YoVDO

Microsoft Cybersecurity Stack: Securing Enterprise Information

Offered By: LinkedIn Learning

Tags

Microsoft Azure Courses Cybersecurity Courses Mobile Device Security Courses Data Loss Prevention Courses Azure SQL Courses Shadow IT Courses

Course Description

Overview

Discover how to leverage the Microsoft cybersecurity stack to more effectively protect corporate information—on any device and in any cloud.

Today's users expect to be productive wherever they are. IT pros must look beyond the traditional network perimeter model, and discover how to design and implement a comprehensive strategy for protecting corporate information. The Microsoft Cybersecurity Stack series shows how to use the Microsoft cybersecurity stack to strengthen your organization's security posture.

In this course, Microsoft MVP Pete Zerger demonstrates how to leverage the Microsoft cybersecurity stack to more effectively protect corporate information—on any device and in any cloud. Pete explains how to use Azure Information Protection (AIP) and secure data on mobile devices. He also covers identifying and controlling shadow IT and securing structured data in Azure.

Syllabus

Introduction
  • Welcome
  • What you should know
  • Lab requirements
1. Securing Corporate Information on Any Device
  • What is Azure Information Protection (AIP)?
  • Configure classification and labeling
  • Create RMS templates
  • Work with the AIP client
  • Introducing the unified labeling experience
  • Classify and protect data in bulk
2. Securing Corporate Data on Mobile Devices
  • Challenges of securing data on mobile devices
  • Data loss prevention (DLP) on mobile devices
  • Secure sharing from mobile devices
  • Implement DLP for unmanaged mobile devices
3. Identifying and Controlling Shadow IT
  • What is Cloud App Security (CAS)?
  • Deploy Cloud Discovery
  • Customize discovery and anonymize discovery data
  • Configure automatic log upload
  • Connect apps to CAS
  • Integration with other Microsoft cloud services
4. Securing Collaboration and DLP
  • Information Rights Management (IRM) in SharePoint
  • Configure built-in IRM options
  • Using SharePoint security policies
  • Audit sharing activity in SharePoint
  • Secure email sharing with anyone, anywhere
5. Securing Structured (SQL) Data
  • Secure structured data at rest
  • What is SQL "Always Encrypted"?
  • Using row-level security
  • Configure dynamic data masking
  • Protect Azure SQL with SQL Threat Detection
Conclusion
  • Next steps

Taught by

Pete Zerger

Related Courses

Cyber Security in Manufacturing
University at Buffalo via Coursera
Security Awareness Training
(ISC)² via Coursera
Masterclass - Hacking de dispositivos moviles
Udemy
Threat and Vulnerability Management for CompTIA CySA+
Pluralsight
Protecting Devices and Applications in Microsoft 365
Pluralsight