Skip to content
Search

629 courses available

IBM

Assess Network Vulnerabilities

shield-halved-duotone-light-full Cyber Security
This credential earner demonstrated their applied knowledge in conducting a vulnerability assessment for a clinic. The earner has analyzed network scans, conducted an internal and external vulnerability scan, and delivered a report of the findings and recommendations to the stakeholders. The earner will build and develop their transferable skills and gain real industry experience.
View full course details Cancel

Microsoft

Assign admins and plan content for Microsoft Search

shield-halved-duotone-light-full Cyber Security
Assign and manage key Microsoft Search roles, determine how success will be measured, and plan the content for the initial release.

Units in this learning path:

• Introduction
• Assign Admin
• Formulate Metrics
• Identify Stakeholders
• Begin Planning
• Knowledge Check
• Summary

Products: M365, Office, Windows, Bing

Roles: Administrator, Business Owner, Functional Consultant, Technology Manager

Level: Beginner

Subjects: Identity Access, Data Management

Duration: 24 minutes

View full course details Cancel

Microsoft

Audit and search activity in Microsoft Purview

shield-halved-duotone-light-full Cyber Security
Logging actions and locating content are essential for investigating events, supporting compliance efforts, and maintaining transparency. Microsoft Purview provides audit and content search capabilities to help organizations understand what actions were taken and find specific items across Microsoft 365 services. This learning path aligns with exam SC-401: Microsoft Information Security Administrator.

Modules in this learning path:

• Purview Audit Search Investigate
• Purview Ediscovery Search

Products: Microsoft Purview

Roles: Auditor, Administrator, Ip Admin

Level: Intermediate

Subjects: Security

Duration: 94 minutes

View full course details Cancel

Microsoft

Audit the security of Windows Server IaaS Virtual Machines

shield-halved-duotone-light-full Cyber Security
Learn about Microsoft Defender for Cloud and how to onboard Windows Server computers to the Microsoft Defender for Cloud Service. Also learn about Microsoft Sentinel, security information and event management (SIEM), and security orchestration, automation, and response (SOAR).

Units in this learning path:

• Introduction
• Describe Azure Security Center
• Enable Azure Security Center Hybrid Environments
• Implement Assess Security Policies
• Protect Your Resources with Azure Security Center
• Implement Azure Sentinel
• Knowledge Check
• Summary

Products: Azure, Azure Cloud Shell, Azure Portal, Azure Virtual Machines

Roles: Administrator, Solution Architect, Technology Manager

Level: Intermediate

Subjects: Threat Protection

Duration: 45 minutes

View full course details Cancel

Amazon Web Services

Auditing Amazon Simple Storage Service (Amazon S3) Security

shield-halved-duotone-light-full Cyber Security
After you have implemented your security measures, you still need to continually assess, audit, and evaluate access to your data and your Amazon S3 configurations. Auditing helps you detect potential security incidents, identify any security…
View full course details Cancel

Microsoft

Authenticate and authorize user identities on GitHub

shield-halved-duotone-light-full Cyber Security
Learn how to manage the authentication and authorization of user identities on GitHub.

Units in this learning path:

• 1 Introduction
• 2 User Identity Access Management
• 3 Authentication
• 4 Authorization
• 5 Team Synchronization
• 6 Knowledge Check
• 7 Summary

Products: Github

Roles: Devops Engineer, Administrator, Developer, Solution Architect

Level: Intermediate

Subjects: Identity Access

Duration: 33 minutes

View full course details Cancel

Amazon Web Services

Authentication and Authorization with AWS Identity and Access Management

shield-halved-duotone-light-full Cyber Security
This is an introductory course to authentication and authorization with AWS Identity and Access Management (IAM). In this course, we introduce you to IAM and discuss how the service helps you manage permissions to your AWS services. We also cover…
View full course details Cancel

Microsoft

Authentication and user management in Power Pages

shield-halved-duotone-light-full Cyber Security
Learn how to authenticate with Power Pages.

Units in this learning path:

• Introduction
• Authentication Settings
• User Registration
• Authentication Management
• Authentication Providers
• Exercise
• Check
• Summary

Products: Power Platform, Power Pages

Roles: Maker, Functional Consultant, Administrator

Level: Intermediate

Subjects: Identity Access

Duration: 55 minutes

View full course details Cancel

Microsoft

Automate identity lifecycle using Lifecycle Workflows in Microsoft Entra

shield-halved-duotone-light-full Cyber Security
Explore the configuration and deployment of Microsoft Entra Lifecycle Workflows. Learn the purpose of lifecycle workflows, their components, and how to implement them effectively.

Units in this learning path:

• Introduction
• Describe Purpose Lifecycle Workflows
• Explore Scenarios Joiner Mover Leaver Workflows
• Configure Lifecycle Workflows Using Templates Triggers
• Deploy Lifecycle Workflows Your Environment
• Monitor Troubleshoot Workflows
• Plan Hybrid Advanced Scenarios
• Knowledge Check
• Summary

Products: Entra, Entra Identity Governance, Entra Id

Roles: Administrator, Identity Access Admin

Level: Advanced

Subjects: Identity Access

Duration: 45 minutes

View full course details Cancel

Amazon Web Services

Automating Cloud Security Posture Management on AWS

shield-halved-duotone-light-full Cyber Security
This course was developed by members of AWS Technical Field Communities (TFC), an AWS community of technical experts. The content is intended to complement our standard training curriculum and augment your AWS learning journey. We are aware some…
View full course details Cancel

Microsoft

Azure Kubernetes Services Governance with Azure Policy

shield-halved-duotone-light-full Cyber Security
In this module, we discuss how to use Azure Policy for Kubernetes to enforce rules and detect noncompliance in AKS clusters.

Units in this learning path:

• Introduction
• Azure Policy Integration with Aks
• Exercise Enable Azure Policy for Aks
• Built in Policies for Aks
• Exercise Assign Policy to Aks Cluster
• Exercise Check Compliance Status
• Check Your Knowledge
• Summary

Products: Azure Kubernetes Service, Azure Policy

Roles: Administrator, Auditor, Devops Engineer, Solution Architect

Level: Intermediate

Subjects: Information Protection Governance

Duration: 117 minutes

View full course details Cancel

Microsoft

Azure for Researchers part 2: Cloud Security and Cost Management

shield-halved-duotone-light-full Cyber Security
In this learning path, you'll learn how to ensure your Azure consumption is planned and predictable by using cost prediction and budgets, and how to ensure your application secrets and virtual machines are safe from unauthorized access.

Modules in this learning path:

• Analyze Costs Create Budgets Azure Cost Management

Products: Azure, Azure Cost Management, Azure Firewall, Azure Key Vault

Roles: Student, School Leader, Higher Ed Educator, Data Scientist

Level: Beginner

Subjects: Cloud Security

Duration: 40 minutes

View full course details Cancel

Viewing 85-96 of 629