Browse opportunities
43 results
A 10-minute video explaining why identity is the new perimeter, with three concrete control patterns: just-in-time access, conditional access, and continuous verification.
Reduce data exposure risk by using Data Security Posture Management in Microsoft Purview to assess posture, protect sensitive data, and investigate risks.
A vendor-led learning path on Cisco's SSE and ZTNA stack, including ISE policy design and Umbrella DNS security. Three modules, hands-on with dCloud labs.
Organizations need to classify, label, and protect sensitive data to prevent exposure and ensure compliance. Microsoft Purview solutions provide data classification, sensitivity labels, and encryption to secure information across Microsoft 365 and on-premises storage. This learning path aligns with exam SC-401: Microsoft Information Security Administrator.
A guided lab applying IAM Roles for Service Accounts, OPA/Gatekeeper policies, and KMS-encrypted secrets to a 3-tier app running on EKS. Includes a downloadable Terraform module.
SC-100: Design security solutions for infrastructure
NIST's finalized PQC standards, hybrid key exchange in TLS 1.3, and a phased migration playbook that prioritizes high-value, long-lived secrets.
A focused refresher on CISSP Domain 1 for re-certifiers. Covers the major framework families (NIST, ISO, COBIT), risk treatment options, and exam-style scenario discussion.
A 3-hour learning path covering conditional access, Privileged Identity Management, workload identities, and migration patterns from legacy AD. Includes 5 labs and a knowledge check.
Protect network infrastructure in Azure
Strengthen security posture using Microsoft Defender for Cloud and Microsoft Sentinel
Plan and implement an identity governance strategy
Active Directory Domain Services
Perform threat hunting in Microsoft Sentinel
AZ-400: Implement security and validate code bases for compliance - Learn DevSecOps practices, secure pipeline implementation, open-source software security, software composition analysis, and comprehensive security monitoring with Microsoft Defender for Cloud, Azure Policy, and GitHub Advanced Security.
Discover how to classify data, apply sensitivity labels, enforce DLP policies, and use Security Copilot to protect information across Microsoft 365.
Learn how to secure resources using policy, role-based access control, and other Azure services
Manage access and security for Azure Virtual Desktop
Implement a secure environment for a database service