Skip to content
Search

629 courses available

Microsoft

Introduction to security, compliance, and identity concepts

shield-halved-duotone-light-full Cyber Security
SC-900: Introduction to security, compliance, and identity concepts

Modules in this learning path:

• Describe Security Concepts Methodologies
• Describe Identity Principles Concepts

Products: Entra Id, Azure, M365

Roles: Business User, Student

Level: Beginner

Subjects: Security

Duration: 52 minutes

View full course details Cancel

Microsoft

Introduction to threat modeling

shield-halved-duotone-light-full Cyber Security
Explore the four high-level steps of threat modeling. This engineering technique identifies potential threats early in the development lifecycle.

Units in this learning path:

• 1 Introduction
• 1b Threat Modeling Phases
• 2 Step 1 Design Phase
• 3 Step 2 Break Phase
• 4 Step 3 Fix Phase
• 5 Step 4 Verify Phase
• 6 Summary

Products: Azure, Defender For Cloud, M365 Security Center, Defender For Cloud Apps

Roles: Administrator, Developer, Devops Engineer, Security Engineer, Solution Architect

Level: Beginner

Subjects: Threat Protection

Duration: 27 minutes

View full course details Cancel

Microsoft

Investigate and respond to Microsoft Purview Data Loss Prevention alerts

shield-halved-duotone-light-full Cyber Security
Investigate and Respond to Microsoft Purview Data Loss Prevention Alerts.

Units in this learning path:

• Introduction
• Understand Data Loss Prevention Alerts
• Data Loss Prevention Alert Lifecycle
• Configure Data Loss Prevention Alert Generation
• Investigate Alerts Purview
• Investigate Alerts Defender
• Investigate Alerts Security Copilot Agents
• Respond Data Loss Prevention Alerts
• Exercise Investigate Alert
• Knowledge Check
• Summary

Products: M365, Microsoft Purview, Defender Xdr

Roles: Administrator, Risk Practitioner

Level: Intermediate

Subjects: Threat Protection, Security

Duration: 81 minutes

View full course details Cancel

Microsoft

Investigate insider risk alerts and related activity

shield-halved-duotone-light-full Cyber Security
Investigate Insider Risk Alerts and Related Activity.

Units in this learning path:

• Introduction
• Understand Insider Risk Alerts
• Manage Alert Volume
• Investigate Triage Alerts
• Investigate Alerts Security Copilot Agents
• All Risk Factors Tab
• Activity Explorer Tab
• User Activity Tab
• Investigate Alerts Defender
• Insider Risk Cases
• Exercise Investigate Alert
• Knowledge Check
• Summary

Products: Microsoft Purview, M365

Roles: Administrator, Risk Practitioner

Level: Intermediate

Subjects: Information Protection Governance, Security

Duration: 87 minutes

View full course details Cancel

Microsoft

Investigate threats by using audit features in Microsoft Defender XDR and Microsoft Purview Standard

shield-halved-duotone-light-full Cyber Security
Use the Microsoft Purview Universal Audit Log (UAL) to investigate threats

Units in this learning path:

• Introduction
• Explore Microsoft Purview Audit Solutions
• Implement Microsoft Purview Audit
• Exercise Start Recording Audit Log
• Search Audit Log
• Export Configure View Audit Log Records
• Use Audit Log Searches to Investigate Common Support Issues
• Knowledge Check
• Summary Resources

Products: Microsoft Purview, M365, Defender Office365

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Threat Protection, Cloud Security

Duration: 55 minutes

View full course details Cancel

Microsoft

Just Enough Administration in Windows Server

shield-halved-duotone-light-full Cyber Security
Streamline the administration of your Windows Server environments with Just Enough Administration (JEA). Limit privileged operations to a set of specified PowerShell cmdlets, parameters and variables, and limit which users can connect to JEA endpoints. Constrain the level of privilege those users have when performing administrative tasks.

Units in this learning path:

• Introduction
• Explain Concept of Jea
• Define Role Capabilities for Jea Endpoint
• Create Session Configuration File to Register Jea Endpoint
• Describe How Jea Endpoints Work to Limit Access to Powershell Session
• Create Connect to Jea Endpoint
• Demonstration Connect to Jea Endpoint
• Knowledge Check
• Summary

Products: Azure, Windows Server

Roles: Administrator

Level: Intermediate

Subjects: Identity Access

Duration: 44 minutes

View full course details Cancel

Microsoft

Learn how Microsoft safeguards customer data

shield-halved-duotone-light-full Cyber Security
Learn how Microsoft safeguards customer data is designed for people in audit, compliance, risk, and legal roles who seek an overall understanding of Microsoft 365’s fundamental security and privacy practices to safeguard their customer data.

Modules in this learning path:

• Audit Governance
• Audit Risk Management
• Audit Architecture
• Audit Incident Management
• Audit Identity Access Management
• Audit Logging Monitoring
• Audit Vulnerability Management
• Audit Resiliency Continuity
• Audit Security Development Operation
• Audit Encryption
• Audit Privacy
• Audit Subprocessor Management
• Audit Physical Security

Products: M365

Roles: Auditor, Privacy Manager, Risk Practitioner

Level: Beginner

Subjects: Security, Compliance, Information Protection Governance

Duration: 355 minutes

View full course details Cancel

Microsoft

Learn how Microsoft supports data discovery, classification, and protection as part of a cybersecurity solution

shield-halved-duotone-light-full Cyber Security
Know your data, protect your data, and don't lose your data. These are the basic tenets of good information protection - data discovery, classification, and protection. This learning path provides an overview of the Microsoft data protection capabilities and how to use them to protect and govern data as part of a cybersecurity solution.The deadline for the heads of federal civilian agencies to evaluate and classify agency data and provide to DHS and OMB a report of their evaluation, per Section 8 of the Executive Order on Improving the Nation's Cybersecurity, is **August 24, 2021**.

Modules in this learning path:

• M365 Compliance Information Governance
• M365 Compliance Information Prevent Data Loss

Products: M365, Azure

Roles: Administrator, Security Operations Analyst, Security Engineer

Level: Beginner

Subjects: Information Protection Governance

Duration: 110 minutes

View full course details Cancel

Microsoft

Learn how Microsoft supports secure software development as part of a cybersecurity solution

shield-halved-duotone-light-full Cyber Security
Secure software development means integrating security into each phase of your development lifecycle, from requirements analysis to maintenance. Microsoft provides many services that can help you develop more secure code and deploy a more secure application in the cloud. This learning path provides an overview of the services and offerings available to help you build secure software as part of a cybersecurity solution.The deadline for agencies to comply with NIST/CISA/OMB guidance on security measures for critical software (including applying practices of least privilege, network segmentation, and proper configuration), per section 4 of the Executive Order on Improving the Nation's Cybersecurity, is **August 10, 2021**. The deadline for agencies to comply with the guidance identifying practices that enhance the security of the software supply chain with respect to software procurement, also per section 4, is **March 8, 2022**.

Modules in this learning path:

• Azure Well Architected Security
• Introduction to Github
• Maintain Secure Repository Github
• Create Security Baselines
• Manage Secrets with Azure Key Vault

Products: M365, Azure

Roles: Administrator, Security Operations Analyst, Security Engineer

Level: Beginner

Subjects: Threat Protection

Duration: 300 minutes

View full course details Cancel

Microsoft

Learn how Microsoft supports using multifactor authentication as part of a cybersecurity solution

shield-halved-duotone-light-full Cyber Security
Multifactor authentication helps secure your environment and resources by requiring that your users confirm their identity by using multiple authentication methods, like a phone call, text message, mobile app notification, or one-time password. You can use multifactor authentication both on-premises and in the cloud to add security for accessing Microsoft online services, remote access applications, and more. This learning path provides an overview of how to use multifactor authentication as part of a cybersecurity solution.The deadline for agencies to adopt multifactor authentication and encryption at rest and in transit to the maximum extent (and report on progress every 60 days), per Section 3 of the Executive Order on Improving the Nation's Cybersecurity, is **November 8, 2021**.

Modules in this learning path:

• Secure Aad Users with Mfa
• Audit Identity Access Management
• Implement Manage Hybrid Identity

Products: M365, Azure

Roles: Administrator, Security Operations Analyst, Security Engineer

Level: Beginner

Subjects: Security

Duration: 137 minutes

View full course details Cancel

Microsoft

MD-100 Configure threat protection

shield-halved-duotone-light-full Cyber Security
MD-100 Configure threat protection

Modules in this learning path:

• Explore Malware Threat Protection
• Explore Microsoft Defender
• Explore Device Encryption Features
• Explore Connection Security Rules
• Explore Advanced Protection Methods

Products: Windows

Roles: Administrator

Level: Beginner

Subjects: Threat Protection

Duration: 102 minutes

View full course details Cancel

Microsoft

MD-100 Troubleshoot the Windows client operating system and apps

shield-halved-duotone-light-full Cyber Security
MD-100 Troubleshoot the Windows client operating system and apps

Modules in this learning path:

• Employ File Recovery Windows Client
• Explore Application Troubleshooting
• Troubleshoot Windows Startup
• Troubleshoot Operating System Service Issues

Products: Windows

Roles: Administrator

Level: Beginner

Subjects: Device Management, Threat Protection

Duration: 105 minutes

View full course details Cancel

Viewing 397-408 of 629