Coursera
Explorar
  • Navegar
  • Pesquisar
  • For Enterprise
  • Entrar
  • Criar conta

Windows Server Management and Security

Visão geralProgramaPerguntas frequentesDesenvolvedoresCustoClassificações e avaliações

Página inicialTecnologia da informaçãoSegurança

Windows Server Management and Security

University of Colorado System

Informações sobre o curso: Microsoft Windows has been at the forefront of enterprise computing for several decades. What most office workers see is the desktop side – such as Windows 7, 8 or 10. This course explores what it takes to design and build the server side of Windows in an enterprise environment. This course will explore everything from Windows Server installation to configuring users, to hardening the server operating system itself. This course is the second course in the System Management and Security Specialization focusing on enterprise system management. The first week of this course provides an overview of how Windows operates in an enterprise environment and what it may look like in the real world. Week 2 of the course will show you how Windows users interact with the system. At the end of Week 2, you will be able to demonstrate how Windows authentication works at the end of Week 2. Week 3 will explore authorization in a Windows environment. At the end of Week 3, you will be able to differentiate between different authorization mechanisms and use different technologies to secure data within the environment. Week 4 explores built in security features of Windows and demonstrates how to use each technology effectively and in what circumstances you would use what technology for what purpose. At the end of week 4, you will be able to determine which technology is the best technology to use to secure certain portions of the Windows operating system.

Para quem é direcionado este curso: This course is for anyone who is interested in becoming a Windows system administrator and understand what it takes to operate Windows systems on an enterprise level. At the end of the course you will be able to use your knowledge and skills to assess how Windows fits into an enterprise environment and how best to use certain technologies to accomplish specific goals within a Windows environment.


Desenvolvido por:  University of Colorado System
University of Colorado System

  • Greg Williams

    Ministrado por:  Greg Williams, Lecturer

    Department of Computer Science
Informações básicas
Curso 2 de 4 no Computer Security and Systems Management Specialization
NívelBeginner
Idioma
English
Como ser aprovadoSeja aprovado em todas as tarefas para concluir o curso.
Classificação do usuário
4.8 estrelas
Classificação média do usuário 4.8Veja o que os aprendizes disseram
Programa
SEMANA 1
Introduction to practical Windows system management
In this module we'll discuss how Windows is used in an enterprise setting.
5 vídeos, 5 leituras
  1. Vídeo: Welcome!
  2. Reading: About This Course
  3. Reading: Resources for building your own test environment
  4. Vídeo: About the Instructor
  5. Reading: Windows 2016 Homepage from Microsoft
  6. Vídeo: Windows in the enterprise
  7. Vídeo: Windows Server install
  8. Reading: Windows Server - Getting Started
  9. Vídeo: Networking in Windows
  10. Discussion Prompt: Windows anyone?
  11. Reading: Lecture Slides
Nota atribuída: Introduction to Windows
SEMANA 2
Users and authentication in a Windows environment
In this module we'll discuss how users are created, grouped and managed in an enterprise environment.
3 vídeos, 2 leituras
  1. Vídeo: Windows Logon process
  2. Reading: Kerberos
  3. Reading: Kerberos Explained
  4. Vídeo: Active Directory
  5. Vídeo: Group Policy
  6. Discussion Prompt: How have you authenticated today?
Nota atribuída: Users and Authentication
SEMANA 3
Users and authorization in a Windows environment
This module looks at users and authorization. Access control is discussed in conjunction with rights and privileges.
4 vídeos, 3 leituras
  1. Vídeo: What is authorization?
  2. Vídeo: Rights and Permissions
  3. Vídeo: Access Control
  4. Vídeo: Managing users on an enterprise level
  5. Reading: Windows Authorization Manager Model
  6. Reading: What is RBAC?
  7. Reading: Lecture Slides
Nota atribuída: Users and authorization
SEMANA 4
Securing Windows in the enterprise
Security within Windows is generally pretty good, however, windows needs to be configured in order to increase overall system security.
4 vídeos, 3 leituras
  1. Vídeo: Built in security controls
  2. Reading: Windows Server 2016 Security Resources
  3. Vídeo: Restricting access to software and resources
  4. Reading: AppLocker Explanation
  5. Vídeo: Security considerations for Windows systems
  6. Vídeo: Windows and Encryption
  7. Reading: Lecture Slides
Nota atribuída: Windows Security
SEMANA 5
Course Project - Kerberos
1 leitura
  1. Reading: Kerberos Explained- the MIT play
Nota atribuída: Explaining Kerberos

Perguntas frequentes
Como funciona
Coursework
Coursework

Each course is like an interactive textbook, featuring pre-recorded videos, quizzes and projects.

Help from Your Peers
Help from Your Peers

Connect with thousands of other learners and debate ideas, discuss course material, and get help mastering concepts.

Certificates
Certificates

Earn official recognition for your work, and share your success with friends, colleagues, and employers.

Desenvolvedores
University of Colorado System
The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond.
Custo
Comprar curso
Acesso aos materiais do curso

Disponível

Acesso a materiais valendo nota

Disponível

Receba uma nota final

Disponível

Obtenha um Certificado de Curso compartilhável

Disponível

Classificações e avaliações
Avaliado em 4.8 de 5 decorrente de 27 avaliações
Yamid Amed Moreno

This course is so good, it made understand the importance o kerberos, i have heard about this protocol, but i did not know how important is , and did not how how it realy worked either. thanks for this course.

JA

love it

Joel Almoradie

Great course for those who need to learn about the role of key management and security elements found in Windows Server operating systems, or for those who need to validate what they know from experience.

Tunde Anthony Awopegba

I really enjoyed the teaching and the structure of the course. Well delivered.



Talvez você também goste de
University of Colorado System
Detecting and Mitigating Cyber Threats and Attacks
1 curso
University of Colorado System
Detecting and Mitigating Cyber Threats and Attacks
Visualizar curso
University of Colorado System
Proactive Computer Security
1 curso
University of Colorado System
Proactive Computer Security
Visualizar curso
University of Colorado System
Cyber Threats and Attack Vectors
1 curso
University of Colorado System
Cyber Threats and Attack Vectors
Visualizar curso
University of Colorado System
Cybersecurity Policy for Aviation and Internet Infrastructures
1 curso
University of Colorado System
Cybersecurity Policy for Aviation and Internet Infrastructures
Visualizar curso
New York University Tandon School of Engineering
Real-Time Cyber Threat Detection and Mitigation
1 curso
New York University Tandon School of Engineering
Real-Time Cyber Threat Detection and Mitigation
Visualizar curso
Coursera
O Coursera proporciona acesso universal à melhor educação do mundo fazendo parcerias com as melhores universidades e organizações para oferecer cursos on-line.
© 2018 Coursera Inc. Todos os direitos reservados.
Baixar na App StoreBaixar no Google Play
  • Coursera
  • Sobre
  • Liderança
  • Carreiras
  • Lista de cursos
  • Certificados
  • Notas
  • Para negócios
  • For Government
  • Comunidade
  • parceiros
  • Orientadores
  • Tradutores
  • Desenvolvedores
  • Testadores beta
  • Conectar
  • Blog
  • Facebook
  • LinkedIn
  • Twitter
  • Google+
  • Tech Blog
  • Mais
  • Termos
  • Privacidade
  • Ajuda
  • Acessibilidade
  • Imprensa
  • Contato
  • Diretório
  • Afiliados