What you will find on the inside:
- Industry-standard security based on the CIS Critical Security Controls
- Guidance that applies to Microsoft 365 Business Premium and up
- Real-world, from-the-trenches advice about implementation
- Step-by-step guidance following screenshots
- Access to my OneNote checklist and Excel assessment tool
- Lifetime access to course updates
All of this is included with the course.
Course Instructor
Hi! I'm Alex Fields, a real human and the author of ITProMentor.com as well as the instructor for several courses here on SquareOne. I have been implementing Microsoft 365 security solutions in production for a long time. Skip some of the pain, and come learn from my mistakes.
Security for the SMB
Small and mid-sized businesses do not have the same budget to throw at cybersecurity initiatives as larger enterprise organizations, but that doesn't mean they don't need solid protection. Learn how to right-size security for the SMB pocketbook with Microsoft 365.
Modern Management
Microsoft 365 subscriptions can be used to manage endpoints without relying on traditional on-premises infrastructure such as Active Directory and Group Policy. Push software, configure endpoint security, and monitor devices from anywhere in the world.
CourseCurriculum
- README
- The purpose and goals of this course (0:43)
- Introduction to the CIS Critical Security Controls (5:29)
- Strategies for meeting the Basic CIS Controls (10:57)
- Strategies for meeting the Foundational CIS Controls (11:52)
- Strategies for meeting the Organizational CIS Controls (4:08)
- Microsoft 365 Licensing overview (13:35)
- Additional Course Resources
- How to use the OneNote checklist (2:34)
- Enabling the Unified Audit Log and Alert Policies (3:17)
- Email Authentication: SPF, DKIM & DMARC (12:58)
- Deploy the Report Message add-in (3:10)
- Exchange Online Protection Baseline (13:55)
- Office 365 Advanced Threat Protection Baseline (17:28)
- Preset Security Policies for EOP and Office 365 ATP (8:12)
- Simple Device Policies (6:23)
- Mobile Application Management (14:27)
- Device Compliance and Conditional Access (20:43)
- Device cleanup rules (1:29)
- Software Deployment (5:29)
- Manage OS Updates (5:13)
- Autopilot (7:48)
- Security Baseline for Microsoft Edge (9:16)
- Security Baseline for Windows 10 (8:20)
- Security Baseline Policies for Office apps (4:27)
- Endpoint protection vs. Endpoint security profiles (4:26)
- Endpoint Security Profiles: Antivirus (7:04)
- Endpoint Security Profiles: BitLocker Encryption (7:25)
- Endpoint Security Profiles: Firewall (3:36)
- Endpoint Security Profiles: Attack Surface Reduction (6:13)
- Endpoint Security Profiles: Account protection & Windows Hello (6:48)
- Controlling Removable Media (5:28)
- Configuring Automatic Screen Lock (4:23)
- Configuring OneDrive Client Backup (7:09)
Disclaimer
ITProMentor.com owners, authors and contributors assume no liability or responsibility for your work. Please independently confirm any content you consume online before executing any changes or implementing new products or services in your own environment.
Independently Operated
I am an independent consultant. Although I have been awarded Microsoft's Most Valuable Professional (MVP), the views expressed on this site do not reflect that of Microsoft. Rather, the opinions expressed are my own.