Skip to content
Search

629 courses available

Microsoft

Manage permissions, roles, and role groups in Microsoft 365

shield-halved-duotone-light-full Cyber Security
This module examines the use of roles and role groups in the Microsoft 365 permission model, including role management, best practices when configuring admin roles, delegating roles, and elevating privileges.

Units in this learning path:

• Introduction
• Examine Roles Microsoft 365 Permission Model
• Manage Roles Across Microsoft 365 Ecosystem
• Explore Admin Roles Microsoft 365
• Examine Best Practices Administrative Roles
• Assign Admin Roles Users Microsoft 365
• Delegate Admin Roles Partners
• Implement Role Groups Microsoft 365
• Manage Permissions Use Administrative Units
• Manage Sharepoint Permissions Prevent Oversharing
• Elevate Privileges Use Privileged Identity Management
• Knowledge Check
• Summary

Products: Office 365

Roles: Administrator, Solution Architect, Technology Manager

Level: Intermediate

Subjects: Business Applications, Compliance, Identity Access, Insider Risk, It Management Monitoring, Productivity, Security, Threat Protection

Duration: 66 minutes

View full course details Cancel

Microsoft

Manage records and disposition with Microsoft Purview

shield-halved-duotone-light-full Cyber Security
Manage records and disposition with Microsoft Purview.

Units in this learning path:

• Introduction
• Plan Retention Disposition
• Retention Label File Plan
• Auto Apply Retention Label
• Exercise Create Auto Apply
• Declare Record
• Disposition Review
• Exercise Disposition Review
• Principles Retention
• Knowledge Check
• Summary

Products: Microsoft Purview, M365

Roles: Risk Practitioner

Level: Intermediate

Subjects: Information Protection Governance

Duration: 73 minutes

View full course details Cancel

Microsoft

Manage scoped administration and delegation with Microsoft Intune and Intune for Education

shield-halved-duotone-light-full Cyber Security
Discover how to manage scoped administration and delegation with Microsoft Intune and Intune for Education.

Units in this learning path:

• Introduction
• Implement Rbac
• Scope Tags
• Knowledge Check
• Summary

Products: M365, Intune

Roles: Administrator

Level: Beginner

Subjects: Identity Access, Cloud Computing, Device Management

Duration: 9 minutes

View full course details Cancel

Microsoft

Manage secure user access in Microsoft 365

shield-halved-duotone-light-full Cyber Security
This module examines the various features provided in the Microsoft 365 ecosystem for securing user access, such as Conditional Access policies, multifactor authentication, self-service password management, Smart Lockout policies, and security defaults.

Units in this learning path:

• Introduction
• Examine Identity Access Tools
• Manage User Passwords
• Implement Conditional Access Policies
• Enable Pass Through Authentication
• Implement Multi Factor Authentication
• Explore Passwordless Authentication Options
• Explore Self Service Password Management
• Implement Smart Lockout
• Explore Security Defaults Entra Id
• Investigate Authentication Issues
• Knowledge Check
• Summary

Products: M365, Office 365

Roles: Administrator, Solution Architect, Technology Manager

Level: Intermediate

Subjects: Business Applications, Compliance, Identity Access, Insider Risk, It Management Monitoring, Productivity, Security, Threat Protection

Duration: 80 minutes

View full course details Cancel

Microsoft

Manage security controls for identity and access

shield-halved-duotone-light-full Cyber Security
This module focuses on effectively managing security controls in Microsoft Entra ID by securing identities, authentication, and authorization to protect users, groups, and external identities against threats while ensuring secure and seamless access to resources.

Units in this learning path:

• Introduction
• Identity Management Privileged Access
• Microsoft Entra Id Overview
• Secure Microsoft Entra Users
• Create New User
• Secure Microsoft Entra Groups
• Recommend When Use External Identities
• Secure External Microsoft Entra Identities
• Microsoft Entra Identity Protection
• Microsoft Entra Connect
• Microsoft Entra Cloud Sync
• Authentication Options
• Password Hash Synchronization with Microsoft Entra Id
• Microsoft Entra Pass Through Authentication
• Federation with Microsoft Entra Id
• What Microsoft Entra Authentication
• Configure Microsoft Entra Multifactor Authentication Settings
• Kerberos Authentication
• New Technology Local Area Network Manager
• Passwordless Authentication Options
• Passwordless Authentication
• Enforce Premises Microsoft Entra Password Protection
• Microsoft Entra Id Single Sign on
• Configure Microsoft Entra Single Sign on
• Integrate Applications with Microsoft Entra Id
• Microsoft Entra Verified Id
• Configure Microsoft Entra Verified Id
• Microsoft Entra Id Authentication Verification Methods
• Azure Management Groups
• Configure Azure Role Permissions
• Azure Role Based Access Control
• Azure Built in Roles
• Assign Azure Role Permissions
• Microsoft Entra Built in Roles
• Built Roles Microsoft Entra Id
• Microsoft Entra Role Based Access Control
• Create New Custom Roles Microsoft Entra Id
• Zero Trust Security
• Microsoft Entra Privileged Identity Management
• Configure Privileged Identity Management
• Microsoft Entra Id Governance
• Identity Lifecycle Management
• Lifecycle Workflows
• Entitlement Management
• Delegation Roles Entitlement Management
• Access Reviews
• Configure Role Management Access Reviews Microsoft Entra Id Governance
• Conditional Access
• Understand Azure Lighthouse
• Knowledge Check
• Summary

Products: Azure Rbac, Entra, Entra External Id, Entra Id, Entra Id Protection, Entra Permissions Management, Entra Verified Id

Roles: Security Engineer

Level: Intermediate

Subjects: Cloud Security

Duration: 367 minutes

View full course details Cancel

Microsoft

Manage security for Azure Virtual Desktop

shield-halved-duotone-light-full Cyber Security
The Windows client for Azure Virtual Desktop integrates Azure Virtual Desktop on local machines. You’ll learn the critical actions for keeping your users safe.

Units in this learning path:

• Introduction
• Security Recommendations Azure Virtual Desktop
• Configure Microsoft Defender Cloud
• Configure Session Host Protection Microsoft Defender
• Trust Principles Azure Virtual Desktop
• Plan Implement Conditional Access Policies for Connections to Azure Virtual Desk
• Security Posture Management Threat Protection
• Knowledge Check
• Summary

Products: Azure, Azure Virtual Desktop, Azure Virtual Machines

Roles: Administrator, Solution Architect

Level: Intermediate

Subjects: Security

Duration: 41 minutes

View full course details Cancel

Microsoft

Manage security operations in Azure

shield-halved-duotone-light-full Cyber Security
Learn how to configure security policies and manage security alerts with the tools and services in Azure.

Modules in this learning path:

• Create Security Baselines
• Identify Threats with Azure Security Center
• Capture Application Logs App Service

Products: Azure, Azure Policy, Azure Key Vault, Entra Id, Azure API Management

Roles: Administrator, Security Engineer

Level: Beginner, Intermediate

Subjects: Security

Duration: 158 minutes

View full course details Cancel

Microsoft

Manage security posture by using Microsoft Defender for Cloud

shield-halved-duotone-light-full Cyber Security
This module focuses on equipping administrators with the knowledge and skills needed to manage and enhance the security posture of their cloud environment using Microsoft Defender for Cloud, ensuring proactive identification and remediation of security risks.

Units in this learning path:

• Introduction
• Implement Microsoft Defender for Cloud
• Secure Score
• Regulatory Compliance Dashboard
• Microsoft Cloud Security Benchmark
• Microsoft Defender for Cloud Secure Score
• Connect Hybrid Cloud Multi Cloud Environments
• Microsoft Defender External Attack Surface Management
• Knowledge Check
• Summary

Products: Azure, Defender For Cloud

Roles: Administrator, Security Engineer

Level: Intermediate

Subjects: Cloud Security, Threat Protection

Duration: 65 minutes

View full course details Cancel

Microsoft

Manage sensitive data and security policies within GitHub

shield-halved-duotone-light-full Cyber Security
Familiarize yourself with GitHub's basic security tools, which prepare repositories for secure development and industry-standard response to threats.

Units in this learning path:

• Introduction
• Set Security Policies
• Scrub Sensitive Data from Repository
• Report Logs
• Exercise
• Knowledge Check
• Summary

Products: Github

Roles: Devops Engineer, Administrator, Developer, Solution Architect

Level: Intermediate

Subjects: Information Protection Governance

Duration: 96 minutes

View full course details Cancel

Microsoft

Manage synchronized identities

shield-halved-duotone-light-full Cyber Security
This module examines how to manage user identities when you configure Microsoft Entra Connect Sync, how to manage users and groups in Microsoft 365 with Microsoft Entra Connect Sync, and how to maintain directory synchronization.

Units in this learning path:

• Introduction
• Manage Users Directory Synchronization
• Manage Groups Directory Synchronization
• Use Azure Active Directory Connect Sync Security Groups
• Configure Object Filters Directory Synchronization
• Explore Microsoft Identity Management
• Troubleshoot Directory Synchronization
• Knowledge Check
• Summary

Products: M365, Office 365

Roles: Administrator, Solution Architect, Technology Manager

Level: Intermediate

Subjects: Business Applications, Compliance, Identity Access, Insider Risk, It Management Monitoring, Productivity, Security, Threat Protection

Duration: 46 minutes

View full course details Cancel

Microsoft

Manage tenant health and services in Microsoft 365

shield-halved-duotone-light-full Cyber Security
This module examines how to monitor your organization's transition to Microsoft 365 using Microsoft 365 tools. It also examines how to develop an incident response plan and request assistance from Microsoft.

Units in this learning path:

• Introduction
• Monitor Health Microsoft 365 Services
• Monitor Tenant Health Use Adoption Score
• Monitor Tenant Health Use Usage Analytics
• Implement Microsoft 365 Network Connectivity
• Implement Microsoft 365 Backup
• Develop Incident Response Plan
• Request Assistance from Microsoft
• Knowledge Check
• Summary

Products: Office 365

Roles: Administrator, Solution Architect, Technology Manager

Level: Intermediate

Subjects: Business Applications, Compliance, Identity Access, Insider Risk, It Management Monitoring, Productivity, Security, Threat Protection

Duration: 49 minutes

View full course details Cancel

Microsoft

Manage user authentication

shield-halved-duotone-light-full Cyber Security
There are multiple options for authentication in Azure AD. Learn how to implement and manage the right authentications for users based on business needs.

Units in this learning path:

• Introduction
• Administer Fido2 Passwordless Authentication Methods
• Explore Authenticator App Oath Token
• Implement Authentication Solution Based Windows Hello for Business
• Exercise Configure Deploy Self Service Password Reset
• Deploy Manage Password Protection
• Configure Smart Lockout Thresholds
• Exercise Manage Azure Ad Smart Lockout Values
• Implement Kerberos Certificate Based Authentication Azure Ad
• Configure Azure Ad User Authentication Virtual Machines
• Knowledge Check
• Summary Resources

Products: Azure, Entra, Entra Id

Roles: Administrator, Identity Access Admin, Security Engineer

Level: Advanced

Subjects: Identity Access

Duration: 52 minutes

View full course details Cancel

Viewing 445-456 of 629