Shadow IT: Protecting Your Organization with Microsoft 365
Offered By: LinkedIn Learning
Course Description
Overview
Get shadow IT under control in your organization. Learn about the risks of shadow IT and how to identify and eliminate threats with tools in the Microsoft cybersecurity stack.
Syllabus
Introduction
- Stop shadow IT attacks in their tracks
- What you should know
- Lab requirements
- What is shadow IT?
- The tenets of shadow IT prevention
- Enter the Cloud Access Security Broker (CASB)
- CAS feature flyover
- Configure Cloud App Discovery and connectors
- Enrich and anonymize discovery data
- Enabling discovery outside the corporate network
- Controlling SaaS access and activity
- Classification and protection of confidential info
- Controlling access to unmanaged devices
- Controlling access to noncompliant devices
- Next steps
Taught by
Pete Zerger
Related Courses
Security Principles(ISC)² via Coursera A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera FinTech for Finance and Business Leaders
ACCA via edX Access Control Concepts
(ISC)² via Coursera Access Controls
(ISC)² via Coursera