Cybersecurity Roles, Processes & Operating System Security
Offered By: IBM via Coursera
Course Description
Overview
51% of organizations are planning to increase security investments as a result of a breach (IBM Report). Companies need skilled IT support and cybersecurity professionals now more than ever. Whether you’re just starting out or switching to tech, this course provides the critical operating systems (OS) knowledge you need to move forward.
Operating systems are fundamental to all aspects of computing. In this course, you’ll learn foundational concepts common to all operating systems and the unique aspects of Windows, Linux, and MacOS.
You’ll explore OS file systems and the associated security features. You'll discover the macOS features that revolutionized OS functionality. Plus, you’ll investigate virtualization and containerization.
Additionally, through labs and a final project, you’ll get hands-on managing virus and threat protection, configuring user accounts and permissions with command-line tools, and securing systems against threats.
If you’re looking to get started IT or cybersecurity, enroll today to gain essential knowledge in operating systems that enables you to work towards a career in cybersecurity, system administration, network engineering, or IT support.
Syllabus
- Windows Operating Systems
- In this module, you will learn about file systems and the directory structure of the Windows operating system. You will also learn how Windows separates 32-bit and 64-bit applications. The module will also enable you to explore Windows user mode and kernel mode components. Finally, you will have the opportunity to manage Windows files and folders, explore Microsoft Windows server features, and use Microsoft Windows command prompt tools for administration through hands-on labs.
- Windows Security
- In this module, you will learn about Microsoft Windows security settings to protect your system against various threats. You will also be able to create a firewall rule in Microsoft Windows Defender through a hands-on lab. Next, you will recognize the importance of patches and updates in protecting against cyberattacks. You will also explore Microsoft Update and some critical practices to ensure a smooth and successful update experience. The module will also explore Kerberos and its benefits in domain-based authentication systems. Finally, you’ll learn to uncover system vulnerabilities and weaknesses through security auditing techniques.
- Linux Operating Systems
- In this module, you will learn about Linux systems and shell commands to efficiently perform various system administration tasks. You will have access to a Linux and Bash commands cheat sheet, which will serve as a ready reckoner for commonly used commands and their syntax in the Linux terminal. This module will also cover Linux file systems, directory structures, and run levels. You will also have the opportunity to get started with the Linux terminal, explore common Linux and Unix commands, and navigate Linux user management tasks through hands-on labs.
- macOS and Virtualization
- In this module, you will learn about macOS, its features, preferences, and how to upgrade it. You will also learn the differences between iOS and Android. The module will cover fundamental concepts of virtualization and cloud computing. You will also have the opportunity to explore macOS features, create a virtual machine simulation, and explore containers, Docker, and IBM Cloud through hands-on labs.
- Final Project
Taught by
IBM Security Learning Services
Tags
Related Courses
Advanced Ethical HackingCity College of San Francisco via California Community Colleges System Ethical Hacking & Network Defe
City College of San Francisco via California Community Colleges System Check Point Jump Start: Harmony Endpoint Security
Checkpoint via Coursera Introduction to Personal Digital Security
Codecademy The Complete Pentesting and Privilege Escalation Course
Packt via Coursera