629 courses available
Microsoft
Manage permissions, roles, and role groups in Microsoft 365
Cyber SecurityUnits in this learning path:
• Introduction
• Examine Roles Microsoft 365 Permission Model
• Manage Roles Across Microsoft 365 Ecosystem
• Explore Admin Roles Microsoft 365
• Examine Best Practices Administrative Roles
• Assign Admin Roles Users Microsoft 365
• Delegate Admin Roles Partners
• Implement Role Groups Microsoft 365
• Manage Permissions Use Administrative Units
• Manage Sharepoint Permissions Prevent Oversharing
• Elevate Privileges Use Privileged Identity Management
• Knowledge Check
• Summary
Products: Office 365
Roles: Administrator, Solution Architect, Technology Manager
Level: Intermediate
Subjects: Business Applications, Compliance, Identity Access, Insider Risk, It Management Monitoring, Productivity, Security, Threat Protection
Duration: 66 minutes
Microsoft
Manage records and disposition with Microsoft Purview
Cyber SecurityUnits in this learning path:
• Introduction
• Plan Retention Disposition
• Retention Label File Plan
• Auto Apply Retention Label
• Exercise Create Auto Apply
• Declare Record
• Disposition Review
• Exercise Disposition Review
• Principles Retention
• Knowledge Check
• Summary
Products: Microsoft Purview, M365
Roles: Risk Practitioner
Level: Intermediate
Subjects: Information Protection Governance
Duration: 73 minutes
Microsoft
Manage scoped administration and delegation with Microsoft Intune and Intune for Education
Cyber SecurityUnits in this learning path:
• Introduction
• Implement Rbac
• Scope Tags
• Knowledge Check
• Summary
Products: M365, Intune
Roles: Administrator
Level: Beginner
Subjects: Identity Access, Cloud Computing, Device Management
Duration: 9 minutes
Microsoft
Manage secure user access in Microsoft 365
Cyber SecurityUnits in this learning path:
• Introduction
• Examine Identity Access Tools
• Manage User Passwords
• Implement Conditional Access Policies
• Enable Pass Through Authentication
• Implement Multi Factor Authentication
• Explore Passwordless Authentication Options
• Explore Self Service Password Management
• Implement Smart Lockout
• Explore Security Defaults Entra Id
• Investigate Authentication Issues
• Knowledge Check
• Summary
Products: M365, Office 365
Roles: Administrator, Solution Architect, Technology Manager
Level: Intermediate
Subjects: Business Applications, Compliance, Identity Access, Insider Risk, It Management Monitoring, Productivity, Security, Threat Protection
Duration: 80 minutes
Microsoft
Manage security controls for identity and access
Cyber SecurityUnits in this learning path:
• Introduction
• Identity Management Privileged Access
• Microsoft Entra Id Overview
• Secure Microsoft Entra Users
• Create New User
• Secure Microsoft Entra Groups
• Recommend When Use External Identities
• Secure External Microsoft Entra Identities
• Microsoft Entra Identity Protection
• Microsoft Entra Connect
• Microsoft Entra Cloud Sync
• Authentication Options
• Password Hash Synchronization with Microsoft Entra Id
• Microsoft Entra Pass Through Authentication
• Federation with Microsoft Entra Id
• What Microsoft Entra Authentication
• Configure Microsoft Entra Multifactor Authentication Settings
• Kerberos Authentication
• New Technology Local Area Network Manager
• Passwordless Authentication Options
• Passwordless Authentication
• Enforce Premises Microsoft Entra Password Protection
• Microsoft Entra Id Single Sign on
• Configure Microsoft Entra Single Sign on
• Integrate Applications with Microsoft Entra Id
• Microsoft Entra Verified Id
• Configure Microsoft Entra Verified Id
• Microsoft Entra Id Authentication Verification Methods
• Azure Management Groups
• Configure Azure Role Permissions
• Azure Role Based Access Control
• Azure Built in Roles
• Assign Azure Role Permissions
• Microsoft Entra Built in Roles
• Built Roles Microsoft Entra Id
• Microsoft Entra Role Based Access Control
• Create New Custom Roles Microsoft Entra Id
• Zero Trust Security
• Microsoft Entra Privileged Identity Management
• Configure Privileged Identity Management
• Microsoft Entra Id Governance
• Identity Lifecycle Management
• Lifecycle Workflows
• Entitlement Management
• Delegation Roles Entitlement Management
• Access Reviews
• Configure Role Management Access Reviews Microsoft Entra Id Governance
• Conditional Access
• Understand Azure Lighthouse
• Knowledge Check
• Summary
Products: Azure Rbac, Entra, Entra External Id, Entra Id, Entra Id Protection, Entra Permissions Management, Entra Verified Id
Roles: Security Engineer
Level: Intermediate
Subjects: Cloud Security
Duration: 367 minutes
Microsoft
Manage security for Azure Virtual Desktop
Cyber SecurityUnits in this learning path:
• Introduction
• Security Recommendations Azure Virtual Desktop
• Configure Microsoft Defender Cloud
• Configure Session Host Protection Microsoft Defender
• Trust Principles Azure Virtual Desktop
• Plan Implement Conditional Access Policies for Connections to Azure Virtual Desk
• Security Posture Management Threat Protection
• Knowledge Check
• Summary
Products: Azure, Azure Virtual Desktop, Azure Virtual Machines
Roles: Administrator, Solution Architect
Level: Intermediate
Subjects: Security
Duration: 41 minutes
Microsoft
Manage security operations in Azure
Cyber SecurityModules in this learning path:
• Create Security Baselines
• Identify Threats with Azure Security Center
• Capture Application Logs App Service
Products: Azure, Azure Policy, Azure Key Vault, Entra Id, Azure API Management
Roles: Administrator, Security Engineer
Level: Beginner, Intermediate
Subjects: Security
Duration: 158 minutes
Microsoft
Manage security posture by using Microsoft Defender for Cloud
Cyber SecurityUnits in this learning path:
• Introduction
• Implement Microsoft Defender for Cloud
• Secure Score
• Regulatory Compliance Dashboard
• Microsoft Cloud Security Benchmark
• Microsoft Defender for Cloud Secure Score
• Connect Hybrid Cloud Multi Cloud Environments
• Microsoft Defender External Attack Surface Management
• Knowledge Check
• Summary
Products: Azure, Defender For Cloud
Roles: Administrator, Security Engineer
Level: Intermediate
Subjects: Cloud Security, Threat Protection
Duration: 65 minutes
Microsoft
Manage sensitive data and security policies within GitHub
Cyber SecurityUnits in this learning path:
• Introduction
• Set Security Policies
• Scrub Sensitive Data from Repository
• Report Logs
• Exercise
• Knowledge Check
• Summary
Products: Github
Roles: Devops Engineer, Administrator, Developer, Solution Architect
Level: Intermediate
Subjects: Information Protection Governance
Duration: 96 minutes
Microsoft
Manage synchronized identities
Cyber SecurityUnits in this learning path:
• Introduction
• Manage Users Directory Synchronization
• Manage Groups Directory Synchronization
• Use Azure Active Directory Connect Sync Security Groups
• Configure Object Filters Directory Synchronization
• Explore Microsoft Identity Management
• Troubleshoot Directory Synchronization
• Knowledge Check
• Summary
Products: M365, Office 365
Roles: Administrator, Solution Architect, Technology Manager
Level: Intermediate
Subjects: Business Applications, Compliance, Identity Access, Insider Risk, It Management Monitoring, Productivity, Security, Threat Protection
Duration: 46 minutes
Microsoft
Manage tenant health and services in Microsoft 365
Cyber SecurityUnits in this learning path:
• Introduction
• Monitor Health Microsoft 365 Services
• Monitor Tenant Health Use Adoption Score
• Monitor Tenant Health Use Usage Analytics
• Implement Microsoft 365 Network Connectivity
• Implement Microsoft 365 Backup
• Develop Incident Response Plan
• Request Assistance from Microsoft
• Knowledge Check
• Summary
Products: Office 365
Roles: Administrator, Solution Architect, Technology Manager
Level: Intermediate
Subjects: Business Applications, Compliance, Identity Access, Insider Risk, It Management Monitoring, Productivity, Security, Threat Protection
Duration: 49 minutes
Microsoft
Manage user authentication
Cyber SecurityUnits in this learning path:
• Introduction
• Administer Fido2 Passwordless Authentication Methods
• Explore Authenticator App Oath Token
• Implement Authentication Solution Based Windows Hello for Business
• Exercise Configure Deploy Self Service Password Reset
• Deploy Manage Password Protection
• Configure Smart Lockout Thresholds
• Exercise Manage Azure Ad Smart Lockout Values
• Implement Kerberos Certificate Based Authentication Azure Ad
• Configure Azure Ad User Authentication Virtual Machines
• Knowledge Check
• Summary Resources
Products: Azure, Entra, Entra Id
Roles: Administrator, Identity Access Admin, Security Engineer
Level: Advanced
Subjects: Identity Access
Duration: 52 minutes
Viewing 445-456 of 629