Whether you’re using Windows, macOS, or Linux, learn how to secure your operating system against attacks.
Overview
Syllabus
Introduction
- Ensuring system security
- Resources
- Securing the Windows OS
- Visualizing the Windows architecture
- Dissecting the NTFS
- NTFS demo
- Controlling folder access
- Using runas
- Exploring User Account Control (UAC)
- Protecting your macOS
- Interacting with a Linux OS
- Using the Linux file system
- Avoiding malware on a Linux host
- Identify and authenticate
- Passwords and complexity
- Smart cards and tokens
- Biometric identification
- Multi-factor authentication
- Using a firewall
- Locking down the browser
- Hardening the OS
- Protocol good practices
- Email clients and servers
- Email and SPAM
- PTR records
- Cryptographic techniques
- Symmetric encryption
- Asymmetric encryption
- Diving into hash algorithms
- Public Key Infrastructure
- Next steps
Taught by
Lisa Bock