Showing 14593–14604 of 18767 results
Protect against malicious attacks and unauthorized access with Microsoft Edge
Microsoft Edge helps protect your network and devices from malicious attacks and helps prevent unauthorized access to, and leaks of, corporate data with Microsoft Defender SmartScreen and Microsoft Defender Application Guard.
Protect against threats with Microsoft Defender for Endpoint
Learn how Microsoft Defender for Endpoint can help your organization stay secure.
Protect data in-transit and at rest
Explore encryption options available within Azure SQL, including firewall rules, Always Encrypted, and Transport Layer Security. Understand how SQL Injection works.
Protect data with Zero Trust
Zero Trust isn't a tool or product, it's an essential security strategy, with data at its core. Here, you'll learn how to identify and protect your data using a Zero Trust approach.
Protect identities in Microsoft Entra ID
This module introduces students to the various authentication methods used to protect identities.
Protect identities in Microsoft Entra ID
This module introduces students to the various authentication methods used to protect identities.
Protect infrastructure with Zero Trust
Infrastructure is a broad term that covers all hardware, software, servers, networks, facilities, and much more. Utilizing Zero Trust principles can help to reduce your infrastructure's exposure to cyberattacks through improved monitoring, configuration management, and keeping software up-to-date.
Protect Windows Devices with Microsoft Intune
Endpoint devices are a primary attack surface for cyberthreats. This course will teach you how to protect Windows devices with Microsoft Intune using capabilities available right out of the box.
Protect your APIs on Azure API Management
Protect your backend APIs from information exposure and implement throttling (rate limiting) to prevent resource exhaustion with policies in Azure API Management.
Protect your Azure Virtual Desktop deployment by using Azure Firewall
In this module, you'll learn to deploy Azure Firewall, route all network traffic through Azure Firewall, and configure rules. You'll also route the outbound network traffic from the Azure Virtual Desktop host pool to the service through Azure Firewall.
Protect Your Company Reputation with LLM Guardrails
Learn how to protect your company's reputation by implementing LLM guardrails. Discover strategies to prevent AI-generated content from causing harm and ensure safe AI interactions.
Protect your endpoint environment with Microsoft Intune
In this module, you'll learn about protecting devices, apps, and data. Additionally, you'll understand the endpoint environment and the supported platforms available with Microsoft Intune.