Pete describes how to continue your journey learning about Microsoft cybersecurity solutions.
- [Instructor] Congratulations,…you've reached the end of the course.…I strongly encourage you to explore…some of the additional reading in the course handout…as well as visit some of the other courses…in my Microsoft Cybersecurity Series…here on LinkedIn Learning.…If you liked the course or you have questions…feel free to connect with me on social media…on Twitter and LinkedIn.…
Author
Released
2/7/2019Skill Level Intermediate
Duration
Views
Related Courses
-
Introduction
-
Lab requirements41s
-
1. Intro to Shadow IT Threats and Strategy
-
What is shadow IT?2m 55s
-
-
2. Enabling and Enriching Cloud Discovery
-
CAS feature flyover8m 16s
-
-
3. Extending Control and Protection
-
Conclusion
-
Next steps21s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Next steps