Skip to content
Search

629 courses available

Microsoft

Implement device profiles

shield-halved-duotone-light-full Cyber Security
Students will learn about the various types of device profiles, and how to create and manage them.

Units in this learning path:

• Introduction
• Explore Intune Device Profiles
• Create Device Profiles
• Create Custom Device Profile
• Knowledge Check
• Summary

Products: Mem, Configuration Manager, Intune, Windows

Roles: Administrator

Level: Intermediate

Subjects: Device Management, Identity Access

Duration: 15 minutes

View full course details Cancel

Microsoft

Implement directory synchronization tools

shield-halved-duotone-light-full Cyber Security
This module examines the Microsoft Entra Connect Sync and Microsoft Entra Cloud Sync installation requirements, the options for installing and configuring the tools, and how to monitor synchronization services using Microsoft Entra Connect Health.

Units in this learning path:

• Introduction
• Configure Azure Active Directory Connect Prerequisites
• Configure Azure Active Directory Connect
• Monitor Azure Active Directory Connect Health
• Configure Azure Active Directory Connect Cloud Sync Prerequisites
• Configure Azure Active Directory Connect Cloud Sync
• Knowledge Check
• Summary

Products: M365, Office 365

Roles: Administrator, Solution Architect, Technology Manager

Level: Intermediate

Subjects: Business Applications, Compliance, Identity Access, Insider Risk, It Management Monitoring, Productivity, Security, Threat Protection

Duration: 45 minutes

View full course details Cancel

Microsoft

Implement endpoint protection by using Microsoft Defender for Endpoint

shield-halved-duotone-light-full Cyber Security
This module examines how Microsoft Defender for Endpoint helps enterprise networks prevent, detect, investigate, and respond to advanced threats by using endpoint behavioral sensors, cloud security analytics, and threat intelligence. MS-102

Units in this learning path:

• Introduction
• Explore Microsoft Defender Endpoint
• Configure Microsoft Defender Endpoint Intune
• Onboard Devices Microsoft Defender Endpoint
• Manage Endpoint Vulnerabilities
• Manage Device Vulnerability Assessment
• Reduce Threat Exposure
• Knowledge Check
• Summary

Products: M365, Office 365

Roles: Administrator, Solution Architect, Technology Manager

Level: Intermediate

Subjects: Business Applications, Compliance, Identity Access, Insider Risk, It Management Monitoring, Productivity, Security, Threat Protection

Duration: 53 minutes

View full course details Cancel

Microsoft

Implement information protection and data loss prevention by using Microsoft Purview

shield-halved-duotone-light-full Cyber Security
Gain the skills to use Microsoft Purview to improve your data security in Microsoft 365. In this training, you learn how to create sensitive information types, create sensitivity labels, and use auto-labeling policies based on these labels. You also learn how to set up DLP (Data Loss Prevention) policies to safeguard your organization's data. (SC-5003)

Modules in this learning path:

• M365 Compliance Information Governance
• Create Manage Sensitive Information Types
• M365 Compliance Information Protect Information
• M365 Compliance Information Prevent Data Loss
• Purview Exercise Information Protection Data Loss Prevention

Products: Microsoft Purview, Office 365

Roles: Auditor

Level: Intermediate

Subjects: Information Protection Governance

Duration: 295 minutes

View full course details Cancel

Microsoft

Implement initial configuration of Microsoft Entra ID

shield-halved-duotone-light-full Cyber Security
Learn to create an initial Azure Active Directory configuration to ensure all the identity solutions available in Azure are ready to use. This module explores how to build and configure an Azure AD system.

Units in this learning path:

• Introduction
• Configure Company Brand
• Configure Manage Roles
• Exercise Manage Users Roles
• Configure Delegation by Using Administrative Units
• Analyze Azure Ad Role Permissions
• Configure Manage Custom Domains
• Configure Tenant Wide Setting
• Exercise Setting Tenant Wide Properties
• Knowledge Check
• Summary Resources

Products: Azure

Roles: Administrator, Identity Access Admin, Security Engineer

Level: Advanced

Subjects: Identity Access

Duration: 50 minutes

View full course details Cancel

Microsoft

Implement managed identities

shield-halved-duotone-light-full Cyber Security
Implement managed identities

Units in this learning path:

• Introduction
• Explore
• Discover Authentication Flow
• Configure
• Acquire Access Token
• Knowledge Check
• Summary

Products: Azure

Roles: Developer

Level: Intermediate

Subjects: Identity Access

Duration: 23 minutes

View full course details Cancel

Microsoft

Implement network security in Azure

shield-halved-duotone-light-full Cyber Security
Learn how to configure, protect, and isolate your networks in Azure.

Modules in this learning path:

• Configure the Network for Your Virtual Machines
• Secure and Isolate with Nsg and Service Endpoints
• Troubleshoot Azure Network Infrastructure

Products: Azure, Azure Clis, Azure Portal, Azure Application Gateway, Azure Expressroute, Azure Virtual Network, Azure Vpn Gateway

Roles: Solution Architect, Administrator, Security Engineer

Level: Beginner, Intermediate

Subjects: Security

Duration: 199 minutes

View full course details Cancel

Microsoft

Implement privileged access management

shield-halved-duotone-light-full Cyber Security
Privileged access management allows granular access control over privileged admin tasks in Office 365. Privileged access management requires users to request just-in-time access to complete elevated and privileged tasks through a highly scoped and time-bound approval workflow. This configuration gives users just-enough-access to perform the task at hand without risking exposure of sensitive data or critical configuration settings.

Units in this learning path:

• Introduction
• Understand Privileged Access Management
• Configure Privileged Access Management
• Manage Privileged Access Management
• Case Study
• Knowledge Check
• Summary

Products: M365, Office 365

Roles: Administrator

Level: Intermediate

Subjects: Identity Access, Data Management

Duration: 44 minutes

View full course details Cancel

Microsoft

Implement resource management security in Azure

shield-halved-duotone-light-full Cyber Security
Learn how to secure resources using policy, role-based access control, and other Azure services

Modules in this learning path:

• Control and Organize with Resource Manager
• Secure Azure Resources with Rbac

Products: Azure, Azure Clis, Azure Portal, Azure Resource Manager, Azure Blueprints, Azure Policy, Azure Rbac

Roles: Solution Architect, Administrator, Security Engineer

Level: Beginner, Intermediate

Subjects: Security

Duration: 83 minutes

View full course details Cancel

Microsoft

Implement role-based security in finance and operations apps

shield-halved-duotone-light-full Cyber Security
Finance and operations apps use role-based security to assign access to components in the system. A user who is assigned to a security role has access to the set of privileges that is associated with that role.

Units in this learning path:

• 1 Introduction
• 2 Duties Privileges
• 3 Perm Policy
• 4 Xds
• 5 Security
• 6 Exercise
• Entra Id Oauth
• 7 Check
• 8 Summary

Products: Dynamics 365, Dynamics Finance, Dynamics Scm

Roles: Developer, Solution Architect

Level: Intermediate

Subjects: Identity Access

Duration: 75 minutes

View full course details Cancel

Microsoft

Implement secure Azure solutions

shield-halved-duotone-light-full Cyber Security
Learn how to more securely deploy apps in Azure by using Azure Key Vault, managed identities, and Azure App Configuration.

Modules in this learning path:

• Implement Azure Key Vault
• Implement Managed Identities
• Implement Azure App Configuration

Products: Azure, Azure App Configuration, Azure Key Vault, Azure Rbac

Roles: Developer

Level: Intermediate

Subjects: Cloud Security

Duration: 107 minutes

View full course details Cancel

Microsoft

Implement security for Microsoft Teams

shield-halved-duotone-light-full Cyber Security
Learn about different security capabilities for Microsoft Teams, including Conditional Access, multifactor authentication, Safe Attachments, Safe Links, and Defender for Cloud Apps.

Units in this learning path:

• Introduction
• Configure Conditional Access Multifactor Authentication
• Configure Safe Attachments
• Configure Safe Links
• Examine Defender Cloud App
• Monitor Security Reports
• Enhanced Encryption Policies
• Knowledge Check
• Summary

Products: M365, Office Teams

Roles: Administrator

Level: Intermediate

Subjects: Collaboration, Security

Duration: 40 minutes

View full course details Cancel

Viewing 337-348 of 629