Diploma in Operating Systems

Learn how an operating system manages computer hardware and software and provide services for computer programs.

Operating Systems
Free Course
We often hear about computer operating systems, but there aren't actually many people who truly understand them. This course will introduce you to the computer operating system or OS. By the end of this course, you will have learned everything you need to know about the Central Processing Unit (CPU), the Inter Process Communication (IPC), the Bakery Algorithm, the Test and Set Instruction, deadlocks, stacks and buffer overflows, and much more.
  • Duration

    15-20 Hours
  • Assessment

  • Certification

  • Publisher





View course modules


This course will first give you a strong overview of the OS and different operating system types. You will then study programs and processes as well as take a look at the CPU. You will learn about memory management, segmentation and booting process, the different types of hardware and software of interrupts, and the process scheduling of a Linux operating system. You will also study the processes of communicating and sharing data, as well as how to access the critical section.

Next, you will cover the subject of deadlocks and study the four conditions that result in a deadlock. You will learn about the role of paralyzation in operating systems and how threads are used in paralyzation. The course will also cover different security goals for an operating system and teach you how to use buffer overflows and techniques to overcome buffer overflow vulnerability. You will also study the most important aspects of libc (The C standard library).

Computers are essential systems in our modern lives, which makes IT professionals highly valuable members of the workforce with profitable careers. With the help of this course, you can join their ranks. This course will be of great interest to computer science students and computer engineers, and anyone who wants to learn more about computer operating systems. So, check out the course today and see if this is the next learning journey for you!

Start Course Now

Learning Outcomes

Having completed this course you will be able to: - Describe what an Operating System is and its role in a computer system. - Explain why hardware has addresses and the types of addresses. - Describe how processes work. - List the different CPU types a computer can have. - Describe the single contiguous model and the partition mode memory management. - Discuss virtual memory and how it works in a computer system. - Describe segmentation memory management and how it is more logical than virtual memory. - Describe the process of a computer booting up to loading the operating system. - Explain how a process is stored in memory. - Describe how a xv6 system executes and new processes. - List the steps in a hardware interrupt. - Describe how a software interrupt happens. - Describe how a CPU switches between processes. - Describe different methods for scheduling processes. - Discuss schedulers used in Linux. - Describe the different types of inter-process communication. - Explain process synchronization and the critical section. - Discuss possible solutions for multiple processes accessing the critical section. - Explain how the bakery algorithm works. - Discuss how hardware can help with the critical section problem. - Describe how spinlocks, mutexes and semaphores work. - Explain the dining philosopher’s problem. - List the conditions for resource deadlock. - Define what is meant by paralysation. - Explain how threads are used in paralyzation. - Distinguish between threads and processes. - Distinguish between secrecy, integrity, and availability with regard to security goals. - Define what denial of service attacks means. - Explain when access control techniques are used. - Explain information flow policies. - Distinguish between the Biba model and the Bell-LaPadula model. - Define the use of buffer overflows. - Describe how an attacker could create an exploit code. - List some techniques to overcome buffer overflow vulnerability. - Explain 'how return to libc' attacks works.


All Alison courses are free to enrol, study and complete. To successfully complete this Diploma course and become an Alison Graduate, you need to achieve 80% or higher in each course assessment. Once you have completed this Diploma course, you have the option to acquire official Certification, which is a great way to share your achievement with the world. Your Alison Certification is:

Ideal for sharing with potential employers - include it in your CV, professional social media profiles and job applications
An indication of your commitment to continuously learn, upskill and achieve high results
An incentive to you to continue empowering yourself through lifelong learning

Alison offers 3 types of Certification for completed Diploma courses:

Digital Diploma - a downloadable Diploma in PDF format, immediately available to you when you complete your purchase
Diploma - a physical version of your officially branded and security-marked Diploma that is posted to you (with FREE standard shipping worldwide)
Framed Diploma - a physical version of your officially branded and security-marked Diploma in a stylish frame that is posted to you (with FREE standard shipping worldwide)

All Certification is available to purchase through the Alison Shop. For more information on purchasing Alison Certification, please visit our faqs. If you decide not to purchase your Alison Certification, you can still demonstrate your achievement by sharing your Learner Record or Learner Achievement Verification, both of which are accessible from your Dashboard. For more details on our Certification pricing, please visit our Pricing Page.


    New course

    This Course has been revised!

    For a more enjoyable learning experience, we recommend that you study the mobile-friendly republished version of this course.

    Take me to revised course.

    You have received a new notification

    Click here to view them all