Loading
Alison Logo

Operating Systems – Systems Security Free Course

certifcate icon
  • Description
  • Outcome
  • Certification
  • In this free Alison course Operating Systems - System Security you will be introduced to methods and techniques that are used to secure operating systems from malicious bugs and viruses. Security has become extremely important in the modern digital age because systems are always on and are highly connected, and hackers and cyber-criminals are always looking for ways to insert malicious programs into vulnerable operating systems.

    The course begins by introducing you to secrecy, integrity, and availability with regard to security goals. You will learn about the denial of service attacks and the different access control techniques that can be used. This course will introduce you to information flow policies and leaky states and will also inform you about the difference between the Biba model and Bell-LaPadula module.

    Next, the course will provide you with in-depth knowledge on buffer overflows and stacks. You will learn about the use of buffer overflows and how an attacker can use these to create an exploit code. You will be able to implement different techniques to overcome buffer overflow vulnerability. This module will also explain libc and ‘how to return libc attacks’. Finally, you will learn what gadgets are in operating systems and how they can be used.

    This free course will be of great interest to computer science students and computer engineers, and anyone who wants to learn more about systems security in computer operating systems.

  • Having completed this course you will be able to:
    - Distinguish between secrecy, integrity, and availability with regard to security goals.
    - Define what denial of service attacks means.
    - Explain when access control techniques are used.
    - Describe the components for developing an access control system.
    - Distinguish between DAC, MAC, and RBAC.
    - Explain what a leaky state is.
    - Explain information flow policies.
    - Describe the mandatory access control mechanism.
    - Distinguish between the Biba model and the Bell-LaPadula model.
    - Explain how a stack in a program is managed.
    - Define the use of buffer overflows.
    - Describe how an attacker could create an exploit code.
    - List some techniques to overcome buffer overflow vulnerability.
    - Explain how 'return to libc' attacks works.
    - Define what a gadget is.

  • All Alison courses are free to study. To successfully complete a course you must score 80% or higher in each course assessments. Upon successful completion of a course, you can choose to make your achievement formal by purchasing an official Alison Diploma, Certificate or PDF.

    Having an official Alison document is a great way to share your success. Plus it’s:

    • Ideal for including in CVs, job applications and portfolios
    • An indication of your ability to learn and achieve high results
    • An incentive to continue to empower yourself through learning
    • A tangible way of supporting the Alison mission to empower people everywhere through education.

Modules List( 3 )
  • Operating Systems – Systems Security
  • Module 1: Security Goals for an Operating System
    • Learning Outcomes
    • Introduction to Security
    • Information Flow Policies
    • Lesson Summary
  • Module 2: Stacks and Buffer Overflows
    • Learning Outcomes
    • Buffer Overflows
    • Preventing Buffer Overflow Attacks
    • Lesson Summary
  • END OF COURSE ASSESSMENT
  • Module 3: Operating Systems – Systems Security Assessment
    • Operating Systems – Systems Security Assessment
Topics List ( 4 )
Module 1: Security Goals for an Operating System
In this module you will learn about different security goals for an operating system. You will learn about access control techniques and the components for developing an access control system. You will also learn about information flow policies, leaky states, and the Biba and Bell-LaPadula models.
Topics List ( 4 )
Module 2: Stacks and Buffer Overflows
In this module you will learn about stacks and buffer overflows. You will become knowledgeable on how to use buffer overflows and techniques to overcome buffer overflow vulnerability. You will also learn about various aspects of libc.
Topics List ( 1 )
Module 3: Operating Systems – Systems Security Assessment
You must score 80% or more to pass this assessment.
Course Features
  • Duration

    2-3 Hours

  • Publisher

    NPTEL

  • Video

    Yes

  • Audio

    Yes

  • Assessment

    Yes

  • Certification

    Yes

  • Price

    Free

  • Reward

    50 Pts

  • Responsive

    No

Reviews and Rate
This course has no reviews yet.
Tags