Protect Windows Devices with Microsoft Intune
Offered By: Pluralsight
Course Description
Overview
Endpoint devices are a primary attack surface for cyberthreats. This course will teach you how to protect Windows devices with Microsoft Intune using capabilities available right out of the box.
For most organizations, Windows endpoints represent the first line of defense and the primary attack surface against cybersecurity threats. In this course, Protect Windows Devices with Microsoft Intune, you’ll learn how Microsoft Intune’s built-in security and updates capabilities can help. First, you’ll explore device compliance, and how it can ensure your devices are secured as expected. Next, you’ll discover Intune’s endpoint security capabilities, based on Microsoft Defender for Endpoint. Finally, you’ll learn how to keep devices patched and updated using Intune’s update capabilities. When you’re finished with this course, you’ll have the skills and knowledge of protecting Windows devices with Microsoft Intune.
For most organizations, Windows endpoints represent the first line of defense and the primary attack surface against cybersecurity threats. In this course, Protect Windows Devices with Microsoft Intune, you’ll learn how Microsoft Intune’s built-in security and updates capabilities can help. First, you’ll explore device compliance, and how it can ensure your devices are secured as expected. Next, you’ll discover Intune’s endpoint security capabilities, based on Microsoft Defender for Endpoint. Finally, you’ll learn how to keep devices patched and updated using Intune’s update capabilities. When you’re finished with this course, you’ll have the skills and knowledge of protecting Windows devices with Microsoft Intune.
Syllabus
- Course Overview 1min
- Configure Compliance Rules and Conditional Access Policies 11mins
- Update Devices 14mins
- Secure Devices 32mins
Taught by
Dean Ellerby
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network