CertificationView course modules
The course Operating Systems - System Security will introduce you to methods and techniques that are used to secure operating systems from malicious bugs and viruses. Security has become extremely important in the modern digital age because systems are always on and are highly connected, and hackers and cyber-criminals are always looking for ways to insert malicious programs into vulnerable operating systems.
The course begins by introducing you to secrecy, integrity, and availability with regard to security goals. You will learn about the denial of service attacks and the different access control techniques that can be used. This course will introduce you to information flow policies and leaky states and will also inform you about the difference between the Biba model and Bell-LaPadula module.
Next, the course will provide you with in-depth knowledge on buffer overflows and stacks. You will learn about the use of buffer overflows and how an attacker can use these to create an exploit code. You will be able to implement different techniques to overcome buffer overflow vulnerability. This module will also explain libc and ‘how to return libc attacks’. Finally, you will learn what gadgets are in operating systems and how they can be used.
This course will be of great interest to computer science students and computer engineers, and anyone who wants to learn more about systems security in computer operating systems.
Having completed this course you will be able to:
- Distinguish between secrecy, integrity, and availability with regard to security goals;
- Define what denial of service attacks means;
- Explain when access control techniques are used;
- Describe the components for developing an access control system;
- Distinguish between DAC, MAC, and RBAC;
- Explain what a leaky state is;
- Explain information flow policies;
- Describe the mandatory access control mechanism;
- Distinguish between the Biba model and the Bell-LaPadula model;
- Explain how a stack in a program is managed;
- Define the use of buffer overflows;
- Describe how an attacker could create an exploit code;
- List some techniques to overcome buffer overflow vulnerability;
- Explain how 'return to libc' attacks works;
- Define what a gadget is.
All Alison courses are free to enrol, study and complete. To successfully complete this Certificate course and become an Alison Graduate, you need to achieve 80% or higher in each course assessment. Once you have completed this Certificate course, you have the option to acquire official Certification, which is a great way to share your achievement with the world. Your Alison Certification is:
Ideal for sharing with potential employers - include it in your CV, professional social media profiles and job applications
An indication of your commitment to continuously learn, upskill and achieve high results
An incentive for you to continue empowering yourself through lifelong learning
Alison offers 3 types of Certification for completed Certificate courses:
Digital Certificate - a downloadable Certificate in PDF format, immediately available to you when you complete your purchase
Certificate - a physical version of your officially branded and security-marked Certificate, posted to you with FREE shipping
Framed Certificate - a physical version of your officially branded and security-marked Certificate in a stylish frame, posted to you with FREE shipping
All Certification is available to purchase through the Alison Shop. For more information on purchasing Alison Certification, please visit our faqs. If you decide not to purchase your Alison Certification, you can still demonstrate your achievement by sharing your Learner Record or Learner Achievement Verification, both of which are accessible from your Dashboard. For more details on our Certification pricing, please visit our Pricing Page.
one year ago
one year ago
its Very Good Course