Find a course

Find the best courses in your region.

Catalogue 225 Courses found

List of sub-fields

Course list

3 days (24 hours)

At the end of this module, participants should be able to:

  • Define what responsible computing is.
  • State the goals and benefits of responsible computing code and data center.
  • State the need for responsible computing.
  • State the principles of security and privacy.
EV8 TECH-027
3 days (24 hours)
EV8 TECH-028

At the end of this course, participants should be able to:

  • Plan and Implement a Cybersecurity Strategy.
  • Design Zero Trust Strategy.
  • Evaluate Security Strategies.
  • Design Security for Infrastructure.
  • Develop a Strategy for Data and Applications.
  • Recommend Security Solutions and Practices.
MS SC-100
At the end of this course, participants should be able to:

  • Identify Various Types of Threats.
  • Protect Hardware Assets.
  • Remediate Risks in Your Environment.
  • Create a Microsoft Defender for Endpoint Environment.
  • Configure Attack Surface Reduction Rules.
  • Perform Actions on a Device.
MS SC-200
At the end of this course, participants should be able to:

  • Implement an Identity Management Solution.
  • Implement an Authentication and Access Management Solutions.
  • Implement Access Management for Apps.
  • Plan and Implement an Identity Governance Strategy.
MS SC-300
At the end of this course, participants should be able to:

  • Explain and Use Sensitivity Labels.
  • Configure Data Loss Prevention Policies.
  • Secure Messages in Office 365.
  • Describe the Information Governance Configuration Process.
MS SC-400

At the end of this course, participants should be able to:

  • Create and configure a Microsoft Sentinel workspace
  • Deploy Microsoft Sentinel Content Hub solutions and data connectors
  • Configure Microsoft Sentinel Data Collection rules, NRT Analytic rule and Automation
  • Perform a simulated attack to validate Analytic and Automation rules
MS SC-5001

At the end of this course, participants should be able to:

  • Understand the purpose and benefits of using Azure NSG to filter network traffic.
  • Learn how to create and configure NSGs to enforce access controls for Azure resources.
  • Gain insights into how NSGs can be used to allow or deny specific types of traffic based on source, destination, and port.
  • Understand how to prioritize NSG rules and leverage Azure NSG flow logs for monitoring and troubleshooting.
  • Recognize the role of NSGs in implementing network security best practices in Azure.
MS SC-5002

At the end of this course, participants should be able to:

  • Implement information protection and data loss prevention strategies using Microsoft Purview.
  • Classify and label sensitive data, enforce data loss prevention policies, and monitor data protection measures for compliance and security within organizational environments.
  • Safeguard organizational data effectively using Microsoft Purview.
MS SC-5003

At the end of this course, the participants will learn about:

  • Generative AI fundamentals and the way it enables the creation of copilots supporting security tasks.
  • Basic terminology about the way Copilot processes prompts and enable the solutions.
  • Core Microsoft Copilot features for Security, including plugins, promptbooks, and exporting and sharing information.
  • Embedded Microsoft Copilot experiences for Security within other Microsoft security products.
  • Applying concepts in real-world cases to improve security operations and incident responses.
MS SC-5006
Items per page :