Productivity Tools
Showing 469–480 of 1728 results
Examine how Microsoft is committed to Responsible AI
This module examines Microsoft's Responsible AI Standard, which is an approach to developing, assessing, and deploying AI systems in a safe, trustworthy, and ethical way.
Examine Microsoft Entra ID Protection
This module examines how Azure Identity Protection provides organizations the same protection systems used by Microsoft to secure identities.
Examine Microsoft Secure Score
This module examines how Microsoft Secure Score helps organizations understand what they've done to reduce the risk to their data and show them what they can do to further reduce that risk.
Examine Privileged Identity Management in Microsoft Entra ID
This module examines how Microsoft Entra Privileged Identity Management (PIM) ensures users in your organization have just the right privileges to perform the tasks they need to accomplish.
Examine SAP HANA on Azure (Large Instances) sample architecture
Examine SAP HANA on Azure (Large Instances) sample architecture and workflow.
Examine SAP NetWeaver with AnyDB on Azure virtual machines
Examine the architecture options available when deploying SAP AnyDB workloads on Azure VMs.
Examine SAP S/4HANA on Azure virtual machines
Examine the architecture when deploying SAP S/4HANA workloads and in-memory SAP HANA databases, running on Azure VMs.
Examine the Copilot for Microsoft 365 design
This module examines the Microsoft Copilot for Microsoft 365 design, how it works, its service and tenant logical architecture, and how you can extend it using plugins and Microsoft Graph connectors.
Examine the enterprise desktop
This module introduces the student to the concepts of modern management and the enterprise desktop lifecycle.
Examine the Microsoft AI blueprint
This module examines the following key aspects of Microsoft's AI blueprint: ethical principles, AI safety networks, technical stacks, AI transparency, and guidelines for human-AI interactions.
Examine threat vectors and data breaches
This module examines the types of threat vectors and their potential outcomes that organizations must deal with on a daily basis and how users can enable hackers to access targets by unwittingly executing malicious content.
Examine Windows 365
This module introduces the different Windows 365 editions that are available and examines foundational Windows 365 concepts including architecture, lifecycle, and customer data handling.