Shadow IT: Protecting Your Organization with Microsoft 365
Offered By: LinkedIn Learning
Course Description
Overview
Get shadow IT under control in your organization. Learn about the risks of shadow IT and how to identify and eliminate threats with tools in the Microsoft cybersecurity stack.
Syllabus
Introduction
- Stop shadow IT attacks in their tracks
- What you should know
- Lab requirements
- What is shadow IT?
- The tenets of shadow IT prevention
- Enter the Cloud Access Security Broker (CASB)
- CAS feature flyover
- Configure Cloud App Discovery and connectors
- Enrich and anonymize discovery data
- Enabling discovery outside the corporate network
- Controlling SaaS access and activity
- Classification and protection of confidential info
- Controlling access to unmanaged devices
- Controlling access to noncompliant devices
- Next steps
Taught by
Pete Zerger
Related Courses
Aprende las funciones básicas de Microsoft FormsCoursera Project Network via Coursera البدء في استخدام Microsoft Forms
Coursera Project Network via Coursera بدء استخدام Microsoft Office 365
Coursera Project Network via Coursera Competencias digitales de ofimática: Microsoft Word
Universitat Autònoma de Barcelona (Autonomous University of Barcelona) via Coursera Introducción al Office 365
Universitat Politècnica de València via edX