Tallo logoTallo logo

Courses

Discover thousands of courses from top institutions and platforms worldwide

30,188 Courses Found

Sort by:
  • Newest First
  • Highest Rated
  • Most Reviewed
  • A to Z
  • Z to A
  • Price: Low to High
  • Price: High to Low
  • Duration: Short to Long
  • Duration: Long to Short
Reduce risk with Microsoft Compliance Manager course thumbnail
FREE

Microsoft Learn

Reduce risk with Microsoft Compliance Manager

IT Compliance
IT Governance
Information Technology

Module 1: In this module, you will learn why compliance management has become so important and be introduced to Microsoft’s solution for compliance management.At the end of this module, you should be able to:Describe why compliance management is important.List common compliance management challenges.Explain how Microsoft Compliance Manager helps you achieve compliance management goals.Module 2: In this module, you will learn about the shared responsibility model and important Compliance Manager concepts.At the end of this module, you should be able to:Describe the shared responsibility model.Explain key Compliance Manager concepts.Module 3: In this module, you will learn about the shared responsibility model and important Compliance Manager concepts.At the end of this module, you should be able to:Describe the key components of the Compliance Manager user experience.List key capabilities available in the various Compliance Manager features.

Microsoft Endpoint Manager: Compliance Policies with MECM and Intune course thumbnail

Pluralsight

Certificate

Microsoft Endpoint Manager: Compliance Policies with MECM and Intune

Microsoft Azure
Cloud Computing
IT Compliance

Learn how to enforce device configurations using compliance policies as you then deny access to corporate resources when machines go non-compliant. The conversation about device configuration over the last couple of courses has focused on just the configurations themselves. As performed, those configurations are more like preferences than any real policy. They configure machines, but users can adjust those configurations generally at will. In this thirteenth course out of sixteen, Microsoft Endpoint Manager: Compliance Policies with MECM and Intune, you'll learn enforcing configurations, declaring misconfigured machines as non-compliant, and then bringing consequences to those misconfigurations. First, you'll start by looking at compliance in MECM. Next, you'll configure some custom compliance policies in MECM including auto-remediation and see how they look from the user's perspective. Then, you'll shift over to Intune to explore the very different approach Intune uses to address compliance. You'll create and deploy Intune compliance policies to see their effect on user's machines. Finally, you'll connect compliance policies to conditional access policies and deny access to corporate resources when machines go non-compliant. By the end of this course, you'll have a better understanding of enforcing configurations to meet compliance in MECM and Intune.

Common Controls in AWS Audit Manager - Simplifying Risk and Compliance Assessments course thumbnail
FREE

YouTube

Common Controls in AWS Audit Manager - Simplifying Risk and Compliance Assessments

AWS Audit Manager
Amazon Web Services (AWS)
Cloud Computing

Learn about AWS Audit Manager's new common controls library in this 18-minute video that demonstrates how to streamline risk and compliance assessments in cloud environments. Discover how compliance teams can leverage AWS managed groupings of evidence sources to automate evidence collection and eliminate redundant work across overlapping compliance standards. Explore how Audit Manager assists in continuously monitoring AWS usage while simplifying the assessment of policies, procedures, and control effectiveness. Gain practical insights into using the common controls feature to build automated evidence collection processes that help evaluate risk and maintain compliance with industry regulations and standards.

Stop Managing Compliance With Spreadsheets! Simplify and Extend Compliance Beyond course thumbnail
FREE

YouTube

Stop Managing Compliance With Spreadsheets! Simplify and Extend Compliance Beyond

IT Governance
Information Technology
IT Compliance

Discover how to simplify, adapt, customize, and extend compliance solutions beyond Microsoft 365 in this 29-minute video from Microsoft. Learn about the new Compliance Manager and its General Availability, as well as new Connectors and APIs that help reduce risk, meet regulatory requirements, standards, and company policies. Explore the Compliance Ecosystem and get an overview of Microsoft Graph API. Access additional resources, including the Virtual Hub for compliance and a trial of E5 Compliance. This presentation, part of #MSIgnite, offers valuable insights for companies looking to streamline their compliance management processes and move beyond spreadsheets.

Manage Risk and Compliance with End-to-End Security Solutions course thumbnail
FREE

YouTube

Manage Risk and Compliance with End-to-End Security Solutions

Microsoft Ignite
Risk Management
Compliance

Join Microsoft experts for a live Ask-the-Experts session following the breakout session on managing risk and compliance with end-to-end security solutions. Gain insights into Compliance Manager, Universal Templates, Healthcare Policy Templates, Communication Compliance, Privacy Controls, and File Inspection. Explore how to effectively use these tools to enhance your organization's security posture. Participate in discussions covering various aspects of risk management and compliance, including specific considerations for Mac users. Take advantage of this opportunity to interact with industry professionals and learn about the latest strategies for implementing comprehensive security solutions.

Achieving GDPR Compliance with Microsoft Technologies course thumbnail

LinkedIn Learning

Certificate

Achieving GDPR Compliance with Microsoft Technologies

GDPR
Law
Compliance

Understand how GDPR affects your organization and how to achieve compliance using Office 365, Microsoft Cloud App Security, Azure Information Protection, and Compliance Manager.

Achieving GDPR Compliance with Microsoft Technologies course thumbnail

LinkedIn Learning

Certificate

Achieving GDPR Compliance with Microsoft Technologies

GDPR
Law
IT Compliance

Understand how GDPR affects your organization and how to achieve compliance using Office 365, Microsoft Cloud App Security, Azure Information Protection, and Compliance Manager.

Compliance Training for Managers course thumbnail

Udemy

Certificate

Compliance Training for Managers

Compliance
Corporate Governance
Law

Secure your business with Lecturio! What you'll learn: Develop the awareness of need and importance for compliance rulesLearn about compliance principles, money laundering, fraud prevention, securities trading, corruption prevention and data protection Compliance provides the right behavior to face a great variety of problematic situations during your everyday professional life. It applies not only for managers but also, and especially, for your employees. Remember that the price for an employee’s mistake is paid by the company – in form of legal repercussions, loss of image, or absences from work. Employees with no compliance training can end up being very expensive for your company. This is why compliance training starts with you, the manager. If you know the rules inside out, you can prevent breaches quicker and more effectively.Our compliance management training has a practical orientation and will raise your employees' awareness for the most important behavioral code – it's quick and easy!Is your company sufficiently protected against corruption and data gaps? How do you guarantee the security of information and data protection? Lecturio will familiarize you with the basics of compliance, such as fraud and corruption prevention. We provide helpful tips for your daily work and show you how to maintain good compliance management in your company.Learn about:- Compliance Principles - Money Laundering - Fraud Prevention - Securities Training - Corruption Prevention - Data Protection - Information Security - Competition LawWith the Lecturio compliance management video training you will learn about the important topics mentioned above independently and more efficiently than ever before, saving you a great deal of time and money!Protect your business with Lecturio's compliance course now!

How to Manage Your Manager course thumbnail

LinkedIn Learning

Certificate

How to Manage Your Manager

Career Development
Leadership
Emotional Intelligence

Learn how to manage your manager. In this course, adapted from the podcast How to Be Awesome at Your Job, Mary Abbajay explains how to build a good relationship with your boss.

Manage Apps with Configuration Manager course thumbnail

LinkedIn Learning

Certificate

Manage Apps with Configuration Manager

Application Deployment
DevOps
PowerShell

Learn how to create and manage apps with SCCM and prepare for Microsoft certification exam 70-703. See how to deploy apps using PowerShell scripts, and deploy App-V virtual apps.

MD-101 Manage authentication and compliance course thumbnail
FREE

Microsoft Learn

MD-101 Manage authentication and compliance

Multi-Factor Authentication
Cybersecurity
Access Control

This module introduces students to the various authentication methods used to protect identities.After this module, you should be able to: Describe Windows Hello for Business Describe Windows Hello deployment and management Describe Microsoft Entra ID Protection Describe and manage self-service password reset in Microsoft Entra ID Describe and manage multi-factor authentication This module describes how clients can be configured to access organizational resources using a virtual private network (VPN). Describe how you can access corporate resources Describe VPN types and configuration Describe Always On VPN Describe how to configure Always On VPN This module describes how to use compliance and conditional access policies to help protect access to organizational resources.After this module, you should be able to: Describe device compliance policy Deploy a device compliance policy Describe conditional access Create conditional access policies This module describes how to use Microsoft Endpoint Manager and Power BI to create compliance and custom reports.After this module, you should be able to: Generate inventory reports and Compliance reports using Microsoft Intune Report and monitor device compliance Create custom reports using the Intune Data Warehouse Use the Microsoft Graph API for building custom reports

MD-102 Manage authentication and compliance course thumbnail
FREE

Microsoft Learn

MD-102 Manage authentication and compliance

Microsoft Endpoint Manager
Enterprise Software
Business Software

This module introduces students to the various authentication methods used to protect identities.After this module, you should be able to: Describe Windows Hello for Business Describe Windows Hello deployment and management Describe Microsoft Entra ID Protection Describe and manage self-service password reset in Microsoft Entra ID Describe and manage multi-factor authentication This module describes how clients can be configured to access organizational resources using a virtual private network (VPN).After this module, you should be able to: Describe how you can access corporate resources Describe VPN types and configuration Describe Always On VPN Describe how to configure Always On VPN This module describes how to use compliance and conditional access policies to help protect access to organizational resources.After this module, you should be able to: Describe device compliance policy Deploy a device compliance policy Describe conditional access Create conditional access policies This module describes how to use Microsoft Endpoint Manager and Power BI to create compliance and custom reports.After this module, you should be able to: Generate inventory reports and Compliance reports using Microsoft Intune Report and monitor device compliance Create custom reports using the Intune Data Warehouse Use the Microsoft Graph API for building custom reports

Microsoft 365: Manage Governance and Compliance course thumbnail

LinkedIn Learning

Certificate

Microsoft 365: Manage Governance and Compliance

Microsoft Office 365
Business Software
IT Compliance

Explore essential Microsoft 365 features and controls that can help you manage your content lifecycle and comply with legal or regulatory standards.

MS-101 Manage compliance in Microsoft 365 course thumbnail
FREE

Microsoft Learn

MS-101 Manage compliance in Microsoft 365

Microsoft Office 365
Business Software
Data Governance

Module 1: Manage retention in emailBy the end of this module, you will be able to:Determine when and how to use retention tags in mailboxesAssign a retention policy to an email folderAdd optional retention policies to email messages and foldersRemove a retention policy from an email messageModule 2: Troubleshoot data governanceBy the end of this module, you will be able to:Explain how the retention age of elements is calculatedRepair retention policies that don't run as expectedUnderstand how to systematically troubleshoot when a retention policy appears to failConduct policy tests in test mode with policy tipsDescribe how to monitor DLP policies through message trackingModule 3: Explore sensitivity labelsBy the end of this module, you will be able to:Describe how sensitivity labels let you classify and protect your organization's dataIdentify the common reasons why organizations use sensitivity labelsExplain what a sensitivity label is and what they can do for an organizationConfigure a sensitivity label's scopeExplain why the order of sensitivity labels in your admin center is importantDescribe what label policies can doModule 4: Implement sensitivity labelsBy the end of this module, you will be able to:Describe the overall process to create, configure, and publish sensitivity labelsIdentify the administrative permissions that must be assigned to compliance team members to implement sensitivity labelsDevelop a data classification framework that provides the foundation for your sensitivity labelsCreate and configure sensitivity labelsPublish sensitivity labels by creating a label policyIdentify the differences between removing and deleting sensitivity labelsModule 5: Implement Windows Information ProtectionBy the end of this module, you will be able to:Describe Windows Information Protection and what it is used forPlan a deployment of Windows Information Protection policiesImplement Windows Information Protection policies in Windows desktop apps

Windows Endpoint Administration: Manage Identity and Compliance course thumbnail

Pluralsight

Certificate

Windows Endpoint Administration: Manage Identity and Compliance

Identity Management
Cybersecurity
Compliance

Windows client is installed and remote administrative access has been set up; what comes next? In this course, Windows Endpoint Administration: Manage Identity and Compliance, you will gain the ability to create and manage user and group accounts and configure systems with cloud-based policies to determine compliance and access to apps. First, you will explore how to secure Windows identities through the use of password management, tokens, and biometric authentication. Next, you will learn to manage users and groups in a domain environment, whether on-premises Active Directory or cloud-based Azure AD. Finally, you will see how to use Intune to build policies that evaluate device compliance with corporate configuration standards, and restrict access to applications based on compliance. When you are finished with this course, you will have the skills and knowledge to set up Windows 10 and 11 successfully for identity management, device compliance, and conditional access.

MS-102 Manage compliance in Microsoft 365 course thumbnail
FREE

Microsoft Learn

MS-102 Manage compliance in Microsoft 365

Microsoft 365
Business Software
Data Protection

This module introduces you to data classification in Microsoft 365, including how to create and train classifiers, view sensitive data using Content explorer and Activity explorer, and implement Document Fingerprinting.By the end of this module, you should be able to: Explain the benefits and pain points of creating a data classification framework. Identify how data classification of sensitive items is handled in Microsoft 365. Understand how Microsoft 365 uses trainable classifiers to protect sensitive data. Create and then retrain custom trainable classifiers. Analyze the results of your data classification efforts in Content explorer and Activity explorer. Implement Document Fingerprinting to protect sensitive information being sent through Exchange Online. This module examines how sensitivity labels from the Microsoft Information Protection solution let you classify and protect your organization's data, while making sure that user productivity and collaboration isn't hindered.By the end of this module, you should be able to: Describe how sensitivity labels let you classify and protect your organization's data Identify the common reasons why organizations use sensitivity labels Explain what a sensitivity label is and what they can do for an organization Configure a sensitivity label's scope Explain why the order of sensitivity labels in your admin center is important Describe what label policies can do This module examines the process for implementing sensitivity labels, including applying proper administrative permissions, determining a deployment strategy, creating, configuring, and publishing labels, and removing and deleting labels.By the end of this module, you should be able to: Create a deployment strategy for implementing sensitivity labels that satisfies your organization's requirements. Enable sensitivity labels in SharePoint Online and OneDrive so they can use encrypted files. Create and configure sensitivity labels. Publish sensitivity labels by creating a label policy. Identify the differences between removing and deleting sensitivity labels.

Manager of Managers: Crafting Your Leader’s Checklist course thumbnail

Coursera

Certificate

Manager of Managers: Crafting Your Leader’s Checklist

Leadership
Management & Leadership
Communication Skills

Great leadership doesn't happen by chance—it happens by design. This course helps you create and evolve a personalized leadership checklist that keeps you focused on what matters most. You'll learn the core components of an effective checklist, from daily practices to strategic responsibilities, and how to structure them for clarity and action. Through practical tools, case examples, and hands-on activities, you'll build a Version 1 of your leadership checklist, test it against real challenges, and refine it as your role evolves.

Manage Application Installs with Chocolatey Package Manager course thumbnail

LinkedIn Learning

Certificate

Manage Application Installs with Chocolatey Package Manager

Windows
Digital Skills
Self Improvement

Looking for a consistent and reliable way to install Windows applications? Learn about the Chocolatey package manager.

Manage data compliance for Copilot for Microsoft 365 course thumbnail
FREE

Microsoft Learn

Manage data compliance for Copilot for Microsoft 365

Microsoft Office 365
Business Software
Data Classification

Module 1: This module introduces you to data classification in Microsoft 365, including how to create and train classifiers, view sensitive data using Content explorer and Activity explorer, and implement Document Fingerprinting.By the end of this module, you should be able to: Explain the benefits and pain points of creating a data classification framework. Identify how data classification of sensitive items is handled in Microsoft 365. Understand how Microsoft 365 uses trainable classifiers to protect sensitive data. Create and then retrain custom trainable classifiers. Analyze the results of your data classification efforts in Content explorer and Activity explorer. Implement Document Fingerprinting to protect sensitive information being sent through Exchange Online. Module 2: This module examines how sensitivity labels from the Microsoft Information Protection solution let you classify and protect your organization's data, while making sure that user productivity and collaboration isn't hindered.By the end of this module, you should be able to: Describe how sensitivity labels let you classify and protect your organization's data Identify the common reasons why organizations use sensitivity labels Explain what a sensitivity label is and what they can do for an organization Configure a sensitivity label's scope Explain why the order of sensitivity labels in your admin center is important Describe what label policies can do Module 3: This module examines the process for implementing sensitivity labels, including applying proper administrative permissions, determining a deployment strategy, creating, configuring, and publishing labels, and removing and deleting labels.By the end of this module, you should be able to: Describe the overall process to create, configure, and publish sensitivity labels Identify the administrative permissions that must be assigned to compliance team members to implement sensitivity labels Develop a data classification framework that provides the foundation for your sensitivity labels Create and configure sensitivity labels Publish sensitivity labels by creating a label policy Identify the differences between removing and deleting sensitivity labels

Why Manage? Understanding the Impact of Managers course thumbnail
FREE

CodeSignal

Certificate

Why Manage? Understanding the Impact of Managers

Management
Leadership
Professional Development

This course focuses on understanding why managers are crucial to team success and the positive impact they can have. It covers recognizing both effective and ineffective management behaviors and highlights the unique value managers bring to their teams.