When you enroll in this course, you'll also be enrolled in this Specialization.
Learn new concepts from industry experts
Gain a foundational understanding of a subject or tool
Develop job-relevant skills with hands-on projects
Earn a shareable career certificate
There are 5 modules in this course
Microsoft Windows has been at the forefront of enterprise computing for several decades. What most office workers see is the desktop side – such as Windows 7, 8 or 10. This course explores what it takes to design and build the server side of Windows in an enterprise environment. This course will explore everything from Windows Server installation to configuring users, to hardening the server operating system itself.
This course is the second course in the System Management and Security Specialization focusing on enterprise system management. The first week of this course provides an overview of how Windows operates in an enterprise environment and what it may look like in the real world. Week 2 of the course will show you how Windows users interact with the system. At the end of Week 2, you will be able to demonstrate how Windows authentication works at the end of Week 2. Week 3 will explore authorization in a Windows environment. At the end of Week 3, you will be able to differentiate between different authorization mechanisms and use different technologies to secure data within the environment. Week 4 explores built in security features of Windows and demonstrates how to use each technology effectively and in what circumstances you would use what technology for what purpose. At the end of week 4, you will be able to determine which technology is the best technology to use to secure certain portions of the Windows operating system.
In this module we'll discuss how Windows is used in an enterprise setting.
What's included
5 videos6 readings1 assignment1 discussion prompt
Show info about module content
5 videos•Total 37 minutes
Welcome!•5 minutes
About the Instructor•9 minutes
Windows in the enterprise•7 minutes
Windows Server install•6 minutes
Networking in Windows•10 minutes
6 readings•Total 75 minutes
About This Course•10 minutes
Resources for building your own test environment•10 minutes
Get help and meet other learners in this course. Join your discussion forums!•5 minutes
Windows 2016 Homepage from Microsoft•10 minutes
Windows Server - Getting Started•30 minutes
Lecture Slides•10 minutes
1 assignment•Total 30 minutes
Introduction to Windows•30 minutes
1 discussion prompt•Total 15 minutes
Windows anyone?•15 minutes
Users and authentication in a Windows environment
Module 2•3 hours to complete
Module details
In this module we'll discuss how users are created, grouped and managed in an enterprise environment.
What's included
3 videos2 readings1 assignment1 discussion prompt
Show info about module content
3 videos•Total 29 minutes
Windows Logon process•5 minutes
Active Directory•15 minutes
Group Policy•8 minutes
2 readings•Total 90 minutes
Kerberos•30 minutes
Kerberos Explained•60 minutes
1 assignment•Total 30 minutes
Users and Authentication•30 minutes
1 discussion prompt•Total 10 minutes
How have you authenticated today?•10 minutes
Users and authorization in a Windows environment
Module 3•3 hours to complete
Module details
This module looks at users and authorization. Access control is discussed in conjunction with rights and privileges.
What's included
4 videos3 readings1 assignment
Show info about module content
4 videos•Total 28 minutes
What is authorization?•8 minutes
Rights and Permissions•7 minutes
Access Control•6 minutes
Managing users on an enterprise level•7 minutes
3 readings•Total 100 minutes
Windows Authorization Manager Model•45 minutes
What is RBAC?•45 minutes
Lecture Slides•10 minutes
1 assignment•Total 30 minutes
Users and authorization•30 minutes
Securing Windows in the enterprise
Module 4•2 hours to complete
Module details
Security within Windows is generally pretty good, however, windows needs to be configured in order to increase overall system security.
What's included
4 videos3 readings1 assignment
Show info about module content
4 videos•Total 34 minutes
Built in security controls•9 minutes
Restricting access to software and resources•11 minutes
Security considerations for Windows systems•8 minutes
Windows and Encryption•6 minutes
3 readings•Total 60 minutes
Windows Server Security Resources•30 minutes
AppLocker Explanation•20 minutes
Lecture Slides•10 minutes
1 assignment•Total 30 minutes
Windows Security•30 minutes
Course Project - Kerberos
Module 5•3 hours to complete
Module details
What's included
1 reading1 peer review
Show info about module content
1 reading•Total 60 minutes
Kerberos Explained- the MIT play•60 minutes
1 peer review•Total 120 minutes
Explaining Kerberos•120 minutes
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Instructor
Instructor ratings
Instructor ratings
We asked all learners to give feedback on our instructors based on the quality of their teaching style.
The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond.
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."
Learner reviews
4.7
678 reviews
5 stars
75.51%
4 stars
18.87%
3 stars
4.12%
2 stars
0.58%
1 star
0.88%
Showing 3 of 678
B
BI
5·
Reviewed on Jun 29, 2023
Tres bon cours! Surtout avec la présentation du protocole Kerberos.
J
JF
4·
Reviewed on Jan 16, 2019
the reliance on peer graded assignments means you could be waiting for days to finally receive the certificate
W
WB
5·
Reviewed on Nov 7, 2018
I'm very happy to finish this course. It was amazing to Manage the server through the tools kerberos for the strong security and Authentication. Thanks Coursera community.
When will I have access to the lectures and assignments?
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
What will I get if I subscribe to this Specialization?
When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Is financial aid available?
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.