In this course, you'll learn how to configure and manage the security features of Microsoft Office 365 and Azure Active Directory to protect your organization's identities, endpoints, and information in the cloud.
Moving applications and data to the cloud presents new security challenges for organizations that need a new approach to IT security. In this course, Configuring and Managing Office 365 Security, you will gain the ability to secure your Microsoft Office 365 cloud services and data from attackers. First, you will learn about the three pillars of modern IT security. Next, you will discover the Office 365 and Azure security features that secure your organization's identities, endpoints, and information. Finally, you will explore how to leverage your new skills to detect and respond to security incidents. When you’re finished with this course, you will have the skills and knowledge of Office 365 security needed to keep your organization safe in the cloud.
Paul Cunningham is a consultant, trainer and author, specializing in Office 365 and Exchange Server. Paul lives in Brisbane, Australia and has over 20 years of experience deploying and managing Microsoft systems and services for enterprise and government customers. Paul has authored and co-authored several books about Office 365 and Microsoft Exchange Server.
Course Overview Hello everyone. My name is Paul Cunningham, and welcome to Configuring and Managing Office 365 Security. Security is one of the top concerns for organizations who are moving to the cloud, and it requires a whole new way of thinking about how you protect your business in a world of permanent connectivity, mobile workforces, and cloud-based productivity. Customers are surprised to find their old approach to securing IT doesn't fit the new cloud reality. In Office 365, Microsoft has made security a top priority, from their highly secure data centers to their secure development lifecycle for building and maintaining the cloud services you rely on, all the way to you, as the customer, providing you with the tools you need to secure your organization from modern threats. Now it's on to you to do the work. Securing your Office 365 applications and data requires you to take what Microsoft has provided and apply it to your unique requirements. And in this course, I'm going to show you how. We're going to look at a broad range of security features in Office 365 and how they each address the requirements to secure the 3 main pillars of security in modern IT: identities, devices, and information. At the end of this course, you'll understand how you can implement Office 365 security features to apply a layered, defense in depth strategy to reduce the risks that your organization faces in the cloud. This is Configuring and Managing Office 365 Security at Pluralsight. Now let's get started.