Semester: 7
ECTS: 5
Lectures: 30
Practice sessions: 30
Independent work: 90
Module Code: 23-122-0215
Semester: 7
ECTS: 5
Lectures: 30
Practice sessions: 30
Independent work: 90
Module Code: 23-122-0215
Module title:
Security of operating systems
Lecturers and associates:
Module overview:
The objective of this course is to equip students with the skills to effectively implement security controls in operating systems, both open-source and commercial (such as those by Microsoft). The course will provide students with an in-depth understanding of basic and advanced security settings, methods, and tools necessary for securing operating systems. Students will learn how to configure security settings, conduct activities to enhance the security level of operating systems and applications, and how to apply best practices for securing operating systems and services.
In this module students will learn:
how to implement security controls in operating systems.
how to use tools to setup security subsystems.
how to work with activity logging systems and operating system security audit systems.
how to find and apply best practice for securing operating systems and services.
Literature:
Required readings:
1. Jahoda, M., Fiala, J. and Wadeley, S. (2020). Red Hat Enterprise Linux 7 Security Guide. Raleigh: Red Hat Customer Content Services.
2. Moskowitz, J. (2015). Group Policy: Fundamentals, Security and the Managed Desktop, New York: Sybex.
3. Center for Internet Security (n.d.). CIS Critical Security Controls. Retrieved January 12, 2024, from https://www.cisecurity.org/controls
Supplementary readings:
1. Tevault, D.A., (2018). Mastering Linux Security and Hardening: Secure your Linux server and protect it from intruders, malware attacks, and other external threats. Birmingham: Packt Publishing
2. Francis, D., (2019). Mastering Active Directory: Deploy and Secure Infrastructures with Active Directory, Windows Server 2016, and PowerShell. Birmingham: Packt Publishing