Learn how to secure operating systems from malicious bugs and viruses.
The course Operating Systems - System Security will introduce you to methods and techniques that are used to secure operating systems from malicious bugs and viruses. Security has become extremely important in the modern digital age because systems are always on and are highly connected, and hackers and cyber-criminals are always looking for ways to insert malicious programs into vulnerable operating systems.
The course begins by introducing you to secrecy, integrity, and availability with regard to security goals. You will learn about the denial of service attacks and the different access control techniques that can be used. This course will introduce you to information flow policies and leaky states and will also inform you about the difference between the Biba model and Bell-LaPadula module.
Next, the course will provide you with in-depth knowledge on buffer overflows and stacks. You will learn about the use of buffer overflows and how an attacker can use these to create an exploit code. You will be able to implement different techniques to overcome buffer overflow vulnerability. This module will also explain libc and ‘how to return libc attacks’. Finally, you will learn what gadgets are in operating systems and how they can be used.
This course will be of great interest to computer science students and computer engineers, and anyone who wants to learn more about systems security in computer operating systems.
Step-by-step guide on how to activate this product->Alison Activation Guide