Skip to content
Search

629 courses available

Microsoft

Understand Microsoft Online Services security incident management

shield-halved-duotone-light-full Cyber Security
Learn how Microsoft Online Services investigates, manages, and responds to security concerns to protect customers and the Microsoft cloud environment.

Units in this learning path:

• Introduction
• Incident Response Phase One
• Incident Response Phase Two
• Incident Response Phase Three
• Incident Response Phase Four
• Customer Notification Process
• Summary Knowledge Check

Products: M365

Roles: Auditor, Privacy Manager, Risk Practitioner

Level: Beginner

Subjects: Cloud Security, Threat Protection

Duration: 22 minutes

View full course details Cancel

Microsoft

Understand Microsoft Online Services subprocessor management

shield-halved-duotone-light-full Cyber Security
Learn how Microsoft Online Services procure, monitor, and manage subprocessors to help protect data from unauthorized access and inappropriate use.

Units in this learning path:

• Introduction
• Subprocessor Requirement
• Access Controls Requirements
• Additional Subprocessor Requirements
• Subprocessor Onboarding
• Subprocessor Offboarding
• Summary Knowledge Check

Products: M365

Roles: Auditor, Risk Practitioner, Privacy Manager

Level: Beginner

Subjects: Threat Protection, Cloud Security, Data Management

Duration: 27 minutes

View full course details Cancel

Microsoft

Understand Microsoft Priva

shield-halved-duotone-light-full Cyber Security
Understand Microsoft Priva.

Units in this learning path:

• Introduction
• Address Privacy Challenges
• Priva Overview
• Navigate Priva Portal
• Configure Priva Settings
• Knowledge Check
• Summary

Products: Priva, Microsoft Purview, M365

Roles: Auditor, Administrator, Privacy Manager

Level: Intermediate

Subjects: Compliance, Security

Duration: 26 minutes

View full course details Cancel

Microsoft

Understand Microsoft Purview Insider Risk Management

shield-halved-duotone-light-full Cyber Security
Understand Microsoft Purview Insider Risk Management.

Units in this learning path:

• Introduction
• Insider Risk Concept
• Insider Risk Management Overview
• Insider Risk Management Features
• Case Study Protect Insider Data
• Knowledge Check
• Summary

Products: Microsoft Purview, M365

Roles: Auditor, Administrator, Risk Practitioner

Level: Intermediate

Subjects: Information Protection Governance, Security

Duration: 28 minutes

View full course details Cancel

Microsoft

Understand Microsoft Purview eDiscovery

shield-halved-duotone-light-full Cyber Security
Understand Microsoft Purview eDiscovery.

Units in this learning path:

• Introduction
• Understand Ediscovery
• Compare Classic New Ediscovery
• Understand Ediscovery Lifecycle
• Understand Ediscovery Permissions
• Knowledge Check
• Summary

Products: Microsoft Purview, M365

Roles: Auditor, Administrator

Level: Intermediate

Subjects: Information Protection Governance, Security, Compliance

Duration: 25 minutes

View full course details Cancel

Microsoft

Understand Microsoft datacenter security

shield-halved-duotone-light-full Cyber Security
Learn how Microsoft uses Defense-In-Depth to secure our datacenters against unauthorized access, environmental hazards, and other physical threats, as well as how Microsoft implements resilient architecture, business continuity, and disaster recovery to maintain the availability of our services.

Units in this learning path:

• Introduction
• Architecture Infrastructure
• Risk Management
• Environmental Safeguards
• Physical Security
• Asset Management
• Device Security
• Disaster Recovery
• Summary Knowledge Check

Products: M365

Roles: Auditor, Risk Practitioner, Privacy Manager

Level: Beginner

Subjects: Security

Duration: 30 minutes

View full course details Cancel

Microsoft

Understand how Microsoft Defender for Cloud supports AI security and governance in Azure

shield-halved-duotone-light-full Cyber Security
Understand how Microsoft Defender for Cloud strengthens AI security in Azure through posture management and integration with key governance and identity services.

Units in this learning path:

• Introduction
• Understand AI Services Azure
• Understand AI Security Risks
• Guardrails Protections Azure
• Azure Security Governance AI Workloads
• Knowledge Check
• Summary

Products: Azure, Azure AI Foundry, Defender For Cloud, Entra Id

Roles: Security Engineer

Level: Intermediate

Subjects: Cloud Security

Duration: 26 minutes

View full course details Cancel

Amazon Web Services

Understanding Amazon EBS Volume Encryption

shield-halved-duotone-light-full Cyber Security
Amazon EBS Volume Encryption is an AWS encryption service that helps you protect your data. In this introductory course, we describe how this service works in conjunction with AWS Key Management Service (Amazon KMS) and how you can begin using it…
View full course details Cancel

Microsoft

Use a framework to identify threats and find ways to reduce or eliminate risk

shield-halved-duotone-light-full Cyber Security
Threat modeling helps you generate a list of potential threats using STRIDE and find ways to reduce or eliminate risk with corresponding security controls.

Units in this learning path:

• 1 Introduction
• 1b Threat Modeling Framework
• 2 Spoofing Pretending to Be Someone or Something Else
• 3 Tampering Changing Data Without Authorization
• 4 Repudiation Not Claiming Responsibility for an Action Taken
• 5 Information Disclosure Seeing Data I Am Not Supposed to See
• 6 Denial of Service Overwhelming the System
• 7 Elevation of Privilege Having Permissions I Should Not Have
• 8 Summary

Products: Azure, Defender For Cloud, M365 Security Center, Defender For Cloud Apps

Roles: Administrator, Developer, Devops Engineer, Security Engineer, Solution Architect

Level: Beginner

Subjects: Threat Protection

Duration: 57 minutes

View full course details Cancel

Microsoft

Use best practices to secure and govern Microsoft Power Platform environments

shield-halved-duotone-light-full Cyber Security
Learn how you can improve security posture and governance in Microsoft Power Platform.

Modules in this learning path:

• Security Governance Intro
• Plan Manage Environment
• Get Started Center Excellence
• Manage Solutions Power Automate
• Implementation Recommendations
• Implement Power Virtual Agents
• Manage Environmental Changes
• Templates Governance Policies

Products: Power Automate, Power Platform, Power Apps

Roles: Administrator, Functional Consultant

Level: Intermediate

Subjects: Security

Duration: 410 minutes

View full course details Cancel

Microsoft

Use recommended tools to create a data-flow diagram

shield-halved-duotone-light-full Cyber Security
You can use any canvas, physical or virtual, to create a data-flow diagram. Engineers at Microsoft recommend three tools to help you in your threat modeling journey.

Units in this learning path:

• 1 Introduction
• 1b Recommended Tools
• 2 Threat Modeling Tool
• 3 Visio
• 5 Summary

Products: Azure, Defender For Cloud, M365 Security Center, Defender For Cloud Apps

Roles: Administrator, Developer, Devops Engineer, Security Engineer, Solution Architect

Level: Beginner

Subjects: Threat Protection

Duration: 18 minutes

View full course details Cancel

Microsoft

Use templates to enforce governance policies in Microsoft Power Platform

shield-halved-duotone-light-full Cyber Security
Learn about templates in Microsoft Power Platform.

Units in this learning path:

• 1 Introduction
• 2 Prerequisites
• 3 Templates
• 4 Exercise
• 5 Check
• 6 Summary

Products: Power Automate, Power Platform, Power Apps

Roles: Administrator, Functional Consultant

Level: Intermediate

Subjects: Information Protection Governance

Duration: 41 minutes

View full course details Cancel

Viewing 613-624 of 629