Cybersecurity
Samer
Operating System Security
Learn the principles and techniques of securing operating systems
Samer Aoudi
Available Jun 2023 English 0

Register »

Course Description

This course covers the principles and techniques of securing operating systems, including topics such as access control, authentication, and system hardening.



Learning Outcomes
Upon completion of Introduction to Information Security, students will be able to:
  1. Demonstrate an understanding of the principles and technologies of operating system security, including topics such as access control, authentication, and security architectures.
  2. Perform tasks to identify and assess operating system security vulnerabilities, and implement appropriate countermeasures.
  3. Use operating system security assessment tools and techniques to evaluate the security of an operating system.
  4. Perform tasks to develop and implement an operating system security plan that addresses the specific needs and risks of an organization.
Prerequisite Knowledge: Introduction to Information Security
Requirements: TBBA
Duration: 0 hours
Files: Kali Linux, Windows 10 Target, Metasploitable 2
Course Access
Digital Book
Read
Full access to digital learning materials              
YouTube Channel
Watch
Dedicated YouTube Playlist for web application security
Apply
Apply
Apply your knowledge in a contrlled lab environment    
Course Outline
Target Audience

This course is suitable for students with a background in computer science or system administration who are interested in learning about the principles and techniques of securing operating systems.

Edition

This is the first edition of the book. Published on January 7, 2023

Course Modules

Module 1 - An Overview of Operating Systems: This module provides students with a foundational understanding of operating systems, which are the software programs that manage computer hardware and software resources.

Module 2 - Introduction to Operating System Security: This module covers the basic concepts and principles of operating system security, including types of threats and vulnerabilities, and common security technologies and tools.

Module 3 - Windows Security: This module covers security features, settings, protection tools, and techniques for the Microsoft Windows OS.

Module 4 - MacOS Security: This module covers security features, settings, protection tools, and techniques for the Apple MacOS.

Module 5 - Linux Security: This module covers security features, settings, protection tools, and techniques for Linux.

Module 6 - Mobile OS Security: This module covers security features, settings, protection tools, and techniques for two of the most popular OS for mobile devices, iOS and Android.

Legal

Some of the product names and company names used in this course have been used for identification purposes only and may be trademarks or registered trademarks of their respective organizations. The software tools and applications in this course are for instructional purposes only. They have been tested with care, but are not guaranteed for any particular intent beyond educational purposes. The author does not offer any warranties or representations, nor does he accept any liabilities with respect to the programs.
© 2022-2023 Samer Aoudi

#cybersecurity #etextbook #websecurity #pentesting #onlinelessons
Ads By Google
               
© Samer Aoudi 2005-2024

Operating System Security