Skip to content
Search

629 courses available

IBM

Security Operations Center in Practice

shield-halved-duotone-light-full Cyber Security
This badge earner has completed all the learning activities included in this online learning experience, including hands-on experience, concepts, methods and tools related to the Security Operations Center’s domain. The individual has developed skills around techniques, technologies, roles and scenarios needed to establish the foundations of a Security Operations Center (SOC) within an organization.
View full course details Cancel

IBM

Security Operations and Management

shield-halved-duotone-light-full Cyber Security
This credential earner has the advanced competencies to assemble the components required for security operations and monitoring. The individual has the technical knowledge and practical skills to distinguish between standard security models, assign security operations center roles and tasks, perform network reconnaissance, manage endpoints, and monitor devices. The earner has practiced essential workplace skills and explored cybersecurity career pathways.
View full course details Cancel

Amazon Web Services

Security and Observability for Serverless Applications

shield-halved-duotone-light-full Cyber Security
This course will get you started on thinking about how security best practices should be reflected in serverless architectures. It covers some of the key Amazon Web Services (AWS) offerings that are available to help you monitor for issues and…
View full course details Cancel

Microsoft

Security incident management in Microsoft Sentinel

shield-halved-duotone-light-full Cyber Security
Learn about security incidents, incident evidence and entities, incident management, and how to use Microsoft Sentinel to handle incidents.

Units in this learning path:

• 1 Introduction
• 2 Exercise Setup
• 3 Describe Incident Management
• 4 Understand Evidence Entities
• 5 Manage Incidents
• 6 Exercise Investigate Incident
• 7 Summary

Products: Azure, Microsoft Sentinel

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Cloud Security, Security

Duration: 80 minutes

View full course details Cancel

Microsoft

Security monitoring and governance

shield-halved-duotone-light-full Cyber Security
Learn security monitoring and governance with Microsoft Defender for Cloud, Azure Policy, resource locks, Microsoft Defender for Identity, and GitHub Advanced Security integration for comprehensive DevSecOps protection.

Units in this learning path:

• Introduction
• Implement Pipeline Security
• Explore Microsoft Defender Cloud
• Examine Microsoft Defender Cloud Usage Scenarios
• Explore Azure Policy
• Understand Policies
• Explore Initiatives
• Explore Resource Locks
• Understand Microsoft Defender Identity
• Integrate Github Advanced Security Microsoft Defender
• Configure Github Advanced Security Github
• Knowledge Check
• Summary

Products: Azure, Azure Artifacts, Azure Boards, Azure Cloud Services, Azure Devops, Azure Pipelines, Azure Repos, Azure Test Plans, Github

Roles: Administrator, AI Engineer, Data Engineer, Developer, Devops Engineer, Platform Engineer, Security Engineer, Security Operations Analyst, Service Adoption Specialist, Solution Architect, Startup Founder, Technology Manager

Level: Advanced

Subjects: Devops, Cloud Security

Duration: 120 minutes

View full course details Cancel

Salesforce

Security, Identity, and Privacy

shield-halved-duotone-light-full Cyber Security
Learn how to protect your data and control user access in Salesforce. This is a critical skill for any admin.
View full course details Cancel

Amazon Web Services

Sensitive Data Detection with Amazon Macie

shield-halved-duotone-light-full Cyber Security
This course was developed by members of AWS Technical Field Communities (TFC), an AWS community of technical experts. The content is intended to complement our standard training curriculum and augment your AWS learning journey. We are aware some…
View full course details Cancel

Microsoft

Set up Microsoft Defender for Cloud

shield-halved-duotone-light-full Cyber Security
Discover how to leverage Microsoft Defender for Cloud through the Azure portal to ensure the security of your Azure services and workloads, offering continuous threat detection and prevention.

Units in this learning path:

• Introduction
• Implement Microsoft Defender for Cloud
• Security Posture
• Workload Protections
• Deploy Microsoft Defender for Cloud
• Upgrade Microsoft Defender for Cloud
• Azure Arc
• Azure Arc Capabilities
• Microsoft Cloud Security Benchmark
• Improve Your Regulatory Compliance
• Configure Microsoft Defender for Cloud Policies
• View Edit Security Policies
• Manage Implement Microsoft Defender for Cloud Recommendation
• Explore Secure Score
• Mitre Attack Matrix
• Define Brute Force Attacks
• Understand Just in Time Vm Access
• Implement Just in Time Vm Access
• Activate Just in Time Access on Your Virtual Machines from Azure Portal
• Knowledge Check
• Summary

Products: Azure, Azure Arc, Azure Log Analytics, Azure Portal, Azure SQL Database, Azure SQL Virtual Machines, Azure Sqlserver Vm, Azure Storage, Azure Storage Accounts, Azure Virtual Machines, Azure Virtual Machines Windows, Azure Virtual Network, Defender For Cloud

Roles: Administrator, Security Engineer

Level: Intermediate

Subjects: Cloud Security, Compliance, Infrastructure, Networking, Security, Storage, Virtual Machine

Duration: 248 minutes

View full course details Cancel

Microsoft

Sign in users with Microsoft Entra ID in a Java web app

shield-halved-duotone-light-full Cyber Security
Learn how to authenticate users with Microsoft Entra ID and get authorized access to data in a Java web app using Microsoft Authentication Library.

Units in this learning path:

• Introduction
• Authentication Authorization
• Exercise Register Azure Ad App
• Sign in with Msal
• Exercise Sign in with Msal
• Authorize Access to API
• Exercise Authorize Access to API
• Knowledge Check
• Summary

Products: Azure, Msal Java

Roles: Developer

Level: Beginner

Subjects: Identity Access

Duration: 37 minutes

View full course details Cancel

Microsoft

Solution Architect series: Implement project governance for Power Platform and Dynamics 365

shield-halved-duotone-light-full Cyber Security
Learn about project governance as a solution architect.

Units in this learning path:

• 1 Introduction
• 2 Governance
• 3 Role
• 4 Techniques
• 5 Team
• 6 Check
• 7 Summary

Products: Power Platform, Dynamics 365, Dataverse

Roles: Solution Architect

Level: Advanced

Subjects: Information Protection Governance

Duration: 28 minutes

View full course details Cancel

Microsoft

Solution architect series: Model security for Power Platform solutions

shield-halved-duotone-light-full Cyber Security
Lean about security functionality within Microsoft Dataverse.

Units in this learning path:

• 1 Introduction
• 2 Environment
• 3 Data Loss Prevention
• 4 Dataverse
• 5 Apps
• Exercise
• 6 Check
• 7 Summary

Products: Power Platform, Dataverse, Dynamics 365

Roles: Solution Architect

Level: Advanced

Subjects: Security

Duration: 58 minutes

View full course details Cancel

Microsoft

Specify requirements for securing SaaS, PaaS, and IaaS services

shield-halved-duotone-light-full Cyber Security
You learn how to analyze security requirements for different cloud offerings (SaaS, PaaS, and IaaS), IoT workloads, web workloads, containers, and AI workloads.

Units in this learning path:

• Introduction Security Saas Paas Iaas
• Specify Security Baselines Saas Paas Iaas Services
• Specify Security Requirements Iot Workloads
• Specify Security Requirements Web Workloads
• Specify Security Requirements Containers Container Orchestration
• Evaluate AI Services Security
• Knowledge Check
• Summary

Products: Azure, Defender For Cloud, Defender For Cloud Apps, Defender Identity, Microsoft Sentinel, Azure AI Foundry

Roles: Security Engineer, Solution Architect

Level: Advanced

Subjects: Security, Cloud Security

Duration: 80 minutes

View full course details Cancel

Viewing 577-588 of 629