Course Code: 834045
These exercises focus on using Copilot in various Microsoft 365 apps (such as Word, PowerPoint, Outlook, and so on) to complete a series of common business-related tasks pertaining to each Use Case. To complete the Use Case exercises in this course, each student must...
Course Code: 834047
Explore the data warehousing process and learn how to load, monitor, secure, and query a warehouse in Microsoft Fabric.
Course Code: 834048
Real-time intelligence in Microsoft Fabric enables analysis of streaming events in real or near-real time.
Course Code: 834049
Explore the data science process and learn how to train machine learning models to accomplish artificial intelligence in Microsoft Fabric.
Course Code: 834052
Gain the skills to use Microsoft Purview to improve your data security in Microsoft 365. In this training, you learn how to create sensitive information types, create sensitivity labels, and use auto-labeling policies based on these labels. You also learn how to set...
Course Code: 834060
Use Microsoft Entra to manage access by using entitlements, access reviews, privileged access tools, and monitor access events.
Course Code: 834062
Learn about Microsoft Security Copilot, an AI-powered security analysis tool that enables analysts to process security signals and respond to threats at a machine speed, and the AI concepts upon which it's built.
Course Code: 834063
Manage data lifecycle, records management, eDiscovery, and communication compliance with Microsoft Purview.
Course Code: 834088
This course provides a detailed description of the key components of the Microsoft 365 messaging service, Exchange Online. It describes how messaging administrators can use Exchange Online to perform various configuration tasks to manage, help secure, monitor, and tr...
Course Code: 834084
Implement the Microsoft Defender for Endpoint environment to manage devices, perform investigations on endpoints, manage incidents in Defender XDR, and use Advanced Hunting with Kusto Query Language (KQL) to detect unique threats. You'll need to have access to a Micr...