Skip to content
Search

629 courses available

Microsoft

Manage user profiles

shield-halved-duotone-light-full Cyber Security
Students learn about the benefits of various Windows user profiles, how to manage them, and how to facilitate profile data synchronization across multiple devices.

Units in this learning path:

• Introduction
• Examine User Profile
• Explore User Profile Types
• Examine Options Minimizing User Profile Size
• Deploy Configure Folder Redirection
• Sync User State Enterprise State Roaming
• Configure Enterprise State Roaming Azure
• Knowledge Check
• Summary

Products: Mem, Configuration Manager, Intune, Windows

Roles: Administrator

Level: Intermediate

Subjects: Identity Access, Storage

Duration: 25 minutes

View full course details Cancel

Microsoft

Manage users and implement security in Dynamics 365 Business Central

shield-halved-duotone-light-full Cyber Security
Learn how to manage users and implement security in Business Central.

Units in this learning path:

• 1 Add
• 2 Group
• 3 Permissions
• 4 Configure
• 5 Understand
• 5a User Setup
• 6 Audit
• 7 Exercise
• 8 Check
• 9 Summary

Products: Dynamics 365, Dynamics Business Central

Roles: Functional Consultant, Business User, Administrator

Level: Intermediate

Subjects: Identity Access

Duration: 96 minutes

View full course details Cancel

Microsoft

Manage users, licenses, guests, and contacts in Microsoft 365

shield-halved-duotone-light-full Cyber Security
This module provides instruction on how to create and manage user accounts, assign Microsoft 365 licenses to users, recover deleted user accounts, and create and manage guests and contacts.

Units in this learning path:

• Introduction
• Determine User Identity Model
• Create User Accounts Microsoft 365
• Manage User Account Settings Microsoft 365
• Manage User Licenses Microsoft 365
• Recover Deleted User Accounts Microsoft 365
• Perform Bulk User Maintenance
• Create Manage Guest Users
• Collaborate with Guests Sharepoint Site
• Create Manage Contacts
• Knowledge Check
• Summary

Products: Office 365

Roles: Administrator, Solution Architect, Technology Manager

Level: Intermediate

Subjects: Business Applications, Compliance, Identity Access, Insider Risk, It Management Monitoring, Productivity, Security, Threat Protection

Duration: 54 minutes

View full course details Cancel

Microsoft

Manage your cloud security posture management​

shield-halved-duotone-light-full Cyber Security
Manage your cloud security posture management​

Units in this learning path:

• Introduction
• Explore Secure Score
• Explore Recommendations
• Measure Enforce Regulatory Compliance
• Understand Workbooks
• Knowledge Check
• Summary Resources

Products: Azure, Defender For Cloud

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Cloud Security, Compliance, Security

Duration: 21 minutes

View full course details Cancel

Microsoft

Microsoft Azure Well-Architected Framework - Security

shield-halved-duotone-light-full Cyber Security
Discover the tools that Azure provides to help you design a secure environment throughout your infrastructure, data, network, and applications.

Units in this learning path:

• 1 Introduction
• Plan Your Security Readiness
• Design to Protect Confidentiality
• Design to Protect Integrity
• Design to Protect Availability
• Sustain and Evolve Your Security Posture
• Summary

Products: Azure, Entra Id

Roles: Solution Architect, Security Engineer

Level: Intermediate

Subjects: Cloud Security

Duration: 54 minutes

View full course details Cancel

Microsoft

Microsoft Intune fundamentals

shield-halved-duotone-light-full Cyber Security
This learning path will help you understand the fundamentals concepts involved in managing your endpoint environment.

Modules in this learning path:

• Intro to Endpoint Manager
• Protect Endpoints with Endpoint Manager
• Manage Devices with Microsoft Endpoint Manager
• App Management Using Microsoft Endpoint Manager
• Policy Security Management Using Microsoft Endpoint Manager
• Compliance Endpoint Manager
• Benefits Microsoft Endpoint Manager

Products: Mem

Roles: Administrator

Level: Beginner

Subjects: Threat Protection, Information Protection Governance

Duration: 221 minutes

View full course details Cancel

Microsoft

Microsoft Learn for Educators preparing for course delivery

shield-halved-duotone-light-full Cyber Security
Microsoft Learn for Educators preparing for course delivery

Units in this learning path:

• Introduction
• Prepare Course Delivery
• Get Ready Teach Checklist
• Close Out Course
• Knowledge Check
• Summary

Products: Azure

Roles: Higher Ed Educator

Level: Advanced

Subjects: Security

Duration: 18 minutes

View full course details Cancel

Microsoft

Microsoft Learn for Educators student certification

shield-halved-duotone-light-full Cyber Security
Microsoft Learn for Educators student certification

Units in this learning path:

• Introduction
• Get Students Certified Fundamentals
• Get Students Certified Advanced Role Based
• Knowledge Check
• Summary

Products: Azure

Roles: Higher Ed Educator

Level: Advanced

Subjects: Security

Duration: 15 minutes

View full course details Cancel

Microsoft

Mitigate incidents using Microsoft Defender

shield-halved-duotone-light-full Cyber Security
Mitigate incidents using Microsoft Defender

Units in this learning path:

• Introduction
• Use Microsoft Security Center Portal
• Manage Incidents
• Investigate Incidents
• Manage Investigate Alerts
• Manage Automated Investigations
• Use Action Center
• Conduct Advanced Hunting
• Investigate Azure Ad Sign in Logs
• Understand Microsoft Secure Score
• Analyze Threat Analytics
• Analyze Reports
• Configure Microsoft 365 Defender Portal
• Knowledge Check
• Summary Resources

Products: Defender Xdr, Microsoft Defender, Microsoft Sentinel

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Security, Cloud Security, Threat Protection

Duration: 75 minutes

View full course details Cancel

Microsoft

Mitigate threats using Microsoft Defender XDR

shield-halved-duotone-light-full Cyber Security
Mitigate threats using Microsoft Defender XDR

Modules in this learning path:

• Introduction Microsoft 365 Threat Protection
• Mitigate Incidents Microsoft 365 Defender
• M365 Threat Remediate
• Manage Azure Ad Identity Protection
• M365 Threat Safeguard
• Cloud App Security

Products: Defender For Cloud Apps, Defender Identity, Defender Office365, Entra Id Protection, Defender Endpoint, Microsoft Defender, Defender Xdr

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Cloud Security, Security, Threat Protection

Duration: 339 minutes

View full course details Cancel

Microsoft

Mitigate threats using Microsoft Defender for Cloud

shield-halved-duotone-light-full Cyber Security
Mitigate threats using Microsoft Defender for Cloud

Modules in this learning path:

• What Is Azure Defender
• Connect Azure Assets to Azure Defender
• Connect Non Azure Machines to Azure Defender
• Manage Cloud Security Posture Management
• Understand Azure Defender Cloud Workload Protection
• Remediate Azure Defender Security Alerts

Products: Azure, Defender For Cloud, Mdeasm

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Compliance, Threat Protection

Duration: 257 minutes

View full course details Cancel

Microsoft

Mitigate threats using Microsoft Defender for Endpoint

shield-halved-duotone-light-full Cyber Security
Mitigate threats using Microsoft Defender for Endpoint

Modules in this learning path:

• M365 Security Threat Protect
• Deploy Microsoft Defender for Endpoints Environment
• Implement Windows 10 Security Enhancements with Microsoft Defender for Endpoint
• Perform Device Investigations Microsoft Defender for Endpoints
• Perform Actions Device Microsoft Defender for Endpoint
• Perform Evidence Entities Investigations Microsoft Defender for Endpoint
• Configure Manage Automation Microsoft Defender for Endpoint
• Configure Settings for Alerts Detections Microsoft Defender for Endpoint
• Use Threat Vulnerability Management Microsoft Defender for Endpoint

Products: Intune, Windows, Defender Xdr, Defender Endpoint, Microsoft Defender

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Compliance, Device Management, Security, Threat Protection

Duration: 349 minutes

View full course details Cancel

Viewing 457-468 of 629