Free Online Courses, Classes and Tutorials

Operating Systems - Systems Security

Join 3,873 other students
Operating Systems - Systems Security
  • Description
  • Outcome
  • Certification
  • The course Operating Systems - System Security will introduce you to methods and techniques that are used to secure operating systems from malicious bugs and viruses. Security has become extremely important in the modern digital age because systems are always on and are highly connected, and hackers and cyber-criminals are always looking for ways to insert malicious programs into vulnerable operating systems.

    The course begins by introducing you to secrecy, integrity, and availability with regard to security goals. You will learn about the denial of service attacks and the different access control techniques that can be used. This course will introduce you to information flow policies and leaky states and will also inform you about the difference between the Biba model and Bell-LaPadula module.

    Next, the course will provide you with in-depth knowledge on buffer overflows and stacks. You will learn about the use of buffer overflows and how an attacker can use these to create an exploit code. You will be able to implement different techniques to overcome buffer overflow vulnerability. This module will also explain libc and ‘how to return libc attacks’. Finally, you will learn what gadgets are in operating systems and how they can be used.

    This course will be of great interest to computer science students and computer engineers, and anyone who wants to learn more about systems security in computer operating systems.

  • Having completed this course you will be able to:

    • Distinguish between secrecy, integrity, and availability with regard to security goals;
    • Define what denial of service attacks means;
    • Explain when access control techniques are used;
    • Describe the components for developing an access control system;
    • Distinguish between DAC, MAC, and RBAC;
    • Explain what a leaky state is;
    • Explain information flow policies;
    • Describe the mandatory access control mechanism;
    • Distinguish between the Biba model and the Bell-LaPadula model;
    • Explain how a stack in a program is managed;
    • Define the use of buffer overflows;
    • Describe how an attacker could create an exploit code;
    • List some techniques to overcome buffer overflow vulnerability;
    • Explain how 'return to libc' attacks works;
    • Define what a gadget is.

  • All Alison courses are free to study. To successfully complete a course you must score 80% or higher in each course assessments. Upon successful completion of a course, you can choose to make your achievement formal by purchasing an official Alison Diploma, Certificate or PDF.

    Having an official Alison document is a great way to celebrate and share your success. It is:

    • Ideal to include with CVs, job applications and portfolios
    • A way to show your ability to learn and achieve high results

Modules List( 3 )

You have received a new notification

Click here to view them all