629 courses available
IBM
Assess Network Vulnerabilities
Cyber SecurityMicrosoft
Assign admins and plan content for Microsoft Search
Cyber SecurityUnits in this learning path:
• Introduction
• Assign Admin
• Formulate Metrics
• Identify Stakeholders
• Begin Planning
• Knowledge Check
• Summary
Products: M365, Office, Windows, Bing
Roles: Administrator, Business Owner, Functional Consultant, Technology Manager
Level: Beginner
Subjects: Identity Access, Data Management
Duration: 24 minutes
Microsoft
Audit and search activity in Microsoft Purview
Cyber SecurityModules in this learning path:
• Purview Audit Search Investigate
• Purview Ediscovery Search
Products: Microsoft Purview
Roles: Auditor, Administrator, Ip Admin
Level: Intermediate
Subjects: Security
Duration: 94 minutes
Microsoft
Audit the security of Windows Server IaaS Virtual Machines
Cyber SecurityUnits in this learning path:
• Introduction
• Describe Azure Security Center
• Enable Azure Security Center Hybrid Environments
• Implement Assess Security Policies
• Protect Your Resources with Azure Security Center
• Implement Azure Sentinel
• Knowledge Check
• Summary
Products: Azure, Azure Cloud Shell, Azure Portal, Azure Virtual Machines
Roles: Administrator, Solution Architect, Technology Manager
Level: Intermediate
Subjects: Threat Protection
Duration: 45 minutes
Amazon Web Services
Auditing Amazon Simple Storage Service (Amazon S3) Security
Cyber SecurityMicrosoft
Authenticate and authorize user identities on GitHub
Cyber SecurityUnits in this learning path:
• 1 Introduction
• 2 User Identity Access Management
• 3 Authentication
• 4 Authorization
• 5 Team Synchronization
• 6 Knowledge Check
• 7 Summary
Products: Github
Roles: Devops Engineer, Administrator, Developer, Solution Architect
Level: Intermediate
Subjects: Identity Access
Duration: 33 minutes
Amazon Web Services
Authentication and Authorization with AWS Identity and Access Management
Cyber SecurityMicrosoft
Authentication and user management in Power Pages
Cyber SecurityUnits in this learning path:
• Introduction
• Authentication Settings
• User Registration
• Authentication Management
• Authentication Providers
• Exercise
• Check
• Summary
Products: Power Platform, Power Pages
Roles: Maker, Functional Consultant, Administrator
Level: Intermediate
Subjects: Identity Access
Duration: 55 minutes
Microsoft
Automate identity lifecycle using Lifecycle Workflows in Microsoft Entra
Cyber SecurityUnits in this learning path:
• Introduction
• Describe Purpose Lifecycle Workflows
• Explore Scenarios Joiner Mover Leaver Workflows
• Configure Lifecycle Workflows Using Templates Triggers
• Deploy Lifecycle Workflows Your Environment
• Monitor Troubleshoot Workflows
• Plan Hybrid Advanced Scenarios
• Knowledge Check
• Summary
Products: Entra, Entra Identity Governance, Entra Id
Roles: Administrator, Identity Access Admin
Level: Advanced
Subjects: Identity Access
Duration: 45 minutes
Amazon Web Services
Automating Cloud Security Posture Management on AWS
Cyber SecurityMicrosoft
Azure Kubernetes Services Governance with Azure Policy
Cyber SecurityUnits in this learning path:
• Introduction
• Azure Policy Integration with Aks
• Exercise Enable Azure Policy for Aks
• Built in Policies for Aks
• Exercise Assign Policy to Aks Cluster
• Exercise Check Compliance Status
• Check Your Knowledge
• Summary
Products: Azure Kubernetes Service, Azure Policy
Roles: Administrator, Auditor, Devops Engineer, Solution Architect
Level: Intermediate
Subjects: Information Protection Governance
Duration: 117 minutes
Microsoft
Azure for Researchers part 2: Cloud Security and Cost Management
Cyber SecurityModules in this learning path:
• Analyze Costs Create Budgets Azure Cost Management
Products: Azure, Azure Cost Management, Azure Firewall, Azure Key Vault
Roles: Student, School Leader, Higher Ed Educator, Data Scientist
Level: Beginner
Subjects: Cloud Security
Duration: 40 minutes
Viewing 85-96 of 629