565 courses available
Microsoft
Investigate and respond to Microsoft Purview Data Loss Prevention alerts
Cyber SecurityUnits in this learning path:
• Introduction
• Understand Data Loss Prevention Alerts
• Data Loss Prevention Alert Lifecycle
• Configure Data Loss Prevention Alert Generation
• Investigate Alerts Purview
• Investigate Alerts Defender
• Investigate Alerts Security Copilot Agents
• Respond Data Loss Prevention Alerts
• Exercise Investigate Alert
• Knowledge Check
• Summary
Products: M365, Microsoft Purview, Defender Xdr
Roles: Administrator, Risk Practitioner
Level: Intermediate
Subjects: Threat Protection, Security
Duration: 81 minutes
Microsoft
Investigate insider risk alerts and related activity
Cyber SecurityUnits in this learning path:
• Introduction
• Understand Insider Risk Alerts
• Manage Alert Volume
• Investigate Triage Alerts
• Investigate Alerts Security Copilot Agents
• All Risk Factors Tab
• Activity Explorer Tab
• User Activity Tab
• Investigate Alerts Defender
• Insider Risk Cases
• Exercise Investigate Alert
• Knowledge Check
• Summary
Products: Microsoft Purview, M365
Roles: Administrator, Risk Practitioner
Level: Intermediate
Subjects: Information Protection Governance, Security
Duration: 87 minutes
Microsoft
Investigate threats by using audit features in Microsoft Defender XDR and Microsoft Purview Standard
Cyber SecurityUnits in this learning path:
• Introduction
• Explore Microsoft Purview Audit Solutions
• Implement Microsoft Purview Audit
• Exercise Start Recording Audit Log
• Search Audit Log
• Export Configure View Audit Log Records
• Use Audit Log Searches to Investigate Common Support Issues
• Knowledge Check
• Summary Resources
Products: Microsoft Purview, M365, Defender Office365
Roles: Security Operations Analyst
Level: Intermediate
Subjects: Threat Protection, Cloud Security
Duration: 55 minutes
Microsoft
Just Enough Administration in Windows Server
Cyber SecurityUnits in this learning path:
• Introduction
• Explain Concept of Jea
• Define Role Capabilities for Jea Endpoint
• Create Session Configuration File to Register Jea Endpoint
• Describe How Jea Endpoints Work to Limit Access to Powershell Session
• Create Connect to Jea Endpoint
• Demonstration Connect to Jea Endpoint
• Knowledge Check
• Summary
Products: Azure, Windows Server
Roles: Administrator
Level: Intermediate
Subjects: Identity Access
Duration: 44 minutes
Microsoft
Learn how Microsoft safeguards customer data
Cyber SecurityModules in this learning path:
• Audit Governance
• Audit Risk Management
• Audit Architecture
• Audit Incident Management
• Audit Identity Access Management
• Audit Logging Monitoring
• Audit Vulnerability Management
• Audit Resiliency Continuity
• Audit Security Development Operation
• Audit Encryption
• Audit Privacy
• Audit Subprocessor Management
• Audit Physical Security
Products: M365
Roles: Auditor, Privacy Manager, Risk Practitioner
Level: Beginner
Subjects: Security, Compliance, Information Protection Governance
Duration: 355 minutes
Microsoft
Learn how Microsoft supports data discovery, classification, and protection as part of a cybersecurity solution
Cyber SecurityModules in this learning path:
• M365 Compliance Information Governance
• M365 Compliance Information Prevent Data Loss
Products: M365, Azure
Roles: Administrator, Security Operations Analyst, Security Engineer
Level: Beginner
Subjects: Information Protection Governance
Duration: 110 minutes
Microsoft
Learn how Microsoft supports secure software development as part of a cybersecurity solution
Cyber SecurityModules in this learning path:
• Azure Well Architected Security
• Introduction to Github
• Maintain Secure Repository Github
• Create Security Baselines
• Manage Secrets with Azure Key Vault
Products: M365, Azure
Roles: Administrator, Security Operations Analyst, Security Engineer
Level: Beginner
Subjects: Threat Protection
Duration: 300 minutes
Microsoft
Learn how Microsoft supports using multifactor authentication as part of a cybersecurity solution
Cyber SecurityModules in this learning path:
• Secure Aad Users with Mfa
• Audit Identity Access Management
• Implement Manage Hybrid Identity
Products: M365, Azure
Roles: Administrator, Security Operations Analyst, Security Engineer
Level: Beginner
Subjects: Security
Duration: 137 minutes
Microsoft
MD-100 Configure threat protection
Cyber SecurityModules in this learning path:
• Explore Malware Threat Protection
• Explore Microsoft Defender
• Explore Device Encryption Features
• Explore Connection Security Rules
• Explore Advanced Protection Methods
Products: Windows
Roles: Administrator
Level: Beginner
Subjects: Threat Protection
Duration: 102 minutes
Microsoft
MD-100 Troubleshoot the Windows client operating system and apps
Cyber SecurityModules in this learning path:
• Employ File Recovery Windows Client
• Explore Application Troubleshooting
• Troubleshoot Windows Startup
• Troubleshoot Operating System Service Issues
Products: Windows
Roles: Administrator
Level: Beginner
Subjects: Device Management, Threat Protection
Duration: 105 minutes
Microsoft
MD-101 Configure user and device profiles
Cyber SecurityModules in this learning path:
• Implement Device Profiles
• Monitor Device Profiles
• Manage User Profiles
Products: Configuration Manager, Intune, Windows
Roles: Administrator
Level: Intermediate
Subjects: Device Management, Identity Access
Duration: 54 minutes
Microsoft
MD-101 Manage Windows client security
Cyber SecurityModules in this learning path:
• Implement Device Data Protection
• Manage Microsoft Defender Endpoint
• Manage Microsoft Defender Windows Client
Products: Configuration Manager, Intune, Windows
Roles: Administrator
Level: Intermediate
Subjects: Cloud Security, Data Management, Threat Protection
Duration: 71 minutes
Viewing 361-372 of 565