Every day we use operating systems without giving them a second thought, though the security of our operating systems and applications that run on them is critical to protecting information. This information may be personally identifiable information like social security numbers or banking information or it may be sensitive business information and intellectual property. Either way, understanding operating systems and how to best implement security controls to protect that information is critical to security practitioner.
Learning Objectives
- Apply the concepts of Confidentiality, Integrity, and Availability to operating system security
- Develop strategies for protecting against known attack types
- Recommend strategies that would create a defense in depth protection model for systems
- Construct a protection plan based on a business risk model
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Specialty Areas
- Systems Development
- Systems Requirements Planning
- Systems Architecture
- Technology R&D
- Test and Evaluation