Security in Office 365

Udemy Security in Office 365

Register & Get access to index
gpzIQzS.jpg


Learn all about the types of threats and the security solutions in Office 365 to detect, protect and remediate risks

What you'll learn​

  • Threats and data breaches targeting your data
  • Office 365 Threat Intelligence
  • Advanced Security Management in Office 365 (Cloud Application Security)
  • Microsoft Defender for Office 365 (former named Office 365 Advanced Threat Protection)
  • Auditing, alerting and reporting in Office 365



Requirements​

  • Basic understanding of Office 365
  • Basic understanding of authorization and authentication concepts
  • Basic understanding of computer networks
  • Basic conceptual understanding of Microsoft Azure


Description​

The threat landscape across the globe has changed dramatically over the past several years with hackers using more sophisticated methods to compromise users and networks alike. At the same time, more and more organizations are enjoying the benefits of cloud computing. But as companies move to the cloud, they are understandably concerned how Office 365 will protect their users and data from being compromised by cybercriminals.
In this course, we will examine the types of threats organizations must deal with daily and provide an overview of the solutions within Office 365 that help organizations detect, protect, and remediate these risks. These solutions include Microsoft Defender for Office 365 and Threat Intelligence, which provide protection against advanced targeted threats in email and Office documents and actionable insights into the global threat landscape, respectively. Solutions also include advanced auditing and alerts and features like Cloud Application Security, which enable security administrators to monitor and remediate risky behaviors and vulnerabilities in their tenant. And we will introduce you to the Secure Score tool, which can help organizations understand their security profile and what they can do to identify risks and vulnerabilities within their tenant.

This course is designed to get you started as quickly as possible. There are a variety of self-paced learning activities. You will get:
  • Video lectures on each topic explaining each concept thoroughly with examples (and Demonstrations where applicable)
  • Review questions (quizz) at the end of each section
  • Hands-on Lab at the end of the course in which you will practice at your own pace. You will have a step by step instruction file available to complete the Lab tasks like: creating Safe Links and Safe Attachments policies, using the Secure Score and much more.
  • Final Exam at the end of the course - review questions to test your knowledge on the topics and concepts learned in the course
  • Links to official Microsoft resources/blogs/videos for further documentation.
This course is the 5th course from a series of 9 courses which address all aspects to become a Microsoft Cyber Security Professional . This cyber security track is designed to teach you, or fill in the knowledge gaps, all the aspects and technologies to become a successful cyber security professional. The entire track addresses mostly Microsoft security technologies, including the latest cloud services made available by Microsoft like: Microsoft Defender Suite, Office 365 security features and services, Microsoft Graph, Azure Active Directory Security and many more.
Microsoft, Windows, Microsoft 365 and Microsoft Azure are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. This course is not certified, accredited, affiliated with, nor endorsed by Microsoft Corporation.

Who this course is for:​

  • Security Administrators, Security Analysts, System Administrator
  • Any IT enthusiast who wnts to get started in cyber security and be confortable with the Microsoft Security services and capabilities
Author
TUTProfessor
Downloads
6
Views
570
First release
Last update
Rating
0.00 star(s) 0 ratings

More resources from TUTProfessor