Skip to content
Search

629 courses available

Amazon Web Services

Innovations in Amazon EC2

shield-halved-duotone-light-full Cyber Security
In this course, you learn about the latest innovations in Amazon Elastic Compute Cloud (Amazon EC2). After learning about the founding of Amazon EC2 and how it has grown, you learn about the broad range of instances available today plus the…
View full course details Cancel

Amazon Web Services

Instance Isolation with Elastic Network Interfaces

shield-halved-duotone-light-full Cyber Security
This is an introductory course on how to isolate your AWS instances with elastic network interfaces. In this course, we discuss an approach to managing the forensics of your system in AWS. We also review how you can manage the isolation of your…
View full course details Cancel

Microsoft

Integrate Microsoft Defender XDR with Microsoft Sentinel

shield-halved-duotone-light-full Cyber Security
In this module, you learn how to integrate Microsoft Defender XDR with Microsoft Sentinel.

Units in this learning path:

• 1 Introduction
• 2 Benefits of Integration
• 3 Capability Differences Between Portals
• 4 Onboarding Sentinel to Defender Xdr
• 5 Exploring Sentinel Features in Defender Xdr
• Simulation Exercise Deploy Sentinel to Defender
• Knowledge Check
• Summary

Products: Microsoft Sentinel, Defender Xdr

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Security, Threat Protection, Cloud Security

Duration: 88 minutes

View full course details Cancel

Microsoft

Interactive case study: Modernizing identity and data security

shield-halved-duotone-light-full Cyber Security
Apply your cybersecurity architect skills on a real business scenario in the area of identity and data security. Analyze design requirements, answer conceptual and technical questions and design a solution to meet the business needs.

Units in this learning path:

• Introduction
• Interactive Case Study
• Interactive Case Study Highlights
• Knowledge Check
• Summary

Products: Entra, Entra Id

Roles: Security Engineer, Solution Architect

Level: Advanced

Subjects: Security, Cloud Security

Duration: 38 minutes

View full course details Cancel

Microsoft

Interactive case study: Modernizing user access control and threat resilience

shield-halved-duotone-light-full Cyber Security
Apply your cybersecurity architect skills on a real business scenario focused on user access control and threat resilience. Analyze design requirements, answer conceptual and technical questions and design a solution to meet the business needs.

Units in this learning path:

• Introduction
• Interactive Case Study
• Interactive Case Study Highlights
• Knowledge Check
• Summary

Products: Entra, Defender For Cloud

Roles: Security Engineer, Solution Architect

Level: Advanced

Subjects: Security, Cloud Security

Duration: 38 minutes

View full course details Cancel

Microsoft

Interactive case study: Securing apps and data

shield-halved-duotone-light-full Cyber Security
Apply your cybersecurity architect skills on a real business scenario in the area of securing apps and data. Analyze design requirements, answer conceptual and technical questions and design a solution to meet the business needs.

Units in this learning path:

• Introduction
• Interactive Case Study
• Interactive Case Study Highlights
• Knowledge Check
• Summary

Products: Defender For Cloud, Azure Arc, Azure Devops, Azure Kubernetes Service, Azure Container Registry, Microsoft Sentinel

Roles: Security Engineer, Solution Architect

Level: Advanced

Subjects: Security, Cloud Security

Duration: 38 minutes

View full course details Cancel

Microsoft

Interactive case study: Securing endpoints and infrastructure

shield-halved-duotone-light-full Cyber Security
Apply your cybersecurity architect skills on a real business scenario in the area of endpoint and infrastructure security. Analyze design requirements, answer conceptual and technical questions and design a solution to meet the business needs.

Units in this learning path:

• Introduction
• Interactive Case Study
• Interactive Case Study Highlights
• Knowledge Check
• Summary

Products: Intune, Defender Xdr, Defender For Iot, Defender For Cloud, Defender Endpoint, Azure Arc

Roles: Security Engineer, Solution Architect

Level: Advanced

Subjects: Security, Cloud Security

Duration: 38 minutes

View full course details Cancel

Microsoft

Intro to Azure Policy

shield-halved-duotone-light-full Cyber Security
This module introduces you to Azure Policy and describes how to use it to meet compliance requirements in your environment.

Units in this learning path:

• Introduction
• What Is Azure Policy
• How Azure Policy Works
• When to Use Azure Policy
• Knowledge Check
• Summary

Products: Azure, Azure Policy

Roles: Developer, Administrator, Solution Architect, Technology Manager

Level: Beginner

Subjects: Cloud Security

Duration: 10 minutes

View full course details Cancel

Microsoft

Introduction to AD DS

shield-halved-duotone-light-full Cyber Security
Introduction to AD DS

Units in this learning path:

• Introduction
• Define
• Define Users Groups Computers
• Define Forests Domains
• Define Ous
• Manage Objects Their Properties
• Knowledge Check
• Summary

Products: Windows Server

Roles: Administrator, Solution Architect, Technology Manager

Level: Intermediate

Subjects: Identity Access

Duration: 65 minutes

View full course details Cancel

Amazon Web Services

Introduction to AWS Identity and Access Management (IAM)

shield-halved-duotone-light-full Cyber Security
In this course, you will be introduced to AWS Identity and Access Management (IAM). The course will highlight how IAM can be used for authentication and authorization to AWS services. Discussions around IAM policies and roles will also be…
View full course details Cancel

Amazon Web Services

Introduction to AWS Identity and Access Management (IAM)

shield-halved-duotone-light-full Cyber Security
This lab shows you how to manage access and permissions to your AWS services using AWS Identity and Access Management (IAM). Practice the steps to add users to groups, manage passwords, log in with IAM-created users, and see the effects of IAM…
View full course details Cancel

Amazon Web Services

Introduction to AWS Key Management Service

shield-halved-duotone-light-full Cyber Security
This lab provides a basic understanding and hands-on experience of AWS Key Management Service. It will demonstrate the basic steps required to get started with Key Management Service, creating keys, assigning management and usage permissions for…
View full course details Cancel

Viewing 361-372 of 629