565 courses available
Microsoft
Understand Microsoft Purview eDiscovery
Cyber SecurityUnits in this learning path:
• Introduction
• Understand Ediscovery
• Compare Classic New Ediscovery
• Understand Ediscovery Lifecycle
• Understand Ediscovery Permissions
• Knowledge Check
• Summary
Products: Microsoft Purview, M365
Roles: Auditor, Administrator
Level: Intermediate
Subjects: Information Protection Governance, Security, Compliance
Duration: 25 minutes
Microsoft
Understand Microsoft datacenter security
Cyber SecurityUnits in this learning path:
• Introduction
• Architecture Infrastructure
• Risk Management
• Environmental Safeguards
• Physical Security
• Asset Management
• Device Security
• Disaster Recovery
• Summary Knowledge Check
Products: M365
Roles: Auditor, Risk Practitioner, Privacy Manager
Level: Beginner
Subjects: Security
Duration: 30 minutes
Microsoft
Understand how Microsoft Defender for Cloud supports AI security and governance in Azure
Cyber SecurityUnits in this learning path:
• Introduction
• Understand AI Services Azure
• Understand AI Security Risks
• Guardrails Protections Azure
• Azure Security Governance AI Workloads
• Knowledge Check
• Summary
Products: Azure, Azure AI Foundry, Defender For Cloud, Entra Id
Roles: Security Engineer
Level: Intermediate
Subjects: Cloud Security
Duration: 26 minutes
Amazon Web Services
Understanding Amazon EBS Volume Encryption
Cyber SecurityMicrosoft
Use a framework to identify threats and find ways to reduce or eliminate risk
Cyber SecurityUnits in this learning path:
• 1 Introduction
• 1b Threat Modeling Framework
• 2 Spoofing Pretending to Be Someone or Something Else
• 3 Tampering Changing Data Without Authorization
• 4 Repudiation Not Claiming Responsibility for an Action Taken
• 5 Information Disclosure Seeing Data I Am Not Supposed to See
• 6 Denial of Service Overwhelming the System
• 7 Elevation of Privilege Having Permissions I Should Not Have
• 8 Summary
Products: Azure, Defender For Cloud, M365 Security Center, Defender For Cloud Apps
Roles: Administrator, Developer, Devops Engineer, Security Engineer, Solution Architect
Level: Beginner
Subjects: Threat Protection
Duration: 57 minutes
Microsoft
Use best practices to secure and govern Microsoft Power Platform environments
Cyber SecurityModules in this learning path:
• Security Governance Intro
• Plan Manage Environment
• Get Started Center Excellence
• Manage Solutions Power Automate
• Implementation Recommendations
• Implement Power Virtual Agents
• Manage Environmental Changes
• Templates Governance Policies
Products: Power Automate, Power Platform, Power Apps
Roles: Administrator, Functional Consultant
Level: Intermediate
Subjects: Security
Duration: 410 minutes
Microsoft
Use recommended tools to create a data-flow diagram
Cyber SecurityUnits in this learning path:
• 1 Introduction
• 1b Recommended Tools
• 2 Threat Modeling Tool
• 3 Visio
• 5 Summary
Products: Azure, Defender For Cloud, M365 Security Center, Defender For Cloud Apps
Roles: Administrator, Developer, Devops Engineer, Security Engineer, Solution Architect
Level: Beginner
Subjects: Threat Protection
Duration: 18 minutes
Microsoft
Use templates to enforce governance policies in Microsoft Power Platform
Cyber SecurityUnits in this learning path:
• 1 Introduction
• 2 Prerequisites
• 3 Templates
• 4 Exercise
• 5 Check
• 6 Summary
Products: Power Automate, Power Platform, Power Apps
Roles: Administrator, Functional Consultant
Level: Intermediate
Subjects: Information Protection Governance
Duration: 41 minutes
Microsoft
Use watchlists in Microsoft Sentinel
Cyber SecurityUnits in this learning path:
• Introduction
• Plan for Azure Watchlists
• Create Watchlist
• Manage Watchlists
• Knowledge Check
• Summary Resources
Products: Azure, Microsoft Sentinel
Roles: Security Operations Analyst
Level: Intermediate
Subjects: Threat Protection
Duration: 21 minutes
Microsoft
Utilize Vulnerability Management in Microsoft Defender for Endpoint
Cyber SecurityUnits in this learning path:
• Introduction
• Understand
• Explore Vulnerabilities Your Devices
• Manage Remediation
• Knowledge Check
• Summary Resources
Products: M365, Defender Endpoint
Roles: Security Operations Analyst
Level: Intermediate
Subjects: Threat Protection
Duration: 28 minutes
Microsoft
Utilize threat intelligence in Microsoft Sentinel
Cyber SecurityUnits in this learning path:
• Introduction
• Define Threat Intelligence
• Manage Your Threat Indicators
• View Your Threat Indicators with Kql
• Knowledge Check
• Summary Resources
Products: Microsoft Defender, Microsoft Sentinel
Roles: Security Operations Analyst
Level: Intermediate
Subjects: Cloud Security, Security, Threat Protection
Duration: 18 minutes
IBM
Vulnerability Management
Cyber SecurityViewing 553-564 of 565