Productivity Tools
Showing 457–468 of 1728 results
Enumerate objects in the pipeline
This module explains how to enumerate objects in the pipeline so that you can work with one object at a time during automation.
Establish the guiding principles and core components of Zero Trust
Zero Trust is not a product or tool, but an essential security strategy that seeks to continuously verify every transaction, asserts least privilege access, and assumes that every transaction could be a possible attack. Through the modules in this learning path, you'll gain an understanding of Zero Trust and how it applies to identity, endpoints, applications, networks, infrastructure, and data.
Estimation Calibration: Make Your Forecasts More Reliable
This course will teach you how to do estimation calibration through Structured Expert Judgment to make your forecasts more reliable by calculating and analyzing calibration and information scores.
Evaluate deployment methods
This module will provide an introduction to the tools and processes for automating and performing large-scale deployments.
Evaluate Windows client installation methods
In this module, you will also learn about the different processes and methods for installing Windows 10 and later.
Evaluate your IoT Scenario by using Azure IoT Central
Learn how to quickly evaluate your IoT scenario by using Azure IoT Central and assess the opportunities it can create for your business.
Examine and Configure Surface Security Options
Learn about advanced firmware and security features of Microsoft Surface devices, Surface UEFI, Project Mu, configuring Virtualization-based Security and Memory Integrity in Windows, and Firmware Attack Surface Reduction.
Examine backup security licensing and support considerations for SAP HANA on Azure (Large Instances)
Considerations for backup, security, licensing, and support of SAP HANA on Azure (Large Instances).
Examine data governance solutions in Microsoft Purview
This module introduces Microsoft Purview, which is designed to meet the challenges of today's decentralized, data-rich workplace by providing a comprehensive set of solutions that help organizations govern, protect, and manage their entire data estate.
Examine data security and compliance in Copilot for Microsoft 365
This module examines how Microsoft Copilot for Microsoft 365 adheres to existing privacy and compliance obligations, how it ensures data residency and compliance boundary, and how it protects sensitive business data.
Examine Defender for Cloud regulatory compliance standards
In this module, we will focus on using Microsoft Defender for Cloud to streamline regulatory compliance by identifying and addressing issues that hinder meeting compliance standards and certifications.
Examine email protection in Microsoft 365
This module examines how Exchange Online Protection (EOP) protects organizations from phishing and spoofing. It also explores how EOP blocks spam, bulk email, and malware before they arrive in users' mailboxes.