Skip to content
Search

629 courses available

Microsoft

Plan and implement security for storage

shield-halved-duotone-light-full Cyber Security
This module is designed to provide administrators with the knowledge and skills required to plan and implement comprehensive security measures for Azure storage resources, safeguarding data integrity, confidentiality, and availability.

Units in this learning path:

• Introduction
• Azure Storage
• Authorize Requests Azure Storage
• Manage Storage Account Access Keys
• Select Configure Access Azure Files
• Authorize Access Blobs Use Microsoft Entra Id
• Authorize Access Tables Use Microsoft Entra Id
• Authorize Access Queue Data Azure Portal
• Recommendations Basic Data Protection
• Bring Your Own Key Specification
• Enable Infrastructure Encryption Double Encryption Data
• Knowledge Check
• Summary

Products: Azure, Azure Blob Storage, Azure Disk Storage, Azure Files, Azure Storage, Azure Storage Accounts

Roles: Administrator, Security Engineer

Level: Intermediate

Subjects: Information Protection Governance

Duration: 89 minutes

View full course details Cancel

Microsoft

Plan and implement security for virtual networks

shield-halved-duotone-light-full Cyber Security
This module is designed to provide administrators with the knowledge and skills needed to plan and implement robust security measures for Azure virtual networks, ensuring the confidentiality, integrity, and availability of network resources.

Units in this learning path:

• Introduction
• Data Protection Logging Threat Detection Network Security
• Azure Virtual Network
• Azure Virtual Network Manager
• Network Security Groups Application Security Groups
• User Defined Routes
• Virtual Network Peering Gateways
• Virtual Wide Area Network
• Secure Virtual Private Network Connectivity Point to Site Site to Site
• Azure Encryption
• What Is Azure Virtual Network Encryption
• Azure Expressroute
• Expressroute Encryption
• Azure Best Practices Network Security
• Monitor Network Security
• Knowledge Check
• Summary

Products: Azure, Azure Firewall, Azure Firewall Manager, Azure Virtual Network, Azure Vpn Gateway

Roles: Administrator, Security Engineer

Level: Intermediate

Subjects: Security

Duration: 117 minutes

View full course details Cancel

Microsoft

Plan and implement security in finance and operations apps

shield-halved-duotone-light-full Cyber Security
If you understand the security architecture of finance and operations apps, you can customize it to fit the requirements of your business. finance and operations apps, helps keep your sensitive data safe, and users focused on their roles.

Units in this learning path:

• 1 Plan and Implement Security in F and O Introduction
• 2 Understand the Security Architecture
• Encryption
• 3 Manage Users and Security
• 4 Set Up and Apply Segregation of Duties
• 5 Run Security Reports
• User Licensing Requirements
• Security Diagnostics Task Recordings
• 5 2 Extensible Data Security Policy
• 7 Exercise Import a User and Assign Security Role
• 6 Exercise Create a New User and Assign a Security Role
• 12 Plan and Implement Security in F and O Knowledge Check
• 13 Plan and Implement Security in F and O Summary

Products: Dynamics 365, Dynamics Finance, Dynamics Scm

Roles: Solution Architect, Functional Consultant, Administrator

Level: Intermediate

Subjects: Security, Business Applications

Duration: 116 minutes

View full course details Cancel

Microsoft

Plan for cloud workload protections using Microsoft Defender for Cloud

shield-halved-duotone-light-full Cyber Security
Plan for cloud workload protections using Microsoft Defender for Cloud

Units in this learning path:

• Introduction
• Explain Azure Defender
• Understand Azure Secure Center
• Exercise Azure Security Center Interactive Guide
• Enable
• Knowledge Check
• Summary Resources

Products: Azure, Defender For Cloud

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Threat Protection

Duration: 51 minutes

View full course details Cancel

Microsoft

Plan information barriers

shield-halved-duotone-light-full Cyber Security
Information barriers enable administrators to define policies to allow or prevent communications between groups of users in Microsoft Teams chats and channels. When information barrier policies are in place, people who should not communicate with other specific users won't be able to find, select, chat, or call those users. With information barriers, checks are in place to prevent unauthorized communication.

Units in this learning path:

• Introduction
• Information Barriers
• Sample Scenario
• Summary Knowledge Check

Products: M365, Office 365

Roles: Administrator

Level: Intermediate

Subjects: Information Protection Governance, Communication

Duration: 25 minutes

View full course details Cancel

Microsoft

Plan to deploy Microsoft Defender for IoT to monitor operational technology (OT) networks

shield-halved-duotone-light-full Cyber Security
Learn how to plan your deployment of Microsoft Defender for IoT to monitor your OT network.

Units in this learning path:

• Introduction
• Describe Process to Deploy
• Identify Sites Zones
• Determine Connection Options
• Identify Azure on Premises Roles
• Summary

Products: Defender For Iot

Roles: Solution Architect

Level: Intermediate

Subjects: Security

Duration: 23 minutes

View full course details Cancel

Microsoft

Plan, implement, and administer Conditional Access

shield-halved-duotone-light-full Cyber Security
Conditional Access gives a fine granularity of control over which users can do specific activities, access which resources, and how to ensure data and systems are safe.

Units in this learning path:

• Introduction
• Plan Security Defaults
• Exercise Working with Security Defaults
• Plan Policies
• Implement Policy Controls Assignments
• Exercise Implement Conditional Access Policies Roles Assignments
• Test Troubleshoot Policies
• Implement Application Controls
• Implement Session Management
• Exercise Configure Authentication Session Controls
• Implement Continuous Access Evaluation
• Knowledge Check
• Summary Resources

Products: Azure, Entra, Entra Id

Roles: Administrator, Identity Access Admin, Security Engineer

Level: Advanced

Subjects: Identity Access

Duration: 65 minutes

View full course details Cancel

Microsoft

Plan, implement, and manage access review

shield-halved-duotone-light-full Cyber Security
Once identity is deployed, proper governance using access reviews is necessary for a secure solution. Explore how to plan for and implement access reviews.

Units in this learning path:

• Introduction
• Plan for Access Reviews
• Create Access Reviews for Groups Apps
• Create Configure Access Review Programs
• Monitor Findings
• Automate Management Tasks
• Configure Recurring Access Reviews
• Knowledge Check
• Summary Resources

Products: Azure, Entra, Entra Identity Governance, Entra Id

Roles: Administrator, Identity Access Admin, Security Engineer

Level: Advanced

Subjects: Identity Access

Duration: 45 minutes

View full course details Cancel

Amazon Web Services

Planning an AWS Outposts Implementation

shield-halved-duotone-light-full Cyber Security
In this course, you learn about implementation planning for AWS Outposts, including security responsibilities, facilities requirements, networking requirements, and where to deploy your code. You learn how Outposts works with the AWS Region and…
View full course details Cancel

Amazon Web Services

PostgreSQL Extensions

shield-halved-duotone-light-full Cyber Security
This course was developed by members of AWS Technical Field Communities (TFC), an AWS community of technical experts. The content is intended to complement our standard training curriculum and augment your AWS learning journey. We are aware some…
View full course details Cancel

Amazon Web Services

PostgreSQL Security

shield-halved-duotone-light-full Cyber Security
Cloud security at Amazon Web Services (AWS) is the highest priority. AWS customers benefit from a data center and network architecture that are built to meet the requirements of the most security-sensitive organizations. This course will cover…
View full course details Cancel

Amazon Web Services

PostgreSQL for Amazon Aurora and RDS - Core Concepts Learning Plan

shield-halved-duotone-light-full Cyber Security
This course was developed by members of AWS Technical Field Communities (TFC), an AWS community of technical experts. The content is intended to complement our standard training curriculum and augment your AWS learning journey. We are aware some…
View full course details Cancel

Viewing 493-504 of 629