YoVDO

Shadow IT: Protecting Your Organization with Microsoft 365

Offered By: LinkedIn Learning

Tags

Microsoft Office 365 Courses Cybersecurity Courses Network Security Courses Software as a Service (SaaS) Courses Data Protection Courses Microsoft 365 Courses Shadow IT Courses

Course Description

Overview

Get shadow IT under control in your organization. Learn about the risks of shadow IT and how to identify and eliminate threats with tools in the Microsoft cybersecurity stack.

Syllabus

Introduction
  • Stop shadow IT attacks in their tracks
  • What you should know
  • Lab requirements
1. Intro to Shadow IT Threats and Strategy
  • What is shadow IT?
  • The tenets of shadow IT prevention
  • Enter the Cloud Access Security Broker (CASB)
2. Enabling and Enriching Cloud Discovery
  • CAS feature flyover
  • Configure Cloud App Discovery and connectors
  • Enrich and anonymize discovery data
  • Enabling discovery outside the corporate network
3. Extending Control and Protection
  • Controlling SaaS access and activity
  • Classification and protection of confidential info
  • Controlling access to unmanaged devices
  • Controlling access to noncompliant devices
Conclusion
  • Next steps

Taught by

Pete Zerger

Related Courses

An Introduction to Computer Networks
Stanford University via Independent
Computer Networks
University of Washington via Coursera
Computer Networking
Georgia Institute of Technology via Udacity
Cybersecurity and Its Ten Domains
University System of Georgia via Coursera
Model Building and Validation
AT&T via Udacity