Skip to content
Search

629 courses available

Microsoft

Use watchlists in Microsoft Sentinel

shield-halved-duotone-light-full Cyber Security
Use watchlists in Microsoft Sentinel

Units in this learning path:

• Introduction
• Plan for Azure Watchlists
• Create Watchlist
• Manage Watchlists
• Knowledge Check
• Summary Resources

Products: Azure, Microsoft Sentinel

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Threat Protection

Duration: 21 minutes

View full course details Cancel

Microsoft

Utilize Vulnerability Management in Microsoft Defender for Endpoint

shield-halved-duotone-light-full Cyber Security
Utilize Vulnerability Management in Microsoft Defender for Endpoint

Units in this learning path:

• Introduction
• Understand
• Explore Vulnerabilities Your Devices
• Manage Remediation
• Knowledge Check
• Summary Resources

Products: M365, Defender Endpoint

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Threat Protection

Duration: 28 minutes

View full course details Cancel

Microsoft

Utilize threat intelligence in Microsoft Sentinel

shield-halved-duotone-light-full Cyber Security
Utilize threat intelligence in Microsoft Sentinel

Units in this learning path:

• Introduction
• Define Threat Intelligence
• Manage Your Threat Indicators
• View Your Threat Indicators with Kql
• Knowledge Check
• Summary Resources

Products: Microsoft Defender, Microsoft Sentinel

Roles: Security Operations Analyst

Level: Intermediate

Subjects: Cloud Security, Security, Threat Protection

Duration: 18 minutes

View full course details Cancel

IBM

Vulnerability Management

shield-halved-duotone-light-full Cyber Security
This credential earner has the advanced competencies to apply appropriate controls to a vulnerability of an organization. The individual has the technical knowledge and practical skills to justify threat mitigation tactics, categorize vulnerabilities by severity, evaluate the current state of organizational security, and analyze the impact of cybersecurity threats on systems and processes. The earner has practiced essential workplace skills and explored cybersecurity career pathways.
View full course details Cancel

Microsoft

Work with entitlements and permission sets in Dynamics 365 Business Central

shield-halved-duotone-light-full Cyber Security
Learn about entitlements and permission sets and how to extend them in Microsoft Dynamics 365 Business Central.

Units in this learning path:

• 1 Introduction
• 2 Get Started
• 3 Create Entitlements Permission Sets
• Override Entitlements
• 4 Check
• 5 Summary

Products: Dynamics 365, Dynamics Business Central

Roles: Developer

Level: Intermediate

Subjects: Identity Access

Duration: 43 minutes

View full course details Cancel

Viewing 625-629 of 629