This comprehensive course equips learners with a deep understanding of modern security principles and practices within IT infrastructure management. Participants explore critical modules covering data center security, compliance management, incident response, and DevSecOps integration. Through theoretical knowledge and practical exercises, learners develop proficiency in designing, implementing, and managing secure IT infrastructures while ensuring regulatory compliance. By course completion, participants possess the skills and expertise necessary to secure, monitor, and maintain robust IT environments against evolving cybersecurity threats.

Data Center Security Management with Microsoft System Center
kurs ist nicht verfĂĽgbar in Deutsch (Deutschland)

54 Bewertungen
Empfohlene Erfahrung
Empfohlene Erfahrung
Stufe „Anfänger“
Basic understanding of IT infrastructure and security concepts; familiarity with Microsoft System Center Suite is beneficial.
54 Bewertungen
Empfohlene Erfahrung
Empfohlene Erfahrung
Stufe „Anfänger“
Basic understanding of IT infrastructure and security concepts; familiarity with Microsoft System Center Suite is beneficial.
Was Sie lernen werden
Comprehensive understanding of data center security principles and regulatory compliance requirements
Proficiency in Microsoft System Center Suite functionalities for IT infrastructure management, including configuration and deployment
Skills in incident response, threat detection, compliance management, and integration of security into DevOps processes
Kompetenzen, die Sie erwerben
- Kategorie: IT AutomationIT Automation
- Kategorie: Security ManagementSecurity Management
- Kategorie: Incident ResponseIncident Response
- Kategorie: Incident ManagementIncident Management
- Kategorie: IT Security ArchitectureIT Security Architecture
- Kategorie: Infrastructure SecurityInfrastructure Security
- Kategorie: Continuous MonitoringContinuous Monitoring
- Kategorie: DevOpsDevOps
- Kategorie: Payment Card Industry (PCI) Data Security StandardsPayment Card Industry (PCI) Data Security Standards
- Kategorie: Computer Security Incident ManagementComputer Security Incident Management
- Kategorie: System MonitoringSystem Monitoring
- Kategorie: Threat DetectionThreat Detection
- Kategorie: Data CentersData Centers
- Kategorie: Security TestingSecurity Testing
- Kategorie: System ConfigurationSystem Configuration
- Kategorie: Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
- Kategorie: IT InfrastructureIT Infrastructure
- Kategorie: DevSecOpsDevSecOps
- Kategorie: Data SecurityData Security
- Kategorie: Information Systems SecurityInformation Systems Security
Wichtige Details

Zu Ihrem LinkedIn-Profil hinzufĂĽgen
60 Aufgaben
Erfahren Sie, wie Mitarbeiter fĂĽhrender Unternehmen gefragte Kompetenzen erwerben.

In diesem Kurs gibt es 12 Module
This module provides a comprehensive understanding of data center security management principles, focusing on Microsoft Security Management Systems. Participants will grasp the critical significance of data center security and learn to identify and classify common security threats that affect data centers. Additionally, the module covers regulatory and compliance requirements in data management, ensuring participants understand the legal frameworks governing data center security practices. By the end of the module, participants will be equipped with the knowledge and skills needed to effectively manage and secure data centers, mitigating risks and ensuring compliance with relevant regulations.
Das ist alles enthalten
15 Videos2 LektĂĽren5 Aufgaben1 Diskussionsthema
15 Videos•Insgesamt 80 Minuten
- Course Introduction•2 Minuten
- Overview of Data Center Security Management Part 1•6 Minuten
- Overview of Data Center Security Management Part 2•5 Minuten
- Overview of Data Center Security Management Part 3•7 Minuten
- Introduction to Microsoft Security Management Systems Part 1•8 Minuten
- Introduction to Microsoft Security Management Systems Part 2•8 Minuten
- Importance of Data Center Security•4 Minuten
- Introduction to Microsoft Security Management Systems•4 Minuten
- What are Threats•8 Minuten
- Types of Threats in Data Center•5 Minuten
- What is Regulatory Compliances•4 Minuten
- Example of Regulatory Compliances•6 Minuten
- Importance of Regulatory Compliances•5 Minuten
- Challenges in Regulatory Compliances•4 Minuten
- How do Company Ensure Regulatory Compliances•3 Minuten
2 Lektüren•Insgesamt 15 Minuten
- Course Introduction - Welcome reading•10 Minuten
- Data Security Threats•5 Minuten
5 Aufgaben•Insgesamt 37 Minuten
- Overview of Data Center Security Management•3 Minuten
- Importance of Data Center Security•3 Minuten
- Common Security Threats in Data Centers•3 Minuten
- Regulatory and Compliance Considerations•3 Minuten
- Graded: Introduction to Data Center Security Management•25 Minuten
1 Diskussionsthema•Insgesamt 10 Minuten
- Discussion Prompt - Introduction to Data Center Security Management•10 Minuten
This module offers an in-depth exploration of the Microsoft System Center Suite, focusing on its functionalities and configuration. Participants will identify the various components of the suite and their roles within IT infrastructure management. Through practical examples and hands-on exercises, participants will explore the functionalities and applications of System Center Configuration Manager (SCCM) across different Microsoft technologies. Additionally, they will gain a solid understanding of System Center Operations Manager (SCOM), including its uses, features, and navigation principles. The module also covers System Center Virtual Machine Manager (SCVMM), illustrating its functionalities and providing insights into its uses and navigation.
Das ist alles enthalten
16 Videos2 LektĂĽren5 Aufgaben1 Diskussionsthema
16 Videos•Insgesamt 95 Minuten
- Introduction to Microsoft System Center Suite•7 Minuten
- System Center Capabilities•7 Minuten
- System Center Infrastructure and Provisioning•5 Minuten
- Introduction to SCCM•8 Minuten
- Configuration Manager with Different Microsoft Technologies Part 1•6 Minuten
- Configuration Manager with Different Microsoft Technologies Part 2•2 Minuten
- SCCM Consoles and Uses•6 Minuten
- Introduction to SCOM•5 Minuten
- Operation Manager Features and Capabilities•7 Minuten
- SCOm Consoles Part 1•6 Minuten
- SCOm Consoles Part 2•5 Minuten
- Introduction to SCVMM Part 1•7 Minuten
- Introduction to SCVMM Part 2•5 Minuten
- SCVMM Features and Capabilities•9 Minuten
- SCMM Consoles Part 1•6 Minuten
- SCMM Consoles Part 2•4 Minuten
2 Lektüren•Insgesamt 20 Minuten
- Uses of Configuration Manager•10 Minuten
- Uses of Virtual Machine Manager•10 Minuten
5 Aufgaben•Insgesamt 37 Minuten
- Introduction to Microsoft System Center Suite•3 Minuten
- System Center Configuration Manager (SCCM)•3 Minuten
- System Center Operations Manager (SCOM)•3 Minuten
- System Center Virtual Machine Manager (SCVMM)•3 Minuten
- Microsoft System Center Overview•25 Minuten
1 Diskussionsthema•Insgesamt 10 Minuten
- Discussion Prompt - Microsoft System Center Overview•10 Minuten
This module delves into data center security policies and management using the Microsoft System Center Suite. Participants will grasp the types, key elements, components, and dimensions of data center security policies. They will explore configuring endpoint security policies in System Center Configuration Manager (SCCM), enhancing proficiency in security management within the system by understanding prerequisites and role configuration. Moreover, participants will identify monitoring security policies with System Center Operations Manager (SCOM), covering topics such as Group Managed Service Accounts (GMSA), rule types, and auditing. Finally, they will define audit and generate compliance reports using System Center Virtual Machine Manager (SCVMM), including configuring monitoring and utilizing the VMM fabric dashboard.
Das ist alles enthalten
19 Videos1 LektĂĽre5 Aufgaben1 Diskussionsthema
19 Videos•Insgesamt 102 Minuten
- What are Data Center Security Policies•7 Minuten
- Types of Security Policies•2 Minuten
- 5 key Element of Security Policies•5 Minuten
- 7 Main Components of Security Awareness•6 Minuten
- 8 Dimension of Security Policy•5 Minuten
- Introduction to End-Point Security Policy Part 1•5 Minuten
- Introduction to End-Point Security Policy Part 2•6 Minuten
- Configure Endpoint Security Role in SCCM Part 1•7 Minuten
- Configure Endpoint Security Role in SCCM Part 2•6 Minuten
- Configure Endpoint Security Role in SCCM Part 3•6 Minuten
- Configure Endpoint Security Role in SCCM Part 4•6 Minuten
- Configure Endpoint Security Role in SCCM Part 5•4 Minuten
- Introduction to GMSA•8 Minuten
- Types of Rules in SCOM•4 Minuten
- Configuring Monitoring Reporting in SCVMM•4 Minuten
- SCVMM Compliance for PCI Auditing Evidences•5 Minuten
- VMM Fabric and Health Dashboard Part 1•6 Minuten
- VMM Fabric and Health Dashboard Part 2•6 Minuten
- VMM Fabric and Health Dashboard Part 3•4 Minuten
1 Lektüre•Insgesamt 10 Minuten
- End-point Security Policies Prerequisites•10 Minuten
5 Aufgaben•Insgesamt 37 Minuten
- Planning Security Policies•3 Minuten
- Configuring Security Policies in SCCM•3 Minuten
- Monitoring Security Policies with SCOM•3 Minuten
- Auditing and Compliance Reporting with SCVMM•3 Minuten
- Implementing Data Center Security Policies•25 Minuten
1 Diskussionsthema•Insgesamt 10 Minuten
- Discussion Prompt - Implementing Data Center Security Policies•10 Minuten
This module provides a comprehensive overview of security incident management and response processes. Participants will develop skills to identify and assess security incidents, gaining insights into the incident response framework and response management processes. They will explore the federated security response model, enhancing incident handling proficiency across diverse environments. Additionally, participants will delve into effective remediation strategies and best practices for operational security, resilience, continuity, and disaster recovery planning. By the end of the module, learners will be equipped with the knowledge and skills necessary for comprehensive incident response in dynamic security environments.
Das ist alles enthalten
7 Videos4 Aufgaben1 Diskussionsthema
7 Videos•Insgesamt 38 Minuten
- Security Incident Management Overview•5 Minuten
- Approach of Security Management Process•3 Minuten
- Response Management Process•6 Minuten
- Federated Security Response Model•5 Minuten
- Operation Security Best Practices•5 Minuten
- Resilience and Continuity Overview•6 Minuten
- Disaster Recovery Plan•7 Minuten
4 Aufgaben•Insgesamt 29 Minuten
- Identifying and Assessing Security Incidents•3 Minuten
- Incident Response Framework•3 Minuten
- Remediation Strategies and Best Practices•3 Minuten
- Security Incident Response and Remediation•20 Minuten
1 Diskussionsthema•Insgesamt 10 Minuten
- Discussion Prompt - Security Incident Response and Remediation•10 Minuten
This module provides foundational knowledge of security monitoring principles and techniques, emphasizing its critical importance in modern cybersecurity. Participants will develop skills in log management and analysis, understanding its role in effective threat detection and incident response. They will gain insight into Security Information and Event Management (SIEM) systems, learning about their principles, benefits, tools, features, and best implementation practices. Additionally, learners will define the fundamentals of threat intelligence, including types and indicators of compromise (IOC), enabling proactive threat detection and mitigation strategies. By the end of the module, participants will be equipped to implement robust security monitoring solutions for enhanced cybersecurity posture.
Das ist alles enthalten
10 Videos5 Aufgaben1 Diskussionsthema
10 Videos•Insgesamt 48 Minuten
- Introduction to Security Monitoring•4 Minuten
- Log Management and Analysis•5 Minuten
- Importance of Security Monitoring•4 Minuten
- "Introduction Security Information and Event Management (SIEM)"•3 Minuten
- Benefits of SIEM•4 Minuten
- Tools and Features of SIEM•3 Minuten
- SIEM Implementation Best Practices•8 Minuten
- Introduction to Threat Intelligence•4 Minuten
- Types of Threat Intelligence•6 Minuten
- Introduction to IOC•7 Minuten
5 Aufgaben•Insgesamt 32 Minuten
- Introduction to Security Monitoring•3 Minuten
- Log Management and Analysis•3 Minuten
- Security Information and Event Management (SIEM)•3 Minuten
- Threat Intelligence and Indicators of Compromise (IOC)•3 Minuten
- Security Monitoring Fundamentals•20 Minuten
1 Diskussionsthema•Insgesamt 10 Minuten
- Discussion Prompt - Security Monitoring Fundamentals•10 Minuten
This module provides an in-depth exploration of the security monitoring features and capabilities of System Center Operations Manager (SCOM). Participants will learn to proficiently utilize SCOM for effective threat detection and incident response by configuring security monitoring rules and alerts. They will explore various types of rules, including alert-based, collection-based, and command-based, to ensure comprehensive threat detection coverage. Additionally, learners will develop proficiency in analyzing security events and incidents within SCOM, enabling timely identification, investigation, and response to security threats. Moreover, participants will understand how SCOM integrates with various security tools and technologies, facilitating a comprehensive approach to security monitoring and management.
Das ist alles enthalten
8 Videos6 Aufgaben1 Diskussionsthema
8 Videos•Insgesamt 33 Minuten
- SCOM Security Monitoring Features and Capabilities•5 Minuten
- SCOM Features and Capabilities•3 Minuten
- Configure Security Rules Part 1•4 Minuten
- Configure Security Rules Part 2•5 Minuten
- Configuring Collection Based Rule•5 Minuten
- Configuring Command Based Rules•4 Minuten
- Analyzing Security Events and Incidents in SCOM•3 Minuten
- Integration with Other Security Tools and Technologies•3 Minuten
6 Aufgaben•Insgesamt 40 Minuten
- SCOM Security Monitoring Features and Capabilities•3 Minuten
- Configuring Security Monitoring Rules and Alerts•3 Minuten
- Configuring Security Monitoring Rules and Alerts•3 Minuten
- Analyzing Security Events and Incidents in SCOM•3 Minuten
- Integration with Other Security Tools and Technologies•3 Minuten
- Security Monitoring with System Center Operations Manager (SCOM)•25 Minuten
1 Diskussionsthema•Insgesamt 10 Minuten
- Discussion Prompt - Security Monitoring with System Center Operations Manager (SCOM)•10 Minuten
This module offers a comprehensive understanding of endpoint security and network monitoring strategies. Participants will delve into the principles and functionalities of Endpoint Detection and Response (EDR) systems to effectively manage endpoint security. They will also explore Network Traffic Analysis (NTA) fundamentals, emphasizing proactive network security monitoring and threat detection. Additionally, learners will investigate behavioral analytics and anomaly detection techniques to enhance threat identification capabilities, understanding their processes, benefits, limitations, and potential failures. Moreover, participants will develop skills in threat hunting and incident investigation methodologies, enabling proactive security management and effective response to security incidents.
Das ist alles enthalten
12 Videos5 Aufgaben1 Diskussionsthema
12 Videos•Insgesamt 48 Minuten
- Endpoint Detection and Response (EDR)•5 Minuten
- Introduction to NTA•3 Minuten
- Importance of NTA•5 Minuten
- Benefits of NTA•3 Minuten
- Introduction to Anomaly Detection•3 Minuten
- Anomaly Detection System Process•2 Minuten
- Benefits of Anomaly Detection•4 Minuten
- Anomaly Failures•3 Minuten
- Behavioral Analytics•7 Minuten
- Behavioral Kill Chain System and Limitation•5 Minuten
- Introduction of Threat Hunting•5 Minuten
- How Threat Hunting and Incident Investigation Works•2 Minuten
5 Aufgaben•Insgesamt 37 Minuten
- Endpoint Detection and Response (EDR)•3 Minuten
- Network Traffic Analysis (NTA)•3 Minuten
- Behavioral Analytics and Anomaly Detection•3 Minuten
- Threat Hunting and Incident Investigation Techniques•3 Minuten
- Advanced Threat Detection and Response•25 Minuten
1 Diskussionsthema•Insgesamt 10 Minuten
- Discussion Prompt - Advanced Threat Detection and Response•10 Minuten
This module provides a solid foundation in security architecture principles and domains, essential for designing robust security monitoring architectures. Participants will integrate continuous monitoring practices with threat intelligence, enhancing real-time threat detection and response capabilities. They will explore real-time incident response and mitigation techniques to ensure swift and effective actions in minimizing the impact of security incidents. Furthermore, participants will analyze a ransomware attack case study to derive valuable lessons, strengthening preparedness and response strategies against similar cybersecurity threats. Through theoretical concepts and practical exercises, learners will gain essential skills to design effective security architectures and respond effectively to security incidents.
Das ist alles enthalten
8 Videos5 Aufgaben1 Diskussionsthema
8 Videos•Insgesamt 41 Minuten
- 5 Principles of Security Architecture Design Part 1•4 Minuten
- 5 Principles of Security Architecture Design Part 2•5 Minuten
- Security Architecture Fundamentals•7 Minuten
- 7 Domains of Security Architecture•4 Minuten
- Continuous Monitoring•5 Minuten
- Threat Intelligence•5 Minuten
- Real-Time Incident Response and Mitigation•5 Minuten
- Case Study-– Detecting and Responding to a Ransomware Attack•7 Minuten
5 Aufgaben•Insgesamt 32 Minuten
- Security Monitoring Architecture Design•3 Minuten
- Continuous Monitoring and Threat Intelligence•3 Minuten
- Real-Time Incident Response and Mitigation•3 Minuten
- Case Study and Lesson Learned•3 Minuten
- Security Monitoring Best Practices and Case Studies•20 Minuten
1 Diskussionsthema•Insgesamt 10 Minuten
- Discussion Prompt - Security Monitoring Best Practices and Case Studies•10 Minuten
This module offers a comprehensive understanding of data center security compliance and standards, ensuring adherence and regulatory alignment. Participants will delve into the fundamentals of data center security compliance, exploring various standards and frameworks such as PCI DSS and HIPAA, understanding their requirements and implications. They will identify common compliance challenges in data centers and develop effective mitigation strategies to ensure regulatory adherence. Furthermore, participants will acquire skills to conduct compliance assessments and gap analyses, enabling effective regulatory compliance management. Through theoretical knowledge and practical exercises, learners will be equipped to navigate and implement robust compliance measures within data center environments.
Das ist alles enthalten
6 Videos5 Aufgaben1 Diskussionsthema
6 Videos•Insgesamt 30 Minuten
- Introduction to Data Center Security Compliance•3 Minuten
- Security Standards•4 Minuten
- Compliance Frameworks (e.g., PCI DSS, HIPAA)•7 Minuten
- Compliance Challenges in Data Centers•7 Minuten
- Compliance Assessment and Gap Analysis Part 1•5 Minuten
- Compliance Assessment and Gap Analysis Part 2•4 Minuten
5 Aufgaben•Insgesamt 32 Minuten
- Introduction to Data Center Security Compliance•3 Minuten
- Compliance Frameworks (e.g., PCI DSS, HIPAA)•3 Minuten
- Compliance Challenges in Data Centers•3 Minuten
- Compliance Assessment and Gap Analysis•3 Minuten
- Compliance Frameworks and Standards•20 Minuten
1 Diskussionsthema•Insgesamt 10 Minuten
- Discussion Prompt - Compliance Frameworks and Standards•10 Minuten
This module provides a comprehensive understanding of SCCM compliance management, focusing on its features and functionalities. Participants will learn to configure and deploy compliance baselines in SCCM, ensuring regulatory adherence. They will explore implementing compliance remediation strategies within SCCM to address non-compliant issues effectively. Additionally, participants will understand the process of compliance reporting and documentation within SCCM, ensuring accurate tracking and documentation of compliance status. Through practical exercises and theoretical knowledge, learners will gain proficiency in managing compliance within SCCM, enabling them to maintain regulatory compliance and mitigate security risks effectively.
Das ist alles enthalten
6 Videos5 Aufgaben1 Diskussionsthema
6 Videos•Insgesamt 28 Minuten
- Overview of SCCM Compliance Management•5 Minuten
- Configuring and Deploying Compliance Baselines (Theory)•3 Minuten
- Configuring and Deploying Compliance Baselines (Practical) Part 1•5 Minuten
- Configuring and Deploying Compliance Baselines (Practical) Part 2•4 Minuten
- Compliance Remediation Strategies•5 Minuten
- Compliance Reporting and Documentation•6 Minuten
5 Aufgaben•Insgesamt 37 Minuten
- Overview of SCCM Compliance Management•3 Minuten
- Configuring and Deploying Compliance Baselines•3 Minuten
- Compliance Remediation Strategies•3 Minuten
- Compliance Reporting and Documentation•3 Minuten
- Configuring Compliance Policies with System Center Configuration Manager (SCCM)•25 Minuten
1 Diskussionsthema•Insgesamt 10 Minuten
- Discussion Prompt - Configuring Compliance Policies with System Center Configuration Manager (SCCM)•10 Minuten
This module provides a comprehensive exploration of audit readiness plans to ensure organizational preparedness for audits, covering policies, procedures, and documentation strategies. Participants will gain skills to conduct thorough internal security audits, including assessment methodologies, risk identification, and compliance evaluation processes. They will learn to respond to audit findings and implement remediation actions effectively to address identified security gaps and ensure compliance. Additionally, participants will understand the importance of continuous audit monitoring and improvement, learning techniques to enhance audit processes and maintain compliance standards. Through practical exercises and theoretical knowledge, learners will develop proficiency in audit preparedness and compliance management.
Das ist alles enthalten
5 Videos5 Aufgaben1 Diskussionsthema
5 Videos•Insgesamt 23 Minuten
- Audit Readiness Planning•7 Minuten
- Conducting Internal Security Audits•3 Minuten
- Audit Response and Remediation•4 Minuten
- Continuous Audit Monitoring and Improvement Part 1•6 Minuten
- Continuous Audit Monitoring and Improvement Part 2•3 Minuten
5 Aufgaben•Insgesamt 32 Minuten
- Audit Readiness Planning•3 Minuten
- Conducting Internal Security Audits•3 Minuten
- Audit Response and Remediation•3 Minuten
- Continuous Audit Monitoring and Improvement•3 Minuten
- Audit Preparation and Management•20 Minuten
1 Diskussionsthema•Insgesamt 10 Minuten
- Discussion Prompt - Audit Preparation and Management•10 Minuten
This module provides an in-depth exploration of automation and DevSecOps principles, emphasizing their significance in enhancing efficiency and security in development processes. Participants will learn to seamlessly integrate security into DevOps processes, prioritizing and implementing security measures throughout the development lifecycle. They will understand the implementation of continuous compliance and security testing methodologies to ensure ongoing adherence to regulatory standards and security protocols. Additionally, participants will explore best practices for integrating security into the software development lifecycle, enhancing resilience against cybersecurity threats. Through practical exercises and theoretical knowledge, learners will develop proficiency in DevSecOps integration and security-enhanced development practices.
Das ist alles enthalten
10 Videos5 Aufgaben1 Diskussionsthema
10 Videos•Insgesamt 41 Minuten
- Introduction to Automation and DevSecOps Part 1•4 Minuten
- Introduction to Automation and DevSecOps Part 2•4 Minuten
- Integrating Security into DevOps Processes Part 1•3 Minuten
- Integrating Security into DevOps Processes Part 2•5 Minuten
- Implementing Continuous Compliance and Security Testing•3 Minuten
- Case Study-– Detecting and Responding to a Ransomware Attack•5 Minuten
- Secure Software Development Lifecycle (SDLC)-Part-1-Phases and Principles of SDLC•4 Minuten
- Secure Software Development Lifecycle (SDLC)-Part-2-Phases and Principles of SDLC•4 Minuten
- Secure Software Development Lifecycle (SDLC)-Part-3-Phases and Principles of SDLC•5 Minuten
- Secure Software Development Lifecycle (SDLC)-Part-4-Phases and Principles of SDLC•4 Minuten
5 Aufgaben•Insgesamt 37 Minuten
- Introduction to Automation and DevSecOps•3 Minuten
- Integrating Security into DevOps Processes•3 Minuten
- Implementing Continuous Compliance and Security•3 Minuten
- Secure Software Development Lifecycle (SDLC) Best Practices•3 Minuten
- Automation and DevSecOps in Data Center Security•25 Minuten
1 Diskussionsthema•Insgesamt 10 Minuten
- Discussion Prompt - Automation and DevSecOps in Data Center Security•10 Minuten
Dozent
Lehrkraftbewertungen
Wir haben alle Lernenden um Feedback zu unseren Dozenten gebeten, ausgehend von der Qualität ihres Unterrichtsstils.

von

von

Welcome to EDUCBA, a place where knowledge is limitless! We provide a wide selection of instructive and engaging programmes designed to empower students of all ages and experiences. From the convenience of your home, start a revolutionary educational experience with our cutting-edge technologies courses and experienced instructors.
Warum entscheiden sich Menschen fĂĽr Coursera fĂĽr ihre Karriere?

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.
Bewertungen von Lernenden
54 Bewertungen
- 5 stars
94,44Â %
- 4 stars
1,85Â %
- 3 stars
1,85Â %
- 2 stars
0Â %
- 1 star
1,85Â %
Zeigt 3 von 54 an
GeprĂĽft am 9. Mai 2025
I’ve worked in IT for over 10 years, but this was my first deep dive into Microsoft System Center. It’s an eye-opener and very well-structured.
GeprĂĽft am 24. Mai 2025
This training helped me prepare for a major audit at work. I applied what I learned directly to our compliance documentation.
GeprĂĽft am 1. Juni 2025
Super valuable course for anyone working in or transitioning into IT security roles. The modules build logically and don’t overwhelm.

Neue Karrieremöglichkeiten mit Coursera Plus
Unbegrenzter Zugang zu 10,000+ Weltklasse-Kursen, praktischen Projekten und berufsqualifizierenden Zertifikatsprogrammen - alles in Ihrem Abonnement enthalten
Bringen Sie Ihre Karriere mit einem Online-Abschluss voran.
Erwerben Sie einen Abschluss von erstklassigen Universitäten – 100 % online
SchlieĂźen Sie sich mehr als 3.400Â Unternehmen in aller Welt an, die sich fĂĽr Coursera for Business entschieden haben.
Schulen Sie Ihre Mitarbeiter*innen, um sich in der digitalen Wirtschaft zu behaupten.
Häufig gestellte Fragen
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
When you purchase a Certificate you get access to all course materials, including graded assignments. Upon completing the course, your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.
Weitere Fragen
Finanzielle UnterstĂĽtzung verfĂĽgbar,