Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "operating system security"
Skills you'll gain: Cloud Computing, Linux, Linux Servers, Cloud Security, Operating Systems, Windows Servers, Microsoft Windows, File Systems, Systems Administration, Mac OS, Command-Line Interface, Security Controls, Virtual Machines, Firewall, Virtualization, User Accounts
Infosec
Skills you'll gain: Penetration Testing, Linux Commands, Command-Line Interface, Linux, Cybersecurity, Operating Systems, Windows PowerShell, Unix Commands, Microsoft Windows, Computer Systems, File Systems, Mac OS, OS Process Management
Skills you'll gain: File Systems, Operating Systems, OS Process Management, C (Programming Language), System Programming, Virtualization, Data Integrity, Debugging, Systems Design, Performance Tuning, Distributed Computing, Data Storage, System Software, Virtual Machines, Command-Line Interface, Computer Systems, Data Security, Computer Hardware, Scalability, Data Structures
Illinois Tech
Skills you'll gain: Firewall, Microsoft Windows, Operating Systems, Linux, Linux Administration, System Configuration, Network Security, Authorization (Computing), System Monitoring, System Software, Windows Servers, Systems Administration, File Management, Data Security, Identity and Access Management
Skills you'll gain: Computer Systems, Business Software, Operating Systems, Generative AI, Business Systems, Cybersecurity, Enterprise Security, Servers, Computer Hardware, Information Systems Security, Data Storage, Patch Management, Artificial Intelligence
Skills you'll gain: Package and Software Management, Desktop Support, Linux, Microsoft Windows, File Systems, Remote Access Systems, Operating Systems, Linux Administration, OS Process Management, System Support, Systems Administration, Software Installation, User Accounts, System Configuration, Linux Commands, Command-Line Interface, System Monitoring, User Provisioning, Authorization (Computing), Identity and Access Management
Skills you'll gain: Peripheral Devices, Computer Hardware, Computer Systems, Operating Systems, Desktop Support, System Configuration, Microsoft Windows, Linux Administration, Hardware Troubleshooting, Networking Hardware, Data Storage, Information Technology, General Networking, Mac OS, Technical Support, File Systems, User Accounts
Akamai Technologies, Inc.
Skills you'll gain: Linux, Linux Administration, File Systems, Linux Commands, Operating Systems, User Accounts, OS Process Management, File Management, Unix Shell, Bash (Scripting Language), Unix Commands, System Configuration, Authorization (Computing), Command-Line Interface, Open Source Technology, Systems Administration, Virtualization, Virtual Machines
Skills you'll gain: Cyber Threat Hunting, Incident Response, IT Service Management, Identity and Access Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Endpoint Security, Malware Protection, Penetration Testing, Linux, Computer Security Incident Management, Database Management, Network Security, Networking Hardware, TCP/IP, Cybersecurity, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment
Skills you'll gain: Bash (Scripting Language), Linux Commands, Linux, File Management, Unix Commands, Command-Line Interface, IT Automation, Scripting, Operating Systems, Development Testing, OS Process Management, Unit Testing, Automation, Python Programming, Test Driven Development (TDD), Debugging, Development Environment
Skills you'll gain: IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Network Security, Network Protocols, Threat Modeling, Linux Servers, Cloud Security, Operating Systems, Endpoint Detection and Response, NIST 800-53, Regulatory Compliance
- Status: [object Object]
Google
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Intrusion Detection and Prevention, Security Controls, Vulnerability Management, Incident Response, Computer Security Incident Management, Cyber Threat Intelligence, Vulnerability Assessments, Event Monitoring, Network Security, Security Awareness, Threat Detection, Risk Management, Cybersecurity, Hardening, Bash (Scripting Language), Data Ethics, Linux Commands, Debugging
Searches related to operating system security
In summary, here are 10 of our most popular operating system security courses
- Operating Systems: Overview, Administration, and Security: IBM
- Operating System Foundations: Infosec
- Introduction to Operating Systems: Codio
- OS Security: Illinois Tech
- Introduction to Computers and Operating Systems and Security: Microsoft
- Operating Systems and You: Becoming a Power User: Google
- Introduction to Hardware and Operating Systems: IBM
- Operating Systems Fundamentals: Akamai Technologies, Inc.
- IBM Cybersecurity Analyst: IBM
- Using Python to Interact with the Operating System: Google