Skip to content
Search

565 courses available

Amazon Web Services

Security and Observability for Serverless Applications

shield-halved-duotone-light-full Cyber Security
This course will get you started on thinking about how security best practices should be reflected in serverless architectures. It covers some of the key Amazon Web Services (AWS) offerings that are available to help you monitor for issues and…
View full course details Cancel

Microsoft

Security incident management in Microsoft Sentinel

shield-halved-duotone-light-full Cyber Security
Learn about security incidents, incident evidence and entities, incident management, and how to use Microsoft Sentinel to handle incidents.

Units in this learning path:

• 1 Introduction
• 2 Exercise Setup
• 3 Describe Incident Management
• 4 Understand Evidence Entities
• 5 Manage Incidents
• 6 Exercise Investigate Incident
• 7 Summary

Products: Azure, Microsoft Sentinel

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Cloud Security, Security

Duration: 80 minutes

View full course details Cancel

Microsoft

Security monitoring and governance

shield-halved-duotone-light-full Cyber Security
Learn security monitoring and governance with Microsoft Defender for Cloud, Azure Policy, resource locks, Microsoft Defender for Identity, and GitHub Advanced Security integration for comprehensive DevSecOps protection.

Units in this learning path:

• Introduction
• Implement Pipeline Security
• Explore Microsoft Defender Cloud
• Examine Microsoft Defender Cloud Usage Scenarios
• Explore Azure Policy
• Understand Policies
• Explore Initiatives
• Explore Resource Locks
• Understand Microsoft Defender Identity
• Integrate Github Advanced Security Microsoft Defender
• Configure Github Advanced Security Github
• Knowledge Check
• Summary

Products: Azure, Azure Artifacts, Azure Boards, Azure Cloud Services, Azure Devops, Azure Pipelines, Azure Repos, Azure Test Plans, Github

Roles: Administrator, AI Engineer, Data Engineer, Developer, Devops Engineer, Platform Engineer, Security Engineer, Security Operations Analyst, Service Adoption Specialist, Solution Architect, Startup Founder, Technology Manager

Level: Advanced

Subjects: Devops, Cloud Security

Duration: 120 minutes

View full course details Cancel

Salesforce

Security, Identity, and Privacy

shield-halved-duotone-light-full Cyber Security
Learn how to protect your data and control user access in Salesforce. This is a critical skill for any admin.
View full course details Cancel

Amazon Web Services

Sensitive Data Detection with Amazon Macie

shield-halved-duotone-light-full Cyber Security
This course was developed by members of AWS Technical Field Communities (TFC), an AWS community of technical experts. The content is intended to complement our standard training curriculum and augment your AWS learning journey. We are aware some…
View full course details Cancel

Microsoft

Set up Microsoft Defender for Cloud

shield-halved-duotone-light-full Cyber Security
Discover how to leverage Microsoft Defender for Cloud through the Azure portal to ensure the security of your Azure services and workloads, offering continuous threat detection and prevention.

Units in this learning path:

• Introduction
• Implement Microsoft Defender for Cloud
• Security Posture
• Workload Protections
• Deploy Microsoft Defender for Cloud
• Upgrade Microsoft Defender for Cloud
• Azure Arc
• Azure Arc Capabilities
• Microsoft Cloud Security Benchmark
• Improve Your Regulatory Compliance
• Configure Microsoft Defender for Cloud Policies
• View Edit Security Policies
• Manage Implement Microsoft Defender for Cloud Recommendation
• Explore Secure Score
• Mitre Attack Matrix
• Define Brute Force Attacks
• Understand Just in Time Vm Access
• Implement Just in Time Vm Access
• Activate Just in Time Access on Your Virtual Machines from Azure Portal
• Knowledge Check
• Summary

Products: Azure, Azure Arc, Azure Log Analytics, Azure Portal, Azure SQL Database, Azure SQL Virtual Machines, Azure Sqlserver Vm, Azure Storage, Azure Storage Accounts, Azure Virtual Machines, Azure Virtual Machines Windows, Azure Virtual Network, Defender For Cloud

Roles: Administrator, Security Engineer

Level: Intermediate

Subjects: Cloud Security, Compliance, Infrastructure, Networking, Security, Storage, Virtual Machine

Duration: 248 minutes

View full course details Cancel

Microsoft

Sign in users with Microsoft Entra ID in a Java web app

shield-halved-duotone-light-full Cyber Security
Learn how to authenticate users with Microsoft Entra ID and get authorized access to data in a Java web app using Microsoft Authentication Library.

Units in this learning path:

• Introduction
• Authentication Authorization
• Exercise Register Azure Ad App
• Sign in with Msal
• Exercise Sign in with Msal
• Authorize Access to API
• Exercise Authorize Access to API
• Knowledge Check
• Summary

Products: Azure, Msal Java

Roles: Developer

Level: Beginner

Subjects: Identity Access

Duration: 37 minutes

View full course details Cancel

Microsoft

Solution Architect series: Implement project governance for Power Platform and Dynamics 365

shield-halved-duotone-light-full Cyber Security
Learn about project governance as a solution architect.

Units in this learning path:

• 1 Introduction
• 2 Governance
• 3 Role
• 4 Techniques
• 5 Team
• 6 Check
• 7 Summary

Products: Power Platform, Dynamics 365, Dataverse

Roles: Solution Architect

Level: Advanced

Subjects: Information Protection Governance

Duration: 28 minutes

View full course details Cancel

Microsoft

Solution architect series: Model security for Power Platform solutions

shield-halved-duotone-light-full Cyber Security
Lean about security functionality within Microsoft Dataverse.

Units in this learning path:

• 1 Introduction
• 2 Environment
• 3 Data Loss Prevention
• 4 Dataverse
• 5 Apps
• Exercise
• 6 Check
• 7 Summary

Products: Power Platform, Dataverse, Dynamics 365

Roles: Solution Architect

Level: Advanced

Subjects: Security

Duration: 58 minutes

View full course details Cancel

Microsoft

Specify requirements for securing SaaS, PaaS, and IaaS services

shield-halved-duotone-light-full Cyber Security
You learn how to analyze security requirements for different cloud offerings (SaaS, PaaS, and IaaS), IoT workloads, web workloads, containers, and AI workloads.

Units in this learning path:

• Introduction Security Saas Paas Iaas
• Specify Security Baselines Saas Paas Iaas Services
• Specify Security Requirements Iot Workloads
• Specify Security Requirements Web Workloads
• Specify Security Requirements Containers Container Orchestration
• Evaluate AI Services Security
• Knowledge Check
• Summary

Products: Azure, Defender For Cloud, Defender For Cloud Apps, Defender Identity, Microsoft Sentinel, Azure AI Foundry

Roles: Security Engineer, Solution Architect

Level: Advanced

Subjects: Security, Cloud Security

Duration: 80 minutes

View full course details Cancel

Microsoft

Static analyzers

shield-halved-duotone-light-full Cyber Security
Static analyzers

Units in this learning path:

• Introduction
• Explore Sonarcloud
• Explore Codeql Github
• Manage Technical Debt Sonarcloud Azure Devops
• Knowledge Check
• Summary

Products: Azure, Azure Artifacts, Azure Boards, Azure Cloud Services, Azure Devops, Azure Pipelines, Azure Repos, Azure Test Plans, Github

Roles: Administrator, Developer, Devops Engineer, Security Engineer, Security Operations Analyst, Service Adoption Specialist, Solution Architect, Technology Manager

Level: Advanced

Subjects: Security

Duration: 71 minutes

View full course details Cancel

Microsoft

Strengthen security posture using Microsoft Defender for Cloud and Microsoft Sentinel

shield-halved-duotone-light-full Cyber Security
Strengthen security posture using Microsoft Defender for Cloud and Microsoft Sentinel

Modules in this learning path:

• Implement Manage Enforcement Cloud Governance Policies
• Microsoft Defender Cloud Security Posture
• Microsoft Defender Cloud Threat Protection
• Security Monitoring Automation Solutions

Products: Azure Key Vault, Azure Kubernetes Service, Azure Log Analytics, Azure Monitor, Defender For Cloud, Defender For Cloud Apps, Microsoft Sentinel

Roles: Security Engineer

Level: Intermediate

Subjects: Cloud Security

Duration: 454 minutes

View full course details Cancel

Viewing 517-528 of 565