One of the fundamental concerns in the security of cyberspace and e-commerce is the security of operating systems that are the core piece of software running in all information systems, such as network devices (routers, firewalls, etc), Web servers, customer desktops, PDAs, and so on. Many of known vulnerabilities discovered so far are rooted from the bugs or deficiency of underneath operating systems.
The course will teach how to conceptualize design issues, principles, and good practices in securing systems in today’s increasingly diverse and complex computing ecosystem, which extends from things and personal devices to enterprises, with processing increasingly in the cloud.
We're going to discuss following topics in this course;
- One Time passwords
- Program Threats
- System Threats
- Computer Security Classifications
What’s in it for you?
As computer systems are always on and always connected in the modern digital age, computer security is becoming more important than ever. This makes the IT experts who protect our operating systems against hackers, cyber-criminals, and malicious programs highly valued professionals.
Having completed this course you will be able to;
- Distinguish between secrecy, integrity, and availability with regard to security goals
- Define what denial of service attacks means
- Explain when access control techniques are used
- Describe the components for developing an access control system
Who should enroll?
The course is highly recommended for cyber security professionals and enthusiast who wish to learn main techniques used to secure modern operating systems, so that you can get one step closer to becoming such an expert.