Skip to content
Search

629 courses available

Microsoft

Implement and manage Microsoft Purview Data Loss Prevention

shield-halved-duotone-light-full Cyber Security
Organizations need to prevent data loss and safeguard sensitive information to meet security and compliance goals. Microsoft Purview provides DLP capabilities to detect and respond to risky activities across cloud and endpoint environments. Learn how to design, configure, and manage DLP policies using Microsoft Purview. This learning path aligns with exam SC-401: Microsoft Information Security Administrator.

Modules in this learning path:

• M365 Compliance Information Prevent Data Loss
• Purview Implement Endpoint Dlp
• Create Configure Data Loss Prevention Policies
• Purview Data Loss Prevention Alerts

Products: Microsoft Purview

Roles: Auditor, Administrator, Ip Admin

Level: Intermediate

Subjects: Security

Duration: 231 minutes

View full course details Cancel

Microsoft

Implement and manage Microsoft Purview Insider Risk Management

shield-halved-duotone-light-full Cyber Security
Implement Microsoft Purview Insider Risk Management to detect, investigate, and respond to internal risks while protecting data, ensuring compliance, and maintaining employee trust.

Modules in this learning path:

• Purview Explore Insider Risk Management
• Purview Prepare Insider Risk Management
• Purview Create Manage Insider Risk Policy
• Purview Insider Risk Investigate Alerts
• M365 Compliance Irm Adaptive Protection

Products: Microsoft Purview

Roles: Auditor, Administrator, Risk Practitioner

Level: Intermediate

Subjects: Security

Duration: 224 minutes

View full course details Cancel

Microsoft

Implement and manage Microsoft Purview Privacy Risk Management

shield-halved-duotone-light-full Cyber Security
Implement and manage Microsoft Purview Privacy Risk Management.

Units in this learning path:

• Introduction
• Understand Privacy Risk Management
• Create Policy from Template
• Create Custom Policy
• Manage Policies
• Investigate Alerts
• Review Reports
• Knowledge Check
• Summary

Products: Priva, Microsoft Purview, Azure, M365

Roles: Auditor, Administrator, Privacy Manager

Level: Intermediate

Subjects: Compliance, Security

Duration: 36 minutes

View full course details Cancel

Microsoft

Implement and manage data privacy with Microsoft Priva

shield-halved-duotone-light-full Cyber Security
Implement Microsoft Priva to help your organization manage personal data responsibly and meet compliance requirements. Use Privacy Risk Management to identify and mitigate potential risks, and manage subject rights requests to respond accurately and on time. With Microsoft Priva, you can build a structured approach to data privacy that supports compliance and strengthens trust with employees and customers.

Modules in this learning path:

• Priva Understand Microsoft Priva
• Priva Privacy Risk Management
• Priva Subject Rights Requests

Products: Priva, Microsoft Purview, M365

Roles: Auditor, Administrator, Privacy Manager

Level: Intermediate

Subjects: Security, Compliance

Duration: 90 minutes

View full course details Cancel

Microsoft

Implement and manage external identities

shield-halved-duotone-light-full Cyber Security
Inviting external users to use company Azure resources is a great benefit, but you want to do it in a secure way. Explore how to enable secure external collaboration.

Units in this learning path:

• Introduction
• Describe Guess Access Business to Business Accounts
• Collaboration
• Exercise Configure External Collaboration
• Invite External Users Individually Bulk
• Exercise Add Guest Users to Directory
• Exercise Invite Guest Users Bulk
• Demo Invite Guest Users to App
• User Accounts Azure Active Directory
• Manage Extern Users Microsoft 365 Workload
• Exercise Explore Dynamic Groups
• Implement Manager Entra Verified Id
• Configure Identity Providers
• Implement Cross Tenant Access Controls
• Knowledge Check
• Summary Resources

Products: Azure, Entra, Entra Verified Id, Entra External Id

Roles: Administrator, Identity Access Admin, Security Engineer

Level: Advanced

Subjects: Identity Access

Duration: 72 minutes

View full course details Cancel

Microsoft

Implement and manage hybrid identity

shield-halved-duotone-light-full Cyber Security
Creating a hybrid-identity solution to use your on-premises active directory can be challenging. Explore how to implement a secure hybrid-identity solution.

Units in this learning path:

• Introduction
• Plan Design Implement Azure Active Directory Connect
• Password Hash Synchronization
• Pass Through Authentication
• Demo Manage Pass Through Authentication Seamless Single Sign
• Federation
• Trouble Shoot Synchronization Errors
• Implement Azure Active Directory Connect Health
• Manage Azure Active Directory Connect Health
• Knowledge Check
• Summary Resources

Products: Azure, Entra, Entra External Id, Entra Id

Roles: Administrator, Identity Access Admin, Security Engineer

Level: Advanced

Subjects: Identity Access

Duration: 70 minutes

View full course details Cancel

Microsoft

Implement and manage retention with Microsoft Purview

shield-halved-duotone-light-full Cyber Security
Implement and manage retention with Microsoft Purview.

Units in this learning path:

• Introduction
• Retention Overview
• Create Configure Retention Policy
• Create Configure Adaptive Scope
• Exercise Retention Policies
• Create Publish Retention Label
• Apply Retention Labels
• Configure Event Based Retention
• Exercise Retention Labels
• Knowledge Check
• Summary

Products: Microsoft Purview, M365

Roles: Risk Practitioner

Level: Intermediate

Subjects: Information Protection Governance

Duration: 85 minutes

View full course details Cancel

Microsoft

Implement app protection by using Microsoft Defender for Cloud Apps

shield-halved-duotone-light-full Cyber Security
This module examines how to implement Microsoft Defender for Cloud Apps, which identifies and combats cyberthreats across all your Microsoft and third-party cloud services. MS-102

Units in this learning path:

• Introduction
• Explore Microsoft Defender Cloud Apps
• Deploy Microsoft Defender Cloud Apps
• Configure File Policies
• Manage Alerts
• Configure Cloud Discovery
• Troubleshoot Cloud Discovery
• Knowledge Check
• Summary

Products: M365, Office 365

Roles: Administrator, Solution Architect, Technology Manager

Level: Intermediate

Subjects: Business Applications, Compliance, Identity Access, Insider Risk, It Management Monitoring, Productivity, Security, Threat Protection

Duration: 44 minutes

View full course details Cancel

Microsoft

Implement authentication by using the Microsoft Authentication Library

shield-halved-duotone-light-full Cyber Security
Implement authentication by using the Microsoft Authentication Library

Units in this learning path:

• Introduction
• Explore
• Initialize Client Applications
• Exercise Implement Interactive Msal Net
• Knowledge Check
• Summary

Products: Azure Sdks

Roles: Developer

Level: Intermediate

Subjects: Identity Access

Duration: 30 minutes

View full course details Cancel

Microsoft

Implement data classification of sensitive information

shield-halved-duotone-light-full Cyber Security
This module introduces you to data classification in Microsoft 365, including how to create and train classifiers, view sensitive data using Content explorer and Activity explorer, and implement Document Fingerprinting.

Units in this learning path:

• Introduction
• Explore Data Classification
• Implement Data Classification
• Explore Trainable Classifiers
• Create Trainable Classifier
• View Data Content Explorer Activity Explorer
• Detect Sensitive Information Use Document Fingerprinting
• Knowledge Check
• Summary

Products: M365, Office 365

Roles: Administrator, Solution Architect, Technology Manager

Level: Intermediate

Subjects: Business Applications, Compliance, Identity Access, Insider Risk, It Management Monitoring, Productivity, Security, Threat Protection

Duration: 52 minutes

View full course details Cancel

Microsoft

Implement device compliance policies

shield-halved-duotone-light-full Cyber Security
This module describes how to use compliance and conditional access policies to help protect access to organizational resources.

Units in this learning path:

• Introduction
• Protect Access Resources Using Intune
• Explore Device Compliance Policy
• Deploy Device Compliance Policy
• Explore Conditional Access
• Create Conditional Access Policies
• Knowledge Check
• Summary

Products: Mem, Configuration Manager, Intune, Windows

Roles: Administrator

Level: Intermediate

Subjects: Compliance, Device Management, Identity Access

Duration: 18 minutes

View full course details Cancel

Microsoft

Implement device data protection

shield-halved-duotone-light-full Cyber Security
This module describes how you can use Intune to create and manage WIP policies that manage this protection. The module also covers implementing BitLocker and Encrypting File System.

Units in this learning path:

• Introduction
• Explore Windows Information Protection
• Plan Windows Information Protection
• Implement Use Windows Information Protection
• Explore Encrypting File System Windows Client
• Explore Bitlocker
• Knowledge Check
• Summary

Products: Mem, Configuration Manager, Intune, Windows

Roles: Administrator

Level: Intermediate

Subjects: Information Protection Governance

Duration: 23 minutes

View full course details Cancel

Viewing 325-336 of 629