Loading

Operating Systems - Systems Security

IT
Free Course
As computer systems are always on and always connected in the modern digital age, computer security is becoming more important than ever. This makes the IT experts who protect our operating systems against hackers, cyber-criminals, and malicious programs highly valued professionals. The course will introduce you to the main techniques used to secure modern operating systems, so that you can get one step closer to becoming such an expert.
Start Course Now
  • Duration

    2-3 Hours
  • Assessment

    Yes
  • Certification

    Yes
  • Publisher

    NPTEL

Description

Outcome

Certification

View course modules

Description

When designing an operating system, you need to have security goals in mind. This course will teach you how to do so, by introducing you to Secrecy, Integrity, and Availability and teaching you about the MAC or Mandatory Access Control, the Biba model, and the Bell-LaPadula model. You will then study the components for developing an access control system, Discretionary Access Control (DAC), and Role-based Access Control (RBAC). The course will also discuss leaky states and information flow policies.

A buffer overflow is a vulnerability in the system could pertain to any application running in the system. Making the stack pages non-executable can prevent buffer overflow attacks but will not completely prevent them. This course will teach you how a stack in a program is managed and how to use buffer overflows. You will learn the techniques for overcoming buffer overflow vulnerability as well as study the limitations of the return to LIBC code.

Computer security is essential not just for keeping information protected but also for preventing viruses and malware from harming your computer system and allowing programs to run more smoothly. This free course on Operating Systems Security will help any aspiring computer programmer to protect their systems against malware and intrusions. With these skills on your side, you'll give your résumé and your professional skills a solid boost, all in just a few short hours. Check out the course today.

Start Course Now

Learning Outcomes

Having completed this course you will be able to:


  • Distinguish between secrecy, integrity, and availability with regard to security goals;
  • Define what denial of service attacks means;
  • Explain when access control techniques are used;
  • Describe the components for developing an access control system;
  • Distinguish between DAC, MAC, and RBAC;
  • Explain what a leaky state is;
  • Explain information flow policies;
  • Describe the mandatory access control mechanism;
  • Distinguish between the Biba model and the Bell-LaPadula model;
  • Explain how a stack in a program is managed;
  • Define the use of buffer overflows;
  • Describe how an attacker could create an exploit code;
  • List some techniques to overcome buffer overflow vulnerability;
  • Explain how 'return to libc' attacks works;
  • Define what a gadget is.

Certification

All Alison courses are free to enrol, study and complete. To successfully complete this Certificate course and become an Alison Graduate, you need to achieve 80% or higher in each course assessment. Once you have completed this Certificate course, you have the option to acquire official Certification, which is a great way to share your achievement with the world. Your Alison Certification is:

Ideal for sharing with potential employers - include it in your CV, professional social media profiles and job applications
An indication of your commitment to continuously learn, upskill and achieve high results
An incentive for you to continue empowering yourself through lifelong learning

Alison offers 3 types of Certification for completed Certificate courses:

Digital Certificate - a downloadable Certificate in PDF format, immediately available to you when you complete your purchase
Certificate - a physical version of your officially branded and security-marked Certificate, posted to you with FREE shipping
Framed Certificate - a physical version of your officially branded and security-marked Certificate in a stylish frame, posted to you with FREE shipping

All Certification is available to purchase through the Alison Shop. For more information on purchasing Alison Certification, please visit our faqs. If you decide not to purchase your Alison Certification, you can still demonstrate your achievement by sharing your Learner Record or Learner Achievement Verification, both of which are accessible from your Dashboard. For more details on our Certification pricing, please visit our Pricing Page.

Careers

Course Reviews

Eugene C.
2 years ago
ZA
Eugene C.

Very Enjoyable!

Moamen B.
2 years ago
EG
Moamen B.

its Very Good Course

View All Reviews
New course

This Course has been revised!

For a more enjoyable learning experience, we recommend that you study the mobile-friendly republished version of this course.

Take me to revised course.

- or -

Continue studying this course
Notification

You have received a new notification

Click here to view them all