Skip to content
Search

594 courses available

Microsoft

Introduction to Microsoft Defender XDR

shield-halved-duotone-light-full Cyber Security
Understand what Microsoft Defender XDR is and how it can help to improve your security posture by empowering your Security Operations Center (SOC) or security teams with the tools they need to identify, control, and remediate security threats.

Units in this learning path:

• Introduction
• What Microsoft 365 Defender
• Threat Information Sources
• Knowledge Check
• Summary

Products: M365, Defender For Cloud Apps, M365 Security Center, Defender Xdr

Roles: Security Operations Analyst, Security Engineer, Administrator

Level: Beginner

Subjects: Threat Protection

Duration: 20 minutes

View full course details Cancel

Microsoft

Introduction to Microsoft Defender XDR threat protection

shield-halved-duotone-light-full Cyber Security
Introduction to Microsoft 365 threat protection

Units in this learning path:

• Introduction
• Explore Extended Detection Response Use Cases
• Understand Defender Security Operations Center
• Explore Microsoft Security Graph
• Investigate Security Incident Defender
• Knowledge Check
• Summary Resources

Products: Defender For Cloud Apps, Defender Identity, M365, Defender Xdr

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Cloud Security, Security, Threat Protection

Duration: 28 minutes

View full course details Cancel

Microsoft

Introduction to Microsoft Defender for Endpoint

shield-halved-duotone-light-full Cyber Security
Learn about Microsoft Defender for Endpoint and its key capabilities, such as threat and vulnerability management, attack surface reduction, automated investigation and remediation, endpoint detection and response, and more.

Units in this learning path:

• Introduction
• Get Overview
• Access Portal
• Knowledge Check
• Summary

Products: M365, M365 Security Center, Defender Xdr, Defender Endpoint

Roles: Security Operations Analyst, Security Engineer, Administrator

Level: Beginner

Subjects: Security, Threat Protection

Duration: 22 minutes

View full course details Cancel

Microsoft

Introduction to Microsoft Defender for Office 365

shield-halved-duotone-light-full Cyber Security
Understand Microsoft Defender for Office 365 and how you can use it to prevent, detect, investigate, and resolve attacks across all your Office 365 products, including Exchange, Teams, and OneDrive.

Units in this learning path:

• Introduction
• Defender Office 365
• Protection Stack
• Defender Portal
• Knowledge Check
• Summary

Products: M365, Defender Office365

Roles: Security Operations Analyst, Security Engineer, Administrator

Level: Beginner

Subjects: Threat Protection, Cloud Security

Duration: 32 minutes

View full course details Cancel

Microsoft

Introduction to Microsoft Power Platform security and governance

shield-halved-duotone-light-full Cyber Security
Learn how to secure and govern Microsoft Power Platform apps.

Units in this learning path:

• 1 Introduction
• 2 Environments
• 3 Data Loss Prevention
• 4 Center of Excellence Starter Kit
• 5 Exercise
• 6 Check
• 7 Summary

Products: Power Automate, Power Platform, Power Apps

Roles: Administrator, Functional Consultant

Level: Intermediate

Subjects: Information Protection Governance

Duration: 47 minutes

View full course details Cancel

Microsoft

Introduction to Microsoft Sentinel

shield-halved-duotone-light-full Cyber Security
Get familiar with Microsoft Sentinel, a cloud-native, security information and event management (SIEM) service.

Units in this learning path:

• 1 Introduction
• 2 What Is Azure Sentinel
• 3 How Azure Sentinel Works
• 4 When to Use Azure Sentinel
• 5 Knowledge Check
• 6 Summary

Products: Microsoft Defender, Microsoft Sentinel, Azure Log Analytics

Roles: Security Operations Analyst, Security Engineer

Level: Intermediate

Subjects: Cloud Security

Duration: 29 minutes

View full course details Cancel

Microsoft

Introduction to Microsoft security solutions

shield-halved-duotone-light-full Cyber Security
SC-900: Introduction to Microsoft security solutions

Modules in this learning path:

• Security Copilot Getting Started
• Describe Basic Security Capabilities Azure
• Describe Security Management Capabilities of Azure
• Describe Security Capabilities of Azure Sentinel
• Describe Threat Protection with Microsoft 365 Defender

Products: Azure, M365

Roles: Business User, Student

Level: Beginner

Subjects: Security

Duration: 216 minutes

View full course details Cancel

Microsoft

Introduction to Secure DevOps

shield-halved-duotone-light-full Cyber Security
Learn DevSecOps principles to integrate security throughout your development lifecycle. Understand common vulnerabilities like SQL injection, implement continuous security validation in pipelines, conduct threat modeling, and use tools like GitHub CodeQL for automated security analysis.

Units in this learning path:

• Introduction
• Describe SQL Injection Attack
• Understand Devsecops
• Explore Secure Devops Pipeline
• Explore Key Validation Points
• Explore Continuous Security Validation
• Understand Threat Modeling
• Explore Codeql Github
• Knowledge Check
• Summary

Products: Azure, Azure Artifacts, Azure Boards, Azure Cloud Services, Azure Devops, Azure Pipelines, Azure Repos, Azure Test Plans, Github

Roles: Administrator, AI Engineer, Data Engineer, Developer, Devops Engineer, Platform Engineer, Security Engineer, Security Operations Analyst, Service Adoption Specialist, Solution Architect, Startup Founder, Technology Manager

Level: Advanced

Subjects: Devops, Security

Duration: 73 minutes

View full course details Cancel

Microsoft

Introduction to Secure Network Infrastructure with Azure network security

shield-halved-duotone-light-full Cyber Security
Learn to protect your network from cyber security attacks to secure your networking infrastructure.

Modules in this learning path:

• Introduction Azure Firewall
• Intro to Azure Firewall Manager

Products: Azure Firewall, Azure Firewall Manager, Azure Ddos Protection, Azure Virtual Wan, Azure Private Link

Roles: Business User

Level: Beginner

Subjects: Security

Duration: 76 minutes

View full course details Cancel

Microsoft

Introduction to Zero Trust

shield-halved-duotone-light-full Cyber Security
In recent years, the Zero Trust concept has emerged as a go-to security solution for organizations big or small. The Zero Trust approach is a combination of modern technologies and best practices that strengthens the security infrastructure within your organization.

Units in this learning path:

• Introduction
• Zero Trust Security Model
• Zero Trust Security Strategy
• Zero Trust Components
• Knowledge Check
• Summary

Products: M365

Roles: Administrator, Student

Level: Beginner

Subjects: Security

Duration: 16 minutes

View full course details Cancel

Microsoft

Introduction to Zero Trust and best practice frameworks

shield-halved-duotone-light-full Cyber Security
You learn about security best practices and antipatterns, the concept of Zero Trust and its guiding principles, and key best practice frameworks including CAF, WAF, MCRA, and MCSB. You also learn about the Zero Trust adoption framework and how the frameworks relate to each other.

Units in this learning path:

• Introduction
• Introduction Best Practices
• Introduction Zero Trust
• Describe Frameworks
• Zero Trust Initiatives
• Describe How Frameworks Relate
• Knowledge Check
• Summary

Products: Azure, Defender For Cloud

Roles: Security Engineer, Solution Architect

Level: Advanced

Subjects: Security, Cloud Security

Duration: 37 minutes

View full course details Cancel

Microsoft

Introduction to information security and compliance in Microsoft Purview

shield-halved-duotone-light-full Cyber Security
Discover the tools and concepts in Microsoft Purview for managing and protecting sensitive data. Understand how to keep data secure and compliant throughout its lifecycle across different environments.

Units in this learning path:

• Introduction
• Foundations Data Security Compliance
• Know Your Data
• Protect Your Data
• Prevent Data Loss
• Govern Your Data
• Knowledge Check
• Summary

Products: Microsoft Purview, M365, Office 365

Roles: Administrator

Level: Intermediate

Subjects: Information Protection Governance, Threat Protection

Duration: 42 minutes

View full course details Cancel

Viewing 361-372 of 594