Skip to content
Search

565 courses available

Microsoft

Perform threat hunting in Microsoft Sentinel

shield-halved-duotone-light-full Cyber Security
Perform threat hunting in Microsoft Sentinel

Modules in this learning path:

• What Is Threat Hunting Azure Sentinel
• Hunt Threats Sentinel
• Use Search Jobs Microsoft Sentinel
• Perform Threat Hunting Sentinel with Notebooks

Products: Azure, Microsoft Sentinel

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Threat Protection

Duration: 134 minutes

View full course details Cancel

Amazon Web Services

Performing a Basic Audit of your AWS Environment

shield-halved-duotone-light-full Cyber Security
This lab leads you through the steps to perform basic audits of core AWS resources. You will use the AWS Management Console to understand how to audit the use of multiple AWS services, Amazon EC2, Amazon VPC, Amazon IAM, Amazon Security Groups,…
View full course details Cancel

IBM

Plan an Open-Source Intelligence Strategy

shield-halved-duotone-light-full Cyber Security
This credential earner has the advanced competencies to identify potential vulnerabilities in an organization’s infrastructure through planning and executing open-source intelligence (OSINT) techniques. The earner has knowledge of OSINT techniques to execute penetration testing and the practical strategies to enhance organizational security. The earner has developed transferable employability skills and gained real industry experience in a project-based learning opportunity.
View full course details Cancel

Microsoft

Plan and design the integration of enterprise apps for SSO

shield-halved-duotone-light-full Cyber Security
Enterprise app deployment enables control over which users can access the apps, easily log into apps with single-sign-on, and provide integrated usage reports.

Units in this learning path:

• Introduction
• Discover Apps by Using Mcas Adfs App Report
• Configure Connectors Apps
• Implement Access Management for Apps
• Design Implement App Management Roles
• Create Custom Role to Manage App Registration
• Configure Pre Integrated Gallery Saas Apps
• Implement Manage Policies Oauth Apps
• Knowledge Check
• Summary Resources

Products: Entra Workload Identities

Roles: Administrator, Security Engineer

Level: Advanced

Subjects: Cloud Security, Identity Access

Duration: 42 minutes

View full course details Cancel

Microsoft

Plan and implement advanced security for compute

shield-halved-duotone-light-full Cyber Security
This module is designed to provide administrators with the knowledge and skills needed to plan and implement advanced security measures for Azure compute resources, safeguarding applications and data against evolving security threats.

Units in this learning path:

• Introduction
• Remote Access Public Endpoints Include Azure Bastion
• Azure Kubernetes Service Overview
• Best Practices Cluster Isolation Azure Kubernetes Service
• Microsoft Defender Containers
• Best Practices Authentication Authorization
• Monitor Container Resources Azure Container Instances
• Security Considerations Azure Container Instances
• Azure Container Registry Roles Permissions
• Azure Data Encryption
• Azure Security Baseline API Management
• Knowledge Check
• Summary

Products: Azure, Azure Disk Encryption, Azure Virtual Machines, Defender For Cloud, Microsoft Defender, Update Manager

Roles: Administrator, Security Engineer

Level: Intermediate

Subjects: Cloud Security

Duration: 82 minutes

View full course details Cancel

Microsoft

Plan and implement an identity governance strategy

shield-halved-duotone-light-full Cyber Security
Plan and implement an identity governance strategy

Modules in this learning path:

• Plan Implement Entitlement Management
• Plan Implement Manage Access Review
• Plan Implement Privileged Access
• Monitor Maintain Azure Active Directory

Products: Azure, Entra, Entra Identity Governance, Entra Permissions Management, Entra Id

Roles: Administrator, Security Engineer

Level: Intermediate

Subjects: Identity Access

Duration: 203 minutes

View full course details Cancel

Microsoft

Plan and implement privileged access

shield-halved-duotone-light-full Cyber Security
Ensuring that administrative roles are protected and managed to increase your Azure solution security is a must. Explore how to use PIM to protect your data and resources.

Units in this learning path:

• Introduction
• Define Strategy for Administrative Users
• Configure Privileged Identity Management for Azure Resources
• Configure Privileged Identity Management for Azure Ad Roles
• Assign Azure Ad Roles Privileged Identity Management
• Assign Azure Resource Roles Privileged Identity Management
• Plan Configure Privileged Access Groups
• Analyze Privileged Identity Management Audit History Reports
• Create Manage Emergency Access Accounts
• Knowledge Check
• Summary Resources

Products: Azure, Entra, Entra Identity Governance, Entra Id

Roles: Administrator, Identity Access Admin, Security Engineer

Level: Advanced

Subjects: Identity Access

Duration: 62 minutes

View full course details Cancel

Microsoft

Plan and implement security for Azure SQL Database and Azure SQL Managed Instance

shield-halved-duotone-light-full Cyber Security
This module is designed to empower administrators with the knowledge and skills needed to plan and implement robust security measures for Azure SQL Database and Azure SQL Managed Instance, ensuring data protection and regulatory compliance.

Units in this learning path:

• Introduction
• Azure SQL Database
• Authorize Database Access
• Database Audit
• Microsoft Purview Governance Portal Use Cases
• Implement Data Classification Sensitive Information
• Dynamic Data Mask
• Transparent Data Encryption
• Always Encrypted
• Implement an Azure SQL Database Firewall
• Knowledge Check
• Summary

Products: Azure, Azure SQL Database, Azure SQL Managed Instance

Roles: Administrator, Security Engineer

Level: Intermediate

Subjects: Security

Duration: 78 minutes

View full course details Cancel

Microsoft

Plan and implement security for private access to Azure resources

shield-halved-duotone-light-full Cyber Security
This module focuses on equipping administrators with the knowledge and skills required to plan and implement robust security measures for private access to Azure resources, safeguarding sensitive data and enhancing network integrity.

Units in this learning path:

• Introduction
• Virtual Network Service Endpoints
• Private Endpoints
• Azure Private Link Services
• Integrate Your App with Azure Virtual Network
• Network Security Configurations App Service Environment
• Network Security Configurations Azure SQL Managed Instance
• Knowledge Check
• Summary

Products: Azure App Service, Azure Functions, Azure Virtual Network

Roles: Administrator, Security Engineer

Level: Intermediate

Subjects: Security

Duration: 56 minutes

View full course details Cancel

Microsoft

Plan and implement security for public access to Azure resources

shield-halved-duotone-light-full Cyber Security
Plan and implement security for public access to Azure resources

Units in this learning path:

• Introduction
• Plan Implement Transport Layer Security
• Azure Firewall Azure Firewall Manager Firewall Policies
• Azure Application Gateway
• Azure Web Application Firewall
• Front Door Content Development Network
• Azure Distributed Denial of Service Protection
• Knowledge Check
• Summary

Products: Azure App Service, Azure Application Gateway, Azure Ddos Protection, Azure Firewall Manager, Azure Front Door, Azure Web Application Firewall

Roles: Administrator, Security Engineer

Level: Intermediate

Subjects: Security

Duration: 61 minutes

View full course details Cancel

Microsoft

Plan and implement security for storage

shield-halved-duotone-light-full Cyber Security
This module is designed to provide administrators with the knowledge and skills required to plan and implement comprehensive security measures for Azure storage resources, safeguarding data integrity, confidentiality, and availability.

Units in this learning path:

• Introduction
• Azure Storage
• Authorize Requests Azure Storage
• Manage Storage Account Access Keys
• Select Configure Access Azure Files
• Authorize Access Blobs Use Microsoft Entra Id
• Authorize Access Tables Use Microsoft Entra Id
• Authorize Access Queue Data Azure Portal
• Recommendations Basic Data Protection
• Bring Your Own Key Specification
• Enable Infrastructure Encryption Double Encryption Data
• Knowledge Check
• Summary

Products: Azure, Azure Blob Storage, Azure Disk Storage, Azure Files, Azure Storage, Azure Storage Accounts

Roles: Administrator, Security Engineer

Level: Intermediate

Subjects: Information Protection Governance

Duration: 89 minutes

View full course details Cancel

Microsoft

Plan and implement security for virtual networks

shield-halved-duotone-light-full Cyber Security
This module is designed to provide administrators with the knowledge and skills needed to plan and implement robust security measures for Azure virtual networks, ensuring the confidentiality, integrity, and availability of network resources.

Units in this learning path:

• Introduction
• Data Protection Logging Threat Detection Network Security
• Azure Virtual Network
• Azure Virtual Network Manager
• Network Security Groups Application Security Groups
• User Defined Routes
• Virtual Network Peering Gateways
• Virtual Wide Area Network
• Secure Virtual Private Network Connectivity Point to Site Site to Site
• Azure Encryption
• What Is Azure Virtual Network Encryption
• Azure Expressroute
• Expressroute Encryption
• Azure Best Practices Network Security
• Monitor Network Security
• Knowledge Check
• Summary

Products: Azure, Azure Firewall, Azure Firewall Manager, Azure Virtual Network, Azure Vpn Gateway

Roles: Administrator, Security Engineer

Level: Intermediate

Subjects: Security

Duration: 117 minutes

View full course details Cancel

Viewing 421-432 of 565