Skip to content
Search

5424 courses available

Microsoft

Manage Microsoft Defender for Endpoint

This module explores using Microsoft Defender for Endpoint to provide additional protection and monitor devices against threats.

Units in this learning path:

• Introduction
• Explore
• Examine Key Capabilities of
• Explore Windows Defender Application Control Device Guard
• Explore Application Guard
• Examine Windows Defender Exploit Guard
• Explore Windows Defender System Guard
• Knowledge Check
• Summary

Products: Windows, Configuration Manager, Intune

Roles: Administrator

Level: Intermediate

Duration: 37 minutes

View full course details Cancel

Microsoft

Manage Microsoft Defender for Endpoint

This module explores using Microsoft Defender for Endpoint to provide additional protection and monitor devices against threats.

Units in this learning path:

• Introduction
• Explore Microsoft Defender Endpoint
• Examine Key Capabilities Microsoft Defender Endpoint
• Explore Windows Defender Application Control Device Guard
• Explore Microsoft Defender Application Guard
• Examine Windows Defender Exploit Guard
• Explore Windows Defender System Guard
• Knowledge Check
• Summary

Products: Mem, Configuration Manager, Intune, Windows

Roles: Administrator

Level: Intermediate

Subjects: Business Applications

Duration: 25 minutes

View full course details Cancel

Microsoft

Manage Microsoft Defender in Windows client

This module explains the built-in security features of Windows clients and how to implement them using policies.

Units in this learning path:

• Introduction
• Explore Windows Security Center
• Explore Windows Defender Credential Guard
• Antivirus
• Manage Windows Defender Firewall
• Explore Windows Defender Firewall Advanced Security
• Knowledge Check
• Summary

Products: Windows, Configuration Manager, Intune

Roles: Administrator

Level: Intermediate

Duration: 42 minutes

View full course details Cancel

Microsoft

Manage Microsoft Defender in Windows client

shield-halved-duotone-light-full Cyber Security
This module explains the built-in security features of Windows clients and how to implement them using policies.

Units in this learning path:

• Introduction
• Explore Windows Security Center
• Explore Windows Defender Credential Guard
• Manage Microsoft Defender Antivirus
• Manage Windows Defender Firewall
• Explore Windows Defender Firewall Advanced Security
• Knowledge Check
• Summary

Products: Mem, Configuration Manager, Intune, Windows

Roles: Administrator

Level: Intermediate

Subjects: Cloud Security, Networking, Threat Protection

Duration: 23 minutes

View full course details Cancel

Microsoft

Manage Microsoft Edge updates and servicing

Manage Microsoft Edge updates and servicing

Units in this learning path:

• Introduction
• Manage Automatic Methods for Microsoft Edge
• Control Build Levels Targeted Versions of Through Group Policy
• Configure Side by Side Installations of
• Knowledge Check
• Summary Resources

Products: M365, Office 365, Microsoft Edge, Internet Explorer

Roles: Administrator

Level: Intermediate

Duration: 16 minutes

View full course details Cancel

Microsoft

Manage Microsoft Entra Identity Protection

shield-halved-duotone-light-full Cyber Security
Protecting a user's identity by monitoring their usage and sign-in patterns will ensure a secure cloud solution. Explore how to design and implement Microsoft Entra Identity protection.

Units in this learning path:

• Introduction
• Review Identity Protection Basics
• Implement Manage User Risk Policy
• Enable Sign in Risk Policy
• Implement Manage Sign Risk Policies
• Monitor Investigate Remediate Elevated Risky Users
• Implement Security Workload Identities
• Explore Microsoft Defender Identity
• Identity Risk Management Agent
• Knowledge Check
• Summary Resources

Products: Azure, Entra, Entra Id, Entra Id Protection

Roles: Administrator, Identity Access Admin, Security Engineer

Level: Advanced

Subjects: Identity Access

Duration: 55 minutes

View full course details Cancel

Microsoft

Manage Microsoft Entra application access

shield-halved-duotone-light-full Cyber Security
This module focuses on effectively managing identities and enhancing security in Microsoft Enterprise Identity, ensuring that users, groups, and external identities are protected against security threats and unauthorized access.

Units in this learning path:

• Introduction
• Manage Access Application
• Manage Application Registrations Microsoft Entra Id
• Configure Application Expose Web API
• Permissions Consent
• Application Service Principal Objects Microsoft Entra Id
• Managed Identities
• Configure Authentication Azure Ad Application Proxy
• Knowledge Check
• Summary

Products: Azure, Entra Id

Roles: Administrator, Security Engineer

Level: Intermediate

Subjects: Cloud Security

Duration: 65 minutes

View full course details Cancel

Microsoft

Manage Microsoft Entra identities

This module enables you to handle Microsoft Entra ID tasks, including RBAC, user/group management, PowerShell cmdlets, and AD DS object synchronization. You'll effectively utilize and manage Microsoft Entra ID in your organization after completing this module.

Units in this learning path:

• Introduction
• Examine Role Based Access Control User Roles Azure Active Directory
• Create Manage Users Azure Active Directory
• Create Manage Groups Azure Active Directory
• Manage Azure Active Directory Objects Powershell
• Synchronize Objects Active Directory Domain Services
• Knowledge Check
• Summary

Products: Azure Powershell, Mem, Active Directory

Roles: Administrator, Identity Access Admin, Support Engineer

Level: Intermediate

Duration: 29 minutes

View full course details Cancel

Microsoft

Manage Microsoft Power Platform deployments

gear-duotone-light-full Software Development
Learn about managing Microsoft Power Platform deployments

Units in this learning path:

• 1 Explore Power Platform Concepts
• Strategy Vision
• 3 Planning the Deployment
• Secure Deployments
• 6 Determine Storage
• 8 Manage Authentication
• Data Sources
• 10 Knowledge Check
• 11 Summary

Products: Power Apps, Power Platform

Roles: Administrator, Business User, Maker, Functional Consultant

Level: Intermediate

Subjects: Custom App Development

Duration: 54 minutes

View full course details Cancel

Microsoft

Manage Microsoft Priva Subject Rights Requests

Manage Microsoft Priva Subject Rights Requests.

Units in this learning path:

• Introduction
• Subject Rights Requests Overview
• Create Subject Rights Request M365
• Review Subject Rights Request Data
• Subject Rights Request Reports
• Knowledge Check
• Summary

Products: Priva, Microsoft Purview, M365

Roles: Auditor, Administrator, Privacy Manager

Level: Intermediate

Subjects: Compliance, Security

Duration: 28 minutes

View full course details Cancel

Microsoft

Manage Microsoft Purview Audit (Premium)

gear-duotone-light-full Software Development
Manage Microsoft Purview Audit (Premium)

Units in this learning path:

• Introduction
• Explore Microsoft Purview Audit Premium
• Implement Microsoft Purview Audit Premium
• Manage Audit Log Retention Policies
• Investigate Compromised Email Accounts
• Knowledge Check
• Summary

Products: M365, Office 365

Roles: Administrator, Security Engineer, Solution Architect, Technology Manager

Level: Intermediate

Subjects: Cloud Computing, Cloud Security, Collaboration, Communication, Compliance, Information Protection Governance, Security, Threat Protection

Duration: 40 minutes

View full course details Cancel

Microsoft

Manage Microsoft Purview Audit (Standard)

gear-duotone-light-full Software Development
Manage Microsoft Purview Audit (Standard)

Units in this learning path:

• Introduction
• Explore Microsoft Purview Audit Solutions
• Implement Microsoft Purview Audit Standard
• Search Audit Log
• Export Configure View Audit Log Records
• Use Audit Log Searching Investigate Common Support Issues
• Knowledge Check
• Summary

Products: M365, Office 365

Roles: Administrator, Security Engineer, Solution Architect, Technology Manager

Level: Intermediate

Subjects: Cloud Computing, Cloud Security, Collaboration, Communication, Compliance, Information Protection Governance, Security, Threat Protection

Duration: 45 minutes

View full course details Cancel

Viewing 3673-3684 of 5424