Skip to content
Search

629 courses available

Microsoft

Review and analyze data classification and protection

shield-halved-duotone-light-full Cyber Security
Review and analyze data classification and protection.

Units in this learning path:

• Introduction
• Information Protection Reports
• Analyze Classified Data
• Monitor Review Actions
• Knowledge Check
• Summary

Products: Microsoft Purview, M365

Roles: Auditor, Administrator, Risk Practitioner

Level: Intermediate

Subjects: Information Protection Governance, Security

Duration: 31 minutes

View full course details Cancel

Microsoft

Review the security model for your Dynamics 365 solutions

shield-halved-duotone-light-full Cyber Security
Engage with customers to assess the effectiveness of their security strategy and provide guidance for improvement.

Units in this learning path:

• 1 Introduction
• Importance Security
• Key Considerations Security
• Security Module Overview
• Business Units Teams
• Implemented Security Mechanisms
• Scalability Performance Maintenance
• Security Beyond Dynamics 365
• 3 Check
• 4 Summary

Products: Dynamics 365, Dynamics Sales, Customer Insights Journeys, Dynamics Customer Service, Dynamics Field Service, Dynamics Finance, Dynamics Scm, Dynamics Project Operations, Dynamics Commerce, Dynamics Human Resources

Roles: Solution Architect, Functional Consultant

Level: Advanced

Subjects: Security

Duration: 55 minutes

View full course details Cancel

Microsoft

Safeguard your environment with Microsoft Defender for Identity

shield-halved-duotone-light-full Cyber Security
Learn about the Microsoft Defender for Identity component of Microsoft Defender XDR.

Units in this learning path:

• Introduction
• Configure Sensors
• Review Compromised Accounts
• Integrate Microsoft Tools
• Summary Knowledge Check

Products: M365, Azure, Microsoft Defender, Defender Xdr

Roles: Administrator

Level: Intermediate

Subjects: Identity Access

Duration: 68 minutes

View full course details Cancel

Microsoft

Search and investigate with Microsoft Purview Audit

shield-halved-duotone-light-full Cyber Security
Search and investigate with Microsoft Purview Audit.

Units in this learning path:

• Introduction
• Audit Overview
• Audit Configure Manage
• Audit Standard Search
• Audit Copilot
• Audit Premium Investigate
• Audit Export
• Audit Premium Retention
• Knowledge Check
• Summary

Products: Microsoft Purview, M365

Roles: Auditor, Ip Admin, Risk Practitioner

Level: Intermediate

Subjects: Information Protection Governance

Duration: 60 minutes

View full course details Cancel

Microsoft

Search for content with Microsoft Purview eDiscovery

shield-halved-duotone-light-full Cyber Security
Use Microsoft Purview eDiscovery to search for content across Microsoft 365. This module covers how to configure cases, define search criteria, and locate messages, files, and other organizational data.

Units in this learning path:

• Introduction
• Understand Ediscovery
• Ediscovery Prerequisites
• Create Ediscovery Search
• Conduct Ediscovery Search
• Export Results
• Knowledge Check
• Summary

Products: M365, Microsoft Purview

Roles: Administrator, Auditor, Ip Admin

Level: Intermediate

Subjects: Information Protection Governance, Compliance, Security

Duration: 34 minutes

View full course details Cancel

Microsoft

Secure AI interactions and environments with Microsoft Purview

shield-halved-duotone-light-full Cyber Security
AI is changing how people work and introduces new risks for data exposure. Explore how Microsoft Purview protects sensitive information in AI-enabled environments across Microsoft 365 Copilot, non-Microsoft AI apps, and developer AI scenarios. This learning path aligns with exam SC-401: Microsoft Information Security Administrator.

Modules in this learning path:

• Purview AI Understand Risks
• Purview AI Secure Copilot
• Purview AI Secure Enterprise Other
• Purview AI Developer Apps

Products: Microsoft Purview, M365, Entra, Microsoft 365 Copilot

Roles: Auditor, Administrator, Ip Admin, Developer

Level: Intermediate

Subjects: Security, Compliance

Duration: 210 minutes

View full course details Cancel

Microsoft

Secure Microsoft 365 Copilot interactions with Microsoft Purview

shield-halved-duotone-light-full Cyber Security
AI tools like Microsoft 365 Copilot create new ways to interact with sensitive data, but they also introduce new risks. Learn how Microsoft Purview helps you apply security and compliance controls that protect data, manage AI activity, and support responsible use at scale.

Units in this learning path:

• Introduction
• Understand Copilot Protection Needs
• Compliance Manager Copilot
• Audit Copilot
• Communication Compliance Copilot
• Sensitivity Labels Copilot
• Data Loss Prevention Copilot
• Retention Copilot
• Ediscovery Copilot
• Knowledge Check
• Summary

Products: M365, Microsoft Purview, Microsoft 365 Copilot

Roles: Administrator, Auditor, Ip Admin, Risk Practitioner

Level: Intermediate

Subjects: Security, Compliance, Information Protection Governance

Duration: 54 minutes

View full course details Cancel

Microsoft

Secure Microsoft Entra users with multifactor authentication

shield-halved-duotone-light-full Cyber Security
Learn how to use multifactor authentication with Microsoft Entra ID to harden your user accounts.

Units in this learning path:

• Introduction
• Azure Multi Factor Authentication
• Planning Mfa
• Exercise Mfa
• Configure Authentication Methods
• Summary

Products: Azure, Azure Portal, Entra Id

Roles: Security Engineer, Administrator

Level: Beginner

Subjects: Identity Access

Duration: 38 minutes

View full course details Cancel

Microsoft

Secure Microsoft Foundry environments

shield-halved-duotone-light-full Cyber Security
Secure Microsoft Foundry environments by applying layered protections across identity, secrets, networks, and diagnostics. This module explains how to manage access with Microsoft Entra ID and project roles, protect credentials with Key Vault, and isolate workloads through private network connections. It also covers enabling diagnostic logging to strengthen visibility and auditing. These practices help you build trusted, compliant AI environments that support collaboration safely.

Units in this learning path:

• Introduction
• Control Access Azure AI Foundry
• Manage Access Foundry Projects
• Secure AI Foundry Secrets
• Isolate Foundry Network
• Enable Foundry Diagnostics
• Knowledge Check
• Summary

Products: Azure, Azure AI Foundry, Defender For Cloud

Roles: Security Engineer, Developer

Level: Intermediate

Subjects: Security, Cloud Security

Duration: 50 minutes

View full course details Cancel

Microsoft

Secure Windows Server DNS

shield-halved-duotone-light-full Cyber Security
Secure Windows Server DNS

Units in this learning path:

• Introduction
• Implement Split Horizon Dns
• Create Dns Policies
• Implement Dns Policies
• Secure Windows Server Dns
• Implement Dnssec
• Knowledge Check
• Summary

Products: Windows Server

Roles: Administrator, Solution Architect, Technology Manager

Level: Intermediate

Subjects: Security

Duration: 58 minutes

View full course details Cancel

Microsoft

Secure Windows Server user accounts

shield-halved-duotone-light-full Cyber Security
Protect your Active Directory environment by securing user accounts to least privilege and placing them in the Protected Users group. Learn how to limit authentication scope and remediate potentially insecure accounts.

Units in this learning path:

• Introduction
• Configure User Account Rights
• Protect Protected Users Group
• Describe Windows Defender Credential Guard
• Block Ntlm Authentication
• Locate Problematic Accounts
• Knowledge Check
• Summary

Products: Azure, Windows Server

Roles: Administrator

Level: Intermediate

Subjects: Identity Access

Duration: 38 minutes

View full course details Cancel

Microsoft

Secure data access in Power BI

shield-halved-duotone-light-full Cyber Security
Row-level security (RLS) and Object-level security (OLS) allows you to create a single or a set of reports that targets data for a specific user. In this module, you'll learn how to implement RLS by using either a static or dynamic method and how Microsoft Power BI simplifies testing RLS in Power BI Desktop and Power BI service.

Units in this learning path:

• 1 Introduction
• 2 Static Method
• 3 Dynamic Method
• 3a Use Single Sign on for Directquery
• 3b Restrict Access to Power Bi Model Objects
• Lab
• 4 Check
• 5 Summary

Products: Power Bi, Power Platform

Roles: Data Analyst

Level: Intermediate

Subjects: Information Protection Governance

Duration: 39 minutes

View full course details Cancel

Viewing 541-552 of 629