Browse opportunities
78 results
Lessons from a 12,000-employee company's migration from ISO 27001:2013 to the 2022 controls. Includes a mapped control delta and an evidence-gathering checklist.
How to author, test, and tune Sigma detections that survive contact with reality. Covers ATT&CK alignment, false-positive triage, and a CI pipeline for detections-as-code.
A focused refresher on CISSP Domain 1 for re-certifiers. Covers the major framework families (NIST, ISO, COBIT), risk treatment options, and exam-style scenario discussion.
A 3-hour learning path covering conditional access, Privileged Identity Management, workload identities, and migration patterns from legacy AD. Includes 5 labs and a knowledge check.
A half-day workshop walking through the full CTI lifecycle — direction, collection, processing, analysis, dissemination — with templates for stakeholder PIRs and finished products.
A self-paced module set covering Defender XDR sensor deployment, baseline policies, automated investigation tuning, and integration with Sentinel.
AZ-104: Manage identities and governance in Azure
Use Microsoft Entra to manage access by using entitlements, access reviews, privileged access tools, and monitor access events. (SC-5008)
Protect network infrastructure in Azure
Plan and implement an identity governance strategy
Learn to create and manage identity and access using Microsoft Entra ID. Explore the basics of creating users, groups, and how to control access with conditional access.
Windows Server file servers and storage management
Active Directory Domain Services
After completing this learning path, you’ll know how to implement identity in Azure. You’ll be able to extend an existing on-premises Active Directory identity service into Azure.
Learn to secure, manage, and monitor endpoints using Microsoft Intune, Microsoft Defender for Endpoint, and Microsoft Security Copilot. This path covers device onboarding, policy enforcement, compliance, threat protection, and AI-powered incident response for modern organizations. (MD-4011)
A free, on-demand 4-hour course covering IAM, KMS, GuardDuty, Security Hub, and the AWS Well-Architected Security Pillar. Includes hands-on labs in a sandbox account.
Configure your Microsoft Sentinel environment
Mitigate threats using Microsoft Defender for Cloud
Perform threat hunting in Microsoft Sentinel
Create detections and perform investigations using Microsoft Sentinel
Learn how to deploy Defender for IoT to discover and secure IoT and OT devices.
AZ-400: Implement security and validate code bases for compliance - Learn DevSecOps practices, secure pipeline implementation, open-source software security, software composition analysis, and comprehensive security monitoring with Microsoft Defender for Cloud, Azure Policy, and GitHub Advanced Security.
Microsoft Purview eDiscovery supports internal investigations and legal matters by enabling the discovery, preservation, and analysis of Microsoft 365 content. Learn how to manage cases, place holds on data, run targeted searches, and organize results for review to meet legal and regulatory requirements.
Learn how to secure resources using policy, role-based access control, and other Azure services