Skip to content
Search

594 courses available

Microsoft

Provide context with the right depth layer

shield-halved-duotone-light-full Cyber Security
Threat models can get complex if all parties involved can't agree on a data-flow diagram depth layer that provides enough context to satisfy requirements

Units in this learning path:

• 1 Introduction
• 1b Depth Layers
• 2 Layer 0 the System Layer
• 3 Layer 1 the Process Layer
• 4 Layer 2 the Sub Process Layer
• 5 Layer 3 the Lower Level Layer
• 6 Summary

Products: Azure, Defender For Cloud, M365 Security Center, Defender For Cloud Apps

Roles: Administrator, Developer, Devops Engineer, Security Engineer, Solution Architect

Level: Beginner

Subjects: Threat Protection

Duration: 26 minutes

View full course details Cancel

Amazon Web Services

Public Sector New User Non-Technical Learning Plan

shield-halved-duotone-light-full Cyber Security
This training solution is for Public Sector employees and contractors new to using AWS in non-technical roles (e.g., project/program managers, acquisition, finance, and legal professionals). This Learning Path covers AWS Cloud concepts, AWS…
View full course details Cancel

Amazon Web Services

Public Sector New User Technical Learning Plan

shield-halved-duotone-light-full Cyber Security
This training solution is for Public Sector employees and contractors new to using AWS in technical roles (e.g., SysOps administrators, architects, engineers, and developers). This solution covers AWS Cloud concepts, AWS services, security,…
View full course details Cancel

Microsoft

Query logs in Microsoft Sentinel

shield-halved-duotone-light-full Cyber Security
Query logs in Microsoft Sentinel

Units in this learning path:

• Introduction
• Logs Page
• Understand Tables
• Understand Common Tables
• Understand Microsoft 365 Defender Tables
• Knowledge Check
• Summary Resources

Products: Microsoft Sentinel

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Cloud Security

Duration: 18 minutes

View full course details Cancel

Microsoft

Query, visualize, and monitor data in Microsoft Sentinel

shield-halved-duotone-light-full Cyber Security
Learn how to query, visualize, and monitor data in Microsoft Sentinel by using the Azure portal.

Units in this learning path:

• 1 Introduction
• 2 Exercise Setup
• 3 Monitor Visualize Data
• 4 Query Data
• 5 Workbooks
• 6 Create New Workbook
• 7 Exercise Visualize Data
• 8 Summary

Products: Azure, Microsoft Sentinel

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Threat Protection

Duration: 48 minutes

View full course details Cancel

Microsoft

Reduce data exposure risk with Data Security Posture Management in Microsoft Purview

shield-halved-duotone-light-full Cyber Security
Reduce data exposure risk by using Data Security Posture Management in Microsoft Purview to assess posture, protect sensitive data, and investigate risks.

Modules in this learning path:

• Purview Data Security Posture Management Understand
• Purview Dspm Assess Data Security Posture
• Purview Data Security Posture Management Protect Remediate
• Purview Data Security Posture Management Investigate Risks

Products: Microsoft Purview, M365

Roles: Administrator, Risk Practitioner

Level: Intermediate

Subjects: Threat Protection, Security

Duration: 162 minutes

View full course details Cancel

Microsoft

Remediate security alerts using Microsoft Defender for Cloud

shield-halved-duotone-light-full Cyber Security
Remediate security alerts using Microsoft Defender for Cloud

Units in this learning path:

• Introduction
• Understand
• Automate Responses
• Suppress Alerts from
• Generate Threat Intelligence Reports
• Respond to Alerts from Azure Resources
• Knowledge Check
• Summary Resources

Products: Azure, Defender For Cloud

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Security, Threat Protection

Duration: 52 minutes

View full course details Cancel

Microsoft

Remediate threats using Microsoft Defender

shield-halved-duotone-light-full Cyber Security
Learn how to investigate and remediate threats using Microsoft Defender for Office 365. Explore automated tools, phishing triage, and attack simulation.

Units in this learning path:

• Introduction
• Automate Investigate Remediate
• Configure Protect Detect
• Phishing Triage Agent
• Simulate Attacks
• Summary Knowledge Check

Products: Defender Office365, M365, Defender Xdr, Office 365

Roles: Security Engineer, Security Operations Analyst

Level: Intermediate

Subjects: Security, Cloud Security, Threat Protection, Information Protection Governance

Duration: 64 minutes

View full course details Cancel

IBM

Respond and Mitigate Security Threats

shield-halved-duotone-light-full Cyber Security
This credential earner demonstrated their applied knowledge in handling and mitigating threats based on the NIST Incident Response Framework. The earner has identified threats, investigated its nature, responded with a containment plan, eradicated further threat, and created a follow-up report. The earner will build and develop their transferable skills and gain real industry experience.
View full course details Cancel

Microsoft

Review and analyze data classification and protection

shield-halved-duotone-light-full Cyber Security
Review and analyze data classification and protection.

Units in this learning path:

• Introduction
• Information Protection Reports
• Analyze Classified Data
• Monitor Review Actions
• Knowledge Check
• Summary

Products: Microsoft Purview, M365

Roles: Auditor, Administrator, Risk Practitioner

Level: Intermediate

Subjects: Information Protection Governance, Security

Duration: 31 minutes

View full course details Cancel

Microsoft

Review the security model for your Dynamics 365 solutions

shield-halved-duotone-light-full Cyber Security
Engage with customers to assess the effectiveness of their security strategy and provide guidance for improvement.

Units in this learning path:

• 1 Introduction
• Importance Security
• Key Considerations Security
• Security Module Overview
• Business Units Teams
• Implemented Security Mechanisms
• Scalability Performance Maintenance
• Security Beyond Dynamics 365
• 3 Check
• 4 Summary

Products: Dynamics 365, Dynamics Sales, Customer Insights Journeys, Dynamics Customer Service, Dynamics Field Service, Dynamics Finance, Dynamics Scm, Dynamics Project Operations, Dynamics Commerce, Dynamics Human Resources

Roles: Solution Architect, Functional Consultant

Level: Advanced

Subjects: Security

Duration: 55 minutes

View full course details Cancel

Microsoft

Safeguard your environment with Microsoft Defender for Identity

shield-halved-duotone-light-full Cyber Security
Learn about the Microsoft Defender for Identity component of Microsoft Defender XDR.

Units in this learning path:

• Introduction
• Configure Sensors
• Review Compromised Accounts
• Integrate Microsoft Tools
• Summary Knowledge Check

Products: M365, Azure, Microsoft Defender, Defender Xdr

Roles: Administrator

Level: Intermediate

Subjects: Identity Access

Duration: 68 minutes

View full course details Cancel

Viewing 493-504 of 594