Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
This specialization focuses on securing operating systems and cloud environments, covering topics such as OS security, cloud security, and threat mitigation. Learners will gain hands-on experience with security tools and best practices, preparing them for roles in IT security and cloud architecture.
Syllabus
- Course 1: Hardware and Operating System Foundations III
- Course 2: Cloud Computing Security - Master's
- Course 3: Cloud: Infrastructure as a Service - Master's
Courses
-
Infrastructure as a Service (IaaS) allows users to provision processing, storage, networks, and other fundamental computing resources which then allows them to deploy and run arbitrary software, which can include operating systems and applications. Students will learn how to provision, deploy and manage operating systems, storage, and deployed applications as well as virtual networking components such as switches, routers, and firewalls in a cloud environment accessible remotely through a network. By the end of this course, students will be able to: - Use concepts of cloud computing and cloud native applications to provision. - Deploy and manage operating systems, storage, and deployed applications as well as virtual networking components such as switches, routers, and firewalls in a cloud environment accessible remotely through a network, using standard planning methodologies to meet identified business and/or consumer needs.
-
This course provides a comprehensive overview of cloud computing security principles and practices, applicable across major cloud platforms such as AWS, Azure, and Google Cloud. Students will learn to identify and mitigate security risks associated with cloud environments, focusing on critical areas such as identity and access management, data protection, network security, and incident response. The course emphasizes a vendor-neutral approach, ensuring that learners understand fundamental security concepts that can be applied universally. Practical examples and case studies from AWS are used to illustrate these principles, offering hands-on experience with real-world scenarios. By the end of the course, students will be equipped with the knowledge and skills to design and implement robust security measures for any cloud-based system, ensuring the confidentiality, integrity, and availability of their data and applications. In addition to theoretical knowledge, the course includes interactive labs and projects that allow students to apply what they have learned in a controlled environment, simulating real-world cloud security challenges. Industry best practices and the latest developments in cloud security are also covered, ensuring that students are up-to-date with current trends and technologies. This course will significantly benefit students' careers by providing them with in-demand skills highly valued by employers in the tech industry. Graduates will be well-prepared for roles such as cloud security architect, cloud security engineer, and cloud security consultant. Additionally, the course content aligns with various cloud security certification exams, helping students to achieve certifications that further enhance their career prospects and professional credibility.
-
This course provides you with the opportunity to learn about OS security. It examines both Windows and Linux operating systems. The career skills acquired in the course introduce the understanding of OS operating system security and its importance in operating system support. At the end of the course, you will be able to: - Explore operating system firewalls. - Demonstrate the use of Operating System logs. - Explore Operating system permissions. Software requirements: Windows and Linux
Taught by
Kevin Vaccaro, Marwan Omar and Thomas Johnson