Skip to content
Search

629 courses available

Amazon Web Services

Amazon Inspector - Getting Started

shield-halved-duotone-light-full Cyber Security
Amazon Inspector is an automated vulnerability management service that continually scans AWS workloads for software vulnerabilities and unintended network exposure. In this 'Getting Started' course you will learn about the purpose and benefits,…
View full course details Cancel

Amazon Web Services

Amazon Location Service Getting Started

shield-halved-duotone-light-full Cyber Security
You can use Amazon Location Service to add location data to applications using maps, places, trackers, and geofences without compromising data security. In this course, you will learn the benefits, typical use cases, and technical concepts of…
View full course details Cancel

Amazon Web Services

Amazon QuickSight Advanced Business Intelligence Authoring (Part 2)

shield-halved-duotone-light-full Cyber Security
This course is part of a two-part series. In this series, learners will learn how to author business intelligence experiences using Amazon QuickSight. In this second course, you will learn practical knowledge on building interactivity, including…
View full course details Cancel

Amazon Web Services

Amazon Security Lake Getting Started

shield-halved-duotone-light-full Cyber Security
With Amazon Security Lake, you can automatically centralize security data from various sources into a purpose-built data lake in your account. These sources include Amazon Web Services (AWS) and software as a service (SaaS) providers, on premises,…
View full course details Cancel

Amazon Web Services

Amazon Simple Storage Service (Amazon S3) Business Continuity and Disaster Recovery

shield-halved-duotone-light-full Cyber Security
Disasters, such as data center failures, cyberattacks, or even user error can cause data loss or corruption. Implementing a business continuity and disaster recovery strategy can help you recover from disasters and data loss and resume operations…
View full course details Cancel

Amazon Web Services

Amazon WorkMail Getting Started

shield-halved-duotone-light-full Cyber Security
Amazon WorkMail provides secure, managed business email and calendaring in the AWS Cloud. You can send and receive email, manage contacts, share calendars, and book resources using familiar client applications. Learn how to use WorkMail for…
View full course details Cancel

IBM

Analyze Security Policies and Controls

shield-halved-duotone-light-full Cyber Security
This credential earner demonstrated their applied knowledge in analyzing and developing security controls for third party applications on the organization’s network. The earner has identified potential risks, and developed a security implementation and disaster recovery plan. The earner will build and develop their transferable skills and gain real industry experience.
View full course details Cancel

Microsoft

Analyze your Microsoft 365 workplace data using Microsoft Viva Insights

shield-halved-duotone-light-full Cyber Security
This module examines the workplace analytical features of Microsoft Viva Insights, including how it works, and how it generates insights and improves collaboration within an organization.

Units in this learning path:

• Introduction
• Examine Microsoft Viva Insights
• Explore Personal Insights
• Explore Team Insights
• Explore Organization Insights
• Explore Advanced Insights
• Knowledge Check
• Summary

Products: Office 365

Roles: Administrator, Solution Architect, Technology Manager

Level: Intermediate

Subjects: Business Applications, Compliance, Identity Access, Insider Risk, It Management Monitoring, Productivity, Security, Threat Protection

Duration: 40 minutes

View full course details Cancel

IBM

Apply Incident Detection and Response Techniques

shield-halved-duotone-light-full Cyber Security
This credential earner demonstrated their applied knowledge in investigating, identifying, and assessing potential threats in an organization. The earner has implemented hash file analysis techniques, analyzed emails to unveil any concealed threats, and provided a defense containment and recommendation plans. The earner will build and develop their transferable skills and gain real industry experience.
View full course details Cancel

Microsoft

Apply sensitivity labels for data protection

shield-halved-duotone-light-full Cyber Security
Apply sensitivity labels for data protection.

Units in this learning path:

• Introduction
• Sensitivity Label Foundations
• Manage Sensitivity Labels Office
• Apply Sensitivity Labels with Copilot
• Protect Meetings with Sensitivity Labels
• Apply Sensitivity Labels to Microsoft 365 Services
• Knowledge Check
• Summary Resources

Products: Microsoft Purview, M365

Roles: Ip Admin, Risk Practitioner

Level: Intermediate

Subjects: Information Protection Governance

Duration: 60 minutes

View full course details Cancel

Microsoft

Approach your data-flow diagram with the right threat model focus

shield-halved-duotone-light-full Cyber Security
Threat modeling is an effective technique to help you identify threats and ways to reduce or eliminate risk. We start by deciding to focus on either what needs to be protected or who it needs protection from.

Units in this learning path:

• 1 Introduction
• 1b Focused Approaches
• 2 System Focused Approach
• 4 Summary

Products: Azure, Defender For Cloud, M365 Security Center, Defender For Cloud Apps

Roles: Administrator, Developer, Devops Engineer, Security Engineer, Solution Architect

Level: Beginner

Subjects: Threat Protection

Duration: 8 minutes

View full course details Cancel

Microsoft

Architect secure infrastructure in Azure

shield-halved-duotone-light-full Cyber Security
Learn about the tools and services available on Azure to ensure your resources are secure.

Modules in this learning path:

• Manage Secrets with Azure Key Vault
• Secure Azure Resources with Rbac
• Monitor Report Aad Security Events

Products: Azure, Azure Virtual Machines, Azure Resource Manager, Azure Application Gateway, Azure Key Vault, Azure SQL Database

Roles: Solution Architect

Level: Intermediate

Subjects: Cloud Security, Architecture

Duration: 155 minutes

View full course details Cancel

Viewing 73-84 of 629