Skip to content
Search

629 courses available

Microsoft

Prepare for Microsoft Purview Insider Risk Management

shield-halved-duotone-light-full Cyber Security
Prepare for Microsoft Purview Insider Risk Management.

Units in this learning path:

• Introduction
• Plan Insider Risk Management
• Insider Risk Management Prerequisites
• Configure Insider Risk Settings
• Insider Risk Management Integrations
• Knowledge Check
• Summary

Products: Microsoft Purview, M365

Roles: Auditor, Administrator, Risk Practitioner

Level: Intermediate

Subjects: Information Protection Governance, Security

Duration: 36 minutes

View full course details Cancel

Microsoft

Prepare for identity synchronization to Microsoft 365

shield-halved-duotone-light-full Cyber Security
This module examines all the planning aspects that must be considered when implementing directory synchronization between on-premises Active Directory and Microsoft Entra ID.

Units in this learning path:

• Introduction
• Plan Microsoft Entra Deployment
• Prepare Directory Synchronization
• Choose Directory Synchronization Tool
• Plan Microsoft Entra Connect
• Plan Microsoft Entra Connect Cloud Sync
• Knowledge Check
• Summary

Products: M365, Office 365

Roles: Administrator, Solution Architect, Technology Manager

Level: Intermediate

Subjects: Business Applications, Compliance, Identity Access, Insider Risk, It Management Monitoring, Productivity, Security, Threat Protection

Duration: 43 minutes

View full course details Cancel

Microsoft

Prepare to deploy Microsoft Defender for IoT

shield-halved-duotone-light-full Cyber Security
Learn how to prepare your deployment of Microsoft Defender for IoT to monitor your OT network.

Units in this learning path:

• Introduction
• Describe Process to Prepare
• Examine Network Diagram
• Identify the Devices and Subnets
• Determine Traffic Mirroring Method
• Review Appliance Options
• Summary

Products: Defender For Iot

Roles: Solution Architect

Level: Intermediate

Subjects: Security

Duration: 33 minutes

View full course details Cancel

Microsoft

Prepare to teach AZ-500 Microsoft Azure Security Technologies

shield-halved-duotone-light-full Cyber Security
Prepare to teach AZ-500 Microsoft Azure Security Technologies

Modules in this learning path:

• Introduction Microsoft Learn Educators Program
• Onboard Microsoft Learn Educators Program
• Microsoft Learn Educators Course Preparation
• Microsoft Learn Educators Course Plan
• Learn Best Practices from Microsoft Technical Trainers
• Get Tips Tricks for Teach Az 500 Microsoft Azure Security Technologies
• Prepare for Course Delivery
• Close Out Course

Products: Azure

Roles: Higher Ed Educator

Level: Advanced

Subjects: Security

Duration: 201 minutes

View full course details Cancel

Microsoft

Prepare to teach SC-300 Microsoft Identity and Access Administrator

shield-halved-duotone-light-full Cyber Security
Learn about the Microsoft Learn for Educators program and how to best deliver its content to your students. Prepare to deliver Microsoft’s security solutions, SC-900 Microsoft Security, Compliance, and Identity Fundamentals in academic program.

Modules in this learning path:

• Introduction Microsoft Learn Educators Program
• Onboard Microsoft Learn Educators Program
• Microsoft Learn Educators Course Preparation
• Microsoft Learn Educators Course Plan
• Learn Best Practices from Microsoft Technical Trainers
• Get Tips Tricks Teach Sc 300 Identity Access Administrator
• Prepare for Course Delivery
• Close Out Course

Products: Azure

Roles: Higher Ed Educator

Level: Beginner

Subjects: Security

Duration: 250 minutes

View full course details Cancel

Microsoft

Prepare to teach SC-400 Microsoft Information Protection Administrator

shield-halved-duotone-light-full Cyber Security
Learn about the Microsoft Learn for Educators program and how to best deliver its content to your students. Prepare to deliver Microsoft’s security solutions, SC-400 Microsoft Information Protection Administrator in academic program.

Modules in this learning path:

• Introduction Microsoft Learn Educators Program
• Onboard Microsoft Learn Educators Program
• Microsoft Learn Educators Course Preparation
• Microsoft Learn Educators Course Plan
• Learn Best Practices from Microsoft Technical Trainers
• Get Tips Tricks Teach Sc 400 Information Protection Administrator
• Prepare for Course Delivery
• Close Out Course

Products: Defender For Cloud

Roles: Higher Ed Educator

Level: Beginner

Subjects: Security

Duration: 242 minutes

View full course details Cancel

Microsoft

Prepare to teach SC-900 Microsoft Security, Compliance, and Identity Fundamentals in academic programs

shield-halved-duotone-light-full Cyber Security
Prepare to teach SC-900 Microsoft Security, Compliance, and Identity Fundamentals in academic programs

Modules in this learning path:

• Introduction Microsoft Learn Educators Program
• Onboard Microsoft Learn Educators Program
• Microsoft Learn Educators Course Preparation
• Microsoft Learn Educators Course Plan
• Learn Best Practices from Microsoft Technical Trainers
• Get Tips Tricks Teach Sc 900 Security Compliance Identity Fundamentals
• Prepare for Course Delivery
• Close Out Course

Products: Defender For Cloud

Roles: Higher Ed Educator

Level: Beginner

Subjects: Compliance, Identity Access, Security

Duration: 229 minutes

View full course details Cancel

Microsoft

Prevent data loss

shield-halved-duotone-light-full Cyber Security
Learn how information protection helps organizations protect data to prevent data loss or theft.

Units in this learning path:

• Introduction
• Define Sensitive Data
• Data Loss Prevention
• Summary Knowledge Check

Products: Microsoft Purview, M365, Office 365

Roles: Administrator

Level: Intermediate

Subjects: Information Protection Governance, Threat Protection

Duration: 12 minutes

View full course details Cancel

Microsoft

Prioritize your issues and apply security controls

shield-halved-duotone-light-full Cyber Security
Threat modeling provides you with a list of threats and ways to reduce or eliminate risk, but it doesn't prioritize them for you. Also, there are no layered security control recommendations based on their type and function.

Units in this learning path:

• 1 Introduction
• 1b Priorities Types and Functions
• 2 Prioritize Security Issues
• 3 Categorize Each Security Control Type
• 5 Summary

Products: Azure, Defender For Cloud, M365 Security Center, Defender For Cloud Apps

Roles: Administrator, Developer, Devops Engineer, Security Engineer, Solution Architect

Level: Beginner

Subjects: Threat Protection

Duration: 14 minutes

View full course details Cancel

Microsoft

Protect AI workloads with Microsoft Defender for Cloud

shield-halved-duotone-light-full Cyber Security
Learn how Microsoft Defender for Cloud extends protection to AI workloads across Azure. See how it discovers AI resources, assesses configuration risks, detects active threats, and integrates with Microsoft Defender XDR for unified investigation and response.

Units in this learning path:

• Introduction
• Enable AI Workload Plan
• Data AI Security Dashboard
• Assess Improve AI Posture
• Detect AI Threats
• Investigate AI Alerts Xdr
• Knowledge Check
• Summary

Products: Azure, Azure AI Foundry, Defender For Cloud, Entra Id, Defender Xdr

Roles: Security Engineer

Level: Intermediate

Subjects: Cloud Security

Duration: 38 minutes

View full course details Cancel

Microsoft

Protect Microsoft Foundry solutions by using Microsoft Defender for Cloud

shield-halved-duotone-light-full Cyber Security
Learn how to secure Microsoft Foundry workloads by using Microsoft Defender for Cloud. Discover AI resources across Azure, assess their security posture, protect against runtime threats, and configure model guardrails in Microsoft Foundry to prevent unsafe or policy-violating content.

Modules in this learning path:

• Defender for Cloud AI Understand Protections
• Defender for Cloud AI Protect Workloads
• Azure AI Foundry Configure Manage Guardrails
• Azure AI Foundry Secure Environment

Products: Defender For Cloud, Azure, Azure AI Foundry, Entra Id

Roles: Security Engineer, AI Engineer, Developer

Level: Intermediate

Subjects: Security, Cloud Security, Threat Protection

Duration: 162 minutes

View full course details Cancel

Amazon Web Services

Protect Your Web-facing Workloads with AWS Security Services

shield-halved-duotone-light-full Cyber Security
As network attacks and intrusion attempts become more sophisticated, application developers and network managers have to manage the balance between protecting their boarders from bad guys while still maintaining a positive online presence for…
View full course details Cancel

Viewing 505-516 of 629