Skip to content
Search

565 courses available

Microsoft

Understand Microsoft Purview eDiscovery

shield-halved-duotone-light-full Cyber Security
Understand Microsoft Purview eDiscovery.

Units in this learning path:

• Introduction
• Understand Ediscovery
• Compare Classic New Ediscovery
• Understand Ediscovery Lifecycle
• Understand Ediscovery Permissions
• Knowledge Check
• Summary

Products: Microsoft Purview, M365

Roles: Auditor, Administrator

Level: Intermediate

Subjects: Information Protection Governance, Security, Compliance

Duration: 25 minutes

View full course details Cancel

Microsoft

Understand Microsoft datacenter security

shield-halved-duotone-light-full Cyber Security
Learn how Microsoft uses Defense-In-Depth to secure our datacenters against unauthorized access, environmental hazards, and other physical threats, as well as how Microsoft implements resilient architecture, business continuity, and disaster recovery to maintain the availability of our services.

Units in this learning path:

• Introduction
• Architecture Infrastructure
• Risk Management
• Environmental Safeguards
• Physical Security
• Asset Management
• Device Security
• Disaster Recovery
• Summary Knowledge Check

Products: M365

Roles: Auditor, Risk Practitioner, Privacy Manager

Level: Beginner

Subjects: Security

Duration: 30 minutes

View full course details Cancel

Microsoft

Understand how Microsoft Defender for Cloud supports AI security and governance in Azure

shield-halved-duotone-light-full Cyber Security
Understand how Microsoft Defender for Cloud strengthens AI security in Azure through posture management and integration with key governance and identity services.

Units in this learning path:

• Introduction
• Understand AI Services Azure
• Understand AI Security Risks
• Guardrails Protections Azure
• Azure Security Governance AI Workloads
• Knowledge Check
• Summary

Products: Azure, Azure AI Foundry, Defender For Cloud, Entra Id

Roles: Security Engineer

Level: Intermediate

Subjects: Cloud Security

Duration: 26 minutes

View full course details Cancel

Amazon Web Services

Understanding Amazon EBS Volume Encryption

shield-halved-duotone-light-full Cyber Security
Amazon EBS Volume Encryption is an AWS encryption service that helps you protect your data. In this introductory course, we describe how this service works in conjunction with AWS Key Management Service (Amazon KMS) and how you can begin using it…
View full course details Cancel

Microsoft

Use a framework to identify threats and find ways to reduce or eliminate risk

shield-halved-duotone-light-full Cyber Security
Threat modeling helps you generate a list of potential threats using STRIDE and find ways to reduce or eliminate risk with corresponding security controls.

Units in this learning path:

• 1 Introduction
• 1b Threat Modeling Framework
• 2 Spoofing Pretending to Be Someone or Something Else
• 3 Tampering Changing Data Without Authorization
• 4 Repudiation Not Claiming Responsibility for an Action Taken
• 5 Information Disclosure Seeing Data I Am Not Supposed to See
• 6 Denial of Service Overwhelming the System
• 7 Elevation of Privilege Having Permissions I Should Not Have
• 8 Summary

Products: Azure, Defender For Cloud, M365 Security Center, Defender For Cloud Apps

Roles: Administrator, Developer, Devops Engineer, Security Engineer, Solution Architect

Level: Beginner

Subjects: Threat Protection

Duration: 57 minutes

View full course details Cancel

Microsoft

Use best practices to secure and govern Microsoft Power Platform environments

shield-halved-duotone-light-full Cyber Security
Learn how you can improve security posture and governance in Microsoft Power Platform.

Modules in this learning path:

• Security Governance Intro
• Plan Manage Environment
• Get Started Center Excellence
• Manage Solutions Power Automate
• Implementation Recommendations
• Implement Power Virtual Agents
• Manage Environmental Changes
• Templates Governance Policies

Products: Power Automate, Power Platform, Power Apps

Roles: Administrator, Functional Consultant

Level: Intermediate

Subjects: Security

Duration: 410 minutes

View full course details Cancel

Microsoft

Use recommended tools to create a data-flow diagram

shield-halved-duotone-light-full Cyber Security
You can use any canvas, physical or virtual, to create a data-flow diagram. Engineers at Microsoft recommend three tools to help you in your threat modeling journey.

Units in this learning path:

• 1 Introduction
• 1b Recommended Tools
• 2 Threat Modeling Tool
• 3 Visio
• 5 Summary

Products: Azure, Defender For Cloud, M365 Security Center, Defender For Cloud Apps

Roles: Administrator, Developer, Devops Engineer, Security Engineer, Solution Architect

Level: Beginner

Subjects: Threat Protection

Duration: 18 minutes

View full course details Cancel

Microsoft

Use templates to enforce governance policies in Microsoft Power Platform

shield-halved-duotone-light-full Cyber Security
Learn about templates in Microsoft Power Platform.

Units in this learning path:

• 1 Introduction
• 2 Prerequisites
• 3 Templates
• 4 Exercise
• 5 Check
• 6 Summary

Products: Power Automate, Power Platform, Power Apps

Roles: Administrator, Functional Consultant

Level: Intermediate

Subjects: Information Protection Governance

Duration: 41 minutes

View full course details Cancel

Microsoft

Use watchlists in Microsoft Sentinel

shield-halved-duotone-light-full Cyber Security
Use watchlists in Microsoft Sentinel

Units in this learning path:

• Introduction
• Plan for Azure Watchlists
• Create Watchlist
• Manage Watchlists
• Knowledge Check
• Summary Resources

Products: Azure, Microsoft Sentinel

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Threat Protection

Duration: 21 minutes

View full course details Cancel

Microsoft

Utilize Vulnerability Management in Microsoft Defender for Endpoint

shield-halved-duotone-light-full Cyber Security
Utilize Vulnerability Management in Microsoft Defender for Endpoint

Units in this learning path:

• Introduction
• Understand
• Explore Vulnerabilities Your Devices
• Manage Remediation
• Knowledge Check
• Summary Resources

Products: M365, Defender Endpoint

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Threat Protection

Duration: 28 minutes

View full course details Cancel

Microsoft

Utilize threat intelligence in Microsoft Sentinel

shield-halved-duotone-light-full Cyber Security
Utilize threat intelligence in Microsoft Sentinel

Units in this learning path:

• Introduction
• Define Threat Intelligence
• Manage Your Threat Indicators
• View Your Threat Indicators with Kql
• Knowledge Check
• Summary Resources

Products: Microsoft Defender, Microsoft Sentinel

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Cloud Security, Security, Threat Protection

Duration: 18 minutes

View full course details Cancel

IBM

Vulnerability Management

shield-halved-duotone-light-full Cyber Security
This credential earner has the advanced competencies to apply appropriate controls to a vulnerability of an organization. The individual has the technical knowledge and practical skills to justify threat mitigation tactics, categorize vulnerabilities by severity, evaluate the current state of organizational security, and analyze the impact of cybersecurity threats on systems and processes. The earner has practiced essential workplace skills and explored cybersecurity career pathways.
View full course details Cancel

Viewing 553-564 of 565