Example Image with Text
Use this Image with Text block to balance out your text content with a complementary visual to strengthen messaging and help your students connect with your product, course, or coaching. You can introduce yourself with a profile picture and author bio, showcase a student testimonial with their smiling face, or highlight an experience with a screenshot.
Example Text
Use this Text block to tell your course or coaching’s story.
Write anything from one-liners to detailed paragraphs that tell your visitors more about what you’re selling.
This block - along with other blocks that contain text content - supports various text formatting such as header sizes, font styles, alignment, ordered and unordered lists, hyperlinks and colors.
Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Curriculum
- Sc-200 part 1 sc 200 Introduction (16:11)
- sc-200 part 2 sc 200 Introduction (8:37)
- sc-200 part 3 sc 200 Lab (7:50)
- sc-200 part 04 Introduction to Threat Hunting (7:04)
- sc-200 part 5 The Microsoft 365 Defender suits (2:54)
- sc-200 part 06 Timeline of Attacks (7:49)
- sc-200 part 7 Security Operations (3:09)
- sc-200 part 8 Microsoft Defender XDR Lab Set up (3:15)
- sc-200 part 9 Microsoft 365 Defender Part-I (3:46)
- sc200 part 10 Microsoft 365 Defender Part-2 (20:01)
- sc-200 part 11 Microsoft Defender MITRE ATT&CK (8:19)
- sc-200 part 12 Microsoft Defender Hunting (2:18)
- sc-200 part 13 Microsoft Defender Advanced Hunting Part-I (4:19)
- sc-200 part 14 Microsoft Defender Advanced Hunting Part-2 (7:43)
- sc-200 part 15 Microsoft Threat Experts (2:17)
- sc-200 part 16 Remediate user Risks using M365 Defender for 0365 (6:00)
- sc-200 part 17 Microsoft Defender O365 Part-1 (3:30)
- sc-200 part 18 Microsoft Defender O365 Part-2 (12:30)
- sc-200 part 19 Microsoft Defender O365 Part-3 (3:43)
- sc-200 part 20 Microsoft Defender O365 Part-4 (9:00)
- sc-200 part 21 Microsoft Defender for Identity (1:05)
- sc-200 part 22 Microsoft Defender for Identity (3:27)
- sc-200 part 23 Key Capabilities Microsoft Defender for Identity- (13:12)
- sc-200 part 24. Microsoft Defender for Identity Sensor (4:29)
- sc-200 part 25 Microsoft Azure Virtual Machine (3:48)
- sc-200 part 26 Azure ATP Sensor Setup (1:31)
- sc-200 part 27 Microsoft Defender for Identity (Part - 1) (1:42)
- sc-200 part 28 Microsoft Defender for Identity (Part - 2) (2:21)
- sc-200 part 29 Microsoft Defender for Identity (Part - 3) (6:38)
- sc-200 part 30 Azure ATP Architecture (2:20)
- sc-200 part 31 Entra ID Identity Protection Part-1 (2:09)
- sc-200 part 32 Entra ID Identity Protection Part-2 (4:33)
- sc-200 part 33 Entra ID Identity Protection Part-3 (9:59)
- sc-200 part 34 Microsoft Cloud App Security (5:42)
- SC-200 part 35 Conditional Access App Control (6:40)
- SC-200 part 36 Information Protection (3:53)
- sc-200 part 37 Insider Risk Managemnet (1:27)
- sc-200 part 38 Phases of Cloud App Security (3:28)
- sc-200 part 39 SOC Analyst (4:21)
- sc-200 part 40 Data Loss Prevention (6:56)
- sc-200 part 41 Insider Risk Management M365 Part-1 (7:54)
- sc-200 part 42 Insider Risk Management M365 Part-2 (8:50)
- sc-200 part 43 Mitigating threats using Microsoft 365 defender for endpoint (1:18)
- sc-200 part 44 Defender for Endpoints Features (2:50)
- sc-200 part 45 Terminology of Microsoft Defender (2:19)
- sc-200 part 46 Microsoft Azure Service (5:57)
- sc-200 part 47 Microsoft Azure Resources (1:59)
- sc-200 part 48 Microsoft Defender Device Inventory (4:49)
- sc-200 part 49 Microsoft Defender Virtual Machine (4:45)
- sc-200 part 50 EDR Block Mode (1:23)
- sc-200 part 51 EDR in Block mode Part-2 (2:29)
- sc-200 part 52 Attack Surface Reduction Part-I (4:03)
- sc-200 part 53 Attack Surface Reduction Part-2 (9:23)
- sc-200 part 54 Windows Defender ATP Onboarding Package Installation (1:27)
- sc-200 part 55 Windows PowerShell ISE (2:26)
- sc-200 part 56 Microsoft Defender Incidents (3:17)
- sc-200 part 57 Microsoft Defender Device Inventory (5:25)
- sc-200 part 58 Microsoft Defender Device Inventory Part-2 (1:57)
- sc-200 part 59 Microsoft Defender Incidents (2:54)
- sc-200 part 60 Microsoft Defender Endpoints (4:56)
- sc-200 part 61 Suspicious Process Injection Observed (5:28)
- sc-200 part 62 Enpoints (3:57)
- sc-200 part 63 Email in Enpoint (2:50)
- sc-200 part 64 Microsoft 365 Access (5:27)
- sc-200 part 65 Threat & Vulnerability Management (5:48)
Example Image with Text
Use this Image with Text block to balance out your text content with a complementary visual to strengthen messaging and help your students connect with your product, course, or coaching. You can introduce yourself with a profile picture and author bio, showcase a student testimonial with their smiling face, or highlight an experience with a screenshot.
Example Featured Products
Showcase other available courses, bundles, and coaching products you’re selling with the Featured Products block to provide alternatives to visitors who may not be interested in this specific product.