YoVDO

Shadow IT: Protecting Your Organization with Microsoft 365

Offered By: LinkedIn Learning

Tags

Microsoft Office 365 Courses Cybersecurity Courses Network Security Courses Software as a Service (SaaS) Courses Data Protection Courses Microsoft 365 Courses Shadow IT Courses

Course Description

Overview

Get shadow IT under control in your organization. Learn about the risks of shadow IT and how to identify and eliminate threats with tools in the Microsoft cybersecurity stack.

Syllabus

Introduction
  • Stop shadow IT attacks in their tracks
  • What you should know
  • Lab requirements
1. Intro to Shadow IT Threats and Strategy
  • What is shadow IT?
  • The tenets of shadow IT prevention
  • Enter the Cloud Access Security Broker (CASB)
2. Enabling and Enriching Cloud Discovery
  • CAS feature flyover
  • Configure Cloud App Discovery and connectors
  • Enrich and anonymize discovery data
  • Enabling discovery outside the corporate network
3. Extending Control and Protection
  • Controlling SaaS access and activity
  • Classification and protection of confidential info
  • Controlling access to unmanaged devices
  • Controlling access to noncompliant devices
Conclusion
  • Next steps

Taught by

Pete Zerger

Related Courses

Aprende las funciones básicas de Microsoft Forms
Coursera Project Network via Coursera
البدء في استخدام Microsoft Forms
Coursera Project Network via Coursera
بدء استخدام Microsoft Office 365
Coursera Project Network via Coursera
Competencias digitales de ofimática: Microsoft Word
Universitat Autònoma de Barcelona (Autonomous University of Barcelona) via Coursera
Introducción al Office 365
Universitat Politècnica de València via edX