YoVDO

Microsoft Cybersecurity Stack: Identity and Endpoint Protection Basics

Offered By: LinkedIn Learning

Tags

Microsoft Azure Courses Cybersecurity Courses Mobile Device Management Courses Multi-Factor Authentication Courses Endpoint Protection Courses

Course Description

Overview

Learn the basics of setting up endpoint protection. Discover how to set up Azure Active Directory Premium, enable multi-factor authentication, and more.

Syllabus

Introduction
  • Welcome
  • What you should know
  • Resources
  • Lab requirements
1. Azure Active Directory (AAD) Premium Setup
  • AAD overview
  • Create a new AAD tenant
  • Activate a trial and assign licenses
  • Set up AAD for an organization
  • Validate readiness for Directory Sync
  • Set up directory integration
2. Enabling Multi-Factor Authentication (MFA)
  • Enable user-level MFA
  • Enable application-level MFA
  • Enable MFA for federated environments
  • Configure MFA registration requirements
  • Configure trusted IPs and app passwords
  • Configure general MFA settings
  • Microsoft MFA Server overview
  • Enable self-service password reset
3. Setting Conditions for Secure Access
  • Configure location-based access rules
  • Configure device-based access rules
  • Configure risk-based access rules
  • Configure per-application access rules
4. Managing Mobile Devices with Intune
  • Plan a mobile device management (MDM) strategy
  • How Intune (standalone) MDM works
  • How Intune mobile application management (MAM) works
  • Configure automatic device registration
5. Publishing Applications with Azure AD App Proxy
  • Azure AD App Proxy overview
  • Publish an app with Azure AD App Proxy
  • Assign users and groups
Conclusion
  • Next steps

Taught by

Pete Zerger

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network