565 courses available
Microsoft
Plan and implement security in finance and operations apps
Cyber SecurityUnits in this learning path:
• 1 Plan and Implement Security in F and O Introduction
• 2 Understand the Security Architecture
• Encryption
• 3 Manage Users and Security
• 4 Set Up and Apply Segregation of Duties
• 5 Run Security Reports
• User Licensing Requirements
• Security Diagnostics Task Recordings
• 5 2 Extensible Data Security Policy
• 7 Exercise Import a User and Assign Security Role
• 6 Exercise Create a New User and Assign a Security Role
• 12 Plan and Implement Security in F and O Knowledge Check
• 13 Plan and Implement Security in F and O Summary
Products: Dynamics 365, Dynamics Finance, Dynamics Scm
Roles: Solution Architect, Functional Consultant, Administrator
Level: Intermediate
Subjects: Security, Business Applications
Duration: 116 minutes
Microsoft
Plan for cloud workload protections using Microsoft Defender for Cloud
Cyber SecurityUnits in this learning path:
• Introduction
• Explain Azure Defender
• Understand Azure Secure Center
• Exercise Azure Security Center Interactive Guide
• Enable
• Knowledge Check
• Summary Resources
Products: Azure, Defender For Cloud
Roles: Security Operations Analyst
Level: Intermediate
Subjects: Threat Protection
Duration: 51 minutes
Microsoft
Plan information barriers
Cyber SecurityUnits in this learning path:
• Introduction
• Information Barriers
• Sample Scenario
• Summary Knowledge Check
Products: M365, Office 365
Roles: Administrator
Level: Intermediate
Subjects: Information Protection Governance, Communication
Duration: 25 minutes
Microsoft
Plan to deploy Microsoft Defender for IoT to monitor operational technology (OT) networks
Cyber SecurityUnits in this learning path:
• Introduction
• Describe Process to Deploy
• Identify Sites Zones
• Determine Connection Options
• Identify Azure on Premises Roles
• Summary
Products: Defender For Iot
Roles: Solution Architect
Level: Intermediate
Subjects: Security
Duration: 23 minutes
Microsoft
Plan, implement, and administer Conditional Access
Cyber SecurityUnits in this learning path:
• Introduction
• Plan Security Defaults
• Exercise Working with Security Defaults
• Plan Policies
• Implement Policy Controls Assignments
• Exercise Implement Conditional Access Policies Roles Assignments
• Test Troubleshoot Policies
• Implement Application Controls
• Implement Session Management
• Exercise Configure Authentication Session Controls
• Implement Continuous Access Evaluation
• Knowledge Check
• Summary Resources
Products: Azure, Entra, Entra Id
Roles: Administrator, Identity Access Admin, Security Engineer
Level: Advanced
Subjects: Identity Access
Duration: 65 minutes
Microsoft
Plan, implement, and manage access review
Cyber SecurityUnits in this learning path:
• Introduction
• Plan for Access Reviews
• Create Access Reviews for Groups Apps
• Create Configure Access Review Programs
• Monitor Findings
• Automate Management Tasks
• Configure Recurring Access Reviews
• Access Review Agent
• Knowledge Check
• Summary Resources
Products: Azure, Entra, Entra Identity Governance, Entra Id
Roles: Administrator, Identity Access Admin, Security Engineer
Level: Advanced
Subjects: Identity Access
Duration: 50 minutes
Amazon Web Services
Planning an AWS Outposts Implementation
Cyber SecurityAmazon Web Services
PostgreSQL Extensions
Cyber SecurityAmazon Web Services
PostgreSQL Security
Cyber SecurityAmazon Web Services
PostgreSQL for Amazon Aurora and RDS - Core Concepts Learning Plan
Cyber SecurityMicrosoft
Prepare Microsoft Entra ID and Intune for device management
Cyber SecurityUnits in this learning path:
• Introduction
• Set Up Microsoft Entra Id Roles Licensing
• Configure Tenant Device Onboarding
• Choose Explain Enrollment Methods
• Knowledge Check
• Summary
Products: Mem, M365, Intune, Entra Id
Roles: Administrator, Security Engineer
Level: Intermediate
Subjects: Device Management, Identity Access, Security
Duration: 29 minutes
Microsoft
Prepare for Microsoft Purview Insider Risk Management
Cyber SecurityUnits in this learning path:
• Introduction
• Plan Insider Risk Management
• Insider Risk Management Prerequisites
• Configure Insider Risk Settings
• Insider Risk Management Integrations
• Knowledge Check
• Summary
Products: Microsoft Purview, M365
Roles: Auditor, Administrator, Risk Practitioner
Level: Intermediate
Subjects: Information Protection Governance, Security
Duration: 36 minutes
Viewing 433-444 of 565