YoVDO

Microsoft Cybersecurity Stack: Securing Enterprise Information

Offered By: LinkedIn Learning

Tags

Microsoft Azure Courses Cybersecurity Courses Mobile Device Security Courses Data Loss Prevention Courses Azure SQL Courses Shadow IT Courses

Course Description

Overview

Discover how to leverage the Microsoft cybersecurity stack to more effectively protect corporate information—on any device and in any cloud.

Today's users expect to be productive wherever they are. IT pros must look beyond the traditional network perimeter model, and discover how to design and implement a comprehensive strategy for protecting corporate information. The Microsoft Cybersecurity Stack series shows how to use the Microsoft cybersecurity stack to strengthen your organization's security posture.

In this course, Microsoft MVP Pete Zerger demonstrates how to leverage the Microsoft cybersecurity stack to more effectively protect corporate information—on any device and in any cloud. Pete explains how to use Azure Information Protection (AIP) and secure data on mobile devices. He also covers identifying and controlling shadow IT and securing structured data in Azure.

Syllabus

Introduction
  • Welcome
  • What you should know
  • Lab requirements
1. Securing Corporate Information on Any Device
  • What is Azure Information Protection (AIP)?
  • Configure classification and labeling
  • Create RMS templates
  • Work with the AIP client
  • Introducing the unified labeling experience
  • Classify and protect data in bulk
2. Securing Corporate Data on Mobile Devices
  • Challenges of securing data on mobile devices
  • Data loss prevention (DLP) on mobile devices
  • Secure sharing from mobile devices
  • Implement DLP for unmanaged mobile devices
3. Identifying and Controlling Shadow IT
  • What is Cloud App Security (CAS)?
  • Deploy Cloud Discovery
  • Customize discovery and anonymize discovery data
  • Configure automatic log upload
  • Connect apps to CAS
  • Integration with other Microsoft cloud services
4. Securing Collaboration and DLP
  • Information Rights Management (IRM) in SharePoint
  • Configure built-in IRM options
  • Using SharePoint security policies
  • Audit sharing activity in SharePoint
  • Secure email sharing with anyone, anywhere
5. Securing Structured (SQL) Data
  • Secure structured data at rest
  • What is SQL "Always Encrypted"?
  • Using row-level security
  • Configure dynamic data masking
  • Protect Azure SQL with SQL Threat Detection
Conclusion
  • Next steps

Taught by

Pete Zerger

Related Courses

Advanced AI on Microsoft Azure: Ethics and Laws, Research Methods and Machine Learning
Cloudswyft via FutureLearn
Ethics, Laws and Implementing an AI Solution on Microsoft Azure
Cloudswyft via FutureLearn
Deep Learning and Python Programming for AI with Microsoft Azure
Cloudswyft via FutureLearn
Advanced Artificial Intelligence on Microsoft Azure: Deep Learning, Reinforcement Learning and Applied AI
Cloudswyft via FutureLearn
AI Design and Engineering with Microsoft Azure
Cloudswyft via FutureLearn