- Level Foundation
- المدة 14 ساعات hours
- الطبع بواسطة Microsoft
-
Offered by
عن
If you're interested in a cybersecurity career but don't know where to start, you've arrived at the right place! This course forms part of a series of courses that offers a good starting point for a career in cybersecurity. It will help you gain knowledge and skills related to Computers and Operating Systems, Enterprise Systems, and Security, including Business Systems Applications. This course gets you one step closer to the Microsoft Cybersecurity Analyst Professional Certificate, which requires no degree or prior experience. After completing this course, you’ll be able to: • Identify the various components of a computer system • Explain how the various components of a computer system interact with an operating system • Describe the basics of the cybersecurity landscape • Describe the various business computing environments This is also a great way to prepare for the Microsoft SC-900 exam. By passing the SC-900 exam, you’ll earn the Microsoft Security, Compliance, and Identity Fundamentals Certification.الوحدات
Course introduction
1
Discussions
- Meet and greet
3
Videos
- Introduction to the program: Microsoft cybersecurity analyst
- Introduction to the course: Introduction to computers and operating systems and security
- A day in the life
6
Readings
- Skills measured: Exam SC-900
- Course syllabus
- How to be successful in this course
- How to open an image in a new tab
- How to locate your downloaded files
- Additional resources: Microsoft cybersecurity analyst
Introduction to Generative AI
1
Assignment
- General Knowledge Quiz
4
Videos
- Welcome to Generative AI for everyone
- Understanding the Capabilities of Generative AI for Business Functions
- Generative AI - Under the hood
- The potential pitfalls and shortcomings of GEN AI
2
Readings
- Generative AI Terminology
- Generative AI in Business
Threat landscape
2
Assignment
- Self-review: Explaining the threat landscape
- Knowledge check: Elements of the threat landscape
1
Discussions
- What elements of the threat landscape have you been exposed to before?
2
Videos
- Threat landscape overview
- Linked threats
4
Readings
- Threat stats
- Exercise: Explaining the threat landscape
- Exemplar: Explaining the threat landscape
- Additional resources: Threat landscape
Introduction to computing devices
1
Assignment
- Knowledge check: Introduction to computing devices
2
Videos
- What is a computer and what is inside it?
- How does a computer operate?
2
Readings
- Hardware versus software
- Additional resources: Introduction to computing devices
Operating systems
2
Assignment
- Knowledge check: Operating systems
- Module quiz: Introduction to computers and operating systems
3
Videos
- What is an operating system and what does it do?
- Popular operating systems
- Module summary: Introduction to computers and operating systems
3
Readings
- Types of operating systems
- Proprietary and open-source software
- Additional resources: Operating systems
Servers, storage and backups
1
Assignment
- Knowledge check: Servers, storage and backup
1
Discussions
- Storage and security needs for enterprise versus home users
2
Videos
- Infrastructure and Servers
- Risk mitigation: Backup frequency
2
Readings
- Types of servers, storage, and backups
- Additional resources: Servers, storage and backup
Computing environments
1
Assignment
- Knowledge check: Computing environments
2
Videos
- What are computing environments?
- Security in computing environments
3
Readings
- Traditional versus cloud computing environments
- Security in computing environments in depth
- Additional resources: Computing environments
Maintenance and patches
2
Assignment
- Knowledge check: Maintenance and patching
- Module quiz: Enterprise systems and security
3
Videos
- What is maintenance and patching?
- Patch management: pros, cons, and challenges
- Module summary: Enterprise systems and security
3
Readings
- Types of maintenance
- Vulnerability management
- Additional resources: Maintenance and patching
Business software
2
Assignment
- Self review: Business software
- Knowledge check: Business software
2
Videos
- What is business software?
- A day in the life of a business computer
5
Readings
- Common business software
- Exercise: Business software
- Exemplar: Business software
- Computers under pressure
- Additional resources: Business software
Email apps
1
Assignment
- Knowledge check: Email apps
1
Discussions
- Have you ever received spam or malicious emails? What was your experience?
2
Videos
- How email changed the world
- Email app functions
2
Readings
- Email security functions
- Additional resources: Email apps
Storage solutions
2
Assignment
- Knowledge check: Storage solutions
- Module quiz: Business systems applications
5
Videos
- Growing your knowledge on storage
- Processing data
- Machine Learning and data
- Artificial intelligence and machine learning
- Module Summary: Business systems applications
3
Readings
- Data warehousing and data lakes
- Machine learning in action
- Additional resources: Storage solutions
Final course assessment
1
Assignment
- Course quiz: Introduction to computers and operating systems, and security
1
Videos
- Course recap: Introduction to computers and operating systems and security
1
Readings
- About the final course assessment
Course wrap-up
1
Discussions
- Reflect on learning
1
Videos
- Congratulations
1
Readings
- Next steps
Auto Summary
Jumpstart your cybersecurity career with this foundational course on Computers, Operating Systems, and Security. Ideal for beginners, this Coursera offering covers key concepts in IT and Computer Science, helping you understand computer components, operating systems, and the cybersecurity landscape. With no prior experience required, you'll be on your way to achieving the Microsoft Cybersecurity Analyst Professional Certificate and preparing for the SC-900 exam. The course spans 840 minutes and offers flexible subscription options, making it perfect for aspiring cybersecurity professionals.

Microsoft