Coursera
Catálogo
  • Explorar
  • Buscar
  • For Enterprise
  • Inicia Sesión
  • Regístrarse

Enterprise System Management and Security

Un vistazoProgramaPreguntas FrecuentesCreadoresTarifaCalificaciones y revisiones

InicioTecnología de informaciónSeguridad

Enterprise System Management and Security

Sistema Universitario de Colorado

Acerca de este curso: The world runs on computers. Your watch, your TV, your car. You might be familiar on how to operate each of these. Your home computer you are even more familiar with operating it. But what does it take to really take computer systems to the next level? - The enterprise level. In this course we discuss what makes home computing systems different from enterprise computing systems. This course will also help you prepare and design your own home lab to explore enterprise operating systems. This course is for anyone who is exploring what it might take to have a job as a system administrator or for those who are already specialized in one area of system management and would like to move to another. This course may also be for those who are looking to understand how computer security plays an important role in system management. At the end of the course, you will also be able to illustrate how different enterprise technologies play role in computing at an enterprise level. You will also be able to discuss the three pillars of the CIA triad and how they apply to enterprise systems. While there is no technical and software component installs necessary for the completion of this course, supplemental how-to guides will be provided if you wish to follow along on the technical portion presented during the course.


Creada por:  Sistema Universitario de Colorado
Sistema Universitario de Colorado

  • Greg Williams

    Enseñado por:  Greg Williams, Lecturer

    Department of Computer Science
Información básica
Curso 1 de 4 en Computer Security and Systems Management Specialization
NivelBeginner
Idioma
English
Cómo aprobarAprueba todas las tareas calificadas para completar el curso.
Calificaciones del usuario
4.8 estrellas
Calificación promedio del usuario 4.8Ve los que los estudiantes dijeron
Programa
SEMANA 1
It's not that different from my home computer is it? Why home computing doesn't map to enterprise computing
Welcome and Introduction to Enterprise System Management and Security
7 videos, 4 readings
  1. Reading: Welcome!
  2. Reading: About this course
  3. Reading: Resources for building your own test environment
  4. Discussion Prompt: Why are you interested in this course?
  5. Vídeo: Introduction
  6. Vídeo: About the Instructor
  7. Vídeo: Don't I just trust what Apple, Microsoft, and the other guys tell me?
  8. Vídeo: What is Personal Computing?
  9. Vídeo: What is Enterprise Computing?
  10. Vídeo: What Roles are there in System Management?
  11. Vídeo: What is Going to Prepare Me for Practical System Management?
  12. Reading: Lecture Slides
Calificado: Personal and Enterprise Computing
SEMANA 2
Doesn't everything work on wireless? An introduction to enterprise networking
This module discusses network and why we need to learn network as part of system management overall.
2 videos, 5 readings, 1 practice quiz
  1. Vídeo: Why Do We Need to Learn Networking?
  2. Reading: Addressing
  3. Reading: Subnetting
  4. Reading: Network Addressing and Subnetting Explained from Cisco
  5. Vídeo: OSI Model
  6. Reading: OSI Model Breakdown links
  7. Reading: Lecture Slides
  8. Practice Quiz: Addressing and Sub-netting Practice
  9. Discussion Prompt: Everyday networking
Calificado: Networking
SEMANA 3
What is virtualization
This module covers the fundamentals of virtualization and how we use virtualization in the enterprise to perform work.
4 videos, 2 readings
  1. Vídeo: What is Virtualization?
  2. Vídeo: Types of Virtualization
  3. Vídeo: When to use and not use virtualization
  4. Vídeo: Your Computer vs. an Enterprise System
  5. Reading: Lecture Slides
  6. Discussion Prompt: Virtual Everything!
  7. Reading: Overview of Virtualization from VMware
Calificado: Virtualization
SEMANA 4
Isn't my computer already protected? Good system management starts with knowing security
4 videos, 4 readings
  1. Vídeo: Why information security in the first place?
  2. Reading: FIPS 199
  3. Vídeo: What is a secure computer?
  4. Vídeo: Risk in System Management
  5. Vídeo: Confidentiality, Integrity and Availability
  6. Reading: TED Talk
  7. Reading: Lecture Slides
  8. Discussion Prompt: This week in security news...
  9. Reading: Confidentiality and data breaches
Calificado: Information Security
SEMANA 5
Course Project - BYOD
This is the project for the course.
1 reading
  1. Reading: Suggested BYOD articles
Calificado: An assessment of Bring Your Own Device (BYOD)

Preguntas Frecuentes
Cómo funciona
Coursework
Coursework

Each course is like an interactive textbook, featuring pre-recorded videos, quizzes and projects.

Help from Your Peers
Help from Your Peers

Connect with thousands of other learners and debate ideas, discuss course material, and get help mastering concepts.

Certificates
Certificates

Earn official recognition for your work, and share your success with friends, colleagues, and employers.

Creadores
Sistema Universitario de Colorado
The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond.
Tarifa
Comprar curso
Accede a los materiales del curso

Disponible

Accede a los materiales con calificación

Disponible

Recibe una calificación final

Disponible

Obtén un Certificado de curso para compartir

Disponible

Calificaciones y revisiones
Calificado 4.8 de 5 39 calificaciones
Mohamed Koroma

Really nice.

Santosh Kumar Thakur

Great course.

Joel Almoradie

I encountered an issue in one of the questions of one of the quizzes. Sometimes, there seems to be an unclear line of thought in the explanations. I liked the tour of the facility in the beginning, I geeked out when I saw the equipment. I would have given this a 4.7 out of 5 (please fix this star rating system, Coursera).

M(

The course material is good. References are given nicely. Properly phased out over five weeks.



También te podría gustar
Sistema Universitario de Colorado
Detecting and Mitigating Cyber Threats and Attacks
1 course
Sistema Universitario de Colorado
Detecting and Mitigating Cyber Threats and Attacks
Ver curso
Sistema Universitario de Colorado
Proactive Computer Security
1 course
Sistema Universitario de Colorado
Proactive Computer Security
Ver curso
Sistema Universitario de Colorado
Cyber Threats and Attack Vectors
1 course
Sistema Universitario de Colorado
Cyber Threats and Attack Vectors
Ver curso
Sistema Universitario de Colorado
Cybersecurity Policy for Aviation and Internet Infrastructures
1 course
Sistema Universitario de Colorado
Cybersecurity Policy for Aviation and Internet Infrastructures
Ver curso
Sistema Universitario de Colorado
Homeland Security and Cybersecurity Future
1 course
Sistema Universitario de Colorado
Homeland Security and Cybersecurity Future
Ver curso
Coursera
Coursera brinda acceso universal a la mejor educación del mundo, al asociarse con las mejores universidades y organizaciones, para ofrecer cursos en línea.
© 2018 Coursera Inc. Todos los derechos reservados.
Descargar en la App StoreConsíguelo en Google Play
  • Coursera
  • Acerca de
  • Liderazgo
  • Empleo
  • Catálogo
  • Certificados
  • Grados
  • Para negocios
  • For Government
  • Comunidad
  • instituciones
  • Mentores
  • Traductores
  • Desarrolladores
  • Probador beta
  • Conectar
  • Blog
  • Facebook
  • LinkedIn
  • Twitter
  • Google+
  • Blog de Tecnología
  • Más
  • Términos
  • Privacidad
  • Ayuda
  • Accesibilidad
  • Prensa
  • Contacto
  • Directorio
  • Afiliados