Enterprise System Management and Security

Start Date: 07/05/2020

Course Type: Common Course

Course Link: https://www.coursera.org/learn/enterprise-system-management-security

About Course

The world runs on computers. Your watch, your TV, your car. You might be familiar on how to operate each of these. Your home computer you are even more familiar with operating it. But what does it take to really take computer systems to the next level? - The enterprise level. In this course we discuss what makes home computing systems different from enterprise computing systems. This course will also help you prepare and design your own home lab to explore enterprise operating systems. This course is for anyone who is exploring what it might take to have a job as a system administrator or for those who are already specialized in one area of system management and would like to move to another. This course may also be for those who are looking to understand how computer security plays an important role in system management. At the end of the course, you will also be able to illustrate how different enterprise technologies play role in computing at an enterprise level. You will also be able to discuss the three pillars of the CIA triad and how they apply to enterprise systems. While there is no technical and software component installs necessary for the completion of this course, supplemental how-to guides will be provided if you wish to follow along on the technical portion presented during the course.

Coursera Plus banner featuring three learners and university partner logos

Course Introduction

Enterprise System Management and Security This course is the third in a series on Business Continuity and Disaster Recovery. In the first course, you learned about the business continuity and disaster recovery concepts and techniques. In the second course, you were given an Enterprise Enrollment Module to complete. This course is the third in a series on Business Continuity and Disaster Recovery. In this course, you will continue your understanding of the continuity and disaster recovery concepts and techniques. You will continue your understanding of the Business Continuity and Disaster Relief (BCD) programs. You will also learn about the security needs and considerations of an organization. You will continue your understanding of the concepts and techniques for implementing the customer-supplied schedule and the mission critical schedule. This course is also part of the iMBA offered by the University of Illinois, a flexible, fully-accredited online MBA at an incredibly competitive price. For more information, please see the Resource page in this course and onlinemba.illinois.edu.Module 1: Business Continuity Module 2: Disaster Recovery and Business Continuity Management Module 3: Business Continuity and Disaster Recovery Management and Fundamentals of the Business Continuity System Module 4: Security Considerations Enterprise Fundamentals: Understanding Fundamentals Students of this course are in the process of learning what it is to be an entrepreneur, and what it

Course Tag

Subnetwork Cybersecurity Information Security (INFOSEC) Enterprise System

Related Wiki Topic

Article Example
Enterprise Volume Management System Enterprise Volume Management System (EVMS) is a flexible, integrated volume management software used to manage storage systems under Linux.
Identity management system Identity management (IdM) describes the management of individual identities, their authentication, authorization, roles and privileges within or across system and enterprise boundaries with the goal of increasing security and productivity while decreasing cost, downtime, and repetitive tasks.
Enterprise information security architecture However, as noted in the opening paragraph of this article it ideally relates more broadly to the practice of business optimization in that it addresses business security architecture, performance management and process security architecture as well. Enterprise Information Security Architecture is also related to IT security portfolio management and metadata in the enterprise IT sense.
Security In 2007 the International Organisation for Standardization (ISO) released ISO 28000 - Security Management Systems for the supply chain. Although the title supply chain is included, this Standard specifies the requirements for a security management system, including those aspects critical to security assurance for any organisation or enterprise wishing to manage the security of the organisation and its activities.
Enterprise information security architecture Enterprise information security architecture is a key component of the information security technology governance process at any organization of significant size. More and more companies are implementing a formal enterprise security architecture process to support the governance and management of IT.
Transportation management system A transportation management system (TMS) is a subset of supply chain management concerning transportation operations and may be part of an enterprise resource planning system.
Enterprise software Services provided by enterprise software are typically business-oriented tools such as online shopping and online payment processing, interactive product catalogue, automated billing systems, security, enterprise content management, IT service management, customer relationship management, enterprise resource planning, business intelligence, project management, collaboration, human resource management, manufacturing, occupational health and safety, enterprise application integration, and enterprise forms automation.
Security information and event management In the field of computer security, security information and event management (SIEM) software products and services combine security information management (SIM) and security event management (SEM). They provide real-time analysis of security alerts generated by network hardware and applications.
Component content management system The solution can be a separate system or be a functionality of another content management system type (for example, enterprise content management or web content management).
Security level management Security Level Management (SLM) comprises a quality assurance system for electronic information security.
D3 Security Management Systems D3 Security Management Systems, Inc., a privately held company headquartered in Vancouver, British Columbia, is a developer of software for security, governance, risk management, and compliance functions of organizations. The company operates as an enterprise on-site and software as a service provider with products designed for investigative case management, incident management, computer-assisted dispatch, security guard tour and security post orders. Through its partnerships, D3 Security Management Systems receives affiliate revenue from other cloud computing partners and value-added resellers for windows mobile devices.
Security level management Besides defining the specifications for engineering, introducing, operating, monitoring, maintaining and improving a documented information security management system, also defines the specifications for implementing suitable security mechanisms.
Information security operations center SOCs typically are based around a security information and event management (SIEM) system which aggregates and correlates data from security feeds such as network discovery and vulnerability assessment systems; governance, risk and compliance (GRC) systems; web site assessment and monitoring systems, application and database scanners; penetration testing tools; intrusion detection systems (IDS); intrusion prevention system (IPS); log management systems; network behavior analysis and Cyber threat intelligence; wireless intrusion prevention system; firewalls, enterprise antivirus and unified threat management (UTM). The SIEM technology creates a "single pane of glass" for the security analysts to monitor the enterprise.
Identity management system An identity management system refers to an information system, or to a set of technologies that can be used for enterprise or cross-network identity management
Enterprise project management In order to facilitate governance, it has become essential to be able to manage, monitor, and assess the status of all projects (and other assets, of course) in the enterprise, through a set of (preferably uniform) Enterprise Project Management processes, methods and application packages. Typically, organizations that adopt an Enterprise Project Management way of working, might set up a Project Management Office (PMO)/ Enterprise Project Management Office (EPMO), which is said to be more successful than a traditional PMO in addressing the priorities of the organization as its scope is enterprise-wide), might select and adopt a Project Management Methodology like PRINCE2, PMBOK (or create a proprietary method) or follow the concepts of IPMA Competence Baseline as a foundation for development and certification of project managers and their knowledge, experience and behaviour. They might even select and implement a software system to support Enterprise Project Management.
Enterprise information system Enterprise information systems provide a technology platform that enables organizations to integrate and coordinate their business processes on a robust foundation. An EIS is currently used in conjunction with customer relationship management and supply chain management to automate business processes. An enterprise information system provides a single system that is central to the organization that ensures information can be shared across all functional levels and management hierarchies.
Video management system A video management system, also known as video management software or a video management server, is a component of a security camera system that in general:
Enterprise information system A typical enterprise information system would be housed in one or more data centers, would run enterprise software, and could include applications that typically cross organizational borders such as content management systems.
Dhyan network management system Dhyan network management system (DNMS) is carrier grade network management system providing generic topology, fault, configuration, performance, and security (FCAPS) functions. It provides the major functions for deploying, monitoring, configuring and managing a network.
Physical security information management The function of security departments has traditionally been to secure people and buildings, and has been slow to absorb new technology, relying more on manned guards and physical barriers. As Enterprise Risk Management (ERM) evolves to address all security and legislative risks across all stakeholders, physical security departments have come under increased scrutiny.