Skip to content
Search

629 courses available

Microsoft

Protect your endpoint environment with Microsoft Intune

shield-halved-duotone-light-full Cyber Security
In this module, you learn about protecting devices, apps, and data. Additionally, you understand the endpoint environment and the supported platforms available with Microsoft Intune.

Units in this learning path:

• 1 Introduction
• 2 Manage Protect Devices
• 3 Manage Protect Apps
• 4 Manage Protect Data
• 5 Understand Endpoint Environment
• 6 Platform Considerations
• 7 Knowledge Check
• 8 Summary

Products: Mem, M365

Roles: Administrator

Level: Beginner

Subjects: Threat Protection

Duration: 26 minutes

View full course details Cancel

Microsoft

Protect, monitor, and tune a migrated database

shield-halved-duotone-light-full Cyber Security
Protect, monitor, and tune a migrated database

Units in this learning path:

• Introduction
• Protecting Database Server
• Monitor Configure Database Server
• Trace Track Activity
• Configure Read Replicas
• Exercise Protect Monitor Tune Migrated Database
• Knowledge Check
• Summary

Products: Azure

Roles: Data Engineer

Level: Intermediate

Subjects: Cloud Security, Migration

Duration: 66 minutes

View full course details Cancel

Amazon Web Services

Protecting Your Instance with Security Groups

shield-halved-duotone-light-full Cyber Security
In this introductory video, we review how to secure access to your individual instances within AWS. We also explain how to use security groups to control permission and authorize traffic based on the source, defined as IP range, protocol and port.
View full course details Cancel

Microsoft

Provide context with the right depth layer

shield-halved-duotone-light-full Cyber Security
Threat models can get complex if all parties involved can't agree on a data-flow diagram depth layer that provides enough context to satisfy requirements

Units in this learning path:

• 1 Introduction
• 1b Depth Layers
• 2 Layer 0 the System Layer
• 3 Layer 1 the Process Layer
• 4 Layer 2 the Sub Process Layer
• 5 Layer 3 the Lower Level Layer
• 6 Summary

Products: Azure, Defender For Cloud, M365 Security Center, Defender For Cloud Apps

Roles: Administrator, Developer, Devops Engineer, Security Engineer, Solution Architect

Level: Beginner

Subjects: Threat Protection

Duration: 26 minutes

View full course details Cancel

Amazon Web Services

Public Sector New User Non-Technical Learning Plan

shield-halved-duotone-light-full Cyber Security
This training solution is for Public Sector employees and contractors new to using AWS in non-technical roles (e.g., project/program managers, acquisition, finance, and legal professionals). This Learning Path covers AWS Cloud concepts, AWS…
View full course details Cancel

Amazon Web Services

Public Sector New User Technical Learning Plan

shield-halved-duotone-light-full Cyber Security
This training solution is for Public Sector employees and contractors new to using AWS in technical roles (e.g., SysOps administrators, architects, engineers, and developers). This solution covers AWS Cloud concepts, AWS services, security,…
View full course details Cancel

Microsoft

Query logs in Microsoft Sentinel

shield-halved-duotone-light-full Cyber Security
Query logs in Microsoft Sentinel

Units in this learning path:

• Introduction
• Logs Page
• Understand Tables
• Understand Common Tables
• Understand Microsoft 365 Defender Tables
• Knowledge Check
• Summary Resources

Products: Microsoft Sentinel

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Cloud Security

Duration: 18 minutes

View full course details Cancel

Microsoft

Query, visualize, and monitor data in Microsoft Sentinel

shield-halved-duotone-light-full Cyber Security
Learn how to query, visualize, and monitor data in Microsoft Sentinel by using the Azure portal.

Units in this learning path:

• 1 Introduction
• 2 Exercise Setup
• 3 Monitor Visualize Data
• 4 Query Data
• 5 Workbooks
• 6 Create New Workbook
• 7 Exercise Visualize Data
• 8 Summary

Products: Azure, Microsoft Sentinel

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Threat Protection

Duration: 48 minutes

View full course details Cancel

Microsoft

Remediate risks with Microsoft Defender for Office 365

shield-halved-duotone-light-full Cyber Security
Learn about the Microsoft Defender for Office 365 component of Microsoft Defender XDR.

Units in this learning path:

• Introduction
• Automate Investigate Remediate
• Configure Protect Detect
• Simulate Attacks
• Summary Knowledge Check

Products: Defender Office365, M365, Defender Xdr, Office 365

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Cloud Security, Insider Risk, Threat Protection

Duration: 49 minutes

View full course details Cancel

Microsoft

Remediate security alerts using Microsoft Defender for Cloud

shield-halved-duotone-light-full Cyber Security
Remediate security alerts using Microsoft Defender for Cloud

Units in this learning path:

• Introduction
• Understand
• Automate Responses
• Suppress Alerts from
• Generate Threat Intelligence Reports
• Respond to Alerts from Azure Resources
• Knowledge Check
• Summary Resources

Products: Azure, Defender For Cloud

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Security, Threat Protection

Duration: 52 minutes

View full course details Cancel

IBM

Respond and Mitigate Security Threats

shield-halved-duotone-light-full Cyber Security
This credential earner demonstrated their applied knowledge in handling and mitigating threats based on the NIST Incident Response Framework. The earner has identified threats, investigated its nature, responded with a containment plan, eradicated further threat, and created a follow-up report. The earner will build and develop their transferable skills and gain real industry experience.
View full course details Cancel

Microsoft

Respond to data loss prevention alerts using Microsoft 365

shield-halved-duotone-light-full Cyber Security
Respond to data loss prevention alerts using Microsoft 365

Units in this learning path:

• Introduction
• Understand Dlp Alerts
• Investigate Dlp Compliance
• Investigate Dlp Cloud App Security
• Knowledge Check
• Summary Resources

Products: Microsoft Purview

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Compliance, Information Protection Governance

Duration: 28 minutes

View full course details Cancel

Viewing 529-540 of 629