Skip to content
Search

5424 courses available

Microsoft

Manage scheduling options in Dynamics 365 for Field Service

Dispatchers and schedulers need to easily identify and schedule resources to work on jobs. They should be able to identify which scheduling method is best based on the scenario that they're trying to schedule. When scenarios arise that require assistance, dispatchers can use the schedule assistant. The assistant provides recommendations based on requirements that you define for the job. Many times, you need to reschedule items or assign them to a different resource. With Dynamics 365, schedule board dispatchers can easily identify which items need to be rescheduled and either reschedule them or rebook them to a different resource.

Units in this learning path:

• 1 Overview of Scheduling Capabilities
• 2 Schedule Board Overview
• 3 Schedule Reschedule
• 4 Reschedule and Move Items
• 6 Knowledge Check
• 7 Summary

Products: Dynamics 365, Dynamics Field Service

Roles: Functional Consultant

Level: Intermediate

Subjects: Field Management, Frontline Support

Duration: 46 minutes

View full course details Cancel

Microsoft

Manage scoped administration and delegation with Microsoft Intune and Intune for Education

shield-halved-duotone-light-full Cyber Security
Discover how to manage scoped administration and delegation with Microsoft Intune and Intune for Education.

Units in this learning path:

• Introduction
• Implement Rbac
• Scope Tags
• Knowledge Check
• Summary

Products: M365, Intune

Roles: Administrator

Level: Beginner

Subjects: Identity Access, Cloud Computing, Device Management

Duration: 9 minutes

View full course details Cancel

Microsoft

Manage secrets in Java applications - Zero Trust and Zero Secrets

gear-duotone-light-full Software Development
In this module, you learn about managing secrets in your Java applications on Azure. You'll explore best practices like Zero Trust and Zero Secrets, and see how to apply them to a hands-on Java project using Azure Key Vault.

Units in this learning path:

• 1 Introduction
• 2 Secrets Handling Java
• 3 Exercise Code Java Application Secrets
• 4 Introduction Azure Key Vault
• 5 Exercise Secure Java Application Operator
• 6 Exercise Secure Java Application Developer
• 7 Knowledge Check
• 8 Summary

Products: Azure, Azure Spring Apps, Azure Functions, Azure App Service, Azure Key Vault

Roles: Developer, Administrator

Level: Beginner

Subjects: Cloud Computing

Duration: 34 minutes

View full course details Cancel

Microsoft

Manage secrets in your server apps with Azure Key Vault

gear-duotone-light-full Software Development
Learn how to create an Azure Key Vault to store secret values and how to enable secure access to the vault.

Units in this learning path:

• 1 Introduction
• 2 What Is Key Vault
• 3 Creating Vaults Storing Secrets
• 4 Authentication with Managed Identities for Azure Resources
• 5 Access Secrets from Web App
• 6 Configure Deploy Run Azure
• 7 Summary

Products: Azure, Azure Key Vault, Azure App Service

Roles: Developer, Solution Architect

Level: Beginner

Subjects: Cloud Computing

Duration: 46 minutes

View full course details Cancel

Microsoft

Manage secure AI-ready infrastructure

gear-duotone-light-full Software Development
This module shows how to secure AI agents using Azure RBAC and Microsoft Entra ID managed identities, eliminating stored credentials while enforcing least‑privilege access. It then demonstrates deploying Azure Cosmos DB for NoSQL as a scalable, compliant conversation store optimized for agent workloads.

Units in this learning path:

• Introduction
• Configure Azure Rbac Infrastructure Components
• Implement Keyless Authentication Microsoft
• Deploy Azure Cosmos Agent
• Exercise Configure Secure Infrastructure Azure
• Knowledge Check
• Summary

Products: Azure

Roles: Administrator

Level: Intermediate

Subjects: Cloud Computing

Duration: 103 minutes

View full course details Cancel

Microsoft

Manage secure user access in Microsoft 365

This module examines the various features provided in the Microsoft 365 ecosystem for securing user access, such as Conditional Access policies, multifactor authentication, self-service password management, Smart Lockout policies, and security defaults.

Units in this learning path:

• Introduction
• Examine Identity Access Tools
• Manage User Passwords
• Implement Conditional Access Policies
• Enable Pass Through Authentication
• Implement Multi Factor Authentication
• Explore Passwordless Authentication Options
• Explore Self Service Password Management
• Implement Smart Lockout
• Explore Security Defaults Entra Id
• Investigate Authentication Issues
• Knowledge Check
• Summary

Products: M365, Office 365

Roles: Administrator, Solution Architect, Technology Manager

Level: Intermediate

Subjects: Business Applications, Compliance, Identity Access, Insider Risk, It Management Monitoring, Productivity, Security, Threat Protection

Duration: 80 minutes

View full course details Cancel

Microsoft

Manage security controls for identity and access

shield-halved-duotone-light-full Cyber Security
This module focuses on effectively managing security controls in Microsoft Entra ID by securing identities, authentication, and authorization to protect users, groups, and external identities against threats while ensuring secure and seamless access to resources.

Units in this learning path:

• Introduction
• Identity Management Privileged Access
• Microsoft Entra Id Overview
• Secure Microsoft Entra Users
• Create New User
• Secure Microsoft Entra Groups
• Recommend When Use External Identities
• Secure External Microsoft Entra Identities
• Microsoft Entra Identity Protection
• Microsoft Entra Connect
• Microsoft Entra Cloud Sync
• Authentication Options
• Password Hash Synchronization with Microsoft Entra Id
• Microsoft Entra Pass Through Authentication
• Federation with Microsoft Entra Id
• What Microsoft Entra Authentication
• Configure Microsoft Entra Multifactor Authentication Settings
• Kerberos Authentication
• New Technology Local Area Network Manager
• Passwordless Authentication Options
• Passwordless Authentication
• Enforce Premises Microsoft Entra Password Protection
• Microsoft Entra Id Single Sign on
• Configure Microsoft Entra Single Sign on
• Integrate Applications with Microsoft Entra Id
• Microsoft Entra Verified Id
• Configure Microsoft Entra Verified Id
• Microsoft Entra Id Authentication Verification Methods
• Azure Management Groups
• Configure Azure Role Permissions
• Azure Role Based Access Control
• Azure Built in Roles
• Assign Azure Role Permissions
• Microsoft Entra Built in Roles
• Built Roles Microsoft Entra Id
• Microsoft Entra Role Based Access Control
• Create New Custom Roles Microsoft Entra Id
• Zero Trust Security
• Microsoft Entra Privileged Identity Management
• Configure Privileged Identity Management
• Microsoft Entra Id Governance
• Identity Lifecycle Management
• Lifecycle Workflows
• Entitlement Management
• Delegation Roles Entitlement Management
• Access Reviews
• Configure Role Management Access Reviews Microsoft Entra Id Governance
• Conditional Access
• Understand Azure Lighthouse
• Knowledge Check
• Summary

Products: Azure Rbac, Entra, Entra External Id, Entra Id, Entra Id Protection, Entra Permissions Management, Entra Verified Id

Roles: Security Engineer

Level: Intermediate

Subjects: Cloud Security

Duration: 367 minutes

View full course details Cancel

Microsoft

Manage security for Azure Virtual Desktop

shield-halved-duotone-light-full Cyber Security
The Windows client for Azure Virtual Desktop integrates Azure Virtual Desktop on local machines. You’ll learn the critical actions for keeping your users safe.

Units in this learning path:

• Introduction
• Security Recommendations Azure Virtual Desktop
• Configure Microsoft Defender Cloud
• Configure Session Host Protection Microsoft Defender
• Trust Principles Azure Virtual Desktop
• Plan Implement Conditional Access Policies for Connections to Azure Virtual Desk
• Security Posture Management Threat Protection
• Knowledge Check
• Summary

Products: Azure, Azure Virtual Desktop, Azure Virtual Machines

Roles: Administrator, Solution Architect

Level: Intermediate

Subjects: Security

Duration: 41 minutes

View full course details Cancel

Microsoft

Manage security in Active Directory

gear-duotone-light-full Software Development
This module focuses on maintaining security in an Active Directory environment. It covers things from permissions management to authentication methods to identifying problematic accounts.

Units in this learning path:

• Introduction
• Configure User Account Rights
• Configure User Account Rights Restrict Access
• Delegate Permissions
• Protect User Accounts Protected Users Group
• Describe Windows Defender Credential Guard
• Block Windows Ntlm Authentication
• Locate Problematic Accounts
• Knowledge Check
• Summary

Products: Active Directory

Roles: Administrator

Level: Intermediate

Subjects: Architecture, Device Management, Infrastructure

Duration: 43 minutes

View full course details Cancel

Microsoft

Manage security operations in Azure

shield-halved-duotone-light-full Cyber Security
Learn how to configure security policies and manage security alerts with the tools and services in Azure.

Modules in this learning path:

• Create Security Baselines

Products: Azure, Azure Policy, Azure Key Vault, Entra Id, Azure API Management

Roles: Administrator, Security Engineer

Level: Beginner, Intermediate

Subjects: Security

Duration: 60 minutes

View full course details Cancel

Microsoft

Manage security posture by using Microsoft Defender for Cloud

shield-halved-duotone-light-full Cyber Security
This module focuses on equipping administrators with the knowledge and skills needed to manage and enhance the security posture of their cloud environment using Microsoft Defender for Cloud, ensuring proactive identification and remediation of security risks.

Units in this learning path:

• Introduction
• Implement Microsoft Defender for Cloud
• Secure Score
• Regulatory Compliance Dashboard
• Microsoft Cloud Security Benchmark
• Microsoft Defender for Cloud Secure Score
• Connect Hybrid Cloud Multi Cloud Environments
• Microsoft Defender External Attack Surface Management
• Knowledge Check
• Summary

Products: Azure, Defender For Cloud

Roles: Administrator, Security Engineer

Level: Intermediate

Subjects: Cloud Security, Threat Protection

Duration: 65 minutes

View full course details Cancel

Microsoft

Manage semantic models in Power BI

chart-line-duotone-light-full Data Science
Semantic models are the foundation for report development in Power BI. Efficient management ensures data connectivity and improves report performance and accuracy.

Units in this learning path:

• 1 Introduction
• 4 Power Bi Gateway
• 5 Dataset Refresh
• 6 Incremental Refresh
• 7 Manage Datasets
• 9 Query Caching
• 9a Lineage
• 10 Check
• 11 Summary

Products: Power Bi, Power Platform

Roles: Data Analyst

Level: Intermediate

Subjects: Data Management

Duration: 25 minutes

View full course details Cancel

Viewing 3817-3828 of 5424