Windows Server Management and Security

Windows Server Management and Security course provide by university of colorado system

Beginner 0(0 Ratings) 0 Students enrolled
Created by University of Colorado System Staff Last updated Wed, 16-Mar-2022 English


Windows Server Management and Security free videos and free material uploaded by University of Colorado System Staff .

Syllabus / What will i learn?

Introduction to practical Windows system management

In this module we'll discuss how Windows is used in an enterprise setting

Users and authentication in a Windows environment

In this module we'll discuss how users are created, grouped and managed in an enterprise environment

Users and authorization in a Windows environment

This module looks at users and authorization Access control is discussed in conjunction with rights and privileges

Securing Windows in the enterprise

Security within Windows is generally pretty good, however, windows needs to be configured in order to increase overall system security

Course Project - Kerberos



Curriculum for this course
0 Lessons 00:00:00 Hours
+ View more
Description

Microsoft Windows has been at the forefront of enterprise computing for several decades What most office workers see is the desktop side – such as Windows 7, 8 or 10 This course explores what it takes to design and build the server side of Windows in an enterprise environment This course will explore everything from Windows Server installation to configuring users, to hardening the server operating system itself This course is the second course in the System Management and Security Specialization focusing on enterprise system management The first week of this course provides an overview of how Windows operates in an enterprise environment and what it may look like in the real world Week 2 of the course will show you how Windows users interact with the system At the end of Week 2, you will be able to demonstrate how Windows authentication works at the end of Week 2 Week 3 will explore authorization in a Windows environment At the end of Week 3, you will be able to differentiate between different authorization mechanisms and use different technologies to secure data within the environment Week 4 explores built in security features of Windows and demonstrates how to use each technology effectively and in what circumstances you would use what technology for what purpose At the end of week 4, you will be able to determine which technology is the best technology to use to secure certain portions of the Windows operating system

You need online training / explanation for this course?

1 to 1 Online Training contact instructor for demo :


+ View more

Other related courses
Updated Wed, 22-Apr-2020
Updated Wed, 24-Feb-2021
Updated Wed, 22-Apr-2020
Updated Thu, 30-Apr-2020
About the instructor
  • 0 Reviews
  • 0 Students
  • 132 Courses
Student feedback
0
Average rating
  • 0%
  • 0%
  • 0%
  • 0%
  • 0%
Reviews

Material price :

Free

1:1 Online Training Fee: 1 /-
Contact instructor for demo :