Skip to content
Search

5424 courses available

Microsoft

Secure your cloud data

shield-halved-duotone-light-full Cyber Security
This learning path helps you leverage the built-in Azure services for securing app data, ensuring that only authorized services and clients have access.

Modules in this learning path:

• Secure Azure Storage Account
• Configure and Manage Azure Key Vault
• Secure Azure Resources with Rbac

Products: Azure, Azure Key Vault, Azure Storage, Azure Cosmos Db, Azure Synapse Analytics, Azure SQL Database

Roles: Developer, Administrator

Level: Beginner, Intermediate

Subjects: Cloud Security

Duration: 111 minutes

View full course details Cancel

Microsoft

Secure your hybrid and multicloud machines by using Azure Arc-enabled servers

shield-halved-duotone-light-full Cyber Security
Learn about the benefits of and how to onboard Azure Arc-enabled servers to Microsoft Defender for Cloud, Microsoft Defender for Servers, and Microsoft Sentinel.

Units in this learning path:

• Introduction
• Assess Secure Defend Azure Arc Enabled Servers with Microsoft Defender for Cloud
• Onboard Azure Arc Enabled Servers to Microsoft Defender for Cloud
• Secure Azure Arc Enabled Servers with Microsoft Defender for Servers
• Threat Intelligence for Azure Arc Enabled Servers with Microsoft Sentinel
• Onboard Azure Arc Enabled Servers to Microsoft Sentinel
• Knowledge Check
• Summary

Products: Azure, Azure Arc

Roles: Developer

Level: Beginner

Subjects: Security

Duration: 38 minutes

View full course details Cancel

Microsoft

Secure your identities by using Microsoft Entra ID

gear-duotone-light-full Software Development
Use Microsoft Entra ID to you secure your internal, external, and customer identities.

Units in this learning path:

• 1 Introduction
• 2 Overview
• 3 Understand Licenses Terminology
• 4 Essential Features
• 5 Get Started
• 6 Summary

Products: Azure, Entra Id, Entra External Id, Entra

Roles: Solution Architect, Administrator, Developer

Level: Beginner

Subjects: Cloud Computing, Identity Access

Duration: 27 minutes

View full course details Cancel

Microsoft

Secure your infrastructure with threat modeling

shield-halved-duotone-light-full Cyber Security
Learn how to use the foundation of threat modeling to identify enterprise risks and find ways to reduce or eliminate them.

Units in this learning path:

• 1 Introduction
• 2 Assessment Questions
• 3 Gather Data
• 4 Visualize Risk
• 5 Eliminate Risk
• 6 Summary

Products: Azure, Defender For Cloud, M365 Security Center, Defender For Cloud Apps

Roles: Administrator, Developer, Devops Engineer, Security Engineer, Solution Architect

Level: Beginner, Intermediate

Subjects: Threat Protection

Duration: 72 minutes

View full course details Cancel

Microsoft

Secure, optimize, and deploy database solutions

chart-line-duotone-light-full Data Science
Learn to protect data with encryption and access controls, tune query performance, implement CI/CD pipelines for database projects, and integrate SQL solutions with Azure services.

Modules in this learning path:

• Implement Data Security Compliance
• Optimize Database Performance
• Implement Cicd SQL Database Projects
• Integrate SQL Solutions Azure Services

Products: SQL Server, Azure SQL Database, Azure SQL Managed Instance, Fabric

Roles: Developer, Data Engineer, Database Administrator

Level: Intermediate

Subjects: Databases, Data Management, Devops, Security

Duration: 451 minutes

View full course details Cancel

Amazon Web Services

Securely Connecting AWS IoT Devices to the Cloud

gear-duotone-light-full Software Development
AWS IoT Core provides secure, bidirectional communication between internet-connected devices, such as sensors, actuators, embedded microcontrollers, or smart appliances and the AWS Cloud. In this course, you will learn how to securely connect a…
View full course details Cancel

Microsoft

Securely connect to SAP on Azure

gear-duotone-light-full Software Development
Learn to describe Azure Networking services and components for connecting and securing SAP S/4 HANA in Azure, and learn how different requirements might adjust networking services requirements.

Units in this learning path:

• Introduction
• Explore Scenario
• Support Access to Premises Networks
• Support Access for Regional Roaming
• Access Azure Infrastructure
• Mechanisms Azure Sap Administration
• Knowledge Check
• Summary

Products: Azure, Power Platform

Roles: Administrator, Functional Consultant

Level: Intermediate

Subjects: Cloud Computing, Networking, Identity Access

Duration: 29 minutes

View full course details Cancel

Amazon Web Services

Securing Data in Amazon Elastic File System (Amazon EFS)

shield-halved-duotone-light-full Cyber Security
Amazon Elastic File System (Amazon EFS) provides a simple, serverless, set-and-forget elastic file system for use with AWS Cloud services and on-premises resources. It is built to scale on demand to petabytes without disrupting applications,…
View full course details Cancel

Amazon Web Services

Securing and Protecting Your Data in Amazon Simple Storage Service (Amazon S3)

shield-halved-duotone-light-full Cyber Security
With Amazon S3, you can use a number of different approaches when addressing data protection, including preventing buckets from being publicly accessible, implementing access controls, and encrypting data at rest and in transit. Amazon S3 makes it…
View full course details Cancel

Amazon Web Services

Security Aspects of RDS and Aurora PostgreSQL

shield-halved-duotone-light-full Cyber Security
This course was developed by members of AWS Technical Field Communities (TFC), an AWS community of technical experts. The content is intended to complement our standard training curriculum and augment your AWS learning journey. We are aware some…
View full course details Cancel

Salesforce

Security Basics

shield-halved-duotone-light-full Cyber Security
Educate your users, protect your Salesforce org, and encourage a culture of security.
View full course details Cancel

Amazon Web Services

Security Engineering on AWS - Supplemental Lab Playlist

shield-halved-duotone-light-full Cyber Security
This Playlist is an unordered collection of supplemental labs that have relevance to the classroom training Security Engineerin on AWS. Students of that class may find the labs in this playlist to be useful hands-on practice.
View full course details Cancel

Viewing 4585-4596 of 5424