Skip to content
Search

594 courses available

Microsoft

Implement managed identities

shield-halved-duotone-light-full Cyber Security
Implement managed identities

Units in this learning path:

• Introduction
• Explore
• Discover Authentication Flow
• Configure
• Acquire Access Token
• Knowledge Check
• Summary

Products: Azure

Roles: Developer

Level: Intermediate

Subjects: Identity Access

Duration: 23 minutes

View full course details Cancel

Microsoft

Implement privileged access management

shield-halved-duotone-light-full Cyber Security
Privileged access management allows granular access control over privileged admin tasks in Office 365. Privileged access management requires users to request just-in-time access to complete elevated and privileged tasks through a highly scoped and time-bound approval workflow. This configuration gives users just-enough-access to perform the task at hand without risking exposure of sensitive data or critical configuration settings.

Units in this learning path:

• Introduction
• Understand Privileged Access Management
• Configure Privileged Access Management
• Manage Privileged Access Management
• Case Study
• Knowledge Check
• Summary

Products: M365, Office 365

Roles: Administrator

Level: Intermediate

Subjects: Identity Access, Data Management

Duration: 44 minutes

View full course details Cancel

Microsoft

Implement resource management security in Azure

shield-halved-duotone-light-full Cyber Security
Learn how to secure resources using policy, role-based access control, and other Azure services

Modules in this learning path:

• Control and Organize with Resource Manager
• Secure Azure Resources with Rbac

Products: Azure, Azure Clis, Azure Portal, Azure Resource Manager, Azure Blueprints, Azure Policy, Azure Rbac

Roles: Solution Architect, Administrator, Security Engineer

Level: Beginner, Intermediate

Subjects: Security

Duration: 83 minutes

View full course details Cancel

Microsoft

Implement role-based security in finance and operations apps

shield-halved-duotone-light-full Cyber Security
Finance and operations apps use role-based security to assign access to components in the system. A user who is assigned to a security role has access to the set of privileges that is associated with that role.

Units in this learning path:

• 1 Introduction
• 2 Duties Privileges
• 3 Perm Policy
• 4 Xds
• 5 Security
• 6 Exercise
• Entra Id Oauth
• 7 Check
• 8 Summary

Products: Dynamics 365, Dynamics Finance, Dynamics Scm

Roles: Developer, Solution Architect

Level: Intermediate

Subjects: Identity Access

Duration: 75 minutes

View full course details Cancel

Microsoft

Implement secure AI-ready infrastructure with Azure services

shield-halved-duotone-light-full Cyber Security
This course explains how to design secure AI platforms using Microsoft Foundry, applying centralized governance, managed identities, private networking, Azure OpenAI security controls, and container image protection to ensure compliant, production‑ready AI workloads across enterprise environments.

Units in this learning path:

• Introduction
• Understand Microsoft Foundry Security Architecture
• Secure Azure Openai Cognitive Services
• Secure AI Container Images Azure Container
• Exercise Configure Secure AI Infrastructure
• Knowledge Check
• Summary

Products: Azure, Azure Openai, Azure Container Registry, Microsoft Foundry, Azure Machine Learning

Roles: Security Engineer, Administrator, Database Administrator, Data Scientist, Security Operations Analyst

Level: Intermediate

Subjects: Security, Cloud Security, Infrastructure, Information Protection Governance, Artificial Intelligence

Duration: 61 minutes

View full course details Cancel

Microsoft

Implement secure Azure solutions

shield-halved-duotone-light-full Cyber Security
Learn how to more securely deploy apps in Azure by using Azure Key Vault, managed identities, and Azure App Configuration.

Modules in this learning path:

• Implement Azure Key Vault
• Implement Managed Identities
• Implement Azure App Configuration

Products: Azure, Azure App Configuration, Azure Key Vault, Azure Rbac

Roles: Developer

Level: Intermediate

Subjects: Cloud Security

Duration: 107 minutes

View full course details Cancel

Microsoft

Implement security controls for Azure AI-ready infrastructure

shield-halved-duotone-light-full Cyber Security
This module equips you to configure Azure's foundational security controls for AI workloads. You'll start by configuring Microsoft Entra ID security principals that define *who* and *what* can access your AI resources—from data scientists needing interactive workspace access to managed identities enabling secure service-to-service communication.

Units in this learning path:

• Introduction
• Configure Microsoft Entra Id Security Principals
• Implement Azure Governance Scopes AI Resources
• Apply Azure Policy Primary Governance
• Exercise Configure Secure AI Infrastructure
• Knowledge Check
• Summary

Products: Azure, Azure Machine Learning, Azure Machine Learning Studio, Azure Machine Learning Designer, Azure Data Science Vm

Roles: Data Scientist, Database Administrator, Business Owner, Administrator, Developer

Level: Intermediate

Subjects: Security, Cloud Security, Infrastructure, Information Protection Governance, Devops

Duration: 63 minutes

View full course details Cancel

Microsoft

Implement security for Azure SQL databases

shield-halved-duotone-light-full Cyber Security
Implement end-to-end security for Azure SQL Database and SQL Managed Instance. Configure Entra ID authentication with managed identity access, deploy private endpoints, and apply encryption and access controls to protect sensitive financial data. Establish compliant audit trails and enable Microsoft Defender for Databases to detect SQL injection, anomalous access, and vulnerability exposures.

Modules in this learning path:

• Configure Azure SQL Platform Security
• Configure Azure SQL Auditing
• Implement Defender Databases

Products: Azure, Azure SQL Database, Azure SQL Managed Instance, Microsoft Defender

Roles: Security Engineer

Level: Intermediate

Subjects: Security, Cloud Security, Databases

Duration: 62 minutes

View full course details Cancel

Microsoft

Implement security in Azure Cosmos DB for NoSQL

shield-halved-duotone-light-full Cyber Security
We will learn the different security models that Azure Cosmos DB uses.

Units in this learning path:

• Introduction
• Implement Network Level Access Control
• Review Data Encryption Options
• Use Role Based Access Control Rbac
• Access Account Resources Using Aad
• Understand Always Encrypted
• Exercise Store Account Keys Azure Key Vault
• Knowledge Check
• Summary

Products: Azure Cosmos Db

Roles: Developer

Level: Intermediate

Subjects: Security

Duration: 60 minutes

View full course details Cancel

Microsoft

Implement shared access signatures

shield-halved-duotone-light-full Cyber Security
Implement shared access signatures

Units in this learning path:

• Introduction
• Discover
• Choose When to Use
• Explore Stored Access Policies
• Knowledge Check
• Summary

Products: Azure

Roles: Developer

Level: Intermediate

Subjects: Identity Access

Duration: 18 minutes

View full course details Cancel

Microsoft

Implement user authentication and authorization

shield-halved-duotone-light-full Cyber Security
Learn how to implement authentication and authorization to resources by using the Microsoft identity platform, Microsoft Authentication Library, shared access signatures, and use Microsoft Graph.

Modules in this learning path:

• Explore Microsoft Identity Platform
• Implement Authentication by Using Microsoft Authentication Library
• Implement Shared Access Signatures
• Microsoft Graph

Products: Azure Sdks, Microsoft Identity Web

Roles: Developer

Level: Intermediate

Subjects: Identity Access

Duration: 105 minutes

View full course details Cancel

Amazon Web Services

Implementing SaaS Tenant Isolation with ABAC and AWS IAM

shield-halved-duotone-light-full Cyber Security
This course was developed by members of AWS Technical Field Communities (TFC), an AWS community of technical experts. The content is intended to complement our standard training curriculum and augment your learning journey. This course teaches you…
View full course details Cancel

Viewing 325-336 of 594