571 courses available
Microsoft
Understand Microsoft Online Services security incident management
Cyber SecurityUnits in this learning path:
• Introduction
• Incident Response Phase One
• Incident Response Phase Two
• Incident Response Phase Three
• Incident Response Phase Four
• Customer Notification Process
• Summary Knowledge Check
Products: M365
Roles: Auditor, Privacy Manager, Risk Practitioner
Level: Beginner
Subjects: Cloud Security, Threat Protection
Duration: 22 minutes
Microsoft
Understand Microsoft Online Services subprocessor management
Cyber SecurityUnits in this learning path:
• Introduction
• Subprocessor Requirement
• Access Controls Requirements
• Additional Subprocessor Requirements
• Subprocessor Onboarding
• Subprocessor Offboarding
• Summary Knowledge Check
Products: M365
Roles: Auditor, Risk Practitioner, Privacy Manager
Level: Beginner
Subjects: Threat Protection, Cloud Security, Data Management
Duration: 27 minutes
Microsoft
Understand Microsoft Purview Insider Risk Management
Cyber SecurityUnits in this learning path:
• Introduction
• Insider Risk Concept
• Insider Risk Management Overview
• Insider Risk Management Features
• Case Study Protect Insider Data
• Knowledge Check
• Summary
Products: Microsoft Purview, M365
Roles: Auditor, Administrator, Risk Practitioner
Level: Intermediate
Subjects: Information Protection Governance, Security
Duration: 28 minutes
Microsoft
Understand Microsoft Purview eDiscovery
Cyber SecurityUnits in this learning path:
• Introduction
• Understand Ediscovery
• Compare Classic New Ediscovery
• Understand Ediscovery Lifecycle
• Understand Ediscovery Permissions
• Knowledge Check
• Summary
Products: Microsoft Purview, M365
Roles: Auditor, Administrator
Level: Intermediate
Subjects: Information Protection Governance, Security, Compliance
Duration: 25 minutes
Microsoft
Understand Microsoft datacenter security
Cyber SecurityUnits in this learning path:
• Introduction
• Architecture Infrastructure
• Risk Management
• Environmental Safeguards
• Physical Security
• Asset Management
• Device Security
• Disaster Recovery
• Summary Knowledge Check
Products: M365
Roles: Auditor, Risk Practitioner, Privacy Manager
Level: Beginner
Subjects: Security
Duration: 30 minutes
Microsoft
Understand and plan data loss prevention
Cyber SecurityUnits in this learning path:
• Introduction
• Understand Data Loss Prevention
• Understand Data Loss Prevention Protection
• Plan Design Policies
• Understand Deployment Simulation Mode
• Advanced Data Loss Prevention Controls
• Knowledge Check
• Summary
Products: M365, Microsoft Purview
Roles: Administrator, Risk Practitioner
Level: Beginner
Subjects: Threat Protection, Security
Duration: 31 minutes
Microsoft
Understand data security posture management in Microsoft Purview
Cyber SecurityUnits in this learning path:
• Introduction
• Understand Data Security Posture Management
• Evaluate Risk Posture
• Data Security Objectives
• Data Security Posture AI
• Data Security Workflow Fit
• Knowledge Check
• Summary
Products: M365, Microsoft Purview
Roles: Administrator, Risk Practitioner
Level: Intermediate
Subjects: Threat Protection, Security
Duration: 35 minutes
Microsoft
Understand how Microsoft Defender for Cloud supports AI security and governance in Azure
Cyber SecurityUnits in this learning path:
• Introduction
• Understand AI Services Azure
• Understand AI Security Risks
• Guardrails Protections Azure
• Azure Security Governance AI Workloads
• Knowledge Check
• Summary
Products: Azure, Microsoft Foundry, Defender For Cloud, Entra Id
Roles: Security Engineer
Level: Intermediate
Subjects: Cloud Security
Duration: 26 minutes
Microsoft
Understand identity architecture for AI workloads
Cyber SecurityUnits in this learning path:
• Introduction
• Identity Control Layer AI Solutions
• Management Data Plane AI Workloads
• Authentication Flows Microsoft Foundry
• Human Workload Identities AI Environments
• Role Scope AI Environments
• Common Identity Misconfigurations AI
• Knowledge Check
• Summary
Products: Azure, Entra Id
Roles: Security Engineer, Identity Access Admin
Level: Intermediate
Subjects: Security, Cloud Security, Identity Access
Duration: 38 minutes
Amazon Web Services
Understanding Amazon EBS Volume Encryption
Cyber SecurityMicrosoft
Use a framework to identify threats and find ways to reduce or eliminate risk
Cyber SecurityUnits in this learning path:
• 1 Introduction
• 1b Threat Modeling Framework
• 2 Spoofing Pretending to Be Someone or Something Else
• 3 Tampering Changing Data Without Authorization
• 4 Repudiation Not Claiming Responsibility for an Action Taken
• 5 Information Disclosure Seeing Data I Am Not Supposed to See
• 6 Denial of Service Overwhelming the System
• 7 Elevation of Privilege Having Permissions I Should Not Have
• 8 Summary
Products: Azure, Defender For Cloud, M365 Security Center, Defender For Cloud Apps
Roles: Administrator, Developer, Devops Engineer, Security Engineer, Solution Architect
Level: Beginner
Subjects: Threat Protection
Duration: 57 minutes
Microsoft
Use best practices to secure and govern Microsoft Power Platform environments
Cyber SecurityModules in this learning path:
• Security Governance Intro
• Plan Manage Environment
• Get Started Center Excellence
• Manage Solutions Power Automate
• Implementation Recommendations
• Implement Power Virtual Agents
• Manage Environmental Changes
• Templates Governance Policies
Products: Power Automate, Power Platform, Power Apps
Roles: Administrator, Functional Consultant
Level: Intermediate
Subjects: Security
Duration: 410 minutes
Viewing 553-564 of 571