Skip to content
Search

594 courses available

Microsoft

Prepare to teach SC-400 Microsoft Information Protection Administrator

shield-halved-duotone-light-full Cyber Security
Learn about the Microsoft Learn for Educators program and how to best deliver its content to your students. Prepare to deliver Microsoft’s security solutions, SC-400 Microsoft Information Protection Administrator in academic program.

Modules in this learning path:

• Introduction Microsoft Learn Educators Program
• Onboard Microsoft Learn Educators Program
• Microsoft Learn Educators Course Preparation
• Microsoft Learn Educators Course Plan
• Learn Best Practices from Microsoft Technical Trainers
• Get Tips Tricks Teach Sc 400 Information Protection Administrator
• Prepare for Course Delivery
• Close Out Course

Products: Defender For Cloud

Roles: Higher Ed Educator

Level: Beginner

Subjects: Security

Duration: 242 minutes

View full course details Cancel

Microsoft

Prevent data loss

shield-halved-duotone-light-full Cyber Security
Learn how information protection helps organizations protect data to prevent data loss or theft.

Units in this learning path:

• Introduction
• Define Sensitive Data
• Data Loss Prevention
• Summary Knowledge Check

Products: Microsoft Purview, M365, Office 365

Roles: Administrator

Level: Intermediate

Subjects: Information Protection Governance, Threat Protection

Duration: 12 minutes

View full course details Cancel

Microsoft

Prioritize your issues and apply security controls

shield-halved-duotone-light-full Cyber Security
Threat modeling provides you with a list of threats and ways to reduce or eliminate risk, but it doesn't prioritize them for you. Also, there are no layered security control recommendations based on their type and function.

Units in this learning path:

• 1 Introduction
• 1b Priorities Types and Functions
• 2 Prioritize Security Issues
• 3 Categorize Each Security Control Type
• 5 Summary

Products: Azure, Defender For Cloud, M365 Security Center, Defender For Cloud Apps

Roles: Administrator, Developer, Devops Engineer, Security Engineer, Solution Architect

Level: Beginner

Subjects: Threat Protection

Duration: 14 minutes

View full course details Cancel

Microsoft

Protect AI workloads with Microsoft Defender for Cloud

shield-halved-duotone-light-full Cyber Security
Learn how Microsoft Defender for Cloud extends protection to AI workloads across Azure. See how it discovers AI resources, assesses configuration risks, detects active threats, and integrates with Microsoft Defender XDR for unified investigation and response.

Units in this learning path:

• Introduction
• Enable AI Workload Plan
• Data AI Security Dashboard
• Assess Improve AI Posture
• Detect AI Threats
• Investigate AI Alerts Xdr
• Knowledge Check
• Summary

Products: Azure, Microsoft Foundry, Defender For Cloud, Entra Id, Defender Xdr

Roles: Security Engineer

Level: Intermediate

Subjects: Cloud Security

Duration: 38 minutes

View full course details Cancel

Microsoft

Protect Azure Key Vault with Microsoft Defender for Cloud

shield-halved-duotone-light-full Cyber Security
Protect Azure Key Vault with Microsoft Defender for Cloud. Use Defender Cloud Security Posture Management (CSPM) agentless secret scanning to discover exposed credentials, enable Microsoft Defender for Key Vault to detect malicious access patterns, and respond effectively to Key Vault security alerts.

Units in this learning path:

• Introduction
• Posture Management Secret Scanning
• Enable Defender Key Vault
• Investigate Alerts
• Knowledge Check
• Summary

Products: Azure Key Vault, Defender For Cloud, Azure

Roles: Security Engineer

Level: Intermediate

Subjects: Security, Cloud Security

Duration: 32 minutes

View full course details Cancel

Microsoft

Protect Microsoft Foundry solutions by using Microsoft Defender for Cloud

shield-halved-duotone-light-full Cyber Security
Learn how to secure Microsoft Foundry workloads by using Microsoft Defender for Cloud. Discover AI resources across Azure, assess their security posture, protect against runtime threats, and configure model guardrails in Microsoft Foundry to prevent unsafe or policy-violating content.

Modules in this learning path:

• Defender for Cloud AI Understand Protections
• Defender for Cloud AI Protect Workloads
• Azure AI Foundry Configure Manage Guardrails
• Azure AI Foundry Secure Environment

Products: Defender For Cloud, Azure, Microsoft Foundry, Entra Id

Roles: Security Engineer, AI Engineer, Developer

Level: Intermediate

Subjects: Security, Cloud Security, Threat Protection

Duration: 162 minutes

View full course details Cancel

Amazon Web Services

Protect Your Web-facing Workloads with AWS Security Services

shield-halved-duotone-light-full Cyber Security
As network attacks and intrusion attempts become more sophisticated, application developers and network managers have to manage the balance between protecting their boarders from bad guys while still maintaining a positive online presence for…
View full course details Cancel

Microsoft

Protect against malicious attacks and unauthorized access with Microsoft Edge

shield-halved-duotone-light-full Cyber Security
Protect against malicious attacks and unauthorized access with Microsoft Edge

Units in this learning path:

• Introduction
• Understand Secure Foundations of
• Intercept Malicious Attacks Defender Smartscreen
• Enhance Browser Security Defender Application Guard
• Manage Controls Policies for Edge Microsoft Endpoint Manager
• Knowledge Check
• Summary Resources

Products: M365, Office 365, Microsoft Edge

Roles: Administrator

Level: Intermediate

Subjects: Identity Access, Threat Protection

Duration: 24 minutes

View full course details Cancel

Microsoft

Protect against threats with Microsoft Defender for Endpoint

shield-halved-duotone-light-full Cyber Security
Learn how Microsoft Defender for Endpoint can help your organization stay secure.

Units in this learning path:

• Introduction
• Practice Security Administration
• Hunt Threats Within Network
• Summary Knowledge Check

Products: M365, Defender Xdr, Defender Endpoint, Office 365

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Cloud Security, Threat Protection

Duration: 72 minutes

View full course details Cancel

Microsoft

Protect and govern Microsoft 365 data

shield-halved-duotone-light-full Cyber Security
This module provides a comprehensive overview of data protection and governance in Microsoft 365, equipping learners to understand and manage sensitive information, compliance, risk, and secure collaboration.

Units in this learning path:

• Introduction
• Introduction Microsoft Purview
• Identify Respond Data Risks
• Examine Compliance AI Data Discovery
• Explore Data Access Governance
• Explore Data Protection Copilot
• Knowledge Check
• Summary

Products: M365, M365 Admin Center, M365 Enterprise, Microsoft 365 Copilot

Roles: Administrator, Functional Consultant

Level: Beginner

Subjects: Information Protection Governance, Productivity, Insider Risk, Security, Threat Protection

Duration: 62 minutes

View full course details Cancel

Microsoft

Protect and remediate sensitive data in Microsoft Purview

shield-halved-duotone-light-full Cyber Security
Use Data Security Posture Management (DSPM) objectives and remediation workflows to select protection approaches, configure one-click policies, and assess and remediate oversharing risks across the data estate.

Units in this learning path:

• Introduction
• Select Remediation Approaches
• Apply One Click Policies
• Measure Remediation Progress
• Assess Remediate Overexposure
• Knowledge Check
• Summary

Products: M365, Microsoft Purview

Roles: Administrator

Level: Intermediate

Subjects: Information Protection Governance

Duration: 40 minutes

View full course details Cancel

Microsoft

Protect compute, storage, and databases

shield-halved-duotone-light-full Cyber Security
Protect compute, storage, and databases

Modules in this learning path:

• Advanced Security Compute
• Security Storage
• Security Azure SQL Database Azure SQL Managed Instance

Products: Azure, Azure App Service, Azure Blob Storage, Azure Files, Azure Key Vault, Azure SQL Database, Azure SQL Managed Instance, Azure Storage, Azure Table Storage, Ms Graph

Roles: Administrator, Security Engineer

Level: Intermediate

Subjects: Cloud Security

Duration: 249 minutes

View full course details Cancel

Viewing 469-480 of 594