Microsoft Security Operations Analyst
About This Course Learn how to investigate, respond to, and hunt for threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 Defender. In this course you will learn how to ...
Microsoft Identity and Access Administrator
In this Microsoft Certified: Identity and Access Administrator Associate course, you’ll learn to design, implement and operate your business' identity and access management system by using Azure AD.
Microsoft Security, Compliance, and Identity Fundamentals
The audience for this course is looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services.
Microsoft Power Platform Fundamentals
At Course Completion After completing this course, students will be able to: Describe Microsoft Power Platform components Describe Microsoft Dataverse and connectors Describe cross-cloud scenarios across M365, ...
Systems Operations on AWS
In this course, you will learn how to: Use standard AWS infrastructure features such as Amazon Virtual Private Cloud (Amazon VPC), Amazon Elastic Compute Cloud (Amazon EC2), Elastic Load Balancing (ELB), and AWS ...
Advanced Architecting on AWS
Course Objectives In this course, you will learn how to: Apply the AWS Well-Architected Framework Manage multiple AWS accounts for your organization Connect an on-premises datacenter to the AWS Cloud Discuss billing ...
AWS Security Essentials
In this course, you will learn to: Identify security benefits and responsibilities when using the AWS Cloud Describe the access control and management features of AWS Understand the different data encryption methods ...
Architecting on AWS
In this course, you will learn how to: Make architectural decisions based on AWS architectural principles and best practices Leverage AWS services to make your infrastructure scalable, reliable, and highly ...
Designing Microsoft Azure Infrastructure Solutions
After completing this course, students will be able to: Design a governance solution. Design a compute solution. Design an application architecture. Design storage, non-relational and relational.