By the
end of this module, you will be able to: Describe the Zero Trust approach to security in Microsoft 365 Describe the principles and components of the Zero Trust security model Describe the five steps to implementing a Zero Trust security model in your organization Explain Microsoft's story and strategy around Zero Trust networking |
Explore
security metrics in Microsoft 365 Introduction Examine the principles and components of the Zero Trust model Plan for a Zero Trust security model in your organization Examine Microsoft's strategy for Zero Trust networking Adopt a Zero Trust approach Knowledge check Summary |
30 min | |
Intermediate | |
English | |
Self-paced | |
- | |
- | |
- | |
- |