Free Online Courses, Classes and Tutorials

Diploma in Operating Systems

Join 5,197 other students
Diploma in Operating Systems
  • Description
  • Outcome
  • Certification
  • Learn about operating systems (OS) and how they manage computer hardware and software resources and provide common services for computer programs by studying the course Diploma in Operating Systems.

    The course begins by introducing you to operating systems, where an OS sits in a computers system, hardware abstraction and resource management. You will learn about processes and system calls, the structure of an OS and how different CPUs work. The course reviews memory management methods such as virtual memory, and how memory functions when booting up a computer system.

    You will be introduced to processes, how they are stored in the computer system, how new processes are created and what happens when they are terminated. You will learn about the different types of interrupts and about programmable interrupt controllers for hardware interrupts. You will learn about system calls and CPU context switching.

    Next, the course covers the two different types of processes for scheduling. You will learn about different scheduling methods for single CPU systems their advantages and disadvantages, about scheduling for multiprocessor systems and about scheduling methods for Linux systems. The course covers how processes communicate and share data with each other, also known as Inter-process communication (IPC). You will learn about different software techniques for IPC and the different ways hardware works with IPC. You will learn about deadlocks and threads in an operating system.

    Finally, you will learn about different security goals for an operating system. The course reviews access control techniques and the components for developing an access control system. You will also learn about information flow policies, leaky states, and the Biba and Bell-LaPadula models.

    This course will be of great interest to computer science students and computer engineers, and anyone who wants to learn about computer operating systems.

    Perquisites: The learner will need an understanding of C programming and an understanding of computer organisation and architecture.

  • Having completed this course you will be able to: - Describe what an Operating System is and its role in a computer system. - Explain why hardware has addresses and the types of addresses. - Describe how processes work. - List the different CPU types a computer can have. - Describe the single contiguous model and the partition mode memory management. - Discuss virtual memory and how it works in a computer system. - Describe segmentation memory management and how it is more logical than virtual memory. - Describe the process of a computer booting up to loading the operating system. - Explain how a process is stored in memory. - Describe how a xv6 system executes and new processes. - List the steps in a hardware interrupt. - Describe how a software interrupt happens. - Describe how a CPU switches between processes. - Describe different methods for scheduling processes. - Discuss schedulers used in Linux. - Describe the different types of inter-process communication. - Explain process synchronization and the critical section. - Discuss possible solutions for multiple processes accessing the critical section. - Explain how the bakery algorithm works. - Discuss how hardware can help with the critical section problem. - Describe how spinlocks, mutexes and semaphores work. - Explain the dining philosopher’s problem. - List the conditions for resource deadlock. - Define what is meant by paralysation. - Explain how threads are used in paralyzation. - Distinguish between threads and processes. - Distinguish between secrecy, integrity, and availability with regard to security goals. - Define what denial of service attacks means. - Explain when access control techniques are used. - Explain information flow policies. - Distinguish between the Biba model and the Bell-LaPadula model. - Define the use of buffer overflows. - Describe how an attacker could create an exploit code. - List some techniques to overcome buffer overflow vulnerability. - Explain 'how return to libc' attacks works.

  • All Alison courses are free to study. To successfully complete a course you must score 80% or higher in each course assessments. Upon successful completion of a course, you can choose to make your achievement formal by purchasing an official Alison Diploma or Certificate.

    Having an official Alison document is a great way to celebrate and share your success. It is:

    • Ideal to include with CVs, job applications and portfolios
    • A way to show your ability to learn and achieve high results

Modules List( 19 )

You have received a new notification

Click here to view them all