Skip to content
Search

629 courses available

Microsoft

Implement Windows Server IaaS VM Security

shield-halved-duotone-light-full Cyber Security
This learning path deals with securing your Azure resources. After completing the learning path, you’ll be able to determine if your Azure IaaS workloads have any security vulnerabilities, and remediate those potential security vulnerabilities.

Modules in this learning path:

• Audit Security of Windows Server Iaas Vms
• Manage Azure Updates
• Configure Bitlocker Disk Encryption for Windows Iaas Vms
• Implement Change Tracking File Integrity Monitoring for Windows Iaas Vms
• Implement Windows Server Iaas Vm Network Security

Products: Azure, Azure Cloud Shell, Azure Monitor, Azure Portal, Azure Virtual Machines

Roles: Administrator, Solution Architect, Technology Manager

Level: Intermediate

Subjects: Security

Duration: 234 minutes

View full course details Cancel

Microsoft

Implement Windows Server IaaS VM network security

shield-halved-duotone-light-full Cyber Security
Implement Windows Server IaaS VM network security

Units in this learning path:

• Introduction
• Groups Windows Iaas Vms
• Azure Firewall Windows Iaas Vms
• Windows Firewall Windows Iaas Vms
• Choose Appropriate Filtering Solution
• Deploy Configure Azure Firewall Using Azure Portal
• Capture Network Traffic with Network Watcher
• Log Network Traffic Using Azure Portal
• Knowledge Check
• Summary

Products: Azure, Azure Cloud Shell, Azure Portal, Azure Virtual Machines

Roles: Administrator, Solution Architect, Technology Manager

Level: Intermediate

Subjects: Cloud Security, Virtual Machine

Duration: 64 minutes

View full course details Cancel

Microsoft

Implement Windows Server hybrid cloud management, monitoring, and security

shield-halved-duotone-light-full Cyber Security
This learning path addresses problems related to managing, monitoring, and securing a hybrid environment. After completing the learning path, you’ll be able to manage and maintain hybrid Azure and on-premises workloads.

Modules in this learning path:

• Manage Hybrid Workloads with Azure Arc
• Monitor Windows Server Iaas Vms Hybrid Instances
• Audit Security of Windows Server Iaas Vms
• Manage Azure Updates

Products: Azure, Azure Cloud Shell, Azure Monitor, Azure Portal

Roles: Administrator, Solution Architect, Technology Manager

Level: Intermediate

Subjects: Security

Duration: 175 minutes

View full course details Cancel

Microsoft

Implement Windows security enhancements with Microsoft Defender for Endpoint

shield-halved-duotone-light-full Cyber Security
Implement Windows security enhancements with Microsoft Defender for Endpoint

Units in this learning path:

• Introduction
• Understand Attack Surface Reduction
• Enable Attack Surface Reduction Rules
• Knowledge Check
• Summary Resources

Products: Defender Xdr, Windows, Defender Endpoint

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Cloud Security, Compliance, Security, Threat Protection

Duration: 31 minutes

View full course details Cancel

IBM

Implement Zero Trust Security

shield-halved-duotone-light-full Cyber Security
This credential earner has the advanced competencies to implement a zero trust security architecture based on insights gathered from a simulated stakeholder interview. The earner has knowledge of modeling a zero trust framework and the practical strategies to enhance organizational security. The earner has developed transferable employability skills and gained real industry experience in a project-based learning opportunity.
View full course details Cancel

Microsoft

Implement a secure environment for a database service

shield-halved-duotone-light-full Cyber Security
Implement a secure environment for a database service

Modules in this learning path:

• Configure Database Authentication Authorization
• Protect Data Transit at Rest
• Implement Compliance Controls for Sensitive Data

Products: Azure, Azure SQL Database, SQL Server

Roles: Data Analyst, Data Engineer, Database Administrator

Level: Intermediate

Subjects: Security

Duration: 238 minutes

View full course details Cancel

Microsoft

Implement access management for Azure resources

shield-halved-duotone-light-full Cyber Security
Explore how to use built-in Azure roles, managed identities, and RBAC-policy to control access to Azure resources. Identity is the key to secure solutions.

Units in this learning path:

• Introduction
• Assign Azure Roles
• Configure Custom Azure Roles
• Create Configure Managed Identities
• Access Managed Identities
• Analyze Azure Role Permissions
• Configure Azure Key Vault Rbac Policies
• Retrieve Objects from Azure Key Vault
• Knowledge Check
• Summary Resources

Products: Azure, Entra, Entra Id

Roles: Administrator, Identity Access Admin, Security Engineer

Level: Advanced

Subjects: Identity Access, Infrastructure, Security

Duration: 30 minutes

View full course details Cancel

Microsoft

Implement access management for apps

shield-halved-duotone-light-full Cyber Security
Implement access management for apps

Modules in this learning path:

• Plan Design Integration of Enterprise Apps for Sso
• Implement Monitor Integration of Enterprise Apps for Sso
• Implement App Registration
• Register Apps Use Microsoft Entra Id

Products: Azure, Entra Id

Roles: Administrator, Security Engineer

Level: Intermediate

Subjects: Identity Access

Duration: 154 minutes

View full course details Cancel

Microsoft

Implement an authentication and access management solution

shield-halved-duotone-light-full Cyber Security
Implement an authentication and access management solution

Modules in this learning path:

• Secure Aad Users with Mfa
• Manage User Authentication
• Plan Implement Administer Conditional Access
• Manage Azure Ad Identity Protection
• Implement Access Management for Azure Resources
• Deploy Configure Microsoft Entra Global Secure Access

Products: Azure, Entra Id

Roles: Administrator, Security Engineer

Level: Intermediate

Subjects: Identity Access

Duration: 293 minutes

View full course details Cancel

Microsoft

Implement an identity management solution using Microsoft Entra ID'

shield-halved-duotone-light-full Cyber Security
Implement an identity management solution using Microsoft Entra ID'

Modules in this learning path:

• Implement Initial Configuration of Azure Active Directory
• Create Configure Manage Identities
• Implement Manage External Identities
• Implement Manage Hybrid Identity

Products: Azure, Entra Id, Entra External Id, Entra, Entra Workload Identities

Roles: Administrator, Identity Access Admin, Security Engineer

Level: Intermediate

Subjects: Identity Access

Duration: 256 minutes

View full course details Cancel

Microsoft

Implement and manage Microsoft 365 retention and recovery

shield-halved-duotone-light-full Cyber Security
Implement and manage Microsoft 365 retention and recovery.

Units in this learning path:

• Introduction
• Plan Retention Disposition
• Create Publish Retention Label
• Auto Apply Retention Label
• Create Configure Adaptive Scope
• Create Configure Retention Policy
• Principles Retention
• Recover Content Microsoft 365 Workloads
• Knowledge Check
• Summary

Products: Microsoft Purview, M365

Roles: Risk Practitioner

Level: Intermediate

Subjects: Information Protection Governance

Duration: 55 minutes

View full course details Cancel

Microsoft

Implement and manage Microsoft 365 retention and recovery

shield-halved-duotone-light-full Cyber Security
Retention helps organizations meet compliance requirements and manage the lifecycle of data in Microsoft 365. This learning path shows how to configure retention labels and policies, apply them with adaptive scopes, and recover deleted content in Microsoft 365 workloads. It aligns with exam SC-401: Microsoft Information Security Administrator.

Modules in this learning path:

• Purview Understand Retention
• Purview Retention Recovery

Products: Microsoft Purview

Roles: Auditor, Administrator, Ip Admin

Level: Intermediate

Subjects: Security

Duration: 79 minutes

View full course details Cancel

Viewing 313-324 of 629