Upcoming online sessions
Security Identities and Access Management
Identity is the cornerstone of the Zero Trust Framework and the first step to consider when establishing an end-to-end security posture to protect your company's valuable information. Explore how to use secure authentication, govern access, get comprehensive protection, and set the right controls in a multi-cloud environment.
Simplify your Compliance Journey with Microsoft Purview
Explore how to assess your compliance risk, protect sensitive and business critical data, and respond efficiently to data discovery requests in this live cloud environment.
Into the Breach
This gamified learning experience tests your cybersecurity skills. Players will assist with the Incident Response investigation of a ransomware attack on the Health Network using their knowledge of Microsoft 365 Defender and Sentinel to complete specific tasks.
In this gamified experience, a hacker has just gained network access through a security camera in the building. Their goal is to breach your enterprise and access sensitive information. Your job as a sophisticated cybersecurity analyst is to stop them in their tracks.