About this Course
4.6
123 ratings
28 reviews
100% online

100% online

Start instantly and learn at your own schedule.
Flexible deadlines

Flexible deadlines

Reset deadlines in accordance to your schedule.
Beginner Level

Beginner Level

Hours to complete

Approx. 11 hours to complete

Suggested: 5 hours/week...
Available languages

English

Subtitles: English

Skills you will gain

SubnetworkCybersecurityInformation Security (INFOSEC)Enterprise System
100% online

100% online

Start instantly and learn at your own schedule.
Flexible deadlines

Flexible deadlines

Reset deadlines in accordance to your schedule.
Beginner Level

Beginner Level

Hours to complete

Approx. 11 hours to complete

Suggested: 5 hours/week...
Available languages

English

Subtitles: English

Syllabus - What you will learn from this course

Week
1
Hours to complete
3 hours to complete

It's not that different from my home computer is it? Why home computing doesn't map to enterprise computing

Welcome and Introduction to Enterprise System Management and Security...
Reading
7 videos (Total 54 min), 4 readings, 1 quiz
Video7 videos
About the Instructor9m
Don't I just trust what Apple, Microsoft, and the other guys tell me?7m
What is Personal Computing?6m
What is Enterprise Computing?11m
What Roles are there in System Management?6m
What is Going to Prepare Me for Practical System Management?7m
Reading4 readings
Welcome!10m
About this course10m
Resources for building your own test environment30m
Lecture Slides10m
Quiz1 practice exercise
Personal and Enterprise Computing30m
Week
2
Hours to complete
3 hours to complete

Doesn't everything work on wireless? An introduction to enterprise networking

This module discusses network and why we need to learn network as part of system management overall....
Reading
2 videos (Total 18 min), 5 readings, 2 quizzes
Video2 videos
OSI Model8m
Reading5 readings
Addressing10m
Subnetting10m
Network Addressing and Subnetting Explained from Ciscos
OSI Model Breakdown links10m
Lecture Slides10m
Quiz2 practice exercises
Addressing and Sub-netting Practice20m
Networking30m
Week
3
Hours to complete
2 hours to complete

What is virtualization

This module covers the fundamentals of virtualization and how we use virtualization in the enterprise to perform work....
Reading
4 videos (Total 32 min), 2 readings, 1 quiz
Video4 videos
Types of Virtualization9m
When to use and not use virtualization7m
Your Computer vs. an Enterprise System8m
Reading2 readings
Lecture Slides10m
Overview of Virtualization from VMware30m
Quiz1 practice exercise
Virtualization30m
Week
4
Hours to complete
2 hours to complete

Isn't my computer already protected? Good system management starts with knowing security

...
Reading
4 videos (Total 33 min), 4 readings, 1 quiz
Video4 videos
What is a secure computer?5m
Risk in System Management11m
Confidentiality, Integrity and Availability9m
Reading4 readings
FIPS 19910m
TED Talk20m
Lecture Slides10m
Confidentiality and data breaches10m
Quiz1 practice exercise
Information Security30m
4.6
28 ReviewsChevron Right
Career Benefit

20%

got a tangible career benefit from this course
Career promotion

20%

got a pay increase or promotion

Top Reviews

By SDNov 4th 2018

Perfect packed course, to help IT and None IT individuals understand the methods, and need for efficient Enterprise System Management and Security.

By NLMay 18th 2018

Good general course. Make sure you read up on some terminology. I currently work in the field to freshen up on my skills.

Instructor

Avatar

Greg Williams

Lecturer
Department of Computer Science

About University of Colorado System

The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond....

About the Computer Security and Systems Management Specialization

The Computer Security and Systems Management Specialization focuses on computing in an enterprise environment. Combining both theory and real world experience and architecture, the courses will prepare you to design and audit secure enterprise systems. The courses will cover practical use of major server operating systems in an enterprise environment and how to design and operate them securely....
Computer Security and Systems Management

Frequently Asked Questions

  • Once you enroll for a Certificate, you’ll have access to all videos, quizzes, and programming assignments (if applicable). Peer review assignments can only be submitted and reviewed once your session has begun. If you choose to explore the course without purchasing, you may not be able to access certain assignments.

  • When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.

More questions? Visit the Learner Help Center.