ITAS 463 Operating Systems Security Strategies

This course covers techniques used to secure operating systems. Typical vulnerabilities, exploits, and countermeasures are covered. Also covered are third-party software and built-in utilities that can be used to protect operating systems from hacking. Operating systems covered include Windows, Unix, Mac, Linux, and z-OS. Vulnerabilities that are introduced by applications, open ports, and services are covered.

Credits

4.5

Prerequisite

ITAS 362