Microsoft Cybersecurity Stack: Securing Enterprise Information
Offered By: LinkedIn Learning
Course Description
Overview
Discover how to leverage the Microsoft cybersecurity stack to more effectively protect corporate information—on any device and in any cloud.
Today's users expect to be productive wherever they are. IT pros must look beyond the traditional network perimeter model, and discover how to design and implement a comprehensive strategy for protecting corporate information. The Microsoft Cybersecurity Stack series shows how to use the Microsoft cybersecurity stack to strengthen your organization's security posture.
In this course, Microsoft MVP Pete Zerger demonstrates how to leverage the Microsoft cybersecurity stack to more effectively protect corporate informationâon any device and in any cloud. Pete explains how to use Azure Information Protection (AIP) and secure data on mobile devices. He also covers identifying and controlling shadow IT and securing structured data in Azure.
Today's users expect to be productive wherever they are. IT pros must look beyond the traditional network perimeter model, and discover how to design and implement a comprehensive strategy for protecting corporate information. The Microsoft Cybersecurity Stack series shows how to use the Microsoft cybersecurity stack to strengthen your organization's security posture.
In this course, Microsoft MVP Pete Zerger demonstrates how to leverage the Microsoft cybersecurity stack to more effectively protect corporate informationâon any device and in any cloud. Pete explains how to use Azure Information Protection (AIP) and secure data on mobile devices. He also covers identifying and controlling shadow IT and securing structured data in Azure.
Syllabus
Introduction
- Welcome
- What you should know
- Lab requirements
- What is Azure Information Protection (AIP)?
- Configure classification and labeling
- Create RMS templates
- Work with the AIP client
- Introducing the unified labeling experience
- Classify and protect data in bulk
- Challenges of securing data on mobile devices
- Data loss prevention (DLP) on mobile devices
- Secure sharing from mobile devices
- Implement DLP for unmanaged mobile devices
- What is Cloud App Security (CAS)?
- Deploy Cloud Discovery
- Customize discovery and anonymize discovery data
- Configure automatic log upload
- Connect apps to CAS
- Integration with other Microsoft cloud services
- Information Rights Management (IRM) in SharePoint
- Configure built-in IRM options
- Using SharePoint security policies
- Audit sharing activity in SharePoint
- Secure email sharing with anyone, anywhere
- Secure structured data at rest
- What is SQL "Always Encrypted"?
- Using row-level security
- Configure dynamic data masking
- Protect Azure SQL with SQL Threat Detection
- Next steps
Taught by
Pete Zerger
Related Courses
Advanced AI on Microsoft Azure: Ethics and Laws, Research Methods and Machine LearningCloudswyft via FutureLearn Ethics, Laws and Implementing an AI Solution on Microsoft Azure
Cloudswyft via FutureLearn Deep Learning and Python Programming for AI with Microsoft Azure
Cloudswyft via FutureLearn Advanced Artificial Intelligence on Microsoft Azure: Deep Learning, Reinforcement Learning and Applied AI
Cloudswyft via FutureLearn AI Design and Engineering with Microsoft Azure
Cloudswyft via FutureLearn