Every day we use operating systems without giving them a second thought, though the security of our operating systems and applications that run on them is critical to protecting information. This information may be personally identifiable information like social security numbers or banking information or it may be sensitive business information and intellectual property. Either way, understanding operating systems and how to best implement security controls to protect that information is critical to security practitioner.
- Apply the concepts of Confidentiality, Integrity, and Availability to operating system security
- Develop strategies for protecting against known attack types
- Recommend strategies that would create a defense in depth protection model for systems
- Construct a protection plan based on a business risk model
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.