Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

LinkedIn Learning

Microsoft Cybersecurity Stack: Securing Enterprise Information

via LinkedIn Learning

Overview

Prepare for a new career with $100 off Coursera Plus
Gear up for jobs in high-demand fields: data analytics, digital marketing, and more.
Discover how to leverage the Microsoft cybersecurity stack to more effectively protect corporate information—on any device and in any cloud.

Today's users expect to be productive wherever they are. IT pros must look beyond the traditional network perimeter model, and discover how to design and implement a comprehensive strategy for protecting corporate information. The Microsoft Cybersecurity Stack series shows how to use the Microsoft cybersecurity stack to strengthen your organization's security posture.

In this course, Microsoft MVP Pete Zerger demonstrates how to leverage the Microsoft cybersecurity stack to more effectively protect corporate information—on any device and in any cloud. Pete explains how to use Azure Information Protection (AIP) and secure data on mobile devices. He also covers identifying and controlling shadow IT and securing structured data in Azure.

Syllabus

Introduction
  • Welcome
  • What you should know
  • Lab requirements
1. Securing Corporate Information on Any Device
  • What is Azure Information Protection (AIP)?
  • Configure classification and labeling
  • Create RMS templates
  • Work with the AIP client
  • Introducing the unified labeling experience
  • Classify and protect data in bulk
2. Securing Corporate Data on Mobile Devices
  • Challenges of securing data on mobile devices
  • Data loss prevention (DLP) on mobile devices
  • Secure sharing from mobile devices
  • Implement DLP for unmanaged mobile devices
3. Identifying and Controlling Shadow IT
  • What is Cloud App Security (CAS)?
  • Deploy Cloud Discovery
  • Customize discovery and anonymize discovery data
  • Configure automatic log upload
  • Connect apps to CAS
  • Integration with other Microsoft cloud services
4. Securing Collaboration and DLP
  • Information Rights Management (IRM) in SharePoint
  • Configure built-in IRM options
  • Using SharePoint security policies
  • Audit sharing activity in SharePoint
  • Secure email sharing with anyone, anywhere
5. Securing Structured (SQL) Data
  • Secure structured data at rest
  • What is SQL "Always Encrypted"?
  • Using row-level security
  • Configure dynamic data masking
  • Protect Azure SQL with SQL Threat Detection
Conclusion
  • Next steps

Taught by

Pete Zerger

Reviews

Start your review of Microsoft Cybersecurity Stack: Securing Enterprise Information

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.