Microsoft Windows has been at the forefront of enterprise computing for several decades. What most office workers see is the desktop side – such as Windows 7, 8 or 10. This course explores what it takes to design and build the server side of Windows in an enterprise environment. This course will explore everything from Windows Server installation to configuring users, to hardening the server operating system itself.
This course is the second course in the System Management and Security Specialization focusing on enterprise system management. The first week of this course provides an overview of how Windows operates in an enterprise environment and what it may look like in the real world. Week 2 of the course will show you how Windows users interact with the system. At the end of Week 2, you will be able to demonstrate how Windows authentication works at the end of Week 2. Week 3 will explore authorization in a Windows environment. At the end of Week 3, you will be able to differentiate between different authorization mechanisms and use different technologies to secure data within the environment. Week 4 explores built in security features of Windows and demonstrates how to use each technology effectively and in what circumstances you would use what technology for what purpose. At the end of week 4, you will be able to determine which technology is the best technology to use to secure certain portions of the Windows operating system.
Who is this class for: This course is for anyone who is interested in becoming a Windows system administrator and understand what it takes to operate Windows systems on an enterprise level. At the end of the course you will be able to use your knowledge and skills to assess how Windows fits into an enterprise environment and how best to use certain technologies to accomplish specific goals within a Windows environment.
Course 2 of 4 in the Computer Security and Systems Management Specialization
Introduction to practical Windows system management
In this module we’ll discuss how Windows is used in an enterprise setting.
Graded: Introduction to Windows
Users and authentication in a Windows environment
In this module we’ll discuss how users are created, grouped and managed in an enterprise environment.
Graded: Users and Authentication
Users and authorization in a Windows environment
This module looks at users and authorization. Access control is discussed in conjunction with rights and privileges.
Graded: Users and authorization
Securing Windows in the enterprise
Security within Windows is generally pretty good, however, windows needs to be configured in order to increase overall system security.
Graded: Windows Security
Course Project – Kerberos
Graded: Explaining Kerberos
ENROLL IN COURSE