Skip to content
Search

629 courses available

Microsoft

Secure developer AI environments with Microsoft Purview

shield-halved-duotone-light-full Cyber Security
Microsoft Purview provides tools to secure developer AI environments by discovering apps, assessing data access, and applying appropriate protections. This includes detecting generative AI usage, assigning user risk levels, and applying dynamic enforcement based on user behavior and data sensitivity.

Units in this learning path:

• Introduction
• Understand Developer AI Risks
• Discover Assess AI Apps
• Classify Protect Retain AI Prompt Data
• Azure AI Services Protections
• Entra AI Apps
• Secure Copilot Studio
• Manage Copilot Fabric Risks
• Investigate Respond AI Activity
• Knowledge Check
• Summary

Products: M365, Microsoft Purview, Entra, Microsoft Copilot Studio, Fabric, AI Services

Roles: Administrator, Developer, Auditor

Level: Intermediate

Subjects: Security, Generative AI, Insider Risk, Compliance

Duration: 63 minutes

View full course details Cancel

Microsoft

Secure endpoints with Zero Trust

shield-halved-duotone-light-full Cyber Security
Learn how to use Zero Trust to secure endpoints to protect your organization and its users.

Units in this learning path:

• Introduction
• What Are Endpoints
• Protect Endpoints
• Knowledge Check
• Summary

Products: M365

Roles: Administrator, Student

Level: Beginner

Subjects: Security

Duration: 13 minutes

View full course details Cancel

Microsoft

Secure sensitive data with Microsoft Purview Ninja training scenarios

shield-halved-duotone-light-full Cyber Security
Discover how to classify data, apply sensitivity labels, enforce DLP policies, and use Security Copilot to protect information across Microsoft 365.

Modules in this learning path:

• Purview Ninja Discover Define Sits
• Purview Ninja Label Sensitive Data
• Purview Ninja Security Copilot
• Purview Ninja Prevent Data Loss Share Transfer
• Purview Ninja Safeguard Remote Work

Products: Microsoft Purview, M365

Roles: Administrator

Level: Intermediate

Subjects: Security, Compliance

Duration: 117 minutes

View full course details Cancel

Microsoft

Secure your Azure resources with Azure role-based access control (Azure RBAC)

shield-halved-duotone-light-full Cyber Security
Learn how to use Azure role-based access control to effectively manage your team's access to Azure resources.

Units in this learning path:

• 1 Introduction
• 2 Rbac Overview
• 3 Knowledge Check Rbac Overview
• 4 List Access
• 5 Grant Access
• 6 View Activity Logs
• 7 Knowledge Check Rbac
• 8 Summary

Products: Azure, Azure Portal, Entra Id, Azure Rbac

Roles: Administrator, Solution Architect, Security Engineer

Level: Beginner

Subjects: Identity Access

Duration: 37 minutes

View full course details Cancel

Microsoft

Secure your cloud applications in Azure

shield-halved-duotone-light-full Cyber Security
Learn how to secure your Azure apps and associated data with encryption, certificates, and policy.

Modules in this learning path:

• Azure Well Architected Security
• Create Security Baselines
• Manage Secrets with Azure Key Vault
• Control Authentication with Apim

Products: Azure, Azure Policy, Azure Key Vault, Entra Id, Azure API Management

Roles: Solution Architect, Developer, Security Engineer

Level: Beginner, Intermediate, Advanced

Subjects: Cloud Security

Duration: 215 minutes

View full course details Cancel

Microsoft

Secure your cloud apps and services with Microsoft Defender for Cloud Apps

shield-halved-duotone-light-full Cyber Security
Microsoft Defender for Cloud Apps is a cloud access security broker (CASB) that operates on multiple clouds. It provides rich visibility, control over data travel, and sophisticated analytics to identify and combat cyberthreats across all your cloud services. Learn how to use Defender for Cloud Apps in your organization.

Units in this learning path:

• Introduction
• Framework
• Cloud Discovery
• Conditional Access App Control
• Walkthrough
• Classify Protect Sensitive Information
• Detect Threats
• Knowledge Check
• Summary

Products: M365, Defender For Cloud Apps

Roles: Administrator

Level: Beginner

Subjects: Cloud Security

Duration: 69 minutes

View full course details Cancel

Microsoft

Secure your cloud data

shield-halved-duotone-light-full Cyber Security
This learning path helps you leverage the built-in Azure services for securing app data, ensuring that only authorized services and clients have access.

Modules in this learning path:

• Secure Azure Storage Account
• Configure and Manage Azure Key Vault
• Secure Azure Resources with Rbac

Products: Azure, Azure Key Vault, Azure Storage, Azure Cosmos Db, Azure Synapse Analytics, Azure SQL Database

Roles: Developer, Administrator

Level: Beginner, Intermediate

Subjects: Cloud Security

Duration: 111 minutes

View full course details Cancel

Microsoft

Secure your hybrid and multicloud machines by using Azure Arc-enabled servers

shield-halved-duotone-light-full Cyber Security
Learn about the benefits of and how to onboard Azure Arc-enabled servers to Microsoft Defender for Cloud, Microsoft Defender for Servers, and Microsoft Sentinel.

Units in this learning path:

• Introduction
• Assess Secure Defend Azure Arc Enabled Servers with Microsoft Defender for Cloud
• Onboard Azure Arc Enabled Servers to Microsoft Defender for Cloud
• Secure Azure Arc Enabled Servers with Microsoft Defender for Servers
• Threat Intelligence for Azure Arc Enabled Servers with Microsoft Sentinel
• Onboard Azure Arc Enabled Servers to Microsoft Sentinel
• Knowledge Check
• Summary

Products: Azure, Azure Arc

Roles: Developer

Level: Beginner

Subjects: Security

Duration: 38 minutes

View full course details Cancel

Microsoft

Secure your infrastructure with threat modeling

shield-halved-duotone-light-full Cyber Security
Learn how to use the foundation of threat modeling to identify enterprise risks and find ways to reduce or eliminate them.

Units in this learning path:

• 1 Introduction
• 2 Assessment Questions
• 3 Gather Data
• 4 Visualize Risk
• 5 Eliminate Risk
• 6 Summary

Products: Azure, Defender For Cloud, M365 Security Center, Defender For Cloud Apps

Roles: Administrator, Developer, Devops Engineer, Security Engineer, Solution Architect

Level: Beginner, Intermediate

Subjects: Threat Protection

Duration: 72 minutes

View full course details Cancel

Amazon Web Services

Securing Data in Amazon Elastic File System (Amazon EFS)

shield-halved-duotone-light-full Cyber Security
Amazon Elastic File System (Amazon EFS) provides a simple, serverless, set-and-forget elastic file system for use with AWS Cloud services and on-premises resources. It is built to scale on demand to petabytes without disrupting applications,…
View full course details Cancel

Amazon Web Services

Securing and Protecting Your Data in Amazon Simple Storage Service (Amazon S3)

shield-halved-duotone-light-full Cyber Security
With Amazon S3, you can use a number of different approaches when addressing data protection, including preventing buckets from being publicly accessible, implementing access controls, and encrypting data at rest and in transit. Amazon S3 makes it…
View full course details Cancel

Amazon Web Services

Security Aspects of RDS and Aurora PostgreSQL

shield-halved-duotone-light-full Cyber Security
This course was developed by members of AWS Technical Field Communities (TFC), an AWS community of technical experts. The content is intended to complement our standard training curriculum and augment your AWS learning journey. We are aware some…
View full course details Cancel

Viewing 553-564 of 629