Skip to content
Search

629 courses available

Microsoft

Protect against malicious attacks and unauthorized access with Microsoft Edge

shield-halved-duotone-light-full Cyber Security
Protect against malicious attacks and unauthorized access with Microsoft Edge

Units in this learning path:

• Introduction
• Understand Secure Foundations of
• Intercept Malicious Attacks Defender Smartscreen
• Enhance Browser Security Defender Application Guard
• Manage Controls Policies for Edge Microsoft Endpoint Manager
• Knowledge Check
• Summary Resources

Products: M365, Office 365, Microsoft Edge, Internet Explorer

Roles: Administrator

Level: Intermediate

Subjects: Identity Access, Threat Protection

Duration: 24 minutes

View full course details Cancel

Microsoft

Protect against threats with Microsoft Defender for Endpoint

shield-halved-duotone-light-full Cyber Security
Learn how Microsoft Defender for Endpoint can help your organization stay secure.

Units in this learning path:

• Introduction
• Practice Security Administration
• Hunt Threats Within Network
• Summary Knowledge Check

Products: M365, Defender Xdr, Defender Endpoint, Office 365

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Cloud Security, Threat Protection

Duration: 72 minutes

View full course details Cancel

Microsoft

Protect and govern Microsoft 365 data

shield-halved-duotone-light-full Cyber Security
This module provides a comprehensive overview of data protection and governance in Microsoft 365, equipping learners to understand and manage sensitive information, compliance, risk, and secure collaboration.

Units in this learning path:

• Introduction
• Introduction Microsoft Purview
• Identify Respond Data Risks
• Examine Compliance AI Data Discovery
• Explore Data Access Governance
• Explore Data Protection Copilot
• Knowledge Check
• Summary

Products: M365, M365 Admin Center, M365 Enterprise, Microsoft 365 Copilot

Roles: Administrator, Functional Consultant

Level: Beginner

Subjects: Information Protection Governance, Productivity, Insider Risk, Security, Threat Protection

Duration: 62 minutes

View full course details Cancel

Microsoft

Protect compute, storage, and databases

shield-halved-duotone-light-full Cyber Security
Protect compute, storage, and databases

Modules in this learning path:

• Advanced Security Compute
• Security Storage
• Security Azure SQL Database Azure SQL Managed Instance

Products: Azure, Azure App Service, Azure Blob Storage, Azure Files, Azure Key Vault, Azure SQL Database, Azure SQL Managed Instance, Azure Storage, Azure Table Storage, Ms Graph

Roles: Administrator, Security Engineer

Level: Intermediate

Subjects: Cloud Security

Duration: 249 minutes

View full course details Cancel

Microsoft

Protect data with Zero Trust

shield-halved-duotone-light-full Cyber Security
Zero Trust isn't a tool or product, it's an essential security strategy, with data at its core. Here, you'll learn how to identify and protect your data using a Zero Trust approach.

Units in this learning path:

• Introduction
• Know Your Data
• Protect Your Data Prevent Loss
• Knowledge Check
• Summary

Products: M365

Roles: Administrator, Student

Level: Beginner

Subjects: Security

Duration: 15 minutes

View full course details Cancel

Microsoft

Protect email with Microsoft Purview Message Encryption

shield-halved-duotone-light-full Cyber Security
Protect email with Microsoft Purview Message Encryption

Units in this learning path:

• Introduction
• Understand Message Encryption
• Plan Message Encryption
• Implement Message Encryption
• Branding Template
• Implement Advanced Message Encryption
• Mail Flow Rules Encryption
• Knowledge Check
• Summary

Products: Microsoft Purview, Office 365

Roles: Auditor, Ip Admin, Risk Practitioner

Level: Intermediate

Subjects: Security, Communication

Duration: 36 minutes

View full course details Cancel

Microsoft

Protect identities in Microsoft Entra ID

shield-halved-duotone-light-full Cyber Security
This module introduces students to the various authentication methods used to protect identities.

Units in this learning path:

• Introduction
• Explore Windows Hello Business
• Deploy Windows Hello
• Manage Windows Hello Business
• Explore Azure Ad Identity Protection
• Manage Self Service Password Reset Azure Ad
• Implement Multi Factor Authentication
• Knowledge Check
• Summary

Products: Mem, Configuration Manager, Intune, Windows

Roles: Administrator

Level: Intermediate

Subjects: Identity Access

Duration: 21 minutes

View full course details Cancel

Microsoft

Protect identity and access in Azure

shield-halved-duotone-light-full Cyber Security
Protect identity and access in Azure

Modules in this learning path:

• Manage Security Controls Identity Access
• Manage Application Access Microsoft Entra Id

Products: Azure, Azure Rbac, Entra Id, Entra Id Protection, Entra Identity Governance, Entra Permissions Management, Entra Verified Id

Roles: Security Engineer

Level: Intermediate

Subjects: Identity Access

Duration: 432 minutes

View full course details Cancel

Microsoft

Protect infrastructure with Zero Trust

shield-halved-duotone-light-full Cyber Security
Infrastructure is a broad term that covers all hardware, software, servers, networks, facilities, and much more. Utilizing Zero Trust principles can help to reduce your infrastructure's exposure to cyberattacks through improved monitoring, configuration management, and keeping software up-to-date.

Units in this learning path:

• Introduction
• What Infrastructure
• Assess Monitor Infrastructure
• Harden Infrastructure
• Knowledge Check
• Summary

Products: M365

Roles: Administrator, Student

Level: Beginner

Subjects: Security

Duration: 17 minutes

View full course details Cancel

Microsoft

Protect network infrastructure in Azure

shield-halved-duotone-light-full Cyber Security
Protect network infrastructure in Azure

Modules in this learning path:

• Security Virtual Networks
• Security Private Access Azure Resources
• Security Public Access Azure Resources

Products: Azure Container Instances, Azure Container Registry, Azure Ddos Protection, Azure Disk Encryption, Azure Expressroute, Azure Firewall, Azure Firewall Manager, Azure Front Door, Azure Kubernetes Service, Azure Web Application Firewall, Update Manager

Roles: Administrator, Security Engineer

Level: Intermediate

Subjects: Information Protection Governance

Duration: 234 minutes

View full course details Cancel

Microsoft

Protect sensitive data in a digital world

shield-halved-duotone-light-full Cyber Security
Protect sensitive data in a digital world.

Units in this learning path:

• Introduction
• Data Protection Need
• Manage Sensitive Data Challenge
• Protect Data Zero Trust World
• Understand Classification Protection
• Prevent Data Leaks Insider Threats
• Manage Respond Alerts Threats
• Protect AI Data
• Knowledge Check
• Summary

Products: Microsoft Purview, M365

Roles: Auditor, Administrator, Risk Practitioner

Level: Intermediate

Subjects: Information Protection Governance, Security

Duration: 34 minutes

View full course details Cancel

Microsoft

Protect your Azure Virtual Desktop deployment by using Azure Firewall

shield-halved-duotone-light-full Cyber Security
Learn how to deploy and configure Azure Firewall to protect outbound network traffic for Azure Virtual Desktop.

Units in this learning path:

• Introduction
• Use Azure Firewall
• Exercise Set Up Host Pool
• Plan Azure Firewall Deployment
• Exercise Deploy Azure Firewall
• Allow Outbound Network Access
• Exercise Route Network Traffic
• Knowledge Check
• Summary

Products: Azure, Azure Firewall, Azure Virtual Desktop

Roles: Administrator

Level: Beginner

Subjects: Security

Duration: 78 minutes

View full course details Cancel

Viewing 517-528 of 629