This specialization equips administrators with the skills to establish and manage Google Workspace for their organization. Topics include setting up a new Google Workspace account, managing users, configuring services, implementing security best practices, and deploying Google Workspace. Participants will learn to protect their organization from phishing, malware attacks, and spam, and gain insights into planning and deploying Google Workspace.
The course is designed to provide hands-on experience and practical knowledge to manage Google Workspace effectively. Participants will also learn about the best practices for protecting users and data, configuring email compliance, and implementing measures to safeguard their organization from various security threats.
Certificate Available ✔
Get Started / More InfoThe course comprises modules that cover setting up Google Workspace, managing services, security, mail management, and planning for deployment.
Introduction to Google Workspace Administration module provides hands-on experience in setting up a Google Workspace account, managing key properties, provisioning users and groups, and creating an organizational structure to simplify user and service management.
Managing Google Workspace module covers managing and configuring services, managing mobile devices, retaining and searching organization's data using Google Vault, and setting up administrator alerts and reports.
Google Workspace Security module focuses on configuring security settings, implementing 2-step verification, managing the Google Workspace Marketplace, and using security and alert centers to identify and mitigate security and privacy issues.
Google Workspace Mail Management module guides participants in protecting users from phishing and malware, controlling end user access features, applying compliance features, and using mail routing options available to Google Workspace administrators.
Planning for a Google Workspace Deployment module explains Google's 3-phase deployment methodology, mail routing types, migration options, coexistence challenges, and the importance of change management in a successful deployment.
Learn to create a multi-node EOSIO blockchain in the Google Cloud Console, extending the single node setup to deploy and manage four EOSIO nodes.
Introduction to Risk Management provides comprehensive understanding of risk assessment techniques, threat modeling, and business continuity planning, equipping...
This course delves into advanced cybersecurity risk management, equipping learners with essential skills to safeguard businesses. With a focus on threat identification,...
Advanced Network Security is a 3-course specialization providing in-depth knowledge of next-gen firewalls, cloud security, and incident response, empowering IT professionals...