YoVDO

Shadow IT: Protecting Your Organization with Microsoft 365

Offered By: LinkedIn Learning

Tags

Microsoft Office 365 Courses Cybersecurity Courses Network Security Courses Software as a Service (SaaS) Courses Data Protection Courses Microsoft 365 Courses Shadow IT Courses

Course Description

Overview

Get shadow IT under control in your organization. Learn about the risks of shadow IT and how to identify and eliminate threats with tools in the Microsoft cybersecurity stack.

Syllabus

Introduction
  • Stop shadow IT attacks in their tracks
  • What you should know
  • Lab requirements
1. Intro to Shadow IT Threats and Strategy
  • What is shadow IT?
  • The tenets of shadow IT prevention
  • Enter the Cloud Access Security Broker (CASB)
2. Enabling and Enriching Cloud Discovery
  • CAS feature flyover
  • Configure Cloud App Discovery and connectors
  • Enrich and anonymize discovery data
  • Enabling discovery outside the corporate network
3. Extending Control and Protection
  • Controlling SaaS access and activity
  • Classification and protection of confidential info
  • Controlling access to unmanaged devices
  • Controlling access to noncompliant devices
Conclusion
  • Next steps

Taught by

Pete Zerger

Related Courses

Security Principles
(ISC)² via Coursera
A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera
FinTech for Finance and Business Leaders
ACCA via edX
Access Control Concepts
(ISC)² via Coursera
Access Controls
(ISC)² via Coursera