Learn the fundamental principles and best practices for securing computer operating systems. Through practical exercises and expert guidance, you'll gain the knowledge and skills needed to protect systems from potential threats and vulnerabilities
Learning Objectives
The course aims to equip students with the skills to recognize and classify common threats to computer operating systems, implement system hardening best practices, and apply secure authentication mechanisms. Students will learn to conduct risk assessments, identify potential vulnerabilities, and monitor system activity to detect and respond to security breaches promptly.
Framework Connections
Competency Areas
Feedback
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.