Skip to content
Search

629 courses available

Microsoft

Implement security in Azure Cosmos DB for NoSQL

shield-halved-duotone-light-full Cyber Security
We will learn the different security models that Azure Cosmos DB uses.

Units in this learning path:

• Introduction
• Implement Network Level Access Control
• Review Data Encryption Options
• Use Role Based Access Control Rbac
• Access Account Resources Using Aad
• Understand Always Encrypted
• Exercise Store Account Keys Azure Key Vault
• Knowledge Check
• Summary

Products: Azure Cosmos Db

Roles: Developer

Level: Intermediate

Subjects: Security

Duration: 60 minutes

View full course details Cancel

Microsoft

Implement sensitivity labels

shield-halved-duotone-light-full Cyber Security
This module examines the process for implementing sensitivity labels, including applying proper administrative permissions, determining a deployment strategy, creating, configuring, and publishing labels, and removing and deleting labels.

Units in this learning path:

• Introduction
• Plan Deployment Strategy Sensitivity Labels
• Enable Sensitivity Labels Sharepoint Onedrive
• Examine Requirements Sensitivity Label
• Create Sensitivity Labels
• Publish Sensitivity Labels
• Remove Sensitivity Labels
• Knowledge Check
• Summary

Products: M365, Office 365

Roles: Administrator, Solution Architect, Technology Manager

Level: Intermediate

Subjects: Business Applications, Compliance, Identity Access, Insider Risk, It Management Monitoring, Productivity, Security, Threat Protection

Duration: 45 minutes

View full course details Cancel

Microsoft

Implement shared access signatures

shield-halved-duotone-light-full Cyber Security
Implement shared access signatures

Units in this learning path:

• Introduction
• Discover
• Choose When to Use
• Explore Stored Access Policies
• Knowledge Check
• Summary

Products: Azure

Roles: Developer

Level: Intermediate

Subjects: Identity Access

Duration: 18 minutes

View full course details Cancel

Microsoft

Implement threat protection by using Microsoft Defender for Office 365

shield-halved-duotone-light-full Cyber Security
This module examines the Microsoft Defender for Office 365 protection stack and its corresponding threat intelligence features, including Threat Explorer, Threat Trackers, and Attack simulation training. MS-102

Units in this learning path:

• Introduction
• Explore Microsoft Defender Office 365 Protection Stack
• Examine Security Policies Rules Defender Office 365
• Investigate Security Attacks Use Threat Explorer
• Identify Cybersecurity Issues Use Threat Trackers
• Prepare Attack Simulation Training
• Knowledge Check
• Summary

Products: M365, Office 365

Roles: Administrator, Solution Architect, Technology Manager

Level: Intermediate

Subjects: Business Applications, Compliance, Identity Access, Insider Risk, It Management Monitoring, Productivity, Security, Threat Protection

Duration: 35 minutes

View full course details Cancel

Microsoft

Implement user authentication and authorization

shield-halved-duotone-light-full Cyber Security
Learn how to implement authentication and authorization to resources by using the Microsoft identity platform, Microsoft Authentication Library, shared access signatures, and use Microsoft Graph.

Modules in this learning path:

• Explore Microsoft Identity Platform
• Implement Authentication by Using Microsoft Authentication Library
• Implement Shared Access Signatures
• Microsoft Graph

Products: Azure Sdks, Microsoft Identity Web

Roles: Developer

Level: Intermediate

Subjects: Identity Access

Duration: 105 minutes

View full course details Cancel

Amazon Web Services

Implementing SaaS Tenant Isolation with ABAC and AWS IAM

shield-halved-duotone-light-full Cyber Security
This course was developed by members of AWS Technical Field Communities (TFC), an AWS community of technical experts. The content is intended to complement our standard training curriculum and augment your learning journey. This course teaches you…
View full course details Cancel

Microsoft

Improve your reliability with modern operations practices: Incident response

shield-halved-duotone-light-full Cyber Security
Learn the incident response fundamentals necessary to help you sustainably achieve the appropriate level of reliability in your systems, services, and products.

Units in this learning path:

• 1 Introduction
• 2 Importance
• 3 Lifecycle
• 4 Foundations
• 5 Tracking
• 6 Communications
• 7 Remediation
• 8 Summary

Products: Azure

Roles: Administrator, Devops Engineer, Solution Architect, Technology Manager

Level: Beginner

Subjects: Compliance, Threat Protection

Duration: 33 minutes

View full course details Cancel

Amazon Web Services

In-memory Databases Learning Plan

shield-halved-duotone-light-full Cyber Security
A Learning Plan pulls together training content for a particular role or solution, and organizes those assets from foundational to advanced. Use Learning Plans as a starting point to discover training that matters to you. This Learning Plan covers…
View full course details Cancel

Amazon Web Services

In-memory Databases Learning Plan (includes labs)

shield-halved-duotone-light-full Cyber Security
A Learning Plan pulls together training content for a particular role or solution, and organizes those assets from foundational to advanced. Use Learning Plans as a starting point to discover training that matters to you. This Learning Plan covers…
View full course details Cancel

IBM

Incident Response and Systems Forensics

shield-halved-duotone-light-full Cyber Security
This credential earner has the advanced competencies to investigate incident reports through digital forensics. The individual has the technical knowledge and practical skills to apply an appropriate incident response framework given an organization’s need, analyze digital forensics evidence, and explain the preservation of digital forensics evidence. The earner has practiced essential workplace skills and explored cybersecurity career pathways.
View full course details Cancel

Amazon Web Services

Infrastructure Security Learning Plan

shield-halved-duotone-light-full Cyber Security
A Learning Plan pulls together training content for a particular role or solution, and organizes those assets from foundational to advanced. Use Learning Plans as a starting point to discover training that matters to you. This collection of…
View full course details Cancel

Amazon Web Services

Infrastructure Security Learning Plan (includes labs)

shield-halved-duotone-light-full Cyber Security
A Learning Plan pulls together training content for a particular role or solution, and organizes those assets from foundational to advanced. Use Learning Plans as a starting point to discover training that matters to you. This collection of…
View full course details Cancel

Viewing 349-360 of 629