YoVDO

Shadow IT: Protecting Your Organization with Microsoft 365

Offered By: LinkedIn Learning

Tags

Microsoft Office 365 Courses Cybersecurity Courses Network Security Courses Software as a Service (SaaS) Courses Data Protection Courses Microsoft 365 Courses Shadow IT Courses

Course Description

Overview

Get shadow IT under control in your organization. Learn about the risks of shadow IT and how to identify and eliminate threats with tools in the Microsoft cybersecurity stack.

Syllabus

Introduction
  • Stop shadow IT attacks in their tracks
  • What you should know
  • Lab requirements
1. Intro to Shadow IT Threats and Strategy
  • What is shadow IT?
  • The tenets of shadow IT prevention
  • Enter the Cloud Access Security Broker (CASB)
2. Enabling and Enriching Cloud Discovery
  • CAS feature flyover
  • Configure Cloud App Discovery and connectors
  • Enrich and anonymize discovery data
  • Enabling discovery outside the corporate network
3. Extending Control and Protection
  • Controlling SaaS access and activity
  • Classification and protection of confidential info
  • Controlling access to unmanaged devices
  • Controlling access to noncompliant devices
Conclusion
  • Next steps

Taught by

Pete Zerger

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network