Greg Williams

Greg has taught the past 5 years in the Department of Computer Science at the University of Colorado Colorado Springs focusing primarily on cyber security. His full time position is within the Office of Information Technology as the Director of Operations, overseeing all network, infrastructure, and telecommunication functions for the university. He has previously been the Information Security Officer and HIPAA Security Officer for university.
More info here.

Sort options

Planning, Auditing and Maintaining Enterprise Systems (Coursera)

Good system management not only requires managing the systems themselves, but requires careful planning to make systems interact with each other, auditing of the systems once the systems are built, and proactive maintenance of all systems. Organizations also rely on organizational policies, such as Acceptable Use Policies to bolster [...]
10
Average: 10 ( 3 votes )

Linux Server Management and Security (Coursera)

Whether you are accessing a bank website, Netflix or your home router, chances are that your computer is interacting with a Linux system. The world runs on Linux. In this course, we will dive into how Linux works from an enterprise perspective. In week 1 we will [...]
10
Average: 10 ( 3 votes )

Advanced System Security Topics (Coursera)

In this MOOC, we learn RBAC and ABAC access control to facilitate the specification and management of access policies. We learn examples of how RBAC is supported by modern systems such as Docker and AWS IAM. We learn XACML 3.0 and an ABAC implementation for controling secure access [...]
0
No votes yet

Proactive Computer Security (Coursera)

I’ve heard this before – “I’m not sure my computer security practices are working”. I reply “Have you tested them?” This course is the fourth and final course in the Practical Computer Security specialization. In this course, you’ll learn how to proactively test what you [...]
0
No votes yet

Detecting and Mitigating Cyber Threats and Attacks (Coursera)

Computer attacks and data breaches are inevitable. It seems like every day a data breach occurs and the victims of the data breach suffer. Their information is stolen or posted online. The company’s or businesses who had the breach go on, learn a little from the [...]
0
No votes yet

Cyber Threats and Attack Vectors (Coursera)

Data breaches occur nearly every day. From very large retailers, down to your fantasy football website, and anywhere in between, they have been compromised in some way. How did the attackers get in? What did they do with the data they compromised? What should I [...]
10
Average: 10 ( 3 votes )

Introduction to Cybersecurity for Business (Coursera)

The world runs computers. From small to large businesses, from the CEO down to level 1 support staff, everyone uses computers. This course is designed to give you a practical perspective on computer security. This course approaches computer security in a way that anyone can understand. [...]
10
Average: 10 ( 3 votes )

Windows Server Management and Security (Coursera)

Microsoft Windows has been at the forefront of enterprise computing for several decades. What most office workers see is the desktop side – such as Windows 7, 8 or 10. This course explores what it takes to design and build the server side of Windows in an [...]
0
No votes yet

Security and Privacy in TOR Network (Coursera)

In this MOOC, we will learn about TOR basic concept and see how they protect the security and privacy of users and resist censorship. We will examine how TOR realize the anonymity and utilize its service by downloading and using Tor browser software. A recent attack on TOR’s application [...]
0
No votes yet