Skip to content
Search

629 courses available

Microsoft

Troubleshoot physical failures on Windows clients

shield-halved-duotone-light-full Cyber Security
The module examines the methods for identifying and troubleshooting issues related to the device's physical hardware.

Units in this learning path:

• Introduction
• Examine Factors When Replacing Devices
• Explore Common Vulnerabilities Hardware Devices
• Examine Guidelines Replacing Hardware
• Diagnose Memory Problems
• Diagnose Troubleshoot Disk Problems
• Knowledge Check
• Summary

Products: Windows

Roles: Administrator

Level: Beginner

Subjects: Device Management, Threat Protection

Duration: 23 minutes

View full course details Cancel

Microsoft

Understand Conditional Access policies using Microsoft Intune

shield-halved-duotone-light-full Cyber Security
In this module, you'll learn about policy and security management using Microsoft Intune.

Units in this learning path:

• 1 Introduction
• 2 Policy Management Groups
• 3 Conditional Access
• 4 Use Conditional Access
• 5 Benefits Conditional Access
• 6 Implement Security Rules
• 7 Knowledge Check
• 8 Summary

Products: Mem, M365

Roles: Administrator

Level: Beginner

Subjects: Identity Access

Duration: 21 minutes

View full course details Cancel

Microsoft

Understand How to Secure AI Data with Microsoft Purview

shield-halved-duotone-light-full Cyber Security
Understand how to secure AI data with Microsoft Purview.

Units in this learning path:

• Introduction
• Understand AI Risks
• Understand Purview AI Protections
• Compliance Risks AI
• Assess AI Risks
• Control AI Sensitive Data
• Detect Respond AI Activity
• Retain Search Copilot
• Knowledge Check
• Summary

Products: Microsoft Purview, M365

Roles: Auditor, Administrator, Risk Practitioner

Level: Intermediate

Subjects: Information Protection Governance, Security

Duration: 40 minutes

View full course details Cancel

Microsoft

Understand Microsoft 365 audit logging and monitoring

shield-halved-duotone-light-full Cyber Security
Learn about how Microsoft 365 uses comprehensive audit logging and monitoring to support security monitoring, maintain service availability, and meet compliance requirements.

Units in this learning path:

• Introduction
• Microsoft365 Log Collection
• Log Protection Retention
• Log Analysis Reporting
• Summary Knowledge Check

Products: M365

Roles: Auditor, Privacy Manager, Risk Practitioner

Level: Beginner

Subjects: Compliance, Finance Accounting, Cloud Security

Duration: 19 minutes

View full course details Cancel

Microsoft

Understand Microsoft 365 encryption

shield-halved-duotone-light-full Cyber Security
Learn how Microsoft 365 encrypts data-at-rest and in-transit, securely manages encryption keys, and provides key management options to customers to meet their business needs and compliance obligations.

Units in this learning path:

• Introduction
• Data at Rest Encryption
• Microsoft Managed Keys
• Customer Key
• Encryption in Transit
• Summary Knowledge Check

Products: M365

Roles: Auditor, Risk Practitioner, Privacy Manager

Level: Beginner

Subjects: Information Protection Governance, Threat Protection, Compliance

Duration: 20 minutes

View full course details Cancel

Microsoft

Understand Microsoft 365 governance

shield-halved-duotone-light-full Cyber Security
Learn how Microsoft implements organization-wide security and privacy governance to support the secure operation of Microsoft 365 services and maintain compliance with regulatory requirements and customer commitments.

Units in this learning path:

• Introduction
• Organizational Structure
• Policy Framework
• Policy Standards Program
• Information Security Policy
• Personnel Security Governance
• Summary Knowledge Check

Products: M365

Roles: Auditor, Risk Practitioner, Privacy Manager

Level: Beginner

Subjects: Information Protection Governance

Duration: 28 minutes

View full course details Cancel

Microsoft

Understand Microsoft 365 identity and access management

shield-halved-duotone-light-full Cyber Security
Learn how Microsoft 365 implements the principle of Zero Standing Access (ZSA) to protect production environments and customer data using Just-In-Time (JIT) and Just-Enough-Access (JEA).

Units in this learning path:

• Introduction
• Recognize Managed Account Types
• Tools Technologies Used
• Prerequisites Team Account Creation
• Privileged Access
• Customer Lockbox
• Access Control Management
• Summary Knowledge Check

Products: M365

Roles: Auditor, Privacy Manager, Risk Practitioner

Level: Beginner

Subjects: Identity Access, Information Protection Governance

Duration: 29 minutes

View full course details Cancel

Microsoft

Understand Microsoft 365 privacy

shield-halved-duotone-light-full Cyber Security
Learn about Microsoft 365 privacy standards, the reasons we have them in place, and how they differentiate Microsoft in protecting and respecting customer data.

Units in this learning path:

• Introduction
• Key Privacy Terms
• Data Lifecycle
• Collection
• Processing
• Third Party Sharing
• Retention
• Destruction
• Roles Responsibilities
• General Data Protection Regulation
• Summary Knowledge Check

Products: M365

Roles: Auditor, Risk Practitioner, Privacy Manager

Level: Beginner

Subjects: Security, Compliance

Duration: 39 minutes

View full course details Cancel

Microsoft

Understand Microsoft 365 risk management

shield-halved-duotone-light-full Cyber Security
Learn how Microsoft 365 identifies, assesses, responds to, and manages risks to protect customers and the Microsoft 365 environment.

Units in this learning path:

• Introduction
• Enterprise Risk Management
• Overview Risk Management
• Risk Identification Assessment
• Risk Response
• Summary Knowledge Check

Products: M365

Roles: Auditor, Risk Practitioner, Privacy Manager

Level: Beginner

Subjects: Information Protection Governance, Cloud Security, Threat Protection

Duration: 17 minutes

View full course details Cancel

Microsoft

Understand Microsoft 365 vulnerability management

shield-halved-duotone-light-full Cyber Security
Learn how Microsoft 365 proactively monitors information system assets for vulnerabilities, assesses the risks associated with discovered vulnerabilities, and remediates them in a timely manner.

Units in this learning path:

• Introduction
• Machine State Scanning
• Patch Management
• Vulnerability Configuration Scanning
• Attack Simulation Penetration Testing
• Summary Knowledge Check

Products: M365

Roles: Auditor, Risk Practitioner, Privacy Manager

Level: Beginner

Subjects: Threat Protection, Information Protection Governance

Duration: 19 minutes

View full course details Cancel

Microsoft

Understand Microsoft Entra ID

shield-halved-duotone-light-full Cyber Security
This module equips learners to describe Microsoft Entra ID - a cloud-based identity and access management service. They'll compare it with AD DS, understand its role as a directory for cloud services, and learn about its security features. They'll also learn about Microsoft Entra Domain Services.

Units in this learning path:

• Introduction
• Examine Azure Active Directory
• Compare Azure Active Directory Domain Services
• Examine Azure Directory Service Cloud Apps
• Compare Azure Premium P1 P2 Plans
• Examine Azure Domain Services
• Knowledge Check
• Summary

Products: Azure, Entra Id, Active Directory

Roles: Administrator, Identity Access Admin

Level: Intermediate

Subjects: Identity Access, Infrastructure, It Management Monitoring, Employee Management

Duration: 31 minutes

View full course details Cancel

Microsoft

Understand Microsoft Online Services security development and operation

shield-halved-duotone-light-full Cyber Security
Learn how Microsoft Online Services follow Microsoft’s Security Development Lifecycle (SDL) to build security and privacy into our products and services.

Units in this learning path:

• Introduction
• Security Training Requirements
• Security Privacy Design
• Security Tool Automation
• Application Penetration Testing
• Support Secure Deployment
• Safe Deployment Process
• Open Source Security
• Summary Knowledge Check

Products: M365

Roles: Auditor, Privacy Manager, Risk Practitioner

Level: Beginner

Subjects: Cloud Security, Threat Protection, Information Protection Governance

Duration: 41 minutes

View full course details Cancel

Viewing 601-612 of 629