1. Home
  2. Training Library
  3. Microsoft 365
  4. Microsoft 365 Courses
  5. Introduction to Security in Microsoft 365

Introduction to Security in Microsoft 365

Introduction
Overview
Difficulty
Beginner
Duration
33m
Students
226
Ratings
4.8/5
starstarstarstarstar-half
Description

In this course, we take an introductory look at the security tools within Microsoft 365.

Learning Objectives

  • Explain what a Zero Trust Policy is and what value it can have.
  • Explain identity and access management concepts.
  • Explain threat and information protection in Microsoft 365.
  • Understand the different tools and portals available to you in Microsoft 365 security offerings.

Intended Audience

  • Users who are new to Microsoft 365.
  • Users looking to learn about the security offerings Microsoft 365 has to offer.

Prerequisites

An understanding of general technical concepts.

Transcript

Hello. And welcome to introduction to Microsoft 365 Security. My name is Lee Mucciarone  and I'm a Microsoft 365 content creator for Cloud Academy. I have four years of IT experience working with Microsoft, and two years of specialized experience as a customer training specialist training users on Microsoft Tools. Perhaps the biggest threat to companies nowadays is their own internal users not properly understanding security rules and protocols given certain situations. 

Improperly classifying documents, sharing of documents, or even accessing sensitive data through an unprotected avenue are all potential security risks that might arise at some point in a company's lifetime. The power of Microsoft 365 is the breadth of tools it provides to ensure your company's data is kept safe. These tools can be something as simple as assigning sensitivity labels to documents or something as robust as the entire Microsoft security and compliance center, which many of these security settings can be found. 

I'm going to take you through an introductory look into the security in Microsoft 365 to give you a better understanding of how M365 keeps businesses safe. By the end of this course, you should be able to: explain what the zero trust policy is and what value it can have, explain identity and access management concepts, explain threat and information protection  in Microsoft 365, and understand the different tools and portals available to you.

 

About the Author
Students
1962
Courses
11
Learning Paths
3

Lee has spent most of his professional career learning as much as he could about PC hardware and software while working as a PC technician with Microsoft. Once covid hit, he moved into a customer training role with the goal to get as many people prepared for remote work as possible using Microsoft 365. Being both Microsoft 365 certified and a self-proclaimed Microsoft Teams expert, Lee continues to expand his knowledge by working through the wide range of Microsoft certifications.