Close Menu

Operating System Security, IT-S 858

About this Course: 

This course will address theoretical concepts of operating system security, security architectures of current operating systems, and details of security implementation using best practices to configure operating systems to industry security standards. Server configuration, system-level firewalls, file system security, logging, anti-virus and anti-spyware measures and other operating system security strategies will be examined.


IT 801 A+ Certification Training or equivalent experience required for enrollment

Course Outline: 

Introduction to operating system security
Understanding the Threats such as Viruses and Worms
Logging, Auditing, and Recovery
OS-level Memory Protection
Virtualization Technology and Applications
Vulnerability Analysis
Malware Capture and Analysis (Honeypots and Honeyfarm)

Expected Outcomes: 

Upon completion of this course, participants should be able to:

  • Understand system hardening, including features in operating systems and networks that enable hardening
  • Explain how viruses, worms and Trojan horses spread and attach computer systems
  • Describe authentication methods and how they are used
  • Configure user accounts and account policies and loon security techniques
  • Implement directory, folder and file security and use groups to implement security
  • Explain border and firewall security
  • Configure the firewall capabilities in operating systems
  • Implement a network topology for security
  • Use structural network design for security
  • Configure security for wireless interfaces in workstation operating systems
  • Configure Web browser, remote access services and virtual private network services for security
  • Understand and configure security in popular e-mail tools
  • Create hardware redundancy and apply fault-tolerance options

Grading Details: 

Grading/CEU award for this course includes assignments, exams, projects, labs and paper.