Data Privacy Statement  | Terms of Use Imprint
© 2024 ALSO Cloud Marketplace

Jen Gilges
Certified Microsoft Security and Cloud-Infrastructure Trainer.

Peik Bech-Andersen 
Senior Developer, Architect and Instructor on Dynamics 365 Business Central.

Michel Aguileira
Microsoft Certified Trainer

Marc Michault
Senior Instructor

Our trainers is here to help you map out your own path to certification. The first step is choosing your focus area below.

Upskilling towards official Microsoft certification in your focus area is crucial for you as a Microsoft partner. It increases your competence to help you better identify efficient solutions, and it also improves your credibility in the eyes of your customers.

Meet our experts!

Mark Christie

Microsoft Azure and Modern Workplace courses.

Each training is held a by a certified Microsoft trainer and is available in English, French, German and Spanish. Comprised of training sessions and workshops, they’re exclusive to ALSO partners and offer first-class exam preparation for your certification.

Modern Workplace coursesAzure coursesSecurity coursesBusiness Applications coursesAI courses

If you are new to the e-learning platform, you can follow the below instructions for log in and searching for Readiness Trainings. 

How to find your courseHow to log in/register

ALSO's Microsoft Security Webinar Series

Unlocking Cybersecurity Excellence:

Register for the coursesSecurity Updates

The demand for strong cybersecurity solutions has never been greater. To help our partners stay ahead of threats, we continue ALSO’s Microsoft Security Webinar Series – now bringing you a lineup of live sessions designed to strengthen your cybersecurity expertise and keep you at the forefront of protection.

These live courses cover advanced threat detection, data protection, and hands-on strategies across Microsoft 365 services. Don’t miss the chance to interact with experts, ask questions in real time, and gain practical skills you can apply immediately.

Dive into AI excellence with our instructor-led online training courses in English, German, French, Spanish, Polish and Italian.

Get certified with the help of ALSO and elevate your skills with our comprehensive range of courses, including MS-900, AI-900, AZ-900, SC-200, MS-102, and more. Each course is delivered by a certified Microsoft trainer, ensuring you receive expert guidance and insights. Our training sessions and workshops, offered exclusively to ALSO partners in English and German, are meticulously designed to help you excel in your Microsoft exams.

Gain hands-on experience with real-world scenarios that prepare you to tackle cybersecurity threats head-on. With ALSO, not only will you be prepped for certification, but you'll also build a solid foundation in security best practices, essential for protecting sensitive data and maintaining compliance in an increasingly complex digital environment.

ALSO’s Microsoft Certification Trainings

Browse Security Trainings

GET IN TOUCH

On demand courses

Securing Azure Infrastructure

(Sales training)

On-demand

16:00 - 17:00 CET

English

Watch on-demand

Defender for Business

(Technical training)

On-demand

16:00 - 17:00 CET

English

Watch on-demand

Defender for Cloud Apps

(Sales training)

On-demand

16:00 - 17:00 CET

English

Watch on-demand

Data Loss Prevention

(Technical training)

On-demand

16:00 - 17:00 CET

English

Watch on-demand

GET IN TOUCH

upcoming courses IN ENGLISH

Information Protection

Sign Up*

23.10.2024

11:00 - 13:00 CEST

English

Learn more

Cloud Security

Watch on-demand*

On-demand

11:00 - 13:00 CEST

English

Learn more

Collaboration Security

Watch on-demand*

On-demand

11:00 - 13:00 CEST

English

Learn more

Integrating Microsoft Security into Your Organization

Watch on-demand*

On-demand

11:00 - 13:00 CEST

English

Learn more

*e-learning portal login required

The Digital Operational Resilience Act (DORA), effective January 17, 2025, will transform how financial institutions and their tech providers manage cybersecurity, ensuring they can withstand and recover from cyber threats. DORA mandates strict guidelines for ICT risk management, incident reporting, operational resilience testing, third-party risk management, and information sharing to safeguard against ICT-related incidents.

The European Network and Information Security Directive (NIS2) is set to be the most comprehensive European cybersecurity directive yet, it covers 15 different sectors, and came into effect in October 2024.

Its purpose is to establish a baseline of security measures for digital service providers and operators of essential services, to mitigate the risk of cyber-attacks and to improve the overall level of cybersecurity in the EU.


Master EU Cybersecurity Regulations with ALSO: DORA and NIS2 Explained 


Learn more

Microsoft and Security Introduction 

(Sales training)

On-demand

16:00 - 17:00 CET

English

Watch on-demand

Secure Identities with Microsoft Entra ID

(Technical training)

On-demand

16:00 - 17:00 CET

English

Watch on-demand

Easier Management of Customer Identities

(Sales training)

On-demand

16:00 - 17:00 CET

English

Watch on-demand*

Microsoft as a security vendor

(Technical training)

On-demand

16:00 - 17:00 CET

English

Watch on-demand

Securing Azure services with Defender for cloud
(Sales training)

April 10. 2024

On-demand

English

Watch on-demand

Azure Sentinel

(Technical training)

On-demand

16:00 - 17:00 CET

English

Watch on-demand

Introduction to Microsoft Security Solutions

Watch on-demand*

On-demand

English

Learn more

Identity and Access Management

Watch on-demand*

On-demand

English

Learn more

Threat Protection

Watch on-demand*

On-demand

English

Learn more

Compliance and Governance

Watch on-demand*

On-demand

English

Learn more

Endpoint Security

Watch on-demand*

On-demand

English

Learn more

Security Management

Watch on-demand*

On-demand

English

Learn more

GET IN TOUCH

In case of further questions,
don't hesitate to contact us!

Cloud Security

Watch on-demand*

On-demand

11:00 - 13:00 CEST

English

Learn more

Microsoft Sentinel in Action: Cloud-Native SIEM 

Watch recording

English

Oualid Bakkari (ALSO)

Learn more

GET IN TOUCH

upcoming Webinars 

Implement DLP to protect sensitive information 

Sign-up

07.10.2025

English

Maciej Wawrzyniak (ALSO)

Learn more

10:00 - 11:00 CET

E-Mail Security (EOP & Defender for O365) 

Sign-up

06.11.2025

English

Oualid Bakkari (ALSO)

Learn more

10:00 - 11:00 CET

Investigate like a pro: Analyze data with eDiscovery & Audit Logs 

Sign-up

18.11.2025

English

Maciej Wawrzyniak (ALSO)

Learn more

10:00 - 11:00 CET

Why standard MFA Isn't enough today: Adversary-in-the-Middle & Token Theft 

Sign-up

20.11.2025

English

Vladislav Johansen (ALSO)

Agenda

10:00 - 11:00 CET

Why standard MFA Isn't enough today: Adversary-in-the-Middle & Token Theft 

Sign-up

20.11.2025

English

Vladislav Johansen (ALSO)

Learn more

10:00 - 11:00 CET

Find your sensitive data with Microsoft Purviews powerful capabilities


Sign-up

11.12.2025

English

Vladislav Johansen (ALSO)

Learn more

10:00 - 11:00 CET

Important Security Update! 2FA (Two-Factor) bypass is no longer hype - it’s a real and escalating threat!

MFA bypass occurs when attackers circumvent common two-factor authentication methods such as SMS codes or Microsoft Authenticator (including both one-time codes and passwordless sign-ins) — without requiring your password at all. In technical terms, these attacks are also known as Man-in-the-Middle (MiTM), Adversary-in-the-Middle (AiTM), or Token Theft attacks 

ALSO Guide to Protection