Skip to content
Search

594 courses available

Microsoft

Manage your cloud security posture management​

shield-halved-duotone-light-full Cyber Security
Manage your cloud security posture management​

Units in this learning path:

• Introduction
• Explore Secure Score
• Explore Recommendations
• Measure Enforce Regulatory Compliance
• Understand Workbooks
• Knowledge Check
• Summary Resources

Products: Azure, Defender For Cloud

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Cloud Security, Compliance, Security

Duration: 21 minutes

View full course details Cancel

Microsoft

Microsoft Azure Well-Architected Framework - Security

shield-halved-duotone-light-full Cyber Security
Discover the tools that Azure provides to help you design a secure environment throughout your infrastructure, data, network, and applications.

Units in this learning path:

• 1 Introduction
• Plan Your Security Readiness
• Design to Protect Confidentiality
• Design to Protect Integrity
• Design to Protect Availability
• Sustain and Evolve Your Security Posture
• Summary

Products: Azure, Entra Id

Roles: Solution Architect, Security Engineer

Level: Intermediate

Subjects: Cloud Security

Duration: 54 minutes

View full course details Cancel

Microsoft

Microsoft Intune fundamentals

shield-halved-duotone-light-full Cyber Security
This learning path will help you understand the fundamentals concepts involved in managing your endpoint environment.

Modules in this learning path:

• Intro to Endpoint Manager
• Protect Endpoints with Endpoint Manager
• Manage Devices with Microsoft Endpoint Manager
• App Management Using Microsoft Endpoint Manager
• Policy Security Management Using Microsoft Endpoint Manager
• Compliance Endpoint Manager
• Benefits Microsoft Endpoint Manager

Products: Mem

Roles: Administrator

Level: Beginner

Subjects: Threat Protection, Information Protection Governance

Duration: 221 minutes

View full course details Cancel

Microsoft

Microsoft Learn for Educators preparing for course delivery

shield-halved-duotone-light-full Cyber Security
Microsoft Learn for Educators preparing for course delivery

Units in this learning path:

• Introduction
• Prepare Course Delivery
• Get Ready Teach Checklist
• Close Out Course
• Knowledge Check
• Summary

Products: Azure

Roles: Higher Ed Educator

Level: Advanced

Subjects: Security

Duration: 18 minutes

View full course details Cancel

Microsoft

Microsoft Learn for Educators student certification

shield-halved-duotone-light-full Cyber Security
Microsoft Learn for Educators student certification

Units in this learning path:

• Introduction
• Get Students Certified Fundamentals
• Get Students Certified Advanced Role Based
• Knowledge Check
• Summary

Products: Azure

Roles: Higher Ed Educator

Level: Advanced

Subjects: Security

Duration: 15 minutes

View full course details Cancel

Microsoft

Mitigate incidents using Microsoft Defender

shield-halved-duotone-light-full Cyber Security
Mitigate incidents using Microsoft Defender

Units in this learning path:

• Introduction
• Use Microsoft Security Center Portal
• Manage Incidents
• Investigate Incidents
• Manage Investigate Alerts
• Manage Automated Investigations
• Use Action Center
• Conduct Advanced Hunting
• Investigate Azure Ad Sign in Logs
• Understand Microsoft Secure Score
• Analyze Threat Analytics
• Analyze Reports
• Configure Microsoft 365 Defender Portal
• Knowledge Check
• Summary Resources

Products: Defender Xdr, Microsoft Defender, Microsoft Sentinel, Security Copilot

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Security, Cloud Security, Threat Protection

Duration: 82 minutes

View full course details Cancel

Microsoft

Mitigate threats using Microsoft Defender XDR

shield-halved-duotone-light-full Cyber Security
Mitigate threats using Microsoft Defender XDR

Modules in this learning path:

• Introduction Microsoft 365 Threat Protection
• Mitigate Incidents Microsoft 365 Defender
• M365 Threat Remediate
• Manage Azure Ad Identity Protection
• M365 Threat Safeguard
• Cloud App Security

Products: Defender For Cloud Apps, Defender Identity, Defender Office365, Entra Id Protection, Defender Endpoint, Microsoft Defender, Defender Xdr

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Cloud Security, Security, Threat Protection

Duration: 366 minutes

View full course details Cancel

Microsoft

Mitigate threats using Microsoft Security Copilot

shield-halved-duotone-light-full Cyber Security
Mitigate threats using Microsoft Security Copilot

Modules in this learning path:

• Fundamentals Generative AI
• Security Copilot Getting Started
• Security Copilot Describe Core Features
• Security Copilot Embedded Experiences
• Security Copilot Exercises

Products: Microsoft Sentinel, Defender Endpoint, Microsoft Defender, Defender Xdr

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Cloud Security, Security, Threat Protection

Duration: 388 minutes

View full course details Cancel

Cisco Networking Academy

Network Defense

shield-halved-duotone-light-full Cyber Security
This course is the fifth in the six-course Junior Cybersecurity Analyst Pathway, aligned to the CCST (Cisco Certified Support Technician) Cybersecurity certification. This course covers ways to monitor your network and how to evaluate security alerts. Delve into the tools and techniques used to protect a network, including access control, firewalls, cloud security, and cryptography. These monitoring and defense tools, along with others, work together to create a layered defense-in-depth cybersecurity strategy. The knowledge and skills that you learn will help you defend networks against many types of attacks and quickly react to any exploits that may occur.
View full course details Cancel

Cisco Networking Academy

Networking Basics

shield-halved-duotone-light-full Cyber Security
This course is the second in the six-course Junior Cybersecurity Analyst Pathway, aligned to the CCST (Cisco Certified Support Technician) Cybersecurity certification, and the first in the four-course Network Technican Pathway, aligned to the CCST Networking certification. This course covers the foundation of networking and network devices, media, and protocols. You will observe data flowing through a network and configure devices to connect to networks. Finally, you will learn how to use different network applications and protocols to accomplish networking tasks.
View full course details Cancel

Cisco Networking Academy

Networking Devices and Initial Configuration

shield-halved-duotone-light-full Cyber Security
This course is the third in the six-course Junior Cybersecurity Analyst Pathway, aligned to the CCST (Cisco Certified Support Technician) Cybersecurity certification and the second in the four-course Network Technican Pathway, aligned to the CCST Networking certification. This course covers the essentials of network devices and how to configure them. Learn the characteristics and benefits of Cloud and Virtualization technologies. Explore how to provide Internet Protocol (IP) addresses to devices both manually and automatically. Using this knowledge, you will calculate an IP addressing scheme, configure Cisco devices to create a small network, and test for connectivity issues.
View full course details Cancel

Amazon Web Services

Official Practice Question Set: AWS Certified Security - Specialty (SCS-C02 - English)

shield-halved-duotone-light-full Cyber Security
The Official Practice Question Set: AWS Certified Security - Specialty (SCS-C02) consists of 20 questions. This question set aligns with the SCS-C02 version of the exam and exam guide. If you are looking for an assessment that is the same length…
View full course details Cancel

Viewing 421-432 of 594