By Google on Coursera. Certificate earned at Saturday, April 20, 2019 12:18 AM GMT
https://www.coursera.org/account/accomplishments/certificate/H7VAGP82ATVN
About this Course
This course will transition you from working on a single computer to an entire fleet. Systems administration is the field of IT that’s responsible for maintaining reliable computers systems in a multi-user environment. In this course, you’ll learn about the infrastructure services that keep all organizations, big and small, up and running. We’ll deep dive on cloud so that you’ll understand everything from typical cloud infrastructure setups to how to manage cloud resources. You'll also learn how to manage and configure servers and how to use industry tools to manage computers, user information, and user productivity. Finally, you’ll learn how to recover your organization’s IT infrastructure in the event of a disaster.
By the end of this course you’ll be able to:
● utilize best practices for choosing hardware, vendors, and services for your organization.
● understand how the most common infrastructure services that keep an organization
running work, and how to manage infrastructure servers.
● understand how to make the most of the cloud for your organization.
● manage an organization’s computers and users using the directory services, Active
Directory, and OpenLDAP.
● choose and manage the tools that your organization will use.
● backup your organization’s data and know how to recover your IT infrastructure in the case of
a disaster.
● utilize systems administration knowledge to plan and improve processes for IT environments.
By Google on Coursera. Certificate earned at Monday, January 21, 2019 12:58 AM GMT
https://www.coursera.org/account/accomplishments/certificate/AS6NTPPYJGS2
Defense against the digital dark arts by Google on Coursera. Certificate earned at Wednesday, April 24, 2019 7:02 PM GMT
https://www.coursera.org/account/accomplishments/certificate/SNTSMELH9ZCV
About this Course
This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. We’ll give you some background of encryption algorithms and how they’re used to safeguard data. Then, we’ll dive into the three As of information security: authentication, authorization, and accounting. We’ll also cover network security solutions, ranging from firewalls to Wifi encryption options. Finally, we’ll go through a case study, where we examine the security model of Chrome OS. The course is rounded out by putting all these elements together into a multi-layered, in-depth security architecture, followed by recommendations on how to integrate a culture of security into your organization or team.
At the end of this course, you’ll understand:
● how various encryption algorithms and techniques work as well as their benefits and limitations.
● various authentication systems and types. ● the difference between authentication and authorization.
● how to evaluate potential risks and recommend ways to reduce risk. ● best practices for securing a network.
● how to help others to grasp security concepts and protect themselves.
By Google on Coursera. Certificate earned at Thursday, March 29, 2018 4:33 AM GMT
https://www.coursera.org/account/accomplishments/certificate/C6XPN5R77TBE
Becoming a Power User by Google on Coursera. Certificate earned at Monday, January 28, 2019 2:55 PM GMT
https://www.coursera.org/account/accomplishments/certificate/FZGTZEDKF85E