Skip to content
Search

571 courses available

Microsoft

Understand Microsoft Online Services security incident management

shield-halved-duotone-light-full Cyber Security
Learn how Microsoft Online Services investigates, manages, and responds to security concerns to protect customers and the Microsoft cloud environment.

Units in this learning path:

• Introduction
• Incident Response Phase One
• Incident Response Phase Two
• Incident Response Phase Three
• Incident Response Phase Four
• Customer Notification Process
• Summary Knowledge Check

Products: M365

Roles: Auditor, Privacy Manager, Risk Practitioner

Level: Beginner

Subjects: Cloud Security, Threat Protection

Duration: 22 minutes

View full course details Cancel

Microsoft

Understand Microsoft Online Services subprocessor management

shield-halved-duotone-light-full Cyber Security
Learn how Microsoft Online Services procure, monitor, and manage subprocessors to help protect data from unauthorized access and inappropriate use.

Units in this learning path:

• Introduction
• Subprocessor Requirement
• Access Controls Requirements
• Additional Subprocessor Requirements
• Subprocessor Onboarding
• Subprocessor Offboarding
• Summary Knowledge Check

Products: M365

Roles: Auditor, Risk Practitioner, Privacy Manager

Level: Beginner

Subjects: Threat Protection, Cloud Security, Data Management

Duration: 27 minutes

View full course details Cancel

Microsoft

Understand Microsoft Purview Insider Risk Management

shield-halved-duotone-light-full Cyber Security
Understand Microsoft Purview Insider Risk Management.

Units in this learning path:

• Introduction
• Insider Risk Concept
• Insider Risk Management Overview
• Insider Risk Management Features
• Case Study Protect Insider Data
• Knowledge Check
• Summary

Products: Microsoft Purview, M365

Roles: Auditor, Administrator, Risk Practitioner

Level: Intermediate

Subjects: Information Protection Governance, Security

Duration: 28 minutes

View full course details Cancel

Microsoft

Understand Microsoft Purview eDiscovery

shield-halved-duotone-light-full Cyber Security
Understand Microsoft Purview eDiscovery.

Units in this learning path:

• Introduction
• Understand Ediscovery
• Compare Classic New Ediscovery
• Understand Ediscovery Lifecycle
• Understand Ediscovery Permissions
• Knowledge Check
• Summary

Products: Microsoft Purview, M365

Roles: Auditor, Administrator

Level: Intermediate

Subjects: Information Protection Governance, Security, Compliance

Duration: 25 minutes

View full course details Cancel

Microsoft

Understand Microsoft datacenter security

shield-halved-duotone-light-full Cyber Security
Learn how Microsoft uses Defense-In-Depth to secure our datacenters against unauthorized access, environmental hazards, and other physical threats, as well as how Microsoft implements resilient architecture, business continuity, and disaster recovery to maintain the availability of our services.

Units in this learning path:

• Introduction
• Architecture Infrastructure
• Risk Management
• Environmental Safeguards
• Physical Security
• Asset Management
• Device Security
• Disaster Recovery
• Summary Knowledge Check

Products: M365

Roles: Auditor, Risk Practitioner, Privacy Manager

Level: Beginner

Subjects: Security

Duration: 30 minutes

View full course details Cancel

Microsoft

Understand and plan data loss prevention

shield-halved-duotone-light-full Cyber Security
Understand and plan data loss prevention.

Units in this learning path:

• Introduction
• Understand Data Loss Prevention
• Understand Data Loss Prevention Protection
• Plan Design Policies
• Understand Deployment Simulation Mode
• Advanced Data Loss Prevention Controls
• Knowledge Check
• Summary

Products: M365, Microsoft Purview

Roles: Administrator, Risk Practitioner

Level: Beginner

Subjects: Threat Protection, Security

Duration: 31 minutes

View full course details Cancel

Microsoft

Understand data security posture management in Microsoft Purview

shield-halved-duotone-light-full Cyber Security
Understand data security posture management in Microsoft Purview.

Units in this learning path:

• Introduction
• Understand Data Security Posture Management
• Evaluate Risk Posture
• Data Security Objectives
• Data Security Posture AI
• Data Security Workflow Fit
• Knowledge Check
• Summary

Products: M365, Microsoft Purview

Roles: Administrator, Risk Practitioner

Level: Intermediate

Subjects: Threat Protection, Security

Duration: 35 minutes

View full course details Cancel

Microsoft

Understand how Microsoft Defender for Cloud supports AI security and governance in Azure

shield-halved-duotone-light-full Cyber Security
Understand how Microsoft Defender for Cloud strengthens AI security in Azure through posture management and integration with key governance and identity services.

Units in this learning path:

• Introduction
• Understand AI Services Azure
• Understand AI Security Risks
• Guardrails Protections Azure
• Azure Security Governance AI Workloads
• Knowledge Check
• Summary

Products: Azure, Microsoft Foundry, Defender For Cloud, Entra Id

Roles: Security Engineer

Level: Intermediate

Subjects: Cloud Security

Duration: 26 minutes

View full course details Cancel

Microsoft

Understand identity architecture for AI workloads

shield-halved-duotone-light-full Cyber Security
Explore how Microsoft Entra ID defines who can deploy, invoke, and manage AI workloads in Azure through identity types, authentication flows, and role scope decisions.

Units in this learning path:

• Introduction
• Identity Control Layer AI Solutions
• Management Data Plane AI Workloads
• Authentication Flows Microsoft Foundry
• Human Workload Identities AI Environments
• Role Scope AI Environments
• Common Identity Misconfigurations AI
• Knowledge Check
• Summary

Products: Azure, Entra Id

Roles: Security Engineer, Identity Access Admin

Level: Intermediate

Subjects: Security, Cloud Security, Identity Access

Duration: 38 minutes

View full course details Cancel

Amazon Web Services

Understanding Amazon EBS Volume Encryption

shield-halved-duotone-light-full Cyber Security
Amazon EBS Volume Encryption is an AWS encryption service that helps you protect your data. In this introductory course, we describe how this service works in conjunction with AWS Key Management Service (Amazon KMS) and how you can begin using it…
View full course details Cancel

Microsoft

Use a framework to identify threats and find ways to reduce or eliminate risk

shield-halved-duotone-light-full Cyber Security
Threat modeling helps you generate a list of potential threats using STRIDE and find ways to reduce or eliminate risk with corresponding security controls.

Units in this learning path:

• 1 Introduction
• 1b Threat Modeling Framework
• 2 Spoofing Pretending to Be Someone or Something Else
• 3 Tampering Changing Data Without Authorization
• 4 Repudiation Not Claiming Responsibility for an Action Taken
• 5 Information Disclosure Seeing Data I Am Not Supposed to See
• 6 Denial of Service Overwhelming the System
• 7 Elevation of Privilege Having Permissions I Should Not Have
• 8 Summary

Products: Azure, Defender For Cloud, M365 Security Center, Defender For Cloud Apps

Roles: Administrator, Developer, Devops Engineer, Security Engineer, Solution Architect

Level: Beginner

Subjects: Threat Protection

Duration: 57 minutes

View full course details Cancel

Microsoft

Use best practices to secure and govern Microsoft Power Platform environments

shield-halved-duotone-light-full Cyber Security
Learn how you can improve security posture and governance in Microsoft Power Platform.

Modules in this learning path:

• Security Governance Intro
• Plan Manage Environment
• Get Started Center Excellence
• Manage Solutions Power Automate
• Implementation Recommendations
• Implement Power Virtual Agents
• Manage Environmental Changes
• Templates Governance Policies

Products: Power Automate, Power Platform, Power Apps

Roles: Administrator, Functional Consultant

Level: Intermediate

Subjects: Security

Duration: 410 minutes

View full course details Cancel

Viewing 553-564 of 571