Skip to content
Search

629 courses available

Microsoft

Mitigate threats using Microsoft Purview

shield-halved-duotone-light-full Cyber Security
Use Microsoft Purview to discover, classify, and protect sensitive data in your organization. This learning path aligns with exam SC-200: Microsoft Security Operations Analyst.

Modules in this learning path:

• Purview Data Loss Prevention Alerts
• Purview Insider Risk Investigate Alerts
• Purview Audit Search Investigate
• Purview Ediscovery Search

Products: M365, Microsoft Purview, Microsoft Defender

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Compliance, Information Protection Governance, Insider Risk, Security, Threat Protection

Duration: 262 minutes

View full course details Cancel

Microsoft

Mitigate threats using Microsoft Security Copilot

shield-halved-duotone-light-full Cyber Security
Mitigate threats using Microsoft Security Copilot

Modules in this learning path:

• Fundamentals Generative AI
• Security Copilot Getting Started
• Security Copilot Describe Core Features
• Security Copilot Embedded Experiences
• Security Copilot Exercises

Products: Microsoft Sentinel, Defender Endpoint, Microsoft Defender, Defender Xdr

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Cloud Security, Security, Threat Protection

Duration: 389 minutes

View full course details Cancel

Cisco Networking Academy

Network Defense

shield-halved-duotone-light-full Cyber Security
This course is the fifth in the six-course Junior Cybersecurity Analyst Pathway, aligned to the CCST (Cisco Certified Support Technician) Cybersecurity certification. This course covers ways to monitor your network and how to evaluate security alerts. Delve into the tools and techniques used to protect a network, including access control, firewalls, cloud security, and cryptography. These monitoring and defense tools, along with others, work together to create a layered defense-in-depth cybersecurity strategy. The knowledge and skills that you learn will help you defend networks against many types of attacks and quickly react to any exploits that may occur.
View full course details Cancel

Cisco Networking Academy

Networking Basics

shield-halved-duotone-light-full Cyber Security
This course is the second in the six-course Junior Cybersecurity Analyst Pathway, aligned to the CCST (Cisco Certified Support Technician) Cybersecurity certification, and the first in the four-course Network Technican Pathway, aligned to the CCST Networking certification. This course covers the foundation of networking and network devices, media, and protocols. You will observe data flowing through a network and configure devices to connect to networks. Finally, you will learn how to use different network applications and protocols to accomplish networking tasks.
View full course details Cancel

Cisco Networking Academy

Networking Devices and Initial Configuration

shield-halved-duotone-light-full Cyber Security
This course is the third in the six-course Junior Cybersecurity Analyst Pathway, aligned to the CCST (Cisco Certified Support Technician) Cybersecurity certification and the second in the four-course Network Technican Pathway, aligned to the CCST Networking certification. This course covers the essentials of network devices and how to configure them. Learn the characteristics and benefits of Cloud and Virtualization technologies. Explore how to provide Internet Protocol (IP) addresses to devices both manually and automatically. Using this knowledge, you will calculate an IP addressing scheme, configure Cisco devices to create a small network, and test for connectivity issues.
View full course details Cancel

Amazon Web Services

Official Practice Question Set: AWS Certified Security - Specialty (SCS-C02 - English)

shield-halved-duotone-light-full Cyber Security
The Official Practice Question Set: AWS Certified Security - Specialty (SCS-C02) consists of 20 questions. This question set aligns with the SCS-C02 version of the exam and exam guide. If you are looking for an assessment that is the same length…
View full course details Cancel

Microsoft

Onboard your first OT sensor to Microsoft Defender for IoT

shield-halved-duotone-light-full Cyber Security
Learn how to onboard an OT sensor as part of the deployment of Microsoft Defender for IoT to monitor your OT network.

Units in this learning path:

• Introduction
• Describe Process Onboard
• Plan to Onboard Sensor
• Exercise Onboard Sensor
• Knowledge Check
• Summary

Products: Defender For Iot

Roles: Technology Manager

Level: Intermediate

Subjects: Security

Duration: 16 minutes

View full course details Cancel

IBM

Perform Risk Assessment and Prioritization

shield-halved-duotone-light-full Cyber Security
This credential earner demonstrated their applied knowledge in assessing and prioritizing risks for an organization. The earner has identified security anomalies on the system, performed risk assessments, and provided recommendations based on priority risk. The earner will build and develop their transferable skills and gain real industry experience.
View full course details Cancel

Microsoft

Perform Windows Server secure administration

shield-halved-duotone-light-full Cyber Security
Perform Windows Server secure administration

Units in this learning path:

• Introduction
• Define Least Privilege Administration
• Implement Delegated Privileges
• Use Privileged Access Workstations
• Use Jump Servers
• Knowledge Check
• Summary

Products: Windows Server

Roles: Administrator, Solution Architect, Technology Manager

Level: Intermediate

Subjects: Device Management, Identity Access, Threat Protection

Duration: 40 minutes

View full course details Cancel

Microsoft

Perform actions on a device using Microsoft Defender for Endpoint

shield-halved-duotone-light-full Cyber Security
Perform actions on a device using Microsoft Defender for Endpoint

Units in this learning path:

• Introduction
• Understand Device Actions
• Run Antivirus Scan Devices
• Collect Investigation Package from Devices
• Initiate Live Response Session
• Knowledge Check
• Summary Resources

Products: M365, M365 Security Center, Defender Endpoint

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Cloud Security, Security, Threat Protection

Duration: 35 minutes

View full course details Cancel

Microsoft

Perform basic Azure Management Tasks (Security and Monitoring)

shield-halved-duotone-light-full Cyber Security
Perform basic Azure Management Tasks (Security and Monitoring)

Modules in this learning path:

• Microsoft Defender Cloud Threat Protection
• Configure and Manage Azure Key Vault
• Introduction Azure Firewall
• Create Configure Log Analytics Workspace

Products: Azure, Azure Firewall, Azure Key Vault, Azure Kubernetes Service, Azure Log Analytics, Azure Virtual Machines, Azure Virtual Network, Defender For Cloud

Roles: Security Engineer

Level: Intermediate

Subjects: Cloud Security

Duration: 305 minutes

View full course details Cancel

Microsoft

Perform basic identity and access tasks

shield-halved-duotone-light-full Cyber Security
Learn to create and manage identity and access using Microsoft Entra ID. Explore the basics of creating users, groups, and how to control access with conditional access.

Modules in this learning path:

• Create Configure Manage Identities
• Explore Authentication Capabilities of Azure Ad
• Explore Access Management Capabilities of Azure Ad
• Describe Identity Protection Governance Capabilities of Azure Ad
• Get Started Identity Access Labs

Products: Entra

Roles: Administrator, Identity Access Admin

Level: Beginner

Subjects: Identity Access

Duration: 227 minutes

View full course details Cancel

Viewing 469-480 of 629