The operating system is where many attacks are targeted, which makes OS-level security just as important to your organization as network security. OS security is also a key component of the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). In this course, instructor Lisa Bock details what’s actually involved in securing an operating system. Lisa reviews user authentication, the structure of Active Directory, and how to assign permissions and create audit policies. In addition, she covers various cryptographic techniques, as well as how to protect servers and email.
Author - Ethical Hacking: Penetration TestingSince 2004, Lisa Bock has been teaching IT, everything from forensics to network security.
Lisa is an associate professor in the Information Technology department at Pennsylvania College of Technology, in Williamsport, PA. Courses she has taught during the past 13 years include: networking, security, biometrics, technical support, protocol vulnerabilities (using Wireshark), CCNA Security, and VoIP and Unified Communications. She holds an MS from University of Maryland University College (UMUC) along with numerous other certifications. She has had training in forensics, networking, steganography, and network security. She is involved with various volunteer activities, has evaluated professional journals, and is an award-winning speaker. Lisa and her husband Mike enjoy bike riding, watching movies, and traveling.
Skills covered in this course
For each course you will get
- Exercise files and quizzes
- Certificate of completion from LinkedIn
- Offline and audio-only options
Ensure system security“
- [Lisa] Hello, my name is Lisa Bock, and welcome to IT Security Foundations: Operating System Security. The operating system provides integration of attached devices, manages files and folders, and is the interface between the user, applications, and the network. However, the operating system is where many attacks are launched and targeted. In this course I'll introduce you to authentication, how to enforce permissions, conduct auditing, and ways to protect the server. I'll cover best practices for securing email, along with some basics of encryption. At the end of this course, you'll have a better understanding of what's involved in securing an operating system, and you'll be ready to investigate even more of the elements of operating system security for either a PC or a server. Now let's get started.
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Download the exercise files for this course. Get started with a free trial today.
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Watch this course anytime, anywhere. Get started with a free trial today.