to resources by using the Microsoft identity platform, Microsoft Authentication Library, shared access signatures, and use Microsoft Graph.

Modules in this learning path:

• Explore Microsoft Identity Platform
• Implement Authentication by Using Microsoft Authentication Library
• Implement Shared Access Signatures
• Microsoft Graph

Products: Azure Sdks, Microsoft Identity Web

Roles: Developer

Level: Intermediate

Subjects: Identity Access

Duration: 105 minutes

View full course details Cancel

Amazon Web Services

Implementing SaaS Tenant Isolation with ABAC and AWS IAM

shield-halved-duotone-light-full Cyber Security
This course was developed by members of AWS Technical Field Communities (TFC), an AWS community of technical experts. The content is intended to complement our standard training curriculum and augment your learning journey. This course teaches you…
View full course details Cancel

Amazon Web Services

In-memory Databases Learning Plan

shield-halved-duotone-light-full Cyber Security
A Learning Plan pulls together training content for a particular role or solution, and organizes those assets from foundational to advanced. Use Learning Plans as a starting point to discover training that matters to you. This Learning Plan covers…
View full course details Cancel

Amazon Web Services

In-memory Databases Learning Plan (includes labs)

shield-halved-duotone-light-full Cyber Security
A Learning Plan pulls together training content for a particular role or solution, and organizes those assets from foundational to advanced. Use Learning Plans as a starting point to discover training that matters to you. This Learning Plan covers…
View full course details Cancel

IBM

Incident Response and Systems Forensics

shield-halved-duotone-light-full Cyber Security
This credential earner has the advanced competencies to investigate incident reports through digital forensics. The individual has the technical knowledge and practical skills to apply an appropriate incident response framework given an organization’s need, analyze digital forensics evidence, and explain the preservation of digital forensics evidence. The earner has practiced essential workplace skills and explored cybersecurity career pathways.
View full course details Cancel

Viewing 313-324 of 571