594 courses available
Microsoft
Provide context with the right depth layer
Cyber SecurityUnits in this learning path:
• 1 Introduction
• 1b Depth Layers
• 2 Layer 0 the System Layer
• 3 Layer 1 the Process Layer
• 4 Layer 2 the Sub Process Layer
• 5 Layer 3 the Lower Level Layer
• 6 Summary
Products: Azure, Defender For Cloud, M365 Security Center, Defender For Cloud Apps
Roles: Administrator, Developer, Devops Engineer, Security Engineer, Solution Architect
Level: Beginner
Subjects: Threat Protection
Duration: 26 minutes
Amazon Web Services
Public Sector New User Non-Technical Learning Plan
Cyber SecurityAmazon Web Services
Public Sector New User Technical Learning Plan
Cyber SecurityMicrosoft
Query logs in Microsoft Sentinel
Cyber SecurityUnits in this learning path:
• Introduction
• Logs Page
• Understand Tables
• Understand Common Tables
• Understand Microsoft 365 Defender Tables
• Knowledge Check
• Summary Resources
Products: Microsoft Sentinel
Roles: Security Operations Analyst
Level: Intermediate
Subjects: Cloud Security
Duration: 18 minutes
Microsoft
Query, visualize, and monitor data in Microsoft Sentinel
Cyber SecurityUnits in this learning path:
• 1 Introduction
• 2 Exercise Setup
• 3 Monitor Visualize Data
• 4 Query Data
• 5 Workbooks
• 6 Create New Workbook
• 7 Exercise Visualize Data
• 8 Summary
Products: Azure, Microsoft Sentinel
Roles: Security Operations Analyst
Level: Intermediate
Subjects: Threat Protection
Duration: 48 minutes
Microsoft
Reduce data exposure risk with Data Security Posture Management in Microsoft Purview
Cyber SecurityModules in this learning path:
• Purview Data Security Posture Management Understand
• Purview Dspm Assess Data Security Posture
• Purview Data Security Posture Management Protect Remediate
• Purview Data Security Posture Management Investigate Risks
Products: Microsoft Purview, M365
Roles: Administrator, Risk Practitioner
Level: Intermediate
Subjects: Threat Protection, Security
Duration: 162 minutes
Microsoft
Remediate security alerts using Microsoft Defender for Cloud
Cyber SecurityUnits in this learning path:
• Introduction
• Understand
• Automate Responses
• Suppress Alerts from
• Generate Threat Intelligence Reports
• Respond to Alerts from Azure Resources
• Knowledge Check
• Summary Resources
Products: Azure, Defender For Cloud
Roles: Security Operations Analyst
Level: Intermediate
Subjects: Security, Threat Protection
Duration: 52 minutes
Microsoft
Remediate threats using Microsoft Defender
Cyber SecurityUnits in this learning path:
• Introduction
• Automate Investigate Remediate
• Configure Protect Detect
• Phishing Triage Agent
• Simulate Attacks
• Summary Knowledge Check
Products: Defender Office365, M365, Defender Xdr, Office 365
Roles: Security Engineer, Security Operations Analyst
Level: Intermediate
Subjects: Security, Cloud Security, Threat Protection, Information Protection Governance
Duration: 64 minutes
IBM
Respond and Mitigate Security Threats
Cyber SecurityMicrosoft
Review and analyze data classification and protection
Cyber SecurityUnits in this learning path:
• Introduction
• Information Protection Reports
• Analyze Classified Data
• Monitor Review Actions
• Knowledge Check
• Summary
Products: Microsoft Purview, M365
Roles: Auditor, Administrator, Risk Practitioner
Level: Intermediate
Subjects: Information Protection Governance, Security
Duration: 31 minutes
Microsoft
Review the security model for your Dynamics 365 solutions
Cyber SecurityUnits in this learning path:
• 1 Introduction
• Importance Security
• Key Considerations Security
• Security Module Overview
• Business Units Teams
• Implemented Security Mechanisms
• Scalability Performance Maintenance
• Security Beyond Dynamics 365
• 3 Check
• 4 Summary
Products: Dynamics 365, Dynamics Sales, Customer Insights Journeys, Dynamics Customer Service, Dynamics Field Service, Dynamics Finance, Dynamics Scm, Dynamics Project Operations, Dynamics Commerce, Dynamics Human Resources
Roles: Solution Architect, Functional Consultant
Level: Advanced
Subjects: Security
Duration: 55 minutes
Microsoft
Safeguard your environment with Microsoft Defender for Identity
Cyber SecurityUnits in this learning path:
• Introduction
• Configure Sensors
• Review Compromised Accounts
• Integrate Microsoft Tools
• Summary Knowledge Check
Products: M365, Azure, Microsoft Defender, Defender Xdr
Roles: Administrator
Level: Intermediate
Subjects: Identity Access
Duration: 68 minutes
Viewing 493-504 of 594