Image for
Home

Security of operating systems

  • Class 15
  • Practice 30
  • Independent work 75
Total 120

Course title

Security of operating systems

Lecture type

Elective

Course code

21-02-554

Semester

2

ECTS

4

Lecturers and associates

Course overview

This is a project-based module where students learn the methods and tools used to develop knowledge about improving the level of security of Open Source and Microsoft operating systems.

Students will learn:
• How to implement security controls in operating systems
• How to use tools to setup security subsystems
• How to work with activity logging systems and operating system security audit systems
• How to find and apply best practice for securing operating systems and services

This module develops students’ skills to research specific problems and find solutions.

Literature

Essential reading:
1. Jahoda, M., Fiala, J. and Wadeley, S. (2020). Red Hat Enterprise Linux 7 Security Guide. Raleigh: Red Hat Customer Content Services.
2. Moskowitz, J. (2015). Group Policy: Fundamentals, Security and the Managed Desktop, New York: Sybex.

Recommended reading:
1. Tevault, D.A., (2018). Mastering Linux Security and Hardening: Secure your Linux server and protect it from intruders, malware attacks, and other external threats. Birmingham: Packt Publishing
2. Francis, D., (2019). Mastering Active Directory: Deploy and Secure Infrastructures with Active Directory, Windows Server 2016, and PowerShell. Birmingham: Packt Publishing

Further reading:
1. [Anom.], (2020). CIS Controls. Available at: https://www.cisecurity.org/controls/ (Accessed: 2 May 2021).

Minimal learning outcomes

  • Capture the basic security level of open operating systems.
  • Configure basic security settings for open operating systems
  • Implement procedures to raise the level of security of open operating systems and applications
  • Capture the basic security level of Microsoft operating systems
  • Configure basic security settings for Microsoft operating systems
  • Implement security procedures for Microsoft operating systems and applications

Preferred learning outcomes

  • Capture the advance security level of open operating systems
  • Configure advance security settings for open operating systems
  • Design procedures to raise the level of security of open operating systems and applications
  • Capture the advance security level of Microsoft operating systems
  • Configure advance security settings for Microsoft operating systems
  • Design security procedures for Microsoft operating systems and applications
Preuzmi vodič za studente
Share: Facebook Twitter