Course

Cyber Security Basics: Systems Security

Time limit: 120 days

$150 Enrol

Full course description

About this course

Sign up now - start now!

Welcome to this course on Systems Security where you will delve into operating systems security and a range of tools and methods used for this purpose. Access control - who is allowed to do what - is a big part of systems security, and you will explore the key elements of access control: authentication, authorisation and accountability. In the course, you will also learn about cryptography which is a tool commonly used to secure communications within and between systems. In this era of rapid technological advancement, the demand for cybersecurity professionals has never been higher. As industries, governments, and individuals alike grow increasingly dependent on digital networks and information systems, the importance of securing these systems against potential threats has become paramount.

Throughout this course, we will explore critical and cutting-edge aspects of operating systems security, access control and cryptography.  You will gain theoretical knowledge and have the opportunity to apply your new knowledge in practical examples and scenarios to provide you with a comprehensive understanding of systems security.

Delivery Mode

Delivered online in self-paced mode, you will have 120 days from the time of your purchase to complete the training. As this is an online self-paced course there is no requirement to attend any live sessions. You can access and complete the online course 24/7 during your access.  After the 120 days you will lose access to the course.

Start Anytime
Access the course straight away
3 Modules
120 days to complete
Online
Self-paced learning
150
Pay Now / Start Now

Course Snapshot

What are the course learning outcomes?

Throughout this course, we will explore critical and cutting-edge aspects of operating systems security, access control and cryptography.  You will gain theoretical knowledge and have the opportunity to apply your new knowledge in practical examples and scenarios to provide you with a comprehensive understanding of systems security.

What core topics are offered?

Here's a brief overview of the modules you will work through in this course:

Operating systems and virtualisation security: Operating systems play a crucial role in managing a computer's resources to ensure a secure foundation for running applications. In this module on operating systems (OS) and virtualisation security, we primarily focus on the technical aspects of systems security such as system design and isolation primitives. We don't go into details on topics like insider threats, human behaviour, physical attacks, project management, or company policies. This is not because those topics are unimportant, but they require their own specialised knowledge areas beyond the scope of OSs.  

Access control: Authentication, Authorisation, Accountability: Access control refers to the process of determining and enforcing restrictions on who is allowed to perform specific actions on certain objects within a system. Access control mechanisms and security policies work together to enforce the principle of least privilege, ensuring that entities are granted only the necessary permissions required to perform their legitimate tasks while preventing unauthorised access or misuse of system resources. It revolves around answering the question of "who is allowed to do what?“ 

Cryptography: Cryptography could be briefly defined as the art of writing or solving codes. In today’s digitised world, cryptography is often about cyber security. Every time you access WhatsApp, Instagram or any other social media platforms, your online interactions are likely secured through encryption. Cryptography is an indispensable tool used to protect (encrypt) data as well as authenticate users and their messages.

Who is this course suited to?

Anyone interested in learning more about cyber security

What are the course credentials?

Upon completion of this course earn a Digital Badge. 

What does my course schedule look like?

This course on Systems security is made up of three modules that can be completed independent of each other and in whatever sequence suits you. After you have completed all three modules, there is a course conclusion and final knowledge check. While there is no set timetable with this course, a study plan is a valuable tool to help manage your time, stay motivated and that all materials a covered. Everyone learns at a different pace, and the times for each module are an average. It may take you less or more time depending on what you already know and previous experiences.

Module Hours of study
  • Operating systems and virtualisation security
  • 3-4 hours
  • Access control: Authentication, authorisation, accountability
  • 2-3 hours
  • Cryptography
  • 4-5 hours
  • Course conclusion and final knowledge check
  • 0.5 hours
Who are the course facilitators?

Professor Ernest Foo

Professor, School of Information and Communication Technology

Griffith University Profile 

Dr. Mukhtar Hussain

Research Fellow, School of Information and Communication Technology

Griffith University Profile