629 courses available
Microsoft
Protect your endpoint environment with Microsoft Intune
Cyber SecurityUnits in this learning path:
• 1 Introduction
• 2 Manage Protect Devices
• 3 Manage Protect Apps
• 4 Manage Protect Data
• 5 Understand Endpoint Environment
• 6 Platform Considerations
• 7 Knowledge Check
• 8 Summary
Products: Mem, M365
Roles: Administrator
Level: Beginner
Subjects: Threat Protection
Duration: 26 minutes
Microsoft
Protect, monitor, and tune a migrated database
Cyber SecurityUnits in this learning path:
• Introduction
• Protecting Database Server
• Monitor Configure Database Server
• Trace Track Activity
• Configure Read Replicas
• Exercise Protect Monitor Tune Migrated Database
• Knowledge Check
• Summary
Products: Azure
Roles: Data Engineer
Level: Intermediate
Subjects: Cloud Security, Migration
Duration: 66 minutes
Amazon Web Services
Protecting Your Instance with Security Groups
Cyber SecurityMicrosoft
Provide context with the right depth layer
Cyber SecurityUnits in this learning path:
• 1 Introduction
• 1b Depth Layers
• 2 Layer 0 the System Layer
• 3 Layer 1 the Process Layer
• 4 Layer 2 the Sub Process Layer
• 5 Layer 3 the Lower Level Layer
• 6 Summary
Products: Azure, Defender For Cloud, M365 Security Center, Defender For Cloud Apps
Roles: Administrator, Developer, Devops Engineer, Security Engineer, Solution Architect
Level: Beginner
Subjects: Threat Protection
Duration: 26 minutes
Amazon Web Services
Public Sector New User Non-Technical Learning Plan
Cyber SecurityAmazon Web Services
Public Sector New User Technical Learning Plan
Cyber SecurityMicrosoft
Query logs in Microsoft Sentinel
Cyber SecurityUnits in this learning path:
• Introduction
• Logs Page
• Understand Tables
• Understand Common Tables
• Understand Microsoft 365 Defender Tables
• Knowledge Check
• Summary Resources
Products: Microsoft Sentinel
Roles: Security Operations Analyst
Level: Intermediate
Subjects: Cloud Security
Duration: 18 minutes
Microsoft
Query, visualize, and monitor data in Microsoft Sentinel
Cyber SecurityUnits in this learning path:
• 1 Introduction
• 2 Exercise Setup
• 3 Monitor Visualize Data
• 4 Query Data
• 5 Workbooks
• 6 Create New Workbook
• 7 Exercise Visualize Data
• 8 Summary
Products: Azure, Microsoft Sentinel
Roles: Security Operations Analyst
Level: Intermediate
Subjects: Threat Protection
Duration: 48 minutes
Microsoft
Remediate risks with Microsoft Defender for Office 365
Cyber SecurityUnits in this learning path:
• Introduction
• Automate Investigate Remediate
• Configure Protect Detect
• Simulate Attacks
• Summary Knowledge Check
Products: Defender Office365, M365, Defender Xdr, Office 365
Roles: Security Operations Analyst
Level: Intermediate
Subjects: Cloud Security, Insider Risk, Threat Protection
Duration: 49 minutes
Microsoft
Remediate security alerts using Microsoft Defender for Cloud
Cyber SecurityUnits in this learning path:
• Introduction
• Understand
• Automate Responses
• Suppress Alerts from
• Generate Threat Intelligence Reports
• Respond to Alerts from Azure Resources
• Knowledge Check
• Summary Resources
Products: Azure, Defender For Cloud
Roles: Security Operations Analyst
Level: Intermediate
Subjects: Security, Threat Protection
Duration: 52 minutes
IBM
Respond and Mitigate Security Threats
Cyber SecurityMicrosoft
Respond to data loss prevention alerts using Microsoft 365
Cyber SecurityUnits in this learning path:
• Introduction
• Understand Dlp Alerts
• Investigate Dlp Compliance
• Investigate Dlp Cloud App Security
• Knowledge Check
• Summary Resources
Products: Microsoft Purview
Roles: Security Operations Analyst
Level: Intermediate
Subjects: Compliance, Information Protection Governance
Duration: 28 minutes
Viewing 529-540 of 629