Featured resource
pluralsight tech forecast
2025 Tech Forecast

Which technologies will dominate in 2025? And what skills do you need to keep up?

Check it out
Hamburger Icon
  • Course
    • Libraries: If you want this course, consider one of these libraries.
    • Core Tech

Implementing and Managing Microsoft Defender for Cloud Apps

This course will teach you how to successfully plan, deploy, and manage Microsoft Defender for Cloud Apps. You'll gain the knowledge to successfully protect your organization from threats across your cloud services.

Rishalin Pillay - Pluralsight course - Implementing and Managing Microsoft Defender for Cloud Apps
by Rishalin Pillay

What you'll learn

In today’s modern world, organizations are making use of cloud services more than ever. With that, comes the challenge of security threats across cloud services. Being able to gain visibility into these threats is paramount in protecting your organization. In this course, Implementing and Managing Microsoft Defender for Cloud Apps, you’ll learn how to successfully protect your cloud services against threats. First, you'll learn how to plan and deploy Defender for Cloud Apps. Next, you’ll discover how to identify risk apps by performing cloud discovery. Finally, you’ll explore how to work with various controls to protect critical information and gain a good overview on the types of cloud threats that exist. When you’re finished with this course, you’ll have the skills and knowledge to successfully protect your organization against cybersecurity threats to your cloud services.

Table of contents

About the author

Rishalin Pillay - Pluralsight course - Implementing and Managing Microsoft Defender for Cloud Apps
Rishalin Pillay

Rishalin Pillay has over 12 years of cybersecurity experience and has acquired a vast amount of skills consulting for Fortune 500 companies while taking part in projects performing tasks in network security design, implementation, and vulnerability analysis. He holds many certifications that demonstrate his knowledge and expertise in the cybersecurity field. He is an author and content contributor to a number of books.

More Courses by Rishalin