Windows Server Management and Security
Microsoft Windows has been at the forefront of enterprise computing for several decades. What most office workers see is the desktop side – such as Windows 7, 8 or 10. This course explores what it takes to design and build the server side of Windows in an enterprise environment. This course will explore everything from Windows Server installation to configuring users, to hardening the server operating system itself.
This course is the second course in the System Management and Security Specialization focusing on enterprise system management. The first week of this course provides an overview of how Windows operates in an enterprise environment and what it may look like in the real world. Week 2 of the course will show you how Windows users interact with the system. At the end of Week 2, you will be able to demonstrate how Windows authentication works at the end of Week 2. Week 3 will explore authorization in a Windows environment. At the end of Week 3, you will be able to differentiate between different authorization mechanisms and use different technologies to secure data within the environment. Week 4 explores built in security features of Windows and demonstrates how to use each technology effectively and in what circumstances you would use what technology for what purpose. At the end of week 4, you will be able to determine which technology is the best technology to use to secure certain portions of the Windows operating system.
Introduction to practical Windows system management
-In this module we'll discuss how Windows is used in an enterprise setting.
Users and authentication in a Windows environment
-In this module we'll discuss how users are created, grouped and managed in an enterprise environment.
Users and authorization in a Windows environment
-This module looks at users and authorization. Access control is discussed in conjunction with rights and privileges.
Securing Windows in the enterprise
-Security within Windows is generally pretty good, however, windows needs to be configured in order to increase overall system security.
Course Project - Kerberos