Good system management not only requires managing the systems themselves, but requires careful planning to make systems interact with each other, auditing of the systems once the systems are built, and proactive maintenance of all systems. Organizations also rely on organizational policies, such as Acceptable Use Policies to bolster the technical aspect of system management.

Planning, Auditing and Maintaining Enterprise Systems

Planning, Auditing and Maintaining Enterprise Systems
This course is part of Computer Security and Systems Management Specialization

Instructor: Greg Williams
Access provided by VodafoneZiggo
13,391 already enrolled
233 reviews
Skills you'll gain
- Security Strategy
- Systems Administration
- Business Continuity Planning
- Continuous Monitoring
- Procedure Development
- Organizational Strategy
- IT Management
- Operating System Administration
- Contingency Planning
- Security Management
- Compliance Auditing
- Enterprise Security
- Disaster Recovery
- Cyber Security Policies
- System Monitoring
- Security Controls
- Incident Response
- Patch Management
- Governance
Tools you'll learn
Details to know

Add to your LinkedIn profile
See how employees at top companies are mastering in-demand skills

Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate

There are 5 modules in this course
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Instructor

Offered by
Why people choose Coursera for their career

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.
Learner reviews
- 5 stars
77.68%
- 4 stars
16.73%
- 3 stars
2.14%
- 2 stars
1.71%
- 1 star
1.71%
Showing 3 of 233
Reviewed on Jul 20, 2018
Good and very Educative content altogether. Learned a lot. Thanks to everyone that makes this possible.
Reviewed on Mar 7, 2019
I never had the chance to think about policies structure and how to write them. Thank you fr including this section in the IT management profile.
Reviewed on Dec 26, 2018
Very Useful in creating and managing the Information Security in an organization!
Explore more from Information Technology

University of Colorado System
¹ Some assignments in this course are AI-graded. For these assignments, your data will be used in accordance with Coursera's Privacy Notice.




