Shadow IT: Protecting Your Organization with Microsoft 365
Offered By: LinkedIn Learning
Course Description
Overview
Get shadow IT under control in your organization. Learn about the risks of shadow IT and how to identify and eliminate threats with tools in the Microsoft cybersecurity stack.
Syllabus
Introduction
- Stop shadow IT attacks in their tracks
- What you should know
- Lab requirements
- What is shadow IT?
- The tenets of shadow IT prevention
- Enter the Cloud Access Security Broker (CASB)
- CAS feature flyover
- Configure Cloud App Discovery and connectors
- Enrich and anonymize discovery data
- Enabling discovery outside the corporate network
- Controlling SaaS access and activity
- Classification and protection of confidential info
- Controlling access to unmanaged devices
- Controlling access to noncompliant devices
- Next steps
Taught by
Pete Zerger
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network