Securing Operating Systems

Course Code: IFIS/SCE/OS002

About this Course

The operating system is where many attacks are targeted, which makes OS-level security just as important to your organization as network security. In this course, instructor Lisa Bock details what’s actually involved in securing an operating system. Lisa reviews user authentication, the structure of Active Directory, and how to assign permissions and create audit policies. In addition, she covers various cryptographic techniques, as well as how to protect servers and email.

Course Outline

  • I.T practitioners
  • Top managers
  • Anyone interested in I.T security at organizational level.

Learning Outcomes

In this one-day course You will learn the details of what’s actually involved in securing an operating system. You will review user authentication, the structure of Active Directory, and how to assign permissions and create audit policies. In addition, you will cover various cryptographic techniques, as well as how to protect servers and email.

Course Outline

Topic 1: Understanding User Authentication
Topic 2: System permissions
Topic 3: Understanding and implementing Audit policies
Topic 4: Protecting your server
Topic 5: Email protection
Topic 6: Understanding encryption

Application/ Relevance of this course

  • This training will help you and your company understand how to protect operating systems so as to secure your organization.

Duration and Fees

Duration: 1 day
Pricing: $150

Subscribe to Our Newsletters

Scroll to Top