Microsoft Training

Back to Blogs
Website Blog Images (900 × 400px) (20)
Share this Article

Microsoft Training

  • Publish Date: 6 months ago
  • Author:by Andrew Clarke

Courses and Certifications can be a great way to accelerate your career in the world of IT! They validate your practical skills, enhance your knowledge, teach you best practices, and can help you stand out from other candidates who are also looking for a new role!

Microsoft certifications often include troubleshooting and problem-solving scenarios, which are directly applicable to IT support/infrastructure roles. The below courses help you develop critical thinking and analytical skills that are essential in resolving technical issues.

Many organisations rely on Microsoft products and services, such as Windows Server, Active Directory, and Office 365. Completing the below courses demonstrates your expertise in these specific areas, which can be highly attractive to employers!

Becoming certified can be expensive, however below are some of the best FREE Microsoft courses to take if you’re looking to enter or advance in the IT Market.

Implement Windows security enhancements with Microsoft Defender for Endpoint

Microsoft Defender for Endpoint gives you various tools to eliminate risks by reducing the surface area for attacks without blocking user productivity. Learn about Attack Surface Reduction (ASR) with Microsoft Defender for Endpoint.

Introduction to Microsoft Intune

Microsoft Intune is your strategic infrastructure for managing and protecting your organization’s devices, apps, and data. In addition, Microsoft Intune helps to ensure your end users have the best experience for productivity. You’ll learn about the endpoints you need to protect and the products and services encompassing Microsoft Intune.

Getting Started with Microsoft Identity

Microsoft identity platform is an evolution of the Azure Active Directory (Azure AD) developer platform. It allows developers to build applications that sign in users and access resources in both external applications such as Microsoft Office 365, the Azure portal, and thousands of other SaaS applications as well as internal resources, such as apps on your corporate network and intranet, along with any cloud apps developed by your own organisation. You’ll learn the basics of Microsoft identity, including the different types of tokens, account types, and supported topologies.

Improve your cloud security posture with Microsoft Defender for Cloud

Learn how you can strengthen your security posture through Microsoft Defender for Cloud:

  • Understand how Microsoft Defender for Cloud can help organizations keep ahead of their security and compliance needs.

  • Explore Cloud Security Posture Management and the services and features available in Azure.

  • Understand how to use Cloud Workload Protection to protect VMs and Servers, Containers, IoT, Data and Storage.

  • Improve Azure security using Microsoft Sentinel.

Manage data loss prevention policies and reports in Microsoft 365

Learn how to manage data loss prevention policies and mitigate data loss prevention policy violations. Discover how to:

  • Review and analyse DLP reports.

  • Manage permissions for DLP reports.

  • Identify and mitigate DLP policy violations.

  • Mitigate DLP violations in Microsoft Defender for Cloud Apps.

Safeguard your environment with Microsoft Defender for Identity

Learn about the Microsoft Defender for Identity component of Microsoft 365 Defender. Discover how to:

  • Define the capabilities of Microsoft Defender for Identity.

  • Understand how to configure Microsoft Defender for Identity sensors.

  • Explain how Microsoft Defender for Identity can remediate risks in your environment.

Defend against attacks with Microsoft Defender for Identity

Learn how Microsoft Defender for Identity helps you to protect your environment against different types of threats by enabling you to detect and investigate attempts to compromise credentials, lateral movement attacks, reconnaissance activity, and more.

Examine data security and compliance in Microsoft 365 Copilot

Learn how Microsoft 365 Copilot adheres to existing privacy and compliance obligations, how it ensures data residency and compliance boundaries, and how it uses access controls and isolation to protect sensitive business data.

Describe authentication and authorization in cybersecurity

Secure authentication and authorization are a cornerstone of protecting against cybersecurity threats. Learn about common identity-based attacks, different authentication methods, and ways to protect against unauthorised access.

Application types in Microsoft identity

The Microsoft Identity platform enables developers to build many different types of applications to satisfy diverse business requirements and different scenarios. By supporting multiple OAuth 2.0 standard authentication protocols, developers can create different types of applications that meet business needs including single-page applications, web apps, mobile or native apps, and services or daemon apps. You’ll learn how you can implement different OAuth 2.0 protocol grant types (flows) in popular application types.

Create and manage sensitive information types

Learn how to use sensitive information types to support your information protection strategy:

  • Recognise the difference between built-in and custom sensitivity labels.

  • Configure sensitive information types with exact data match-based classification.

  • Implement document fingerprinting.

  • Create custom keyword dictionaries.

Secure custom APIs with Microsoft Identity

Many solutions involve creating web APIs to expose functionality to different clients and consumers. Developers can secure these APIs using Microsoft identity to ensure only approved apps can access the web APIs provided they’ve been granted the necessary permissions. You’ll learn how to secure a web API with Microsoft identity and how to call it from another application.

Introduction to threat modelling

Threat modelling is an effective way to help secure your systems, applications, networks, and services. It’s an engineering technique that identifies potential threats and recommendations to help reduce risk and meet security objectives earlier in the development lifecycle. Learn how to:

  • Understand the importance of capturing requirements and assumptions to help create a data-flow diagram.

  • Read about the framework that helps you find security issues in a system.

  • Learn about the security control categories that help you reduce or eliminate potential threats.

  • Highlight the importance of verifying assumptions, requirements, and fixes before deployment.

Secure your infrastructure with threat modelling
  • Learn how to use the foundation of threat modelling to identify enterprise risks and find ways to reduce or eliminate them

  • Understand the importance of a well-defined, open-ended questionnaire to get a better view of the infrastructure.

  • Visualize how each component interacts with the other with a detailed data-flow diagram.

  • Identify infrastructure security gaps using a combination of security policies and the threat modelling framework.

  • Reduce or eliminate risk with known security requirements and controls.

Choose a client application to use in a Privileged Access Workstation (PAW) with threat modelling

Learn how to use the foundation of threat modelling to assess a client application for security risks. Find ways to reduce or eliminate risks before installing an application into a privileged environment. You will:

  • Understand the importance of a well-defined, open-ended questionnaire.

  • Visualize how the application interacts with the secured environment with a detailed data-flow diagram.

  • Identify security gaps using the threat modelling framework.

  • Reduce or eliminate risks with known security requirements and controls.