MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.
MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.
Week 2 of the course will show you how Windows users interact with the system. At the end of Week 2, you will be able to demonstrate how Windows authentication works at the end of Week 2. Week 3 will explore authorization in a Windows environment. At the end of Week 3, you will be able to differentiate between different authorization mechanisms and use different technologies to secure data within the environment. Week 4 explores built in security features of Windows and demonstrates how to use each technology effectively and in what circumstances you would use what technology for what purpose. At the end of week 4, you will be able to determine which technology is the best technology to use to secure certain portions of the Windows operating system.
Course 2 of 4 in the Computer Security and Systems Management Specialization
Syllabus
WEEK 1
Introduction to practical Windows system management
In this module we'll discuss how Windows is used in an enterprise setting.
WEEK 2
Users and authentication in a Windows environment
In this module we'll discuss how users are created, grouped and managed in an enterprise environment.
WEEK 3
Users and authorization in a Windows environment
This module looks at users and authorization. Access control is discussed in conjunction with rights and privileges.
WEEK 4
Securing Windows in the enterprise
Security within Windows is generally pretty good, however, windows needs to be configured in order to increase overall system security.
WEEK 5
Course Project - Kerberos
MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.
MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.