Catalogue 225 Courses found
List of sub-fields
Course list
Reference | Course | Duration | Prices | |
---|---|---|---|---|
EV8 TECH-027 | Responsible Computing | 3 days 24 hours |
||
EV8 TECH-028 | Robotics | 3 days 24 hours |
||
MS SC-100 | SC-100: Microsoft Cybersecurity Architect | 4 days 32 hours |
||
MS SC-200 | SC-200: Microsoft Security Operations Analyst | 4 days 32 hours |
||
MS SC-300 | SC-300: Microsoft Identity and Access Administrator | 4 days 32 hours |
||
MS SC-400 | SC-400: Microsoft Information Protection Administrator | 4 days 32 hours |
||
MS SC-5001 | SC-5001: Configure SIEM security operations using Microsoft Sentinel | 1 day 8 hours |
||
MS SC-5002 | SC-5002: Secure Azure services and workloads with Microsoft Defender for Cloud regulatory compliance controls | 1 day 8 hours |
||
MS SC-5003 | SC-5003: Implement information protection and data loss prevention by using Microsoft Purview | 1 day 8 hours |
||
MS SC-5006 | SC-5006: Get started with Microsoft Copilot for Security | 1 day 8 hours |
3 days (24 hours)
At the end of this module, participants should be able to:
- Define what responsible computing is.
- State the goals and benefits of responsible computing code and data center.
- State the need for responsible computing.
- State the principles of security and privacy.
EV8 TECH-027
3 days (24 hours)
EV8 TECH-028
4 days (32 hours)
At the end of this course, participants should be able to:
- Plan and Implement a Cybersecurity Strategy.
- Design Zero Trust Strategy.
- Evaluate Security Strategies.
- Design Security for Infrastructure.
- Develop a Strategy for Data and Applications.
- Recommend Security Solutions and Practices.
MS SC-100
4 days (32 hours)
At the end of this course, participants should be able to:
- Identify Various Types of Threats.
- Protect Hardware Assets.
- Remediate Risks in Your Environment.
- Create a Microsoft Defender for Endpoint Environment.
- Configure Attack Surface Reduction Rules.
- Perform Actions on a Device.
MS SC-200
4 days (32 hours)
At the end of this course, participants should be able to:
- Implement an Identity Management Solution.
- Implement an Authentication and Access Management Solutions.
- Implement Access Management for Apps.
- Plan and Implement an Identity Governance Strategy.
MS SC-300
4 days (32 hours)
At the end of this course, participants should be able to:
- Explain and Use Sensitivity Labels.
- Configure Data Loss Prevention Policies.
- Secure Messages in Office 365.
- Describe the Information Governance Configuration Process.
MS SC-400
At the end of this course, participants should be able to:
- Create and configure a Microsoft Sentinel workspace
- Deploy Microsoft Sentinel Content Hub solutions and data connectors
- Configure Microsoft Sentinel Data Collection rules, NRT Analytic rule and Automation
- Perform a simulated attack to validate Analytic and Automation rules
MS SC-5001
1 day (8 hours)
At the end of this course, participants should be able to:
- Understand the purpose and benefits of using Azure NSG to filter network traffic.
- Learn how to create and configure NSGs to enforce access controls for Azure resources.
- Gain insights into how NSGs can be used to allow or deny specific types of traffic based on source, destination, and port.
- Understand how to prioritize NSG rules and leverage Azure NSG flow logs for monitoring and troubleshooting.
- Recognize the role of NSGs in implementing network security best practices in Azure.
MS SC-5002
1 day (8 hours)
At the end of this course, participants should be able to:
- Implement information protection and data loss prevention strategies using Microsoft Purview.
- Classify and label sensitive data, enforce data loss prevention policies, and monitor data protection measures for compliance and security within organizational environments.
- Safeguard organizational data effectively using Microsoft Purview.
MS SC-5003
1 day (8 hours)
At the end of this course, the participants will learn about:
- Generative AI fundamentals and the way it enables the creation of copilots supporting security tasks.
- Basic terminology about the way Copilot processes prompts and enable the solutions.
- Core Microsoft Copilot features for Security, including plugins, promptbooks, and exporting and sharing information.
- Embedded Microsoft Copilot experiences for Security within other Microsoft security products.
- Applying concepts in real-world cases to improve security operations and incident responses.