Skip to content
Search

5424 courses available

Microsoft

Protect data with Zero Trust

shield-halved-duotone-light-full Cyber Security
Zero Trust isn't a tool or product, it's an essential security strategy, with data at its core. Here, you'll learn how to identify and protect your data using a Zero Trust approach.

Units in this learning path:

• Introduction
• Know Your Data
• Protect Your Data Prevent Loss
• Knowledge Check
• Summary

Products: M365

Roles: Administrator, Student

Level: Beginner

Subjects: Security

Duration: 15 minutes

View full course details Cancel

Microsoft

Protect email with Microsoft Purview Message Encryption

shield-halved-duotone-light-full Cyber Security
Protect email with Microsoft Purview Message Encryption

Units in this learning path:

• Introduction
• Understand Message Encryption
• Plan Message Encryption
• Implement Message Encryption
• Branding Template
• Implement Advanced Message Encryption
• Mail Flow Rules Encryption
• Knowledge Check
• Summary

Products: Microsoft Purview, Office 365

Roles: Auditor, Ip Admin, Risk Practitioner

Level: Intermediate

Subjects: Security, Communication

Duration: 36 minutes

View full course details Cancel

Microsoft

Protect identities in Microsoft Entra ID

shield-halved-duotone-light-full Cyber Security
This module introduces students to the various authentication methods used to protect identities.

Units in this learning path:

• Introduction
• Explore Windows Hello Business
• Deploy Windows Hello
• Manage Windows Hello Business
• Explore Azure Ad Identity Protection
• Manage Self Service Password Reset Azure Ad
• Implement Multi Factor Authentication
• Knowledge Check
• Summary

Products: Mem, Configuration Manager, Intune, Windows

Roles: Administrator

Level: Intermediate

Subjects: Identity Access

Duration: 21 minutes

View full course details Cancel

Microsoft

Protect identities in Microsoft Entra ID

This module introduces students to the various authentication methods used to protect identities.

Units in this learning path:

• Introduction
• Explore Windows Hello for Business
• Deploy Windows Hello
• Manage Windows Hello for Business
• Explore Identity Protection
• Manage Self Service Password Reset
• Implement Multi Factor Authentication
• Knowledge Check
• Summary

Products: Windows, Configuration Manager, Intune

Roles: Administrator

Level: Intermediate

Duration: 27 minutes

View full course details Cancel

Microsoft

Protect identity and access in Azure

shield-halved-duotone-light-full Cyber Security
Protect identity and access in Azure

Modules in this learning path:

• Manage Security Controls Identity Access
• Manage Application Access Microsoft Entra Id

Products: Azure, Azure Rbac, Entra Id, Entra Id Protection, Entra Identity Governance, Entra Verified Id

Roles: Security Engineer

Level: Intermediate

Subjects: Identity Access

Duration: 432 minutes

View full course details Cancel

Microsoft

Protect infrastructure with Zero Trust

shield-halved-duotone-light-full Cyber Security
Infrastructure is a broad term that covers all hardware, software, servers, networks, facilities, and much more. Utilizing Zero Trust principles can help to reduce your infrastructure's exposure to cyberattacks through improved monitoring, configuration management, and keeping software up-to-date.

Units in this learning path:

• Introduction
• What Infrastructure
• Assess Monitor Infrastructure
• Harden Infrastructure
• Knowledge Check
• Summary

Products: M365

Roles: Administrator, Student

Level: Beginner

Subjects: Security

Duration: 17 minutes

View full course details Cancel

Microsoft

Protect network infrastructure in Azure

shield-halved-duotone-light-full Cyber Security
Protect network infrastructure in Azure

Modules in this learning path:

• Security Virtual Networks
• Security Private Access Azure Resources
• Security Public Access Azure Resources

Products: Azure Container Instances, Azure Container Registry, Azure Ddos Protection, Azure Disk Encryption, Azure Expressroute, Azure Firewall, Azure Firewall Manager, Azure Front Door, Azure Kubernetes Service, Azure Web Application Firewall, Update Manager

Roles: Administrator, Security Engineer

Level: Intermediate

Subjects: Information Protection Governance

Duration: 234 minutes

View full course details Cancel

Microsoft

Protect sensitive data in a digital world

shield-halved-duotone-light-full Cyber Security
Protect sensitive data in a digital world.

Units in this learning path:

• Introduction
• Data Protection Need
• Manage Sensitive Data Challenge
• Protect Data Zero Trust World
• Understand Classification Protection
• Prevent Data Leaks Insider Threats
• Manage Respond Alerts Threats
• Protect AI Data
• Knowledge Check
• Summary

Products: Microsoft Purview, M365

Roles: Auditor, Administrator, Risk Practitioner

Level: Intermediate

Subjects: Information Protection Governance, Security

Duration: 34 minutes

View full course details Cancel

Microsoft

Protect your Azure Virtual Desktop deployment by using Azure Firewall

shield-halved-duotone-light-full Cyber Security
Learn how to deploy and configure Azure Firewall to protect outbound network traffic for Azure Virtual Desktop.

Units in this learning path:

• Introduction
• Use Azure Firewall
• Exercise Set Up Host Pool
• Plan Azure Firewall Deployment
• Exercise Deploy Azure Firewall
• Allow Outbound Network Access
• Exercise Route Network Traffic
• Knowledge Check
• Summary

Products: Azure, Azure Firewall, Azure Virtual Desktop

Roles: Administrator

Level: Beginner

Subjects: Security

Duration: 78 minutes

View full course details Cancel

Microsoft

Protect your endpoint environment with Microsoft Intune

shield-halved-duotone-light-full Cyber Security
In this module, you learn about protecting devices, apps, and data. Additionally, you understand the endpoint environment and the supported platforms available with Microsoft Intune.

Units in this learning path:

• 1 Introduction
• 2 Manage Protect Devices
• 3 Manage Protect Apps
• 4 Manage Protect Data
• 5 Understand Endpoint Environment
• 6 Platform Considerations
• 7 Knowledge Check
• 8 Summary

Products: Mem, M365

Roles: Administrator

Level: Beginner

Subjects: Threat Protection

Duration: 26 minutes

View full course details Cancel

Microsoft

Protect your on-premises infrastructure from disasters with Azure Site Recovery

gear-duotone-light-full Software Development
Learn how to provide disaster recovery for your on-premises infrastructure by using Azure Site Recovery to manage and orchestrate replication. Use Site Recovery to perform failover and failback of VMware virtual machines, Hyper-V virtual machines, and physical servers.

Units in this learning path:

• 1 Introduction
• 2 Azure Site Recovery Overview
• 3 Workloads Supported Azure Site Recovery
• 4 Run Disaster Recovery Drill
• 5 Failover Failback
• 6 Summary

Products: Azure, Azure Site Recovery

Roles: Solution Architect

Level: Intermediate

Subjects: Site Reliability Engineering

Duration: 33 minutes

View full course details Cancel

Microsoft

Protect your virtual machines by using Azure Backup

gear-duotone-light-full Software Development
Use Azure Backup to help protect on-premises servers, virtual machines, SQL Server, Azure file shares, and other workloads.

Units in this learning path:

• 1 Introduction
• 2 Azure Backup Features Scenarios
• 3 Back Up Azure Virtual Machine
• 4 Exercise Back Up Azure Virtual Machine
• 5 Restore Virtual Machine Data
• 6 Exercise Restore Virtual Machine Data
• 7 Summary

Products: Azure, Azure Virtual Machines, Azure Backup

Roles: Solution Architect, Administrator

Level: Beginner

Subjects: Virtual Machine

Duration: 35 minutes

View full course details Cancel

Viewing 4393-4404 of 5424