Module Additional Assessment Details
An ASSIGNMENT weighted at 100% (3000 words excluding appendices) addressing all of the learning outcomes (Learning Outcomes 1 to 3). The assignment will be a practical artefact with written support from a small report.
Module Indicative Content
This module will cover topics of:
OS security methodologies
Scripting
Memory protection
File system security
User authentication
Event Logging and System auditing
Firewall administration
Secure configuration of OS services
OS updates
Module Learning Strategies
As a distance learning module, there will not be a traditional lecture every week. The main learning environment that will be used is our Virtual Learning Environment (VLE). Students will work through the module material provided on the VLE at a pace suggested by the instructors. The Instructors will monitor student progress, providing their expertise where necessary for assisting in solving problems. Students will be encouraged to discuss relevant aspects within discussion forums that are part of the VLE. The forums will allow discussion with a student's peer group as well as the module tutor.
Module Resources
Access to online resources including emulators and open source tools.
Module Special Admissions Requirements
None
Module Texts
Flynt. C. and Lakshman, S. (2017), Linux Shell Scripting Cookbook, 3rd edition, Packt Publishing, ISBN-10: 1785881981
Bresnahan, C. and Blum, R. (2015), Linux essentials, 2nd edition, Sybex, Indianapolis, ISBN: 111909206X.
Tidrow, R. and Boyce. J. (2017), Windows Anniversary 10 bible, Wiley, Indianapolis, ISBN-10: 1119356334
Negus, C. (2015), Linux bible, 9th; edition, Wiley, Indianapolis, ISBN-10: 1118999878
Module Learning Outcomes
1. Attain a systematic understanding of the mechanisms used to implement security systems, through implementation using several tools to evaluate key security parameters, and be able to explain techniques for security accounts and discuss general threats to Windows and Linux systems.
Communication
Knowledge & Understanding
2. Demonstrate critical ability to research, identify, assign and use various permissions; change system defaults; and implement various security commands in order to counter OS vulnerabilities.
Enquiry
Reflection
3. Demonstrate originality and creativity in implementing security features for a given scenario which will effectively improve OS security.
Application
Problem Solving
Web Descriptor
Operating System Security teaches you the latest security industry recommendations and provides instruction on how to properly protect and harden Windows and Linux servers in a variety of settings and roles. By the end of the course, you will have an advanced understanding of the security architectures used by Windows and Linux.