EDUCBA
Data Center Security Management with Microsoft System Center

Offrez à votre carrière le cadeau de Coursera Plus avec $160 de réduction, facturé annuellement. Économisez aujourd’hui.

Ce cours n'est pas disponible en Français (France)

Nous sommes actuellement en train de le traduire dans plus de langues.
EDUCBA

Data Center Security Management with Microsoft System Center

EDUCBA

Instructeur : EDUCBA

Inclus avec Coursera Plus

Obtenez un aperçu d'un sujet et apprenez les principes fondamentaux.
niveau Débutant

Expérience recommandée

19 heures pour terminer
3 semaines à 6 heures par semaine
Planning flexible
Apprenez à votre propre rythme
Obtenez un aperçu d'un sujet et apprenez les principes fondamentaux.
niveau Débutant

Expérience recommandée

19 heures pour terminer
3 semaines à 6 heures par semaine
Planning flexible
Apprenez à votre propre rythme

Ce que vous apprendrez

  • Comprehensive understanding of data center security principles and regulatory compliance requirements

  • Proficiency in Microsoft System Center Suite functionalities for IT infrastructure management, including configuration and deployment

  • Skills in incident response, threat detection, compliance management, and integration of security into DevOps processes

Compétences que vous acquerrez

  • Catégorie : Microsoft system center suite
  • Catégorie : Cyber security principles
  • Catégorie : problem solving skills

Détails à connaître

Certificat partageable

Ajouter à votre profil LinkedIn

Récemment mis à jour !

mai 2024

Évaluations

60 devoirs

Enseigné en Anglais

Découvrez comment les employés des entreprises prestigieuses maîtrisent des compétences recherchées

Emplacement réservé
Emplacement réservé

Obtenez un certificat professionnel

Ajoutez cette qualification à votre profil LinkedIn ou à votre CV

Partagez-le sur les réseaux sociaux et dans votre évaluation de performance

Emplacement réservé

Il y a 12 modules dans ce cours

This module provides a comprehensive understanding of data center security management principles, focusing on Microsoft Security Management Systems. Participants will grasp the critical significance of data center security and learn to identify and classify common security threats that affect data centers. Additionally, the module covers regulatory and compliance requirements in data management, ensuring participants understand the legal frameworks governing data center security practices. By the end of the module, participants will be equipped with the knowledge and skills needed to effectively manage and secure data centers, mitigating risks and ensuring compliance with relevant regulations.

Inclus

15 vidéos2 lectures5 devoirs1 sujet de discussion

This module offers an in-depth exploration of the Microsoft System Center Suite, focusing on its functionalities and configuration. Participants will identify the various components of the suite and their roles within IT infrastructure management. Through practical examples and hands-on exercises, participants will explore the functionalities and applications of System Center Configuration Manager (SCCM) across different Microsoft technologies. Additionally, they will gain a solid understanding of System Center Operations Manager (SCOM), including its uses, features, and navigation principles. The module also covers System Center Virtual Machine Manager (SCVMM), illustrating its functionalities and providing insights into its uses and navigation.

Inclus

16 vidéos2 lectures5 devoirs1 sujet de discussion

This module delves into data center security policies and management using the Microsoft System Center Suite. Participants will grasp the types, key elements, components, and dimensions of data center security policies. They will explore configuring endpoint security policies in System Center Configuration Manager (SCCM), enhancing proficiency in security management within the system by understanding prerequisites and role configuration. Moreover, participants will identify monitoring security policies with System Center Operations Manager (SCOM), covering topics such as Group Managed Service Accounts (GMSA), rule types, and auditing. Finally, they will define audit and generate compliance reports using System Center Virtual Machine Manager (SCVMM), including configuring monitoring and utilizing the VMM fabric dashboard.

Inclus

19 vidéos1 lecture5 devoirs1 sujet de discussion

This module provides a comprehensive overview of security incident management and response processes. Participants will develop skills to identify and assess security incidents, gaining insights into the incident response framework and response management processes. They will explore the federated security response model, enhancing incident handling proficiency across diverse environments. Additionally, participants will delve into effective remediation strategies and best practices for operational security, resilience, continuity, and disaster recovery planning. By the end of the module, learners will be equipped with the knowledge and skills necessary for comprehensive incident response in dynamic security environments.

Inclus

7 vidéos4 devoirs1 sujet de discussion

This module provides foundational knowledge of security monitoring principles and techniques, emphasizing its critical importance in modern cybersecurity. Participants will develop skills in log management and analysis, understanding its role in effective threat detection and incident response. They will gain insight into Security Information and Event Management (SIEM) systems, learning about their principles, benefits, tools, features, and best implementation practices. Additionally, learners will define the fundamentals of threat intelligence, including types and indicators of compromise (IOC), enabling proactive threat detection and mitigation strategies. By the end of the module, participants will be equipped to implement robust security monitoring solutions for enhanced cybersecurity posture.

Inclus

10 vidéos5 devoirs1 sujet de discussion

This module provides an in-depth exploration of the security monitoring features and capabilities of System Center Operations Manager (SCOM). Participants will learn to proficiently utilize SCOM for effective threat detection and incident response by configuring security monitoring rules and alerts. They will explore various types of rules, including alert-based, collection-based, and command-based, to ensure comprehensive threat detection coverage. Additionally, learners will develop proficiency in analyzing security events and incidents within SCOM, enabling timely identification, investigation, and response to security threats. Moreover, participants will understand how SCOM integrates with various security tools and technologies, facilitating a comprehensive approach to security monitoring and management.

Inclus

8 vidéos6 devoirs1 sujet de discussion

This module offers a comprehensive understanding of endpoint security and network monitoring strategies. Participants will delve into the principles and functionalities of Endpoint Detection and Response (EDR) systems to effectively manage endpoint security. They will also explore Network Traffic Analysis (NTA) fundamentals, emphasizing proactive network security monitoring and threat detection. Additionally, learners will investigate behavioral analytics and anomaly detection techniques to enhance threat identification capabilities, understanding their processes, benefits, limitations, and potential failures. Moreover, participants will develop skills in threat hunting and incident investigation methodologies, enabling proactive security management and effective response to security incidents.

Inclus

12 vidéos5 devoirs1 sujet de discussion

This module provides a solid foundation in security architecture principles and domains, essential for designing robust security monitoring architectures. Participants will integrate continuous monitoring practices with threat intelligence, enhancing real-time threat detection and response capabilities. They will explore real-time incident response and mitigation techniques to ensure swift and effective actions in minimizing the impact of security incidents. Furthermore, participants will analyze a ransomware attack case study to derive valuable lessons, strengthening preparedness and response strategies against similar cybersecurity threats. Through theoretical concepts and practical exercises, learners will gain essential skills to design effective security architectures and respond effectively to security incidents.

Inclus

8 vidéos5 devoirs1 sujet de discussion

This module offers a comprehensive understanding of data center security compliance and standards, ensuring adherence and regulatory alignment. Participants will delve into the fundamentals of data center security compliance, exploring various standards and frameworks such as PCI DSS and HIPAA, understanding their requirements and implications. They will identify common compliance challenges in data centers and develop effective mitigation strategies to ensure regulatory adherence. Furthermore, participants will acquire skills to conduct compliance assessments and gap analyses, enabling effective regulatory compliance management. Through theoretical knowledge and practical exercises, learners will be equipped to navigate and implement robust compliance measures within data center environments.

Inclus

6 vidéos5 devoirs1 sujet de discussion

This module provides a comprehensive understanding of SCCM compliance management, focusing on its features and functionalities. Participants will learn to configure and deploy compliance baselines in SCCM, ensuring regulatory adherence. They will explore implementing compliance remediation strategies within SCCM to address non-compliant issues effectively. Additionally, participants will understand the process of compliance reporting and documentation within SCCM, ensuring accurate tracking and documentation of compliance status. Through practical exercises and theoretical knowledge, learners will gain proficiency in managing compliance within SCCM, enabling them to maintain regulatory compliance and mitigate security risks effectively.

Inclus

6 vidéos5 devoirs1 sujet de discussion

This module provides a comprehensive exploration of audit readiness plans to ensure organizational preparedness for audits, covering policies, procedures, and documentation strategies. Participants will gain skills to conduct thorough internal security audits, including assessment methodologies, risk identification, and compliance evaluation processes. They will learn to respond to audit findings and implement remediation actions effectively to address identified security gaps and ensure compliance. Additionally, participants will understand the importance of continuous audit monitoring and improvement, learning techniques to enhance audit processes and maintain compliance standards. Through practical exercises and theoretical knowledge, learners will develop proficiency in audit preparedness and compliance management.

Inclus

5 vidéos5 devoirs1 sujet de discussion

This module provides an in-depth exploration of automation and DevSecOps principles, emphasizing their significance in enhancing efficiency and security in development processes. Participants will learn to seamlessly integrate security into DevOps processes, prioritizing and implementing security measures throughout the development lifecycle. They will understand the implementation of continuous compliance and security testing methodologies to ensure ongoing adherence to regulatory standards and security protocols. Additionally, participants will explore best practices for integrating security into the software development lifecycle, enhancing resilience against cybersecurity threats. Through practical exercises and theoretical knowledge, learners will develop proficiency in DevSecOps integration and security-enhanced development practices.

Inclus

10 vidéos5 devoirs1 sujet de discussion

Instructeur

EDUCBA
EDUCBA
48 Cours47 076 apprenants

Offert par

EDUCBA

Recommandé si vous êtes intéressé(e) par Data Management

Pour quelles raisons les étudiants sur Coursera nous choisissent-ils pour leur carrière ?

Felipe M.
Étudiant(e) depuis 2018
’Pouvoir suivre des cours à mon rythme à été une expérience extraordinaire. Je peux apprendre chaque fois que mon emploi du temps me le permet et en fonction de mon humeur.’
Jennifer J.
Étudiant(e) depuis 2020
’J'ai directement appliqué les concepts et les compétences que j'ai appris de mes cours à un nouveau projet passionnant au travail.’
Larry W.
Étudiant(e) depuis 2021
’Lorsque j'ai besoin de cours sur des sujets que mon université ne propose pas, Coursera est l'un des meilleurs endroits où se rendre.’
Chaitanya A.
’Apprendre, ce n'est pas seulement s'améliorer dans son travail : c'est bien plus que cela. Coursera me permet d'apprendre sans limites.’
Emplacement réservé

Ouvrez de nouvelles portes avec Coursera Plus

Accès illimité à plus de 7 000 cours de renommée internationale, à des projets pratiques et à des programmes de certificats reconnus sur le marché du travail, tous inclus dans votre abonnement

Faites progresser votre carrière avec un diplôme en ligne

Obtenez un diplôme auprès d’universités de renommée mondiale - 100 % en ligne

Rejoignez plus de 3 400 entreprises mondiales qui ont choisi Coursera pour les affaires

Améliorez les compétences de vos employés pour exceller dans l’économie numérique

Foire Aux Questions