Protect Windows Devices with Microsoft Intune
Offered By: Pluralsight
Course Description
Overview
Endpoint devices are a primary attack surface for cyberthreats. This course will teach you how to protect Windows devices with Microsoft Intune using capabilities available right out of the box.
For most organizations, Windows endpoints represent the first line of defense and the primary attack surface against cybersecurity threats. In this course, Protect Windows Devices with Microsoft Intune, you’ll learn how Microsoft Intune’s built-in security and updates capabilities can help. First, you’ll explore device compliance, and how it can ensure your devices are secured as expected. Next, you’ll discover Intune’s endpoint security capabilities, based on Microsoft Defender for Endpoint. Finally, you’ll learn how to keep devices patched and updated using Intune’s update capabilities. When you’re finished with this course, you’ll have the skills and knowledge of protecting Windows devices with Microsoft Intune.
For most organizations, Windows endpoints represent the first line of defense and the primary attack surface against cybersecurity threats. In this course, Protect Windows Devices with Microsoft Intune, you’ll learn how Microsoft Intune’s built-in security and updates capabilities can help. First, you’ll explore device compliance, and how it can ensure your devices are secured as expected. Next, you’ll discover Intune’s endpoint security capabilities, based on Microsoft Defender for Endpoint. Finally, you’ll learn how to keep devices patched and updated using Intune’s update capabilities. When you’re finished with this course, you’ll have the skills and knowledge of protecting Windows devices with Microsoft Intune.
Syllabus
- Course Overview 1min
- Configure Compliance Rules and Conditional Access Policies 11mins
- Update Devices 14mins
- Secure Devices 32mins
Taught by
Dean Ellerby
Related Courses
Windows 10 Security FeaturesMicrosoft via edX Palo Alto Networks Cybersecurity Essentials II
Palo Alto Networks via Coursera Cybersecurity Compliance Framework & System Administration
IBM via Coursera Cybersecurity Compliance and Framework
IBM via edX Securing Microsoft Azure Data Access Endpoints
Pluralsight