Author
Released
5/30/2019- Define “passphrase.”
- Recall the purpose of multifactor authentication.
- Identify the tool used in today’s Windows operating systems to secure the file system.
- Explain what happens when a file is moved into a folder with permissions.
- Name the authentication protocol used in Active Directory.
- Recognize the location of the audit logs.
- Summarize the purpose of hardening.
- Explain the purpose of cryptographic techniques.
Skill Level Beginner
Duration
Views
- [Lisa] Hello, my name is Lisa Bock, and welcome to IT Security Foundations: Operating System Security. The operating system provides integration of attached devices, manages files and folders, and is the interface between the user, applications, and the network. However, the operating system is where many attacks are launched and targeted. In this course I'll introduce you to authentication, how to enforce permissions, conduct auditing, and ways to protect the server. I'll cover best practices for securing email, along with some basics of encryption. At the end of this course, you'll have a better understanding of what's involved in securing an operating system, and you'll be ready to investigate even more of the elements of operating system security for either a PC or a server. Now let's get started.
Related Courses
-
IT Security Foundations: Core Concepts
with Lisa Bock1h 35m Beginner -
Windows 10: Security
with Martin Guidry2h Intermediate -
IT Security: Key Policies and Resources
with Gregory Michaelidis23m 44s Intermediate
-
Introduction
-
1. Understand User Authentication
-
Passwords and complexity5m 43s
-
Smart cards and tokens2m 59s
-
Biometric identification5m 12s
-
RADIUS5m 13s
-
-
2. Understand Permissions
-
NTFS file, share, registry4m 51s
-
Permission behavior4m 1s
-
NTFS demo2m 39s
-
Active Directory structure3m 20s
-
Active Directory components4m 51s
-
Use Run As2m 55s
-
-
3. Dissecting Audit Policies
-
Types and enabling auditing4m 58s
-
What to audit3m 12s
-
Secure audit logs4m 25s
-
-
4. Server Protection
-
Isolate the server4m 22s
-
Harden: Updates and patching3m 38s
-
Protocol good practices3m 54s
-
-
5. Providing email protection
-
Email clients and servers5m 12s
-
Email and SPAM4m 4s
-
PTR records2m 15s
-
-
6. Understand Encryption
-
Cryptographic techniques3m 38s
-
Symmetric encryption4m 2s
-
Asymmetric encryption3m 31s
-
Public key infrastructure3m 35s
-
-
Conclusion
-
Next steps1m 3s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Ensure system security