Shadow IT: Protecting Your Organization with Microsoft 365
Offered By: LinkedIn Learning
Course Description
Overview
Get shadow IT under control in your organization. Learn about the risks of shadow IT and how to identify and eliminate threats with tools in the Microsoft cybersecurity stack.
Syllabus
Introduction
- Stop shadow IT attacks in their tracks
- What you should know
- Lab requirements
- What is shadow IT?
- The tenets of shadow IT prevention
- Enter the Cloud Access Security Broker (CASB)
- CAS feature flyover
- Configure Cloud App Discovery and connectors
- Enrich and anonymize discovery data
- Enabling discovery outside the corporate network
- Controlling SaaS access and activity
- Classification and protection of confidential info
- Controlling access to unmanaged devices
- Controlling access to noncompliant devices
- Next steps
Taught by
Pete Zerger
Related Courses
Microsoft Cybersecurity Stack: Securing Enterprise InformationLinkedIn Learning The Cybersecurity Threat Landscape
LinkedIn Learning The Cybersecurity Threat Landscape (2019)
LinkedIn Learning Building a Co-Creative Enterprise with ManageEngine - IT Collaboration and Automation
Microsoft via YouTube Democratizing Data - Leadership Insights from Rolls-Royce's CIDO - Episode 1
Databricks via YouTube