Skip to content
Search

594 courses available

Microsoft

Onboard your first OT sensor to Microsoft Defender for IoT

shield-halved-duotone-light-full Cyber Security
Learn how to onboard an OT sensor as part of the deployment of Microsoft Defender for IoT to monitor your OT network.

Units in this learning path:

• Introduction
• Describe Process Onboard
• Plan to Onboard Sensor
• Exercise Onboard Sensor
• Knowledge Check
• Summary

Products: Defender For Iot

Roles: Technology Manager

Level: Intermediate

Subjects: Security

Duration: 16 minutes

View full course details Cancel

IBM

Perform Risk Assessment and Prioritization

shield-halved-duotone-light-full Cyber Security
This credential earner demonstrated their applied knowledge in assessing and prioritizing risks for an organization. The earner has identified security anomalies on the system, performed risk assessments, and provided recommendations based on priority risk. The earner will build and develop their transferable skills and gain real industry experience.
View full course details Cancel

Microsoft

Perform Windows Server secure administration

shield-halved-duotone-light-full Cyber Security
Perform Windows Server secure administration

Units in this learning path:

• Introduction
• Define Least Privilege Administration
• Implement Delegated Privileges
• Use Privileged Access Workstations
• Use Jump Servers
• Knowledge Check
• Summary

Products: Windows Server

Roles: Administrator, Solution Architect, Technology Manager

Level: Intermediate

Subjects: Device Management, Identity Access, Threat Protection

Duration: 40 minutes

View full course details Cancel

Microsoft

Perform actions on a device using Microsoft Defender for Endpoint

shield-halved-duotone-light-full Cyber Security
Perform actions on a device using Microsoft Defender for Endpoint

Units in this learning path:

• Introduction
• Understand Device Actions
• Run Antivirus Scan Devices
• Collect Investigation Package from Devices
• Initiate Live Response Session
• Knowledge Check
• Summary Resources

Products: M365, M365 Security Center, Defender Endpoint

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Cloud Security, Security, Threat Protection

Duration: 35 minutes

View full course details Cancel

Microsoft

Perform basic Azure Management Tasks (Security and Monitoring)

shield-halved-duotone-light-full Cyber Security
Perform basic Azure Management Tasks (Security and Monitoring)

Modules in this learning path:

• Microsoft Defender Cloud Threat Protection
• Introduction Azure Firewall
• Create Configure Log Analytics Workspace

Products: Azure, Azure Firewall, Azure Key Vault, Azure Kubernetes Service, Azure Log Analytics, Azure Virtual Machines, Azure Virtual Network, Defender For Cloud

Roles: Security Engineer

Level: Intermediate

Subjects: Cloud Security

Duration: 276 minutes

View full course details Cancel

Microsoft

Perform basic identity and access tasks

shield-halved-duotone-light-full Cyber Security
Learn to create and manage identity and access using Microsoft Entra ID. Explore the basics of creating users, groups, and how to control access with conditional access.

Modules in this learning path:

• Create Configure Manage Identities
• Explore Authentication Capabilities of Azure Ad
• Explore Access Management Capabilities of Azure Ad
• Describe Identity Protection Governance Capabilities of Azure Ad
• Get Started Identity Access Labs

Products: Entra, Entra Id

Roles: Administrator, Identity Access Admin

Level: Beginner

Subjects: Identity Access

Duration: 239 minutes

View full course details Cancel

Microsoft

Perform device investigations in Microsoft Defender for Endpoint

shield-halved-duotone-light-full Cyber Security
Perform device investigations in Microsoft Defender for Endpoint

Units in this learning path:

• Introduction
• Use Device Inventory List
• Investigate Device
• Use Behavioral Blocking
• Detect Devices with Device Discovery
• Knowledge Check
• Summary Resources

Products: Microsoft Defender, Windows Security, Defender Endpoint

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Cloud Security, Security, Threat Protection, Asset Management

Duration: 35 minutes

View full course details Cancel

Microsoft

Perform evidence and entities investigations using Microsoft Defender for Endpoint

shield-halved-duotone-light-full Cyber Security
Perform evidence and entities investigations using Microsoft Defender for Endpoint

Units in this learning path:

• Introduction
• Investigate File
• Investigate User Account
• Investigate Ip Addresses
• Investigate Domain
• Knowledge Check
• Summary Resources

Products: M365, Defender Endpoint

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Information Protection Governance, Threat Protection

Duration: 36 minutes

View full course details Cancel

Microsoft

Perform threat hunting in Microsoft Sentinel

shield-halved-duotone-light-full Cyber Security
Perform threat hunting in Microsoft Sentinel

Modules in this learning path:

• What Is Threat Hunting Azure Sentinel
• Hunt Threats Sentinel
• Use Search Jobs Microsoft Sentinel
• Perform Threat Hunting Sentinel with Notebooks

Products: Azure, Microsoft Sentinel

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Threat Protection

Duration: 134 minutes

View full course details Cancel

Amazon Web Services

Performing a Basic Audit of your AWS Environment

shield-halved-duotone-light-full Cyber Security
This lab leads you through the steps to perform basic audits of core AWS resources. You will use the AWS Management Console to understand how to audit the use of multiple AWS services, Amazon EC2, Amazon VPC, Amazon IAM, Amazon Security Groups,…
View full course details Cancel

IBM

Plan an Open-Source Intelligence Strategy

shield-halved-duotone-light-full Cyber Security
This credential earner has the advanced competencies to identify potential vulnerabilities in an organization’s infrastructure through planning and executing open-source intelligence (OSINT) techniques. The earner has knowledge of OSINT techniques to execute penetration testing and the practical strategies to enhance organizational security. The earner has developed transferable employability skills and gained real industry experience in a project-based learning opportunity.
View full course details Cancel

Microsoft

Plan and design the integration of enterprise apps for SSO

shield-halved-duotone-light-full Cyber Security
Enterprise app deployment enables control over which users can access the apps, easily log into apps with single-sign-on, and provide integrated usage reports.

Units in this learning path:

• Introduction
• Discover Apps by Using Mcas Adfs App Report
• Configure Connectors Apps
• Implement Access Management for Apps
• Design Implement App Management Roles
• Create Custom Role to Manage App Registration
• Configure Pre Integrated Gallery Saas Apps
• Implement Manage Policies Oauth Apps
• Knowledge Check
• Summary Resources

Products: Entra Workload Identities

Roles: Administrator, Security Engineer

Level: Advanced

Subjects: Cloud Security, Identity Access

Duration: 42 minutes

View full course details Cancel

Viewing 433-444 of 594