571 courses available
Microsoft
Use recommended tools to create a data-flow diagram
Cyber SecurityUnits in this learning path:
• 1 Introduction
• 1b Recommended Tools
• 2 Threat Modeling Tool
• 3 Visio
• 5 Summary
Products: Azure, Defender For Cloud, M365 Security Center, Defender For Cloud Apps
Roles: Administrator, Developer, Devops Engineer, Security Engineer, Solution Architect
Level: Beginner
Subjects: Threat Protection
Duration: 18 minutes
Microsoft
Use templates to enforce governance policies in Microsoft Power Platform
Cyber SecurityUnits in this learning path:
• 1 Introduction
• 2 Prerequisites
• 3 Templates
• 4 Exercise
• 5 Check
• 6 Summary
Products: Power Automate, Power Platform, Power Apps
Roles: Administrator, Functional Consultant
Level: Intermediate
Subjects: Information Protection Governance
Duration: 41 minutes
Microsoft
Use watchlists in Microsoft Sentinel
Cyber SecurityUnits in this learning path:
• Introduction
• Plan for Azure Watchlists
• Create Watchlist
• Manage Watchlists
• Knowledge Check
• Summary Resources
Products: Azure, Microsoft Sentinel
Roles: Security Operations Analyst
Level: Intermediate
Subjects: Threat Protection
Duration: 21 minutes
Microsoft
Utilize Vulnerability Management in Microsoft Defender for Endpoint
Cyber SecurityUnits in this learning path:
• Introduction
• Understand
• Explore Vulnerabilities Your Devices
• Manage Remediation
• Knowledge Check
• Summary Resources
Products: M365, Defender Endpoint
Roles: Security Operations Analyst
Level: Intermediate
Subjects: Threat Protection
Duration: 28 minutes
Microsoft
Utilize threat intelligence in Microsoft Sentinel
Cyber SecurityUnits in this learning path:
• Introduction
• Define Threat Intelligence
• Manage Your Threat Indicators
• View Your Threat Indicators with Kql
• Knowledge Check
• Summary Resources
Products: Microsoft Defender, Microsoft Sentinel
Roles: Security Operations Analyst
Level: Intermediate
Subjects: Cloud Security, Security, Threat Protection
Duration: 18 minutes
IBM
Vulnerability Management
Cyber SecurityMicrosoft
Work with entitlements and permission sets in Dynamics 365 Business Central
Cyber SecurityUnits in this learning path:
• 1 Introduction
• 2 Get Started
• 3 Create Entitlements Permission Sets
• Override Entitlements
• 4 Check
• 5 Summary
Products: Dynamics 365, Dynamics Business Central
Roles: Developer
Level: Intermediate
Subjects: Identity Access
Duration: 43 minutes
Viewing 565-571 of 571