Course

Computer Security and Systems Management

University of Colorado System

The Computer Security and Systems Management Specialization focuses on computing in an enterprise environment. Combining theory and real-world experience, it prepares you to design and audit secure enterprise systems. The specialization covers practical use of major server operating systems in an enterprise environment and how to operate them securely.

The course includes four modules:

  1. Enterprise System Management and Security
  2. Windows Server Management and Security
  3. Linux Server Management and Security
  4. Planning, Auditing, and Maintaining Enterprise Systems

Throughout the specialization, you will explore the differences between home and enterprise computing systems, understand the operation of Windows and Linux servers, learn to design and operate them securely, and delve into the planning, auditing, and maintenance of enterprise systems.

Certificate Available ✔

Get Started / More Info
Computer Security and Systems Management
Course Modules

The course modules cover enterprise system management and security, Windows server management and security, Linux server management and security, and planning, auditing, and maintaining enterprise systems.

Enterprise System Management and Security

The Enterprise System Management and Security module explores the differences between home and enterprise computing systems, enabling you to design your own home lab to explore enterprise operating systems. It's suitable for anyone interested in system administration or computer security.

Windows Server Management and Security

The Windows Server Management and Security module delves into the server side of Windows in an enterprise environment, covering installation, configuration, user management, and server operating system hardening. By the end of the course, you will be able to effectively secure different portions of the Windows operating system.

Linux Server Management and Security

The Linux Server Management and Security module provides insights into the use of Linux in the enterprise, covering configuration, authentication mechanisms, user controls, and system hardening. You will learn to secure Linux and differentiate access control methods for Linux applications.

Planning, Auditing and Maintaining Enterprise Systems

The Planning, Auditing, and Maintaining Enterprise Systems module focuses on the behind-the-scenes requirements of system management, including building security into the process, organizational policies, auditing, and proactive maintenance. By the end of the course, you will be able to design organizational policies, audit systems, and ensure technical adherence to requirements.

More Security Courses

Writing Secure Code in C++

Infosec

Writing Secure Code in C++ is a comprehensive program covering the intricacies of C/C++ languages and their impact on security. Learn to create secure programs using...

Integração e Cibersegurança entre os Sistemas de Informação

Fundação Instituto de Administração

Integração e Cibersegurança entre os Sistemas de Informação é um curso abrangente que explora a interconectividade dos sistemas de informação e os desafios...

Security Awareness Training

(ISC)²

Security Awareness Training provides comprehensive foundational security awareness training covering a wide array of topics for nearly every type of end-user and...

OS Security

Illinois Tech

OS Security course provides in-depth knowledge of securing Windows and Linux operating systems. Gain expertise in firewalls, operating system logs, and permissions....