Every day we use operating systems without giving them a second thought, though the security of our operating systems and applications that run on them is critical to protecting information. This information may be personally identifiable information like social security numbers or banking information or it may be sensitive business information and intellectual property. Either way, understanding operating systems and how to best implement security controls to protect that information is critical to security practitioner.
Apply the concepts of Confidentiality, Integrity, and Availability to operating system security
Develop strategies for protecting against known attack types
Recommend strategies that would create a defense in depth protection model for systems
Construct a protection plan based on a business risk model
The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.