Skip to content
Search

629 courses available

Microsoft

MS-700 Prepare the environment for a Microsoft Teams deployment

shield-halved-duotone-light-full Cyber Security
MS-700 Prepare the environment for a Microsoft Teams deployment

Modules in this learning path:

• Manage Access for External Users
• Implement Security for Microsoft Teams
• Implement Compliance for Microsoft Teams
• Plan Configure Network Settings for Microsoft Teams

Products: M365, Office Teams

Roles: Administrator

Level: Intermediate

Subjects: Communication, Identity Access

Duration: 200 minutes

View full course details Cancel

Microsoft

MS-900 Introduction to Microsoft 365: Describe Microsoft 365 security and compliance capabilities

shield-halved-duotone-light-full Cyber Security
MS-900 Introduction to Microsoft 365: Describe Microsoft 365 security and compliance capabilities

Modules in this learning path:

• Explore Basic Services Identity Types of Azure Active Directory Azure Ad
• Explore Access Management Capabilities of Azure Ad
• Describe Threat Protection with Microsoft 365 Defender
• Describe Purview Risk Compliance Governance
• Describe Compliance Management Capabilities Microsoft

Products: M365

Roles: Business Owner, Business User

Level: Beginner

Subjects: Cloud Security, Compliance, Threat Protection

Duration: 194 minutes

View full course details Cancel

Microsoft

Maintain user profiles

shield-halved-duotone-light-full Cyber Security
Students learn about the benefits of various Windows user profiles, how to manage them, and how to facilitate profile data synchronization across multiple devices.

Units in this learning path:

• Introduction
• Examine User Profile
• Explore User Profile Types
• Examine Options Minimizing User Profile Size
• Deploy Configure Folder Redirection
• Sync User State Enterprise State Roaming
• Configure Enterprise State Roaming Azure
• Knowledge Check
• Summary

Products: Windows, Configuration Manager, Intune

Roles: Administrator

Level: Intermediate

Subjects: Identity Access, Storage

Duration: 27 minutes

View full course details Cancel

Microsoft

Manage Customer Lockbox

shield-halved-duotone-light-full Cyber Security
Customer Lockbox supports requests to access data in Exchange Online, SharePoint Online, and OneDrive when Microsoft engineers need to access customer content to determine root cause and fix an issue. Customer Lockbox requires the engineer to request access from the customer as a final step in the approval workflow. This gives organizations the option to approve or deny these requests and provide direct-access control to the customer.

Units in this learning path:

• Introduction
• Understand Customer Lockbox
• Configure Customer Lockbox
• Manage
• Knowledge Check
• Summary

Products: M365, Office 365

Roles: Administrator

Level: Intermediate

Subjects: It Management Monitoring, Identity Access, Compliance

Duration: 22 minutes

View full course details Cancel

Microsoft

Manage Microsoft Defender in Windows client

shield-halved-duotone-light-full Cyber Security
This module explains the built-in security features of Windows clients and how to implement them using policies.

Units in this learning path:

• Introduction
• Explore Windows Security Center
• Explore Windows Defender Credential Guard
• Manage Microsoft Defender Antivirus
• Manage Windows Defender Firewall
• Explore Windows Defender Firewall Advanced Security
• Knowledge Check
• Summary

Products: Mem, Configuration Manager, Intune, Windows

Roles: Administrator

Level: Intermediate

Subjects: Cloud Security, Networking, Threat Protection

Duration: 23 minutes

View full course details Cancel

Microsoft

Manage Microsoft Entra Identity Protection

shield-halved-duotone-light-full Cyber Security
Protecting a user's identity by monitoring their usage and sign-in patterns will ensure a secure cloud solution. Explore how to design and implement Microsoft Entra Identity protection.

Units in this learning path:

• Introduction
• Review Identity Protection Basics
• Implement Manage User Risk Policy
• Enable Sign in Risk Policy
• Implement Manage Sign Risk Policies
• Monitor Investigate Remediate Elevated Risky Users
• Implement Security Workload Identities
• Explore Microsoft Defender Identity
• Knowledge Check
• Summary Resources

Products: Azure, Entra, Entra Id, Entra Id Protection

Roles: Administrator, Identity Access Admin, Security Engineer

Level: Advanced

Subjects: Identity Access

Duration: 50 minutes

View full course details Cancel

Microsoft

Manage Microsoft Entra application access

shield-halved-duotone-light-full Cyber Security
This module focuses on effectively managing identities and enhancing security in Microsoft Enterprise Identity, ensuring that users, groups, and external identities are protected against security threats and unauthorized access.

Units in this learning path:

• Introduction
• Manage Access Application
• Manage Application Registrations Microsoft Entra Id
• Configure Application Expose Web API
• Permissions Consent
• Application Service Principal Objects Microsoft Entra Id
• Managed Identities
• Configure Authentication Azure Ad Application Proxy
• Knowledge Check
• Summary

Products: Azure, Entra Id

Roles: Administrator, Security Engineer

Level: Intermediate

Subjects: Cloud Security

Duration: 65 minutes

View full course details Cancel

Microsoft

Manage Microsoft Priva Subject Rights Requests

shield-halved-duotone-light-full Cyber Security
Manage Microsoft Priva Subject Rights Requests.

Units in this learning path:

• Introduction
• Subject Rights Requests Overview
• Create Subject Rights Request M365
• Review Subject Rights Request Data
• Subject Rights Request Reports
• Knowledge Check
• Summary

Products: Priva, Microsoft Purview, M365

Roles: Auditor, Administrator, Privacy Manager

Level: Intermediate

Subjects: Compliance, Security

Duration: 28 minutes

View full course details Cancel

Microsoft

Manage Safe Attachments

shield-halved-duotone-light-full Cyber Security
This module examines how to manage Safe Attachments in your Microsoft 365 tenant by creating and configuring policies and using transport rules to disable a policy from taking effect in certain scenarios. MS-102

Units in this learning path:

• Introduction
• Protect Use Safe Attachments
• Create Safe Attachment Policies Microsoft Defender Office 365
• Create Safe Attachments Windows Powershell
• Modify Existing Safe Attachments Policy
• Create Transport Rule Bypass Safe Attachments Policy
• Examine End User Experience Safe Attachments
• Knowledge Check
• Summary

Products: M365, Office 365

Roles: Administrator, Solution Architect, Technology Manager

Level: Intermediate

Subjects: Business Applications, Communication, Identity Access, Insider Risk, It Management Monitoring, Productivity, Security, Threat Protection

Duration: 33 minutes

View full course details Cancel

Microsoft

Manage Safe Links

shield-halved-duotone-light-full Cyber Security
This module examines how to manage Safe Links in your tenant by creating and configuring policies and using transport rules to disable a policy from taking effect in certain scenarios. MS-102

Units in this learning path:

• Introduction
• Protect Use Safe Links
• Create Safe Links Policies Microsoft Defender Office 365
• Create Safe Links Policies Windows Powershell
• Modify Existing Safe Links Policy
• Create Transport Rule Bypass Safe Links Policy
• Examine End User Experience Safe Links
• Knowledge Check
• Summary

Products: M365, Office 365

Roles: Administrator, Solution Architect, Technology Manager

Level: Intermediate

Subjects: Business Applications, Compliance, Identity Access, Insider Risk, It Management Monitoring, Productivity, Security, Threat Protection

Duration: 41 minutes

View full course details Cancel

Microsoft

Manage access and security for Azure Virtual Desktop

shield-halved-duotone-light-full Cyber Security
Manage access and security for Azure Virtual Desktop

Modules in this learning path:

• Manage Access
• Manage Security

Products: Azure, Azure Virtual Desktop, Azure Virtual Machines

Roles: Administrator, Solution Architect

Level: Intermediate

Subjects: Cloud Security, Identity Access

Duration: 81 minutes

View full course details Cancel

Microsoft

Manage access for Azure Virtual Desktop

shield-halved-duotone-light-full Cyber Security
Manage access for Azure Virtual Desktop

Units in this learning path:

• Introduction
• Role Based Access Control Azure Virtual Desktop
• Select Authentication Strategy Azure Virtual Desktop
• Rbac for Azure Virtual Desktop
• Plan Implement Azure Roles Rbac for Window Virtual Desktop
• Assign Roles Azure Virtual Desktop Service Principals
• Enforce Microsoft Entra Multifactor Authentication
• Using Azure Virtual Desktop Intune
• Knowledge Check
• Summary

Products: Azure, Azure Virtual Desktop, Azure Virtual Machines

Roles: Administrator, Solution Architect

Level: Intermediate

Subjects: Identity Access, Virtual Machine

Duration: 40 minutes

View full course details Cancel

Viewing 421-432 of 629