Implementing Cloud App Security in Microsoft 365
Course info



Course info



Description
Microsoft 365 includes Cloud App Security (CAS) that is used to help with securing your cloud data. CAS provides configuration tools including CAS policies, and Connected Apps to provide access and protect your cloud data. In this course, Implementing Cloud App Security in Microsoft 365, you will learn foundational knowledge of/gain the ability to planning considerations for implementing, configuring, and monitoring CAS. First, you will learn the implementation of CAS. Next, you will discover how to configure CAS using policies and connected apps. Finally, you will explore how to third skill. When you’re finished with this course, you will have the skills and knowledge of monitor CAS using both alerts and logs needed to end product/overall skill.
Section Introduction Transcripts
Course Overview
Hello, everyone, my name is Brian Alderman and welcome to my course, Implementing Cloud App Security in Microsoft 365. I'm a Microsoft MVP, I'm an MCT, which is a Microsoft Certified Trainer, for 23 consecutive years. So quite a bit of training under my belt. I'm an author of four published Microsoft technology books. I speak at several SharePoint and Microsoft 365 conferences around the world, and I'm a trainer and consultant at my own company called MicroTechPoint. Microsoft 365 includes Cloud App Security, or CAS, as you'll see throughout the course, to help you secure your cloud data. It's important to plan for the implementation in CAS and understand the different components available to configure CAS; including CAS policies, and connected apps used to design a CAS solution. After implementing CAS, you'll want to monitor security breaches. CAS generates alerts to notify you of a security breach, and CAS also provides information in several logs that you can use to monitor security breaches to help you protect your users and data. In this course, we are going to introduce, explore, and discuss planning for Cloud App Security, configuring Cloud App Security, configuring connected apps, and monitoring CAS. By the end of this course, you'll know what needs to be carefully considered to successfully plan for implementing, configuring, and monitoring Cloud App Security as your users are accessing your cloud data. Before beginning this course, you should be familiar with your organization's planning policies, have a general understanding of the data security requirements in your organization, and be familiar with the type of data stored in the cloud. I hope you'll join me on this journey to learn about Cloud App Security with my implementing Cloud App Security in Microsoft 365 course, available here, at Pluralsight.