Configuring and Managing Office 365 Security

In this course, you'll learn how to configure and manage the security features of Microsoft Office 365 and Azure Active Directory to protect your organization's identities, endpoints, and information in the cloud.
Course info
Rating
(57)
Level
Intermediate
Updated
May 8, 2018
Duration
6h 24m
Table of contents
Course Overview
Course Introduction
Protecting Office 365 Mailboxes with Exchange Online Protection
Protecting Office 365 Services with Advanced Threat Protection
Protecting Endpoints with Windows Defender Advanced Threat Protection
Securing User and Admin Access with Identity Protection in Office 365
Protecting Corporate Data with Information Protection in Office 365
Detecting Intrusions with Azure Advanced Threat Protection (ATP)
Investigating and Responding to Office 365 Security Events
Course Wrap Up
Description
Course info
Rating
(57)
Level
Intermediate
Updated
May 8, 2018
Duration
6h 24m
Description

Moving applications and data to the cloud presents new security challenges for organizations that need a new approach to IT security. In this course, Configuring and Managing Office 365 Security, you will gain the ability to secure your Microsoft Office 365 cloud services and data from attackers. First, you will learn about the three pillars of modern IT security. Next, you will discover the Office 365 and Azure security features that secure your organization's identities, endpoints, and information. Finally, you will explore how to leverage your new skills to detect and respond to security incidents. When you’re finished with this course, you will have the skills and knowledge of Office 365 security needed to keep your organization safe in the cloud.

About the author
About the author

Paul Cunningham is a consultant, trainer and author, specializing in Office 365 and Exchange Server. Paul lives in Brisbane, Australia and has over 20 years of experience deploying and managing Microsoft systems and services for enterprise and government customers. Paul has authored and co-authored several books about Office 365 and Microsoft Exchange Server.

More from the author
More courses by Paul Cunningham
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hello everyone. My name is Paul Cunningham, and welcome to Configuring and Managing Office 365 Security. Security is one of the top concerns for organizations who are moving to the cloud, and it requires a whole new way of thinking about how you protect your business in a world of permanent connectivity, mobile workforces, and cloud-based productivity. Customers are surprised to find their old approach to securing IT doesn't fit the new cloud reality. In Office 365, Microsoft has made security a top priority, from their highly secure data centers to their secure development lifecycle for building and maintaining the cloud services you rely on, all the way to you, as the customer, providing you with the tools you need to secure your organization from modern threats. Now it's on to you to do the work. Securing your Office 365 applications and data requires you to take what Microsoft has provided and apply it to your unique requirements. And in this course, I'm going to show you how. We're going to look at a broad range of security features in Office 365 and how they each address the requirements to secure the 3 main pillars of security in modern IT: identities, devices, and information. At the end of this course, you'll understand how you can implement Office 365 security features to apply a layered, defense in depth strategy to reduce the risks that your organization faces in the cloud. This is Configuring and Managing Office 365 Security at Pluralsight. Now let's get started.