Learn the fundamental principles and best practices for securing computer operating systems. Through practical exercises and expert guidance, you'll gain the knowledge and skills needed to protect systems from potential threats and vulnerabilities
Learning Objectives
The course aims to equip students with the skills to recognize and classify common threats to computer operating systems, implement system hardening best practices, and apply secure authentication mechanisms. Students will learn to conduct risk assessments, identify potential vulnerabilities, and monitor system activity to detect and respond to security breaches promptly.
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Competency Areas
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.