YoVDO

Shadow IT: Protecting Your Organization with Microsoft 365

Offered By: LinkedIn Learning

Tags

Microsoft Office 365 Courses Cybersecurity Courses Network Security Courses Software as a Service (SaaS) Courses Data Protection Courses Microsoft 365 Courses Shadow IT Courses

Course Description

Overview

Get shadow IT under control in your organization. Learn about the risks of shadow IT and how to identify and eliminate threats with tools in the Microsoft cybersecurity stack.

Syllabus

Introduction
  • Stop shadow IT attacks in their tracks
  • What you should know
  • Lab requirements
1. Intro to Shadow IT Threats and Strategy
  • What is shadow IT?
  • The tenets of shadow IT prevention
  • Enter the Cloud Access Security Broker (CASB)
2. Enabling and Enriching Cloud Discovery
  • CAS feature flyover
  • Configure Cloud App Discovery and connectors
  • Enrich and anonymize discovery data
  • Enabling discovery outside the corporate network
3. Extending Control and Protection
  • Controlling SaaS access and activity
  • Classification and protection of confidential info
  • Controlling access to unmanaged devices
  • Controlling access to noncompliant devices
Conclusion
  • Next steps

Taught by

Pete Zerger

Related Courses

Cryptography II
Stanford University via Coursera
Microsoft Enterprise Mobility Suite
Microsoft via edX
Social Media - What No One has Told You about Privacy
openHPI
Windows 10 Features for a Mobile Workforce: Identity Management and Data Access
Microsoft via edX
Health Professional Teaching Skills – Level 3 - Professionalism
University of Toronto via edX