1. To support our site, MoocLab may be compensated by some course providers through affiliate links.

Windows Server Management and Security

University of Colorado System via Coursera

  • Overview
  1. Coursera
    Overview
    Microsoft Windows has been at the forefront of enterprise computing for several decades. What most office workers see is the desktop side – such as Windows 7, 8 or 10. This course explores what it takes to design and build the server side of Windows in an enterprise environment. This course will explore everything from Windows Server installation to configuring users, to hardening the server operating system itself.
    This course is the second course in the System Management and Security Specialization focusing on enterprise system management. The first week of this course provides an overview of how Windows operates in an enterprise environment and what it may look like in the real world. Week 2 of the course will show you how Windows users interact with the system. At the end of Week 2, you will be able to demonstrate how Windows authentication works at the end of Week 2. Week 3 will explore authorization in a Windows environment. At the end of Week 3, you will be able to differentiate between different authorization mechanisms and use different technologies to secure data within the environment. Week 4 explores built in security features of Windows and demonstrates how to use each technology effectively and in what circumstances you would use what technology for what purpose. At the end of week 4, you will be able to determine which technology is the best technology to use to secure certain portions of the Windows operating system.

    Syllabus
    Introduction to practical Windows system management
    In this module we'll discuss how Windows is used in an enterprise setting.

    Users and authentication in a Windows environment
    In this module we'll discuss how users are created, grouped and managed in an enterprise environment.

    Users and authorization in a Windows environment
    This module looks at users and authorization. Access control is discussed in conjunction with rights and privileges.

    Securing Windows in the enterprise
    Security within Windows is generally pretty good, however, windows needs to be configured in order to increase overall system security.

    Course Project - Kerberos

    Taught by
    Greg Williams

Share This Page



  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice