Skip to content
Search

565 courses available

Microsoft

Understand How to Secure AI Data with Microsoft Purview

shield-halved-duotone-light-full Cyber Security
Understand how to secure AI data with Microsoft Purview.

Units in this learning path:

• Introduction
• Understand AI Risks
• Understand Purview AI Protections
• Compliance Risks AI
• Assess AI Risks
• Control AI Sensitive Data
• Detect Respond AI Activity
• Retain Search Copilot
• Knowledge Check
• Summary

Products: Microsoft Purview, M365

Roles: Auditor, Administrator, Risk Practitioner

Level: Intermediate

Subjects: Information Protection Governance, Security

Duration: 40 minutes

View full course details Cancel

Microsoft

Understand Microsoft 365 encryption

shield-halved-duotone-light-full Cyber Security
Learn how Microsoft 365 encrypts data-at-rest and in-transit, securely manages encryption keys, and provides key management options to customers to meet their business needs and compliance obligations.

Units in this learning path:

• Introduction
• Data at Rest Encryption
• Microsoft Managed Keys
• Customer Key
• Encryption in Transit
• Summary Knowledge Check

Products: M365

Roles: Auditor, Risk Practitioner, Privacy Manager

Level: Beginner

Subjects: Information Protection Governance, Threat Protection, Compliance

Duration: 20 minutes

View full course details Cancel

Microsoft

Understand Microsoft 365 governance

shield-halved-duotone-light-full Cyber Security
Learn how Microsoft implements organization-wide security and privacy governance to support the secure operation of Microsoft 365 services and maintain compliance with regulatory requirements and customer commitments.

Units in this learning path:

• Introduction
• Organizational Structure
• Policy Framework
• Policy Standards Program
• Information Security Policy
• Personnel Security Governance
• Summary Knowledge Check

Products: M365

Roles: Auditor, Risk Practitioner, Privacy Manager

Level: Beginner

Subjects: Information Protection Governance

Duration: 28 minutes

View full course details Cancel

Microsoft

Understand Microsoft 365 identity and access management

shield-halved-duotone-light-full Cyber Security
Learn how Microsoft 365 implements the principle of Zero Standing Access (ZSA) to protect production environments and customer data using Just-In-Time (JIT) and Just-Enough-Access (JEA).

Units in this learning path:

• Introduction
• Recognize Managed Account Types
• Tools Technologies Used
• Prerequisites Team Account Creation
• Privileged Access
• Customer Lockbox
• Access Control Management
• Summary Knowledge Check

Products: M365

Roles: Auditor, Privacy Manager, Risk Practitioner

Level: Beginner

Subjects: Identity Access, Information Protection Governance

Duration: 29 minutes

View full course details Cancel

Microsoft

Understand Microsoft 365 privacy

shield-halved-duotone-light-full Cyber Security
Learn about Microsoft 365 privacy standards, the reasons we have them in place, and how they differentiate Microsoft in protecting and respecting customer data.

Units in this learning path:

• Introduction
• Key Privacy Terms
• Data Lifecycle
• Collection
• Processing
• Third Party Sharing
• Retention
• Destruction
• Roles Responsibilities
• General Data Protection Regulation
• Summary Knowledge Check

Products: M365

Roles: Auditor, Risk Practitioner, Privacy Manager

Level: Beginner

Subjects: Security, Compliance

Duration: 39 minutes

View full course details Cancel

Microsoft

Understand Microsoft 365 risk management

shield-halved-duotone-light-full Cyber Security
Learn how Microsoft 365 identifies, assesses, responds to, and manages risks to protect customers and the Microsoft 365 environment.

Units in this learning path:

• Introduction
• Enterprise Risk Management
• Overview Risk Management
• Risk Identification Assessment
• Risk Response
• Summary Knowledge Check

Products: M365

Roles: Auditor, Risk Practitioner, Privacy Manager

Level: Beginner

Subjects: Information Protection Governance, Cloud Security, Threat Protection

Duration: 17 minutes

View full course details Cancel

Microsoft

Understand Microsoft 365 vulnerability management

shield-halved-duotone-light-full Cyber Security
Learn how Microsoft 365 proactively monitors information system assets for vulnerabilities, assesses the risks associated with discovered vulnerabilities, and remediates them in a timely manner.

Units in this learning path:

• Introduction
• Machine State Scanning
• Patch Management
• Vulnerability Configuration Scanning
• Attack Simulation Penetration Testing
• Summary Knowledge Check

Products: M365

Roles: Auditor, Risk Practitioner, Privacy Manager

Level: Beginner

Subjects: Threat Protection, Information Protection Governance

Duration: 19 minutes

View full course details Cancel

Microsoft

Understand Microsoft Entra ID

shield-halved-duotone-light-full Cyber Security
This module equips learners to describe Microsoft Entra ID - a cloud-based identity and access management service. They'll compare it with AD DS, understand its role as a directory for cloud services, and learn about its security features. They'll also learn about Microsoft Entra Domain Services.

Units in this learning path:

• Introduction
• Examine Azure Active Directory
• Compare Azure Active Directory Domain Services
• Examine Azure Directory Service Cloud Apps
• Compare Azure Premium P1 P2 Plans
• Examine Azure Domain Services
• Knowledge Check
• Summary

Products: Azure, Entra Id, Active Directory

Roles: Administrator, Identity Access Admin

Level: Intermediate

Subjects: Identity Access, Infrastructure, It Management Monitoring, Employee Management

Duration: 31 minutes

View full course details Cancel

Microsoft

Understand Microsoft Online Services security development and operation

shield-halved-duotone-light-full Cyber Security
Learn how Microsoft Online Services follow Microsoft’s Security Development Lifecycle (SDL) to build security and privacy into our products and services.

Units in this learning path:

• Introduction
• Security Training Requirements
• Security Privacy Design
• Security Tool Automation
• Application Penetration Testing
• Support Secure Deployment
• Safe Deployment Process
• Open Source Security
• Summary Knowledge Check

Products: M365

Roles: Auditor, Privacy Manager, Risk Practitioner

Level: Beginner

Subjects: Cloud Security, Threat Protection, Information Protection Governance

Duration: 41 minutes

View full course details Cancel

Microsoft

Understand Microsoft Online Services security incident management

shield-halved-duotone-light-full Cyber Security
Learn how Microsoft Online Services investigates, manages, and responds to security concerns to protect customers and the Microsoft cloud environment.

Units in this learning path:

• Introduction
• Incident Response Phase One
• Incident Response Phase Two
• Incident Response Phase Three
• Incident Response Phase Four
• Customer Notification Process
• Summary Knowledge Check

Products: M365

Roles: Auditor, Privacy Manager, Risk Practitioner

Level: Beginner

Subjects: Cloud Security, Threat Protection

Duration: 22 minutes

View full course details Cancel

Microsoft

Understand Microsoft Online Services subprocessor management

shield-halved-duotone-light-full Cyber Security
Learn how Microsoft Online Services procure, monitor, and manage subprocessors to help protect data from unauthorized access and inappropriate use.

Units in this learning path:

• Introduction
• Subprocessor Requirement
• Access Controls Requirements
• Additional Subprocessor Requirements
• Subprocessor Onboarding
• Subprocessor Offboarding
• Summary Knowledge Check

Products: M365

Roles: Auditor, Risk Practitioner, Privacy Manager

Level: Beginner

Subjects: Threat Protection, Cloud Security, Data Management

Duration: 27 minutes

View full course details Cancel

Microsoft

Understand Microsoft Purview Insider Risk Management

shield-halved-duotone-light-full Cyber Security
Understand Microsoft Purview Insider Risk Management.

Units in this learning path:

• Introduction
• Insider Risk Concept
• Insider Risk Management Overview
• Insider Risk Management Features
• Case Study Protect Insider Data
• Knowledge Check
• Summary

Products: Microsoft Purview, M365

Roles: Auditor, Administrator, Risk Practitioner

Level: Intermediate

Subjects: Information Protection Governance, Security

Duration: 28 minutes

View full course details Cancel

Viewing 541-552 of 565