Windows Server Management and Security
This course is part of Computer Security and Systems Management Specialization
Instructor: Greg Williams
Skills you'll gain
There are 5 modules in this course
This course is the second course in the System Management and Security Specialization focusing on enterprise system management. The first week of this course provides an overview of how Windows operates in an enterprise environment and what it may look like in the real world. Week 2 of the course will show you how Windows users interact with the system. At the end of Week 2, you will be able to demonstrate how Windows authentication works at the end of Week 2. Week 3 will explore authorization in a Windows environment. At the end of Week 3, you will be able to differentiate between different authorization mechanisms and use different technologies to secure data within the environment. Week 4 explores built in security features of Windows and demonstrates how to use each technology effectively and in what circumstances you would use what technology for what purpose. At the end of week 4, you will be able to determine which technology is the best technology to use to secure certain portions of the Windows operating system.
Users and authentication in a Windows environment
Users and authorization in a Windows environment
Securing Windows in the enterprise
Course Project - Kerberos
Explore more from Security
©2025 ementorhub.com. All rights reserved