Skip to content
Search

594 courses available

Amazon Web Services

In-memory Databases Learning Plan

shield-halved-duotone-light-full Cyber Security
A Learning Plan pulls together training content for a particular role or solution, and organizes those assets from foundational to advanced. Use Learning Plans as a starting point to discover training that matters to you. This Learning Plan covers…
View full course details Cancel

Amazon Web Services

In-memory Databases Learning Plan (includes labs)

shield-halved-duotone-light-full Cyber Security
A Learning Plan pulls together training content for a particular role or solution, and organizes those assets from foundational to advanced. Use Learning Plans as a starting point to discover training that matters to you. This Learning Plan covers…
View full course details Cancel

IBM

Incident Response and Systems Forensics

shield-halved-duotone-light-full Cyber Security
This credential earner has the advanced competencies to investigate incident reports through digital forensics. The individual has the technical knowledge and practical skills to apply an appropriate incident response framework given an organization’s need, analyze digital forensics evidence, and explain the preservation of digital forensics evidence. The earner has practiced essential workplace skills and explored cybersecurity career pathways.
View full course details Cancel

Amazon Web Services

Infrastructure Security Learning Plan

shield-halved-duotone-light-full Cyber Security
A Learning Plan pulls together training content for a particular role or solution, and organizes those assets from foundational to advanced. Use Learning Plans as a starting point to discover training that matters to you. This collection of…
View full course details Cancel

Amazon Web Services

Infrastructure Security Learning Plan (includes labs)

shield-halved-duotone-light-full Cyber Security
A Learning Plan pulls together training content for a particular role or solution, and organizes those assets from foundational to advanced. Use Learning Plans as a starting point to discover training that matters to you. This collection of…
View full course details Cancel

Amazon Web Services

Innovations in Amazon EC2

shield-halved-duotone-light-full Cyber Security
In this course, you learn about the latest innovations in Amazon Elastic Compute Cloud (Amazon EC2). After learning about the founding of Amazon EC2 and how it has grown, you learn about the broad range of instances available today plus the…
View full course details Cancel

Amazon Web Services

Instance Isolation with Elastic Network Interfaces

shield-halved-duotone-light-full Cyber Security
This is an introductory course on how to isolate your AWS instances with elastic network interfaces. In this course, we discuss an approach to managing the forensics of your system in AWS. We also review how you can manage the isolation of your…
View full course details Cancel

Microsoft

Integrate Microsoft Defender XDR with Microsoft Sentinel

shield-halved-duotone-light-full Cyber Security
In this module, you learn how to integrate Microsoft Defender XDR with Microsoft Sentinel.

Units in this learning path:

• 1 Introduction
• 2 Benefits of Integration
• 3 Capability Differences Between Portals
• 4 Onboarding Sentinel to Defender Xdr
• 5 Exploring Sentinel Features in Defender Xdr
• Simulation Exercise Deploy Sentinel to Defender
• Knowledge Check
• Summary

Products: Microsoft Sentinel, Defender Xdr

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Security, Threat Protection, Cloud Security

Duration: 88 minutes

View full course details Cancel

Microsoft

Interactive case study: Modernizing identity and data security

shield-halved-duotone-light-full Cyber Security
Apply your cybersecurity architect skills on a real business scenario in the area of identity and data security. Analyze design requirements, answer conceptual and technical questions and design a solution to meet the business needs.

Units in this learning path:

• Introduction
• Interactive Case Study
• Interactive Case Study Highlights
• Knowledge Check
• Summary

Products: Entra, Entra Id

Roles: Security Engineer, Solution Architect

Level: Advanced

Subjects: Security, Cloud Security

Duration: 38 minutes

View full course details Cancel

Microsoft

Interactive case study: Modernizing user access control and threat resilience

shield-halved-duotone-light-full Cyber Security
Apply your cybersecurity architect skills on a real business scenario focused on user access control and threat resilience. Analyze design requirements, answer conceptual and technical questions and design a solution to meet the business needs.

Units in this learning path:

• Introduction
• Interactive Case Study
• Interactive Case Study Highlights
• Knowledge Check
• Summary

Products: Entra, Defender For Cloud

Roles: Security Engineer, Solution Architect

Level: Advanced

Subjects: Security, Cloud Security

Duration: 38 minutes

View full course details Cancel

Microsoft

Interactive case study: Securing apps and data

shield-halved-duotone-light-full Cyber Security
Apply your cybersecurity architect skills on a real business scenario in the area of securing apps and data. Analyze design requirements, answer conceptual and technical questions and design a solution to meet the business needs.

Units in this learning path:

• Introduction
• Interactive Case Study
• Interactive Case Study Highlights
• Knowledge Check
• Summary

Products: Defender For Cloud, Azure Arc, Azure Devops, Azure Kubernetes Service, Azure Container Registry, Microsoft Sentinel

Roles: Security Engineer, Solution Architect

Level: Advanced

Subjects: Security, Cloud Security

Duration: 38 minutes

View full course details Cancel

Microsoft

Interactive case study: Securing endpoints and infrastructure

shield-halved-duotone-light-full Cyber Security
Apply your cybersecurity architect skills on a real business scenario in the area of endpoint and infrastructure security. Analyze design requirements, answer conceptual and technical questions and design a solution to meet the business needs.

Units in this learning path:

• Introduction
• Interactive Case Study
• Interactive Case Study Highlights
• Knowledge Check
• Summary

Products: Intune, Defender Xdr, Defender For Iot, Defender For Cloud, Defender Endpoint, Azure Arc

Roles: Security Engineer, Solution Architect

Level: Advanced

Subjects: Security, Cloud Security

Duration: 38 minutes

View full course details Cancel

Viewing 337-348 of 594