Computer Security and Systems Management Specialization

Start Date: 09/15/2019

Course Type: Specialization Course

Course Link:

Explore 1600+ online courses from top universities. Join Coursera today to learn data science, programming, business strategy, and more.

About Course

The Computer Security and Systems Management Specialization focuses on computing in an enterprise environment. Combining both theory and real world experience and architecture, the courses will prepare you to design and audit secure enterprise systems. The courses will cover practical use of major server operating systems in an enterprise environment and how to design and operate them securely.

Course Syllabus

Enterprise System Management and Security
Windows Server Management and Security
Linux Server Management and Security
Planning, Auditing and Maintaining Enterprise Systems

Deep Learning Specialization on Coursera

Course Introduction

Computer Security and Systems Management Specialization-

Course Tag

Subnetwork Cybersecurity Enterprise System Linux

Related Wiki Topic

Article Example
D3 Security Management Systems In 2004 D3 Security Management Systems, leveraging a common thin client architecture and back-end framework, developed modules for computer-assisted dispatch and security guard tour. Following their release and implementation in early 2005, D3 Security Management Systems added a security post orders module. Beginning in 2006, D3 Security Management Systems implemented enhancements for more robust role-based access controls and transactional sharing of database records. The former permitted compliance with need to know regulations for privacy and the later enabled collaboration between functional units. As a result, D3 Security Management Systems released its Case Collaboration Platform (CCP), a configurable platform catering to the governance, risk management, and compliance business functions, expanding product scope from corporate security and physical security incident management to ethics and compliance, human resources and IT security case management.
Computer security incident management In the fields of computer security and information technology, computer security incident management involves the monitoring and detection of security events on a computer or computer network, and the execution of proper responses to those events. Computer security incident management is a specialized form of incident management, the primary purpose of which is the development of a well understood and predictable response to damaging events and computer intrusions.
D3 Security Management Systems D3 Security Management Systems, Inc., a privately held company headquartered in Vancouver, British Columbia, is a developer of software for security, governance, risk management, and compliance functions of organizations. The company operates as an enterprise on-site and software as a service provider with products designed for investigative case management, incident management, computer-assisted dispatch, security guard tour and security post orders. Through its partnerships, D3 Security Management Systems receives affiliate revenue from other cloud computing partners and value-added resellers for windows mobile devices.
Computer security incident management Computer security incident management is an administrative function of managing and protecting computer assets, networks and information systems. These systems continue to become more critical to the personal and economic welfare of our society. Organizations (public and private sector groups, associations and enterprises) must understand their responsibilities to the public good and to the welfare of their memberships and stakeholders. This responsibility extends to having a management program for “what to do, when things go wrong.” Incident management is a program which defines and implements a process that an organization may adopt to promote its own welfare and the security of the public.
Computer security Vulnerability management is the cycle of identifying, and remediating or mitigating vulnerabilities", especially in software and firmware. Vulnerability management is integral to computer security and network security.
Security information and event management In the field of computer security, security information and event management (SIEM) software products and services combine security information management (SIM) and security event management (SEM). They provide real-time analysis of security alerts generated by network hardware and applications.
D3 Security Management Systems As a software as a service provider, D3 Security Management Systems was an early adopter of solutions designed to secure the cloud. Using its published application programming interface for interaction with technology designed to extend single sign-on to the cloud, D3 Security Management Systems enabled single sign-on without inserting a third-party security product into its proprietary platform.
Systems management Systems management refers to enterprise-wide administration of distributed systems including (and commonly in practice) computer systems. Systems management is strongly influenced by network management initiatives in telecommunications. The application performance management (APM) technologies are now a subset of Systems management. Maximum productivity can be achieved more efficiently through event correlation, system automation and predictive analysis which is now all part of APM.
D3 Security Management Systems D3 Security Management Systems was formed in 2002 by Canadian entrepreneur Gordon Benoit. The original incident management software focused on delivering a configurable platform for automating the business processes of the physical security function.
Computer security incident management Computer security and information technology personnel must handle emergency events according to well-defined computer security incident response plan.
Security level management ""[…] SIM provides reporting and analysis of data primarily from host systems and applications, and secondarily from security devices — to support security policy compliance management, internal threat management and regulatory compliance initiatives. SIM supports the monitoring and incident management activities of the IT security organization […]. SEM improves security incident response capabilities. SEM processes near-real-time data from security devices, network devices and systems to provide real-time event management for security operations. […]""
Computer security incident management Incident management requires a process and a response team which follows this process. This definition of computer security incident management follows the standards and definitions described in the National Incident Management System (NIMS). The incident coordinator manages the response to an emergency security incident. In a Natural Disaster or other event requiring response from Emergency services, the "incident coordinator" would act as a liaison to the emergency services incident manager.
Automated information systems security Automated information systems security includes consideration of all computer hardware and software functions, characteristics and features; operational procedures; accountability procedures; and access controls at the central computer facility, remote computer, and terminal facilities; management constraints; physical structures and devices, such as computers, transmission lines, and power sources; and personnel and communications controls needed to provide an acceptable level of risk for the automated information system and for the data and information contained in the system. Automated information systems security also includes the totality of security safeguards needed to provide an acceptable protection level for an automated information system and for the data handled by an automated information system.
Automated information systems security In information security, automated information systems security is a synonym for computer security.
Organizational Systems Security Analyst Technical staff enrolling in the programme are taught and trained how to address the technical security issues they encounter in daily operations and how to methodically establish, operate and maintain security for their organization's computer network and computer systems infrastructure.
Computer Security Act of 1987 The Computer Security Law of 1987, Public Law No. 100-235 (H.R. 145), (Jan. 8, 1988), was passed by the United States Congress. It was passed to improve the security and privacy of sensitive information in federal computer systems and to establish a minimum acceptable security practices for such systems. It requires the creation of computer security plans, and the appropriate training of system users or owners where the systems house sensitive information.
Goverlan Systems Management Goverlan Systems Management Software provides the following security features:
Sequent Computer Systems Sequent Computer Systems was a computer company that designed and manufactured multiprocessing computer systems. They were among the pioneers in high-performance symmetric multiprocessing (SMP) open systems, innovating in both hardware (e.g., cache management and interrupt handling) and software (e.g., read-copy-update).
Physical security information management Physical security information management (PSIM) is a category of software that provides a platform and applications created by middleware developers, designed to integrate multiple unconnected security applications and devices and control them through one comprehensive user interface. It collects and correlates events from existing disparate security devices and information systems (video, access control, sensors, analytics, networks, building systems, etc.) to empower personnel to identify and proactively resolve situations. PSIM integration enables numerous organizational benefits, including increased control, improved situation awareness and management reporting.
Records management An Electronic Document and Records Management System (EDRM) is a computer program (or set of programs) used to track and store records. The term is distinguished from imaging and document management systems that specialize in paper capture and document management respectively. ERM systems commonly provide specialized security and auditing functionality tailored to the needs of records managers.