Tags
Language
Tags
May 2025
Su Mo Tu We Th Fr Sa
27 28 29 30 1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
SpicyMags.xyz

Lynda - Microsoft Cybersecurity Stack: Identity and Endpoint Protection Basics

Posted By: U.N.Owen
Lynda - Microsoft Cybersecurity Stack: Identity and Endpoint Protection Basics

Lynda - Microsoft Cybersecurity Stack: Identity and Endpoint Protection Basics
Size: 259 MB | Duration: 2h 5m | Video: AVC (.mp4) 1280x720 15&30fps | Audio: AAC 48KHz 2ch
Genre: eLearning | Level: Intermediate | Language: English

The traditional model of the network perimeter is dead. The perimeter—where access and authorization are enforced—can be anywhere, on any device. With the evolution of Microsoft Enterprise Mobility + Security (EMS) and Azure, the Microsoft enterprise cybersecurity story is growing increasingly more exciting. The Microsoft Cybersecurity Stack series of courses provides IT pros with a holistic view of the Microsoft cybersecurity stack, and how to configure those components to strengthen an organization's security posture. These hands-on courses demonstrate how to configure EMS and Azure features, and how to combine them for greatest effect. In this course—the first in the series—Microsoft MVP Pete Zerger takes you through the basics of setting up endpoint protection. He begins by explaining how to set up Azure Active Directory Premium. Next, he goes into enabling multi-factor authentication, followed by setting conditions for secure access. To wrap up, Pete covers managing mobile devices with Intune, and publishing applications with Azure AD App Proxy.

* Setting up Azure Active Directory for an organization
* Enabling user-level and application-level multi-factor authentication
* Setting conditions for secure access
* Planning a mobile device management (MDM) strategy
* How Intune (standalone) MDM works
* How Intune mobile application management works
* Publishing applications with Azure AD App Proxy
* Assigning users and groups


Lynda - Microsoft Cybersecurity Stack: Identity and Endpoint Protection Basics

No mirrors below please.