Example Image with Text
Use this Image with Text block to balance out your text content with a complementary visual to strengthen messaging and help your students connect with your product, course, or coaching. You can introduce yourself with a profile picture and author bio, showcase a student testimonial with their smiling face, or highlight an experience with a screenshot.
Example Text
Use this Text block to tell your course or coaching’s story.
Write anything from one-liners to detailed paragraphs that tell your visitors more about what you’re selling.
This block - along with other blocks that contain text content - supports various text formatting such as header sizes, font styles, alignment, ordered and unordered lists, hyperlinks and colors.
Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Curriculum
- Sc-200 part 1 sc 200 Introduction (16:11)
- sc-200 part 2 sc 200 Introduction (8:37)
- sc-200 part 3 sc 200 Lab (7:50)
- sc-200 part 04 Introduction to Threat Hunting (7:04)
- sc-200 part 5 The Microsoft 365 Defender suits (2:54)
- sc-200 part 06 Timeline of Attacks (7:49)
- sc-200 part 7 Security Operations (3:09)
- sc-200 part 8 Microsoft Defender XDR Lab Set up (3:15)
- sc-200 part 9 Microsoft 365 Defender Part-I (3:46)
- sc200 part 10 Microsoft 365 Defender Part-2 (20:01)
- sc-200 part 11 Microsoft Defender MITRE ATT&CK (8:19)
- sc-200 part 12 Microsoft Defender Hunting (2:18)
- sc-200 part 13 Microsoft Defender Advanced Hunting Part-I (4:19)
- sc-200 part 14 Microsoft Defender Advanced Hunting Part-2 (7:43)
- sc-200 part 15 Microsoft Threat Experts (2:17)
- sc-200 part 16 Remediate user Risks using M365 Defender for 0365 (6:00)
- sc-200 part 17 Microsoft Defender O365 Part-1 (3:30)
- sc-200 part 18 Microsoft Defender O365 Part-2 (12:30)
- sc-200 part 19 Microsoft Defender O365 Part-3 (3:43)
- sc-200 part 20 Microsoft Defender O365 Part-4 (9:00)
- sc-200 part 21 Microsoft Defender for Identity (1:05)
- sc-200 part 22 Microsoft Defender for Identity (3:27)
- sc-200 part 23 Key Capabilities Microsoft Defender for Identity- (13:12)
- sc-200 part 24. Microsoft Defender for Identity Sensor (4:29)
- sc-200 part 25 Microsoft Azure Virtual Machine (3:48)
- sc-200 part 26 Azure ATP Sensor Setup (1:31)
- sc-200 part 27 Microsoft Defender for Identity (Part - 1) (1:42)
- sc-200 part 28 Microsoft Defender for Identity (Part - 2) (2:21)
- sc-200 part 29 Microsoft Defender for Identity (Part - 3) (6:38)
- sc-200 part 30 Azure ATP Architecture (2:20)
- sc-200 part 31 Entra ID Identity Protection Part-1 (2:09)
- sc-200 part 32 Entra ID Identity Protection Part-2 (4:33)
- sc-200 part 33 Entra ID Identity Protection Part-3 (9:59)
- sc-200 part 34 Microsoft Cloud App Security (5:42)
- SC-200 part 35 Conditional Access App Control (6:40)
- SC-200 part 36 Information Protection (3:53)
- sc-200 part 37 Insider Risk Managemnet (1:27)
- sc-200 part 38 Phases of Cloud App Security (3:28)
- sc-200 part 39 SOC Analyst (4:21)
- sc-200 part 40 Data Loss Prevention (6:56)
- sc-200 part 41 Insider Risk Management M365 Part-1 (7:54)
- sc-200 part 42 Insider Risk Management M365 Part-2 (8:50)
- sc-200 part 43 Mitigating threats using Microsoft 365 defender for endpoint (1:18)
- sc-200 part 44 Defender for Endpoints Features (2:50)
- sc-200 part 45 Terminology of Microsoft Defender (2:19)
- sc-200 part 46 Microsoft Azure Service (5:57)
- sc-200 part 47 Microsoft Azure Resources (1:59)
- sc-200 part 48 Microsoft Defender Device Inventory (4:49)
- sc-200 part 49 Microsoft Defender Virtual Machine (4:45)
- sc-200 part 50 EDR Block Mode (1:23)
- sc-200 part 51 EDR in Block mode Part-2 (2:29)
- sc-200 part 52 Attack Surface Reduction Part-I (4:03)
- sc-200 part 53 Attack Surface Reduction Part-2 (9:23)
- sc-200 part 54 Windows Defender ATP Onboarding Package Installation (1:27)
- sc-200 part 55 Windows PowerShell ISE (2:26)
- sc-200 part 56 Microsoft Defender Incidents (3:17)
- sc-200 part 57 Microsoft Defender Device Inventory (5:25)
- sc-200 part 58 Microsoft Defender Device Inventory Part-2 (1:57)
- sc-200 part 59 Microsoft Defender Incidents (2:54)
- sc-200 part 60 Microsoft Defender Endpoints (4:56)
- sc-200 part 61 Suspicious Process Injection Observed (5:28)
- sc-200 part 62 Enpoints (3:57)
- sc-200 part 63 Email in Enpoint (2:50)
- sc-200 part 64 Microsoft 365 Access (5:27)
- sc-200 part 65 Threat & Vulnerability Management (5:48)
- sc-200 part 66 introduction (1:26)
- sc-200 part 67 azure security center (2:55)
- sc-200 part 68 defender overview (5:46)
- sc-200 part 69 cspm and cwp (3:26)
- sc-200 part 70 benifits of azure defender (8:30)
- sc-200 part 71 defender for app service (6:48)
- sc-200 part 72 defender for storage (5:17)
- sc-200 part 73 creating sql db (4:04)
- sc-200 part 74 defender for sql (5:38)
- sc-200 part 75 defender for key vault (4:07)
- sc-200 part 76 defender for DNS (4:03)
- sc-200 part 77 Azure Kubernetes Service (4:15)
- sc-200 part 78 Deploying Cluster (2:30)
- sc-200 part 79 Defender for Azure Kubernetes Service (AKS) (2:12)
- sc-200 part 80 Container registry for defender (5:23)
- sc-200 part 81 Configure assets (1:00)
- sc-200 part 82 Inventory (3:17)
- sc-200 part 83 auto provisioning (2:18)
- sc-200 part 84 attackers (2:19)
- sc-200 part 85 security alerts and notification (1:36)
- sc-200 part 86 how defender works (4:02)
- sc-200 part 87 severity of alerts (2:40)
- sc-200 part 88 continous mointoring (1:57)
- sc-200 part 89 Mitre attack (5:32)
- sc-200 part 90 workflow automation (3:42)
- sc-200 part 91 supression alerts (4:10)
- sc-200 part 92 What is SIME solutions (2:15)
- sc-200 part 94 components (0:46)
- sc-200 part 93 Microsoft sentinel (2:47)
- sc-200 part 95 data connectors (1:19)
- sc-200 part 96 components explaination overview (6:42)
- sc-200 part 97 log analytics workspace (5:38)
- SC-200 PART 98 data connectors (9:06)
- sc-200 part 99 connecting vm using data connector (7:22)
- sc-200 part 100 ingest data from vm (4:25)
- sc-200 part 101 watchlist part 1 (2:27)
- sc-200 part 102 watch list part 2 (6:17)
- sc-200 part 103 query hunting (4:18)
- sc-200 part 104 testing vm in tor (6:27)
- sc-200 part 105 fusion alerts (4:02)
- sc-200 part 106 microsoft security (1:50)
- sc-200 part 108 analytical rule template (2:23)
- sc-200 part 109 analytical wizard method (9:07)
- sc-200 part 110 managing the rules (2:55)
- sc-200 part 111 pthreat intelligence (3:36)
- sc-200 part 112 threat intelligence lab (4:19)
- sc-200 part 113 intro (0:58)
- sc-200 part 114 connect 365 defender for sentinel (1:24)
- sc-200 part 115 office 365 connector (4:14)
- sc-200 part 116 active directory connector (3:10)
- sc-200 part 117 entra id connector (3:01)
- sc-200 part 118 entra id connector (2:53)
- sc-200 part 119 office 365 defender connectors (3:25)
- sc-200 part 120 defender for endpoints (6:12)
- sc-200 part 121 threat intelligence indicator (6:17)
- sc-200 part 122 intro (0:56)
- sc-200 part 123 Incidents (6:11)
- sc-200 part 124 key concepts of MS sentienl 1 (2:41)
- sc-200 part 125 cloud apps policy (6:31)
- sc-200 part 126 incident management part 2 (4:44)
- sc-200 part 127 playbook intro (3:05)
- sc-200 part 128 playbook (8:07)
- sc-200 part 129 UEBA intro (5:39)
- SC-200 part 130 UEBA demo (9:42)
- sc-200 part 131 workbooks intro (1:43)
- sc-200 part 132 workbooks (10:23)
- sc-200 part 133 new workbooks (6:41)
- sc-200 part 134 threat hunting intro (0:58)
- sc-200 part 135 cyber threat hunt (3:03)
- SC-200 part 136 proactive hunting (2:27)
- sc-200 part 137 hypothesis (3:44)
- sc-200 part 138 hunting queries (5:42)
Example Image with Text
Use this Image with Text block to balance out your text content with a complementary visual to strengthen messaging and help your students connect with your product, course, or coaching. You can introduce yourself with a profile picture and author bio, showcase a student testimonial with their smiling face, or highlight an experience with a screenshot.
Example Featured Products
Showcase other available courses, bundles, and coaching products you’re selling with the Featured Products block to provide alternatives to visitors who may not be interested in this specific product.