Skip to content
Search

594 courses available

Microsoft

Plan, implement, and administer Conditional Access

shield-halved-duotone-light-full Cyber Security
Conditional Access gives a fine granularity of control over which users and identities can do specific activities, access which resources, and how to ensure data and systems are safe—including AI agent identities managed through Microsoft Entra Agent ID.

Units in this learning path:

• Introduction
• Plan Security Defaults
• Exercise Working with Security Defaults
• Plan Policies
• Implement Policy Controls Assignments
• Exercise Implement Conditional Access Policies Roles Assignments
• Test Troubleshoot Policies
• Implement Application Controls
• Implement Session Management
• Exercise Configure Authentication Session Controls
• Implement Continuous Access Evaluation
• Knowledge Check
• Summary Resources

Products: Azure, Entra, Entra Id

Roles: Administrator, Identity Access Admin, Security Engineer

Level: Advanced

Subjects: Identity Access

Duration: 65 minutes

View full course details Cancel

Microsoft

Plan, implement, and manage access review

shield-halved-duotone-light-full Cyber Security
Once identity is deployed, proper governance using access reviews is necessary for a secure solution. Explore how to plan for and implement access reviews.

Units in this learning path:

• Introduction
• Plan for Access Reviews
• Create Access Reviews for Groups Apps
• Create Configure Access Review Programs
• Monitor Findings
• Automate Management Tasks
• Configure Recurring Access Reviews
• Access Review Agent
• Knowledge Check
• Summary Resources

Products: Azure, Entra, Entra Identity Governance, Entra Id

Roles: Administrator, Identity Access Admin, Security Engineer

Level: Advanced

Subjects: Identity Access

Duration: 50 minutes

View full course details Cancel

Amazon Web Services

Planning an AWS Outposts Implementation

shield-halved-duotone-light-full Cyber Security
In this course, you learn about implementation planning for AWS Outposts, including security responsibilities, facilities requirements, networking requirements, and where to deploy your code. You learn how Outposts works with the AWS Region and…
View full course details Cancel

Amazon Web Services

PostgreSQL Extensions

shield-halved-duotone-light-full Cyber Security
This course was developed by members of AWS Technical Field Communities (TFC), an AWS community of technical experts. The content is intended to complement our standard training curriculum and augment your AWS learning journey. We are aware some…
View full course details Cancel

Amazon Web Services

PostgreSQL Security

shield-halved-duotone-light-full Cyber Security
Cloud security at Amazon Web Services (AWS) is the highest priority. AWS customers benefit from a data center and network architecture that are built to meet the requirements of the most security-sensitive organizations. This course will cover…
View full course details Cancel

Amazon Web Services

PostgreSQL for Amazon Aurora and RDS - Core Concepts Learning Plan

shield-halved-duotone-light-full Cyber Security
This course was developed by members of AWS Technical Field Communities (TFC), an AWS community of technical experts. The content is intended to complement our standard training curriculum and augment your AWS learning journey. We are aware some…
View full course details Cancel

Microsoft

Prepare Microsoft Entra ID and Intune for device management

shield-halved-duotone-light-full Cyber Security
Learn how to prepare Microsoft Entra ID for device management and implement various device enrollment methods in Microsoft Intune.

Units in this learning path:

• Introduction
• Set Up Microsoft Entra Id Roles Licensing
• Configure Tenant Device Onboarding
• Choose Explain Enrollment Methods
• Knowledge Check
• Summary

Products: Mem, M365, Intune, Entra Id

Roles: Administrator, Security Engineer

Level: Intermediate

Subjects: Device Management, Identity Access, Security

Duration: 29 minutes

View full course details Cancel

Microsoft

Prepare for Microsoft Purview Insider Risk Management

shield-halved-duotone-light-full Cyber Security
Prepare for Microsoft Purview Insider Risk Management.

Units in this learning path:

• Introduction
• Plan Insider Risk Management
• Insider Risk Management Prerequisites
• Configure Insider Risk Settings
• Insider Risk Management Integrations
• Knowledge Check
• Summary

Products: Microsoft Purview, M365

Roles: Auditor, Administrator, Risk Practitioner

Level: Intermediate

Subjects: Information Protection Governance, Security

Duration: 36 minutes

View full course details Cancel

Microsoft

Prepare the environment for a Microsoft Teams deployment

shield-halved-duotone-light-full Cyber Security
Prepare the environment for a Microsoft Teams deployment

Modules in this learning path:

• Manage Access for External Users
• Implement Security for Microsoft Teams
• Implement Compliance for Microsoft Teams
• Plan Configure Network Settings for Microsoft Teams

Products: M365, Office Teams

Roles: Administrator

Level: Intermediate

Subjects: Communication, Identity Access

Duration: 200 minutes

View full course details Cancel

Microsoft

Prepare to deploy Microsoft Defender for IoT

shield-halved-duotone-light-full Cyber Security
Learn how to prepare your deployment of Microsoft Defender for IoT to monitor your OT network.

Units in this learning path:

• Introduction
• Describe Process to Prepare
• Examine Network Diagram
• Identify the Devices and Subnets
• Determine Traffic Mirroring Method
• Review Appliance Options
• Summary

Products: Defender For Iot

Roles: Solution Architect

Level: Intermediate

Subjects: Security

Duration: 33 minutes

View full course details Cancel

Microsoft

Prepare to teach AZ-500 Microsoft Azure Security Technologies

shield-halved-duotone-light-full Cyber Security
Prepare to teach AZ-500 Microsoft Azure Security Technologies

Modules in this learning path:

• Introduction Microsoft Learn Educators Program
• Onboard Microsoft Learn Educators Program
• Microsoft Learn Educators Course Preparation
• Microsoft Learn Educators Course Plan
• Learn Best Practices from Microsoft Technical Trainers
• Get Tips Tricks for Teach Az 500 Microsoft Azure Security Technologies
• Prepare for Course Delivery
• Close Out Course

Products: Azure

Roles: Higher Ed Educator

Level: Advanced

Subjects: Security

Duration: 201 minutes

View full course details Cancel

Microsoft

Prepare to teach SC-300 Microsoft Identity and Access Administrator

shield-halved-duotone-light-full Cyber Security
Learn about the Microsoft Learn for Educators program and how to best deliver its content to your students. Prepare to deliver Microsoft’s security solutions, SC-900 Microsoft Security, Compliance, and Identity Fundamentals in academic program.

Modules in this learning path:

• Introduction Microsoft Learn Educators Program
• Onboard Microsoft Learn Educators Program
• Microsoft Learn Educators Course Preparation
• Microsoft Learn Educators Course Plan
• Learn Best Practices from Microsoft Technical Trainers
• Get Tips Tricks Teach Sc 300 Identity Access Administrator
• Prepare for Course Delivery
• Close Out Course

Products: Azure

Roles: Higher Ed Educator

Level: Beginner

Subjects: Security

Duration: 250 minutes

View full course details Cancel

Viewing 457-468 of 594