Microsoft Cybersecurity Stack: Securing Enterprise Information

Posted By: Landau17
Microsoft Cybersecurity Stack: Securing Enterprise Information

Microsoft Cybersecurity Stack: Securing Enterprise Information
MP4 | Video: 720p | Duration: 1:45:49 | English | Subtitles: VTT | 277.3 MB

Today's users expect to be productive wherever they are, and on any device. As a result, IT pros must look beyond the traditional network perimeter model, and discover how to design and implement a comprehensive strategy for protecting corporate information. The Microsoft Cybersecurity Stack series helps to familiarize you with the Microsoft cybersecurity stack, and demonstrates how to configure its components to strengthen your organization's security posture.

In this course—the third installment in the series—Microsoft MVP Pete Zerger demonstrates how to leverage the Microsoft cybersecurity stack to more effectively protect corporate information—on any device and in any cloud. Pete explains how to use Azure Information Protection (AIP) to protect information, as well as how to secure data on mobile devices. Plus, he covers identifying and controlling shadow IT, securing structured data in Azure, and more.

Topics include:
  • Securing information on any device
  • What is Azure Information Protection (AIP)?
  • Configuring classification and labeling
  • Classifying and protecting data in bulk
  • Challenges of securing data on mobile devices
  • Data loss prevention (DLP) on mobile devices
  • Identifying and controlling shadow IT
  • Securing collaboration and DLP
  • Configuring dynamic data masking
  • Protecting Azure SQL with SQL Threat Detection