Full course description
About this course
Course Snapshot
Throughout this course, we will explore critical and cutting-edge aspects of operating systems security, access control and cryptography. You will gain theoretical knowledge and have the opportunity to apply your new knowledge in practical examples and scenarios to provide you with a comprehensive understanding of systems security.
Here's a brief overview of the modules you will work through in this course:
Operating systems and virtualisation security: Operating systems play a crucial role in managing a computer's resources to ensure a secure foundation for running applications. In this module on operating systems (OS) and virtualisation security, we primarily focus on the technical aspects of systems security such as system design and isolation primitives. We don't go into details on topics like insider threats, human behaviour, physical attacks, project management, or company policies. This is not because those topics are unimportant, but they require their own specialised knowledge areas beyond the scope of OSs.
Access control: Authentication, Authorisation, Accountability: Access control refers to the process of determining and enforcing restrictions on who is allowed to perform specific actions on certain objects within a system. Access control mechanisms and security policies work together to enforce the principle of least privilege, ensuring that entities are granted only the necessary permissions required to perform their legitimate tasks while preventing unauthorised access or misuse of system resources. It revolves around answering the question of "who is allowed to do what?“
Cryptography: Cryptography could be briefly defined as the art of writing or solving codes. In today’s digitised world, cryptography is often about cyber security. Every time you access WhatsApp, Instagram or any other social media platforms, your online interactions are likely secured through encryption. Cryptography is an indispensable tool used to protect (encrypt) data as well as authenticate users and their messages.
Anyone interested in learning more about cyber security
Upon completion of this course earn a Digital Badge.
This course on Systems security is made up of three modules that can be completed independent of each other and in whatever sequence suits you. After you have completed all three modules, there is a course conclusion and final knowledge check. While there is no set timetable with this course, a study plan is a valuable tool to help manage your time, stay motivated and that all materials a covered. Everyone learns at a different pace, and the times for each module are an average. It may take you less or more time depending on what you already know and previous experiences.
Module | Hours of study |
---|---|
|
|
|
|
|
|
|
|
Professor Ernest Foo
Professor, School of Information and Communication Technology
Dr. Mukhtar Hussain
Research Fellow, School of Information and Communication Technology