Skip to content
Search

629 courses available

Microsoft

Perform device investigations in Microsoft Defender for Endpoint

shield-halved-duotone-light-full Cyber Security
Perform device investigations in Microsoft Defender for Endpoint

Units in this learning path:

• Introduction
• Use Device Inventory List
• Investigate Device
• Use Behavioral Blocking
• Detect Devices with Device Discovery
• Knowledge Check
• Summary Resources

Products: Microsoft Defender, Windows Security, Defender Endpoint

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Cloud Security, Security, Threat Protection, Asset Management

Duration: 35 minutes

View full course details Cancel

Microsoft

Perform evidence and entities investigations using Microsoft Defender for Endpoint

shield-halved-duotone-light-full Cyber Security
Perform evidence and entities investigations using Microsoft Defender for Endpoint

Units in this learning path:

• Introduction
• Investigate File
• Investigate User Account
• Investigate Ip Addresses
• Investigate Domain
• Knowledge Check
• Summary Resources

Products: M365, Defender Endpoint

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Information Protection Governance, Threat Protection

Duration: 36 minutes

View full course details Cancel

Microsoft

Perform threat hunting in Microsoft Sentinel

shield-halved-duotone-light-full Cyber Security
Perform threat hunting in Microsoft Sentinel

Modules in this learning path:

• What Is Threat Hunting Azure Sentinel
• Hunt Threats Sentinel
• Use Search Jobs Microsoft Sentinel
• Perform Threat Hunting Sentinel with Notebooks

Products: Azure, Microsoft Sentinel

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Threat Protection

Duration: 134 minutes

View full course details Cancel

Amazon Web Services

Performing a Basic Audit of your AWS Environment

shield-halved-duotone-light-full Cyber Security
This lab leads you through the steps to perform basic audits of core AWS resources. You will use the AWS Management Console to understand how to audit the use of multiple AWS services, Amazon EC2, Amazon VPC, Amazon IAM, Amazon Security Groups,…
View full course details Cancel

IBM

Plan an Open-Source Intelligence Strategy

shield-halved-duotone-light-full Cyber Security
This credential earner has the advanced competencies to identify potential vulnerabilities in an organization’s infrastructure through planning and executing open-source intelligence (OSINT) techniques. The earner has knowledge of OSINT techniques to execute penetration testing and the practical strategies to enhance organizational security. The earner has developed transferable employability skills and gained real industry experience in a project-based learning opportunity.
View full course details Cancel

Microsoft

Plan and design the integration of enterprise apps for SSO

shield-halved-duotone-light-full Cyber Security
Enterprise app deployment enables control over which users can access the apps, easily log into apps with single-sign-on, and provide integrated usage reports.

Units in this learning path:

• Introduction
• Discover Apps by Using Mcas Adfs App Report
• Configure Connectors Apps
• Implement Access Management for Apps
• Design Implement App Management Roles
• Create Custom Role to Manage App Registration
• Configure Pre Integrated Gallery Saas Apps
• Implement Manage Policies Oauth Apps
• Knowledge Check
• Summary Resources

Products: Entra Workload Identities

Roles: Administrator, Security Engineer

Level: Advanced

Subjects: Cloud Security, Identity Access

Duration: 42 minutes

View full course details Cancel

Microsoft

Plan and implement advanced security for compute

shield-halved-duotone-light-full Cyber Security
This module is designed to provide administrators with the knowledge and skills needed to plan and implement advanced security measures for Azure compute resources, safeguarding applications and data against evolving security threats.

Units in this learning path:

• Introduction
• Remote Access Public Endpoints Include Azure Bastion
• Azure Kubernetes Service Overview
• Best Practices Cluster Isolation Azure Kubernetes Service
• Microsoft Defender Containers
• Best Practices Authentication Authorization
• Monitor Container Resources Azure Container Instances
• Security Considerations Azure Container Instances
• Azure Container Registry Roles Permissions
• Azure Data Encryption
• Azure Security Baseline API Management
• Knowledge Check
• Summary

Products: Azure, Azure Disk Encryption, Azure Virtual Machines, Defender For Cloud, Microsoft Defender, Update Manager

Roles: Administrator, Security Engineer

Level: Intermediate

Subjects: Cloud Security

Duration: 82 minutes

View full course details Cancel

Microsoft

Plan and implement an identity governance strategy

shield-halved-duotone-light-full Cyber Security
Plan and implement an identity governance strategy

Modules in this learning path:

• Plan Implement Entitlement Management
• Plan Implement Manage Access Review
• Plan Implement Privileged Access
• Monitor Maintain Azure Active Directory

Products: Azure, Entra, Entra Identity Governance, Entra Permissions Management, Entra Id

Roles: Administrator, Security Engineer

Level: Intermediate

Subjects: Identity Access

Duration: 198 minutes

View full course details Cancel

Microsoft

Plan and implement privileged access

shield-halved-duotone-light-full Cyber Security
Ensuring that administrative roles are protected and managed to increase your Azure solution security is a must. Explore how to use PIM to protect your data and resources.

Units in this learning path:

• Introduction
• Define Strategy for Administrative Users
• Configure Privileged Identity Management for Azure Resources
• Configure Privileged Identity Management for Azure Ad Roles
• Assign Azure Ad Roles Privileged Identity Management
• Assign Azure Resource Roles Privileged Identity Management
• Plan Configure Privileged Access Groups
• Analyze Privileged Identity Management Audit History Reports
• Create Manage Emergency Access Accounts
• Knowledge Check
• Summary Resources

Products: Azure, Entra, Entra Identity Governance, Entra Id

Roles: Administrator, Identity Access Admin, Security Engineer

Level: Advanced

Subjects: Identity Access

Duration: 62 minutes

View full course details Cancel

Microsoft

Plan and implement security for Azure SQL Database and Azure SQL Managed Instance

shield-halved-duotone-light-full Cyber Security
This module is designed to empower administrators with the knowledge and skills needed to plan and implement robust security measures for Azure SQL Database and Azure SQL Managed Instance, ensuring data protection and regulatory compliance.

Units in this learning path:

• Introduction
• Azure SQL Database
• Authorize Database Access
• Database Audit
• Microsoft Purview Governance Portal Use Cases
• Implement Data Classification Sensitive Information
• Dynamic Data Mask
• Transparent Data Encryption
• Always Encrypted
• Implement an Azure SQL Database Firewall
• Knowledge Check
• Summary

Products: Azure, Azure SQL Database, Azure SQL Managed Instance

Roles: Administrator, Security Engineer

Level: Intermediate

Subjects: Security

Duration: 78 minutes

View full course details Cancel

Microsoft

Plan and implement security for private access to Azure resources

shield-halved-duotone-light-full Cyber Security
This module focuses on equipping administrators with the knowledge and skills required to plan and implement robust security measures for private access to Azure resources, safeguarding sensitive data and enhancing network integrity.

Units in this learning path:

• Introduction
• Virtual Network Service Endpoints
• Private Endpoints
• Azure Private Link Services
• Integrate Your App with Azure Virtual Network
• Network Security Configurations App Service Environment
• Network Security Configurations Azure SQL Managed Instance
• Knowledge Check
• Summary

Products: Azure App Service, Azure Functions, Azure Virtual Network

Roles: Administrator, Security Engineer

Level: Intermediate

Subjects: Security

Duration: 56 minutes

View full course details Cancel

Microsoft

Plan and implement security for public access to Azure resources

shield-halved-duotone-light-full Cyber Security
Plan and implement security for public access to Azure resources

Units in this learning path:

• Introduction
• Plan Implement Transport Layer Security
• Azure Firewall Azure Firewall Manager Firewall Policies
• Azure Application Gateway
• Azure Web Application Firewall
• Front Door Content Development Network
• Azure Distributed Denial of Service Protection
• Knowledge Check
• Summary

Products: Azure App Service, Azure Application Gateway, Azure Ddos Protection, Azure Firewall Manager, Azure Front Door, Azure Web Application Firewall

Roles: Administrator, Security Engineer

Level: Intermediate

Subjects: Security

Duration: 61 minutes

View full course details Cancel

Viewing 481-492 of 629