Skip to content
Search

594 courses available

Microsoft

Manage permissions and administration for Dataverse

shield-halved-duotone-light-full Cyber Security
Do you need to manage user access rights? In this learning path, you will learn how to manage permissions associated with environments and entities. You will also learn about different administrative portals and how to access each.

Modules in this learning path:

• Get Started Security Concepts
• Get Started Security Roles
• Use Admin Options Cds

Products: Dynamics 365, Power Platform, Dataverse, Power Apps

Roles: Functional Consultant

Level: Intermediate

Subjects: Identity Access

Duration: 159 minutes

View full course details Cancel

Microsoft

Manage plugins and agents in Microsoft Security Copilot

shield-halved-duotone-light-full Cyber Security
Learn how to configure plugin governance settings and manage the Security Copilot agent lifecycle, from discovering agents in the agent library and Security Store through to day-to-day agent operations.

Units in this learning path:

• Introduction
• Configure Plug in Settings
• Discover Set Up Microsoft Agents
• Acquire Configure Partner Agents
• Manage Agents
• Knowledge Check
• Summary

Products: Security Copilot

Roles: Security Engineer

Level: Intermediate

Subjects: Security, Cloud Security

Duration: 24 minutes

View full course details Cancel

Microsoft

Manage records and disposition with Microsoft Purview

shield-halved-duotone-light-full Cyber Security
Manage records and disposition with Microsoft Purview.

Units in this learning path:

• Introduction
• Plan Retention Disposition
• Retention Label File Plan
• Auto Apply Retention Label
• Exercise Create Auto Apply
• Declare Record
• Disposition Review
• Exercise Disposition Review
• Principles Retention
• Knowledge Check
• Summary

Products: Microsoft Purview, M365

Roles: Risk Practitioner

Level: Intermediate

Subjects: Information Protection Governance

Duration: 73 minutes

View full course details Cancel

Microsoft

Manage scoped administration and delegation with Microsoft Intune and Intune for Education

shield-halved-duotone-light-full Cyber Security
Discover how to manage scoped administration and delegation with Microsoft Intune and Intune for Education.

Units in this learning path:

• Introduction
• Implement Rbac
• Scope Tags
• Knowledge Check
• Summary

Products: M365, Intune

Roles: Administrator

Level: Beginner

Subjects: Identity Access, Cloud Computing, Device Management

Duration: 9 minutes

View full course details Cancel

Microsoft

Manage security controls for identity and access

shield-halved-duotone-light-full Cyber Security
This module focuses on effectively managing security controls in Microsoft Entra ID by securing identities, authentication, and authorization to protect users, groups, and external identities against threats while ensuring secure and seamless access to resources.

Units in this learning path:

• Introduction
• Identity Management Privileged Access
• Microsoft Entra Id Overview
• Secure Microsoft Entra Users
• Create New User
• Secure Microsoft Entra Groups
• Recommend When Use External Identities
• Secure External Microsoft Entra Identities
• Microsoft Entra Identity Protection
• Microsoft Entra Connect
• Microsoft Entra Cloud Sync
• Authentication Options
• Password Hash Synchronization with Microsoft Entra Id
• Microsoft Entra Pass Through Authentication
• Federation with Microsoft Entra Id
• What Microsoft Entra Authentication
• Configure Microsoft Entra Multifactor Authentication Settings
• Kerberos Authentication
• New Technology Local Area Network Manager
• Passwordless Authentication Options
• Passwordless Authentication
• Enforce Premises Microsoft Entra Password Protection
• Microsoft Entra Id Single Sign on
• Configure Microsoft Entra Single Sign on
• Integrate Applications with Microsoft Entra Id
• Microsoft Entra Verified Id
• Configure Microsoft Entra Verified Id
• Microsoft Entra Id Authentication Verification Methods
• Azure Management Groups
• Configure Azure Role Permissions
• Azure Role Based Access Control
• Azure Built in Roles
• Assign Azure Role Permissions
• Microsoft Entra Built in Roles
• Built Roles Microsoft Entra Id
• Microsoft Entra Role Based Access Control
• Create New Custom Roles Microsoft Entra Id
• Zero Trust Security
• Microsoft Entra Privileged Identity Management
• Configure Privileged Identity Management
• Microsoft Entra Id Governance
• Identity Lifecycle Management
• Lifecycle Workflows
• Entitlement Management
• Delegation Roles Entitlement Management
• Access Reviews
• Configure Role Management Access Reviews Microsoft Entra Id Governance
• Conditional Access
• Understand Azure Lighthouse
• Knowledge Check
• Summary

Products: Azure Rbac, Entra, Entra External Id, Entra Id, Entra Id Protection, Entra Permissions Management, Entra Verified Id

Roles: Security Engineer

Level: Intermediate

Subjects: Cloud Security

Duration: 367 minutes

View full course details Cancel

Microsoft

Manage security for Azure Virtual Desktop

shield-halved-duotone-light-full Cyber Security
The Windows client for Azure Virtual Desktop integrates Azure Virtual Desktop on local machines. You’ll learn the critical actions for keeping your users safe.

Units in this learning path:

• Introduction
• Security Recommendations Azure Virtual Desktop
• Configure Microsoft Defender Cloud
• Configure Session Host Protection Microsoft Defender
• Trust Principles Azure Virtual Desktop
• Plan Implement Conditional Access Policies for Connections to Azure Virtual Desk
• Security Posture Management Threat Protection
• Knowledge Check
• Summary

Products: Azure, Azure Virtual Desktop, Azure Virtual Machines

Roles: Administrator, Solution Architect

Level: Intermediate

Subjects: Security

Duration: 41 minutes

View full course details Cancel

Microsoft

Manage security posture by using Microsoft Defender for Cloud

shield-halved-duotone-light-full Cyber Security
Learn to manage cloud security posture using Microsoft Defender for Cloud. You connect hybrid and multicloud environments, identify risks, and assess compliance—then protect your workloads with threat detection and vulnerability management.

Modules in this learning path:

• Connect Hybrid Multicloud Environments Defender
• Identify Security Risks Posture Management
• Discover External Assets Vulnerabilities
• Evaluate Regulatory Compliance
• Enable Configure Workload Protection Plans
• Configure Defender Vulnerability Management

Products: Azure, Defender For Cloud

Roles: Administrator, Security Engineer

Level: Intermediate

Subjects: Security, Cloud Security, Compliance

Duration: 213 minutes

View full course details Cancel

Microsoft

Manage security posture by using Microsoft Defender for Cloud

shield-halved-duotone-light-full Cyber Security
This module focuses on equipping administrators with the knowledge and skills needed to manage and enhance the security posture of their cloud environment using Microsoft Defender for Cloud, ensuring proactive identification and remediation of security risks.

Units in this learning path:

• Introduction
• Implement Microsoft Defender for Cloud
• Secure Score
• Regulatory Compliance Dashboard
• Microsoft Cloud Security Benchmark
• Microsoft Defender for Cloud Secure Score
• Connect Hybrid Cloud Multi Cloud Environments
• Microsoft Defender External Attack Surface Management
• Knowledge Check
• Summary

Products: Azure, Defender For Cloud

Roles: Administrator, Security Engineer

Level: Intermediate

Subjects: Cloud Security, Threat Protection

Duration: 65 minutes

View full course details Cancel

Microsoft

Manage sensitive data and security policies within GitHub

shield-halved-duotone-light-full Cyber Security
Familiarize yourself with GitHub's basic security tools, which prepare repositories for secure development and industry-standard response to threats.

Units in this learning path:

• Introduction
• Set Security Policies
• Scrub Sensitive Data from Repository
• Report Logs
• Exercise
• Knowledge Check
• Summary

Products: Github

Roles: Devops Engineer, Administrator, Developer, Solution Architect

Level: Intermediate

Subjects: Information Protection Governance

Duration: 96 minutes

View full course details Cancel

Microsoft

Manage user authentication

shield-halved-duotone-light-full Cyber Security
There are multiple options for authentication in Azure AD. Learn how to implement and manage the right authentications for users based on business needs.

Units in this learning path:

• Introduction
• Administer Fido2 Passwordless Authentication Methods
• Explore Authenticator App Oath Token
• Implement Authentication Solution Based Windows Hello for Business
• Exercise Configure Deploy Self Service Password Reset
• Deploy Manage Password Protection
• Configure Smart Lockout Thresholds
• Exercise Manage Azure Ad Smart Lockout Values
• Implement Kerberos Certificate Based Authentication Azure Ad
• Configure Azure Ad User Authentication Virtual Machines
• Knowledge Check
• Summary Resources

Products: Azure, Entra, Entra Id

Roles: Administrator, Identity Access Admin, Security Engineer

Level: Advanced

Subjects: Identity Access

Duration: 52 minutes

View full course details Cancel

Microsoft

Manage user profiles

shield-halved-duotone-light-full Cyber Security
Students learn about the benefits of various Windows user profiles, how to manage them, and how to facilitate profile data synchronization across multiple devices.

Units in this learning path:

• Introduction
• Examine User Profile
• Explore User Profile Types
• Examine Options Minimizing User Profile Size
• Deploy Configure Folder Redirection
• Sync User State Enterprise State Roaming
• Configure Enterprise State Roaming Azure
• Knowledge Check
• Summary

Products: Mem, Configuration Manager, Intune, Windows

Roles: Administrator

Level: Intermediate

Subjects: Identity Access, Storage

Duration: 25 minutes

View full course details Cancel

Microsoft

Manage users and implement security in Dynamics 365 Business Central

shield-halved-duotone-light-full Cyber Security
Learn how to manage users and implement security in Business Central.

Units in this learning path:

• 1 Add
• 2 Group
• 3 Permissions
• 4 Configure
• 5 Understand
• 5a User Setup
• 6 Audit
• 7 Exercise
• 8 Check
• 9 Summary

Products: Dynamics 365, Dynamics Business Central

Roles: Functional Consultant, Business User, Administrator

Level: Intermediate

Subjects: Identity Access

Duration: 96 minutes

View full course details Cancel

Viewing 409-420 of 594