Skip to content
Search

571 courses available

Microsoft

Protect your endpoint environment with Microsoft Intune

shield-halved-duotone-light-full Cyber Security
In this module, you learn about protecting devices, apps, and data. Additionally, you understand the endpoint environment and the supported platforms available with Microsoft Intune.

Units in this learning path:

• 1 Introduction
• 2 Manage Protect Devices
• 3 Manage Protect Apps
• 4 Manage Protect Data
• 5 Understand Endpoint Environment
• 6 Platform Considerations
• 7 Knowledge Check
• 8 Summary

Products: Mem, M365

Roles: Administrator

Level: Beginner

Subjects: Threat Protection

Duration: 26 minutes

View full course details Cancel

Microsoft

Protect, monitor, and tune a migrated database

shield-halved-duotone-light-full Cyber Security
Protect, monitor, and tune a migrated database

Units in this learning path:

• Introduction
• Protecting Database Server
• Monitor Configure Database Server
• Trace Track Activity
• Configure Read Replicas
• Exercise Protect Monitor Tune Migrated Database
• Knowledge Check
• Summary

Products: Azure

Roles: Data Engineer

Level: Intermediate

Subjects: Cloud Security, Migration

Duration: 66 minutes

View full course details Cancel

Amazon Web Services

Protecting Your Instance with Security Groups

shield-halved-duotone-light-full Cyber Security
In this introductory video, we review how to secure access to your individual instances within AWS. We also explain how to use security groups to control permission and authorize traffic based on the source, defined as IP range, protocol and port.
View full course details Cancel

Microsoft

Provide context with the right depth layer

shield-halved-duotone-light-full Cyber Security
Threat models can get complex if all parties involved can't agree on a data-flow diagram depth layer that provides enough context to satisfy requirements

Units in this learning path:

• 1 Introduction
• 1b Depth Layers
• 2 Layer 0 the System Layer
• 3 Layer 1 the Process Layer
• 4 Layer 2 the Sub Process Layer
• 5 Layer 3 the Lower Level Layer
• 6 Summary

Products: Azure, Defender For Cloud, M365 Security Center, Defender For Cloud Apps

Roles: Administrator, Developer, Devops Engineer, Security Engineer, Solution Architect

Level: Beginner

Subjects: Threat Protection

Duration: 26 minutes

View full course details Cancel

Amazon Web Services

Public Sector New User Non-Technical Learning Plan

shield-halved-duotone-light-full Cyber Security
This training solution is for Public Sector employees and contractors new to using AWS in non-technical roles (e.g., project/program managers, acquisition, finance, and legal professionals). This Learning Path covers AWS Cloud concepts, AWS…
View full course details Cancel

Amazon Web Services

Public Sector New User Technical Learning Plan

shield-halved-duotone-light-full Cyber Security
This training solution is for Public Sector employees and contractors new to using AWS in technical roles (e.g., SysOps administrators, architects, engineers, and developers). This solution covers AWS Cloud concepts, AWS services, security,…
View full course details Cancel

Microsoft

Query logs in Microsoft Sentinel

shield-halved-duotone-light-full Cyber Security
Query logs in Microsoft Sentinel

Units in this learning path:

• Introduction
• Logs Page
• Understand Tables
• Understand Common Tables
• Understand Microsoft 365 Defender Tables
• Knowledge Check
• Summary Resources

Products: Microsoft Sentinel

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Cloud Security

Duration: 18 minutes

View full course details Cancel

Microsoft

Query, visualize, and monitor data in Microsoft Sentinel

shield-halved-duotone-light-full Cyber Security
Learn how to query, visualize, and monitor data in Microsoft Sentinel by using the Azure portal.

Units in this learning path:

• 1 Introduction
• 2 Exercise Setup
• 3 Monitor Visualize Data
• 4 Query Data
• 5 Workbooks
• 6 Create New Workbook
• 7 Exercise Visualize Data
• 8 Summary

Products: Azure, Microsoft Sentinel

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Threat Protection

Duration: 48 minutes

View full course details Cancel

Microsoft

Remediate security alerts using Microsoft Defender for Cloud

shield-halved-duotone-light-full Cyber Security
Remediate security alerts using Microsoft Defender for Cloud

Units in this learning path:

• Introduction
• Understand
• Automate Responses
• Suppress Alerts from
• Generate Threat Intelligence Reports
• Respond to Alerts from Azure Resources
• Knowledge Check
• Summary Resources

Products: Azure, Defender For Cloud

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Security, Threat Protection

Duration: 52 minutes

View full course details Cancel

Microsoft

Remediate threats using Microsoft Defender

shield-halved-duotone-light-full Cyber Security
Learn how to investigate and remediate threats using Microsoft Defender for Office 365. Explore automated tools, phishing triage, and attack simulation.

Units in this learning path:

• Introduction
• Automate Investigate Remediate
• Configure Protect Detect
• Phishing Triage Agent
• Simulate Attacks
• Summary Knowledge Check

Products: Defender Office365, M365, Defender Xdr, Office 365

Roles: Security Engineer, Security Operations Analyst

Level: Intermediate

Subjects: Security, Cloud Security, Threat Protection, Information Protection Governance

Duration: 64 minutes

View full course details Cancel

IBM

Respond and Mitigate Security Threats

shield-halved-duotone-light-full Cyber Security
This credential earner demonstrated their applied knowledge in handling and mitigating threats based on the NIST Incident Response Framework. The earner has identified threats, investigated its nature, responded with a containment plan, eradicated further threat, and created a follow-up report. The earner will build and develop their transferable skills and gain real industry experience.
View full course details Cancel

Microsoft

Review and analyze data classification and protection

shield-halved-duotone-light-full Cyber Security
Review and analyze data classification and protection.

Units in this learning path:

• Introduction
• Information Protection Reports
• Analyze Classified Data
• Monitor Review Actions
• Knowledge Check
• Summary

Products: Microsoft Purview, M365

Roles: Auditor, Administrator, Risk Practitioner

Level: Intermediate

Subjects: Information Protection Governance, Security

Duration: 31 minutes

View full course details Cancel

Viewing 469-480 of 571