Description
Safeguard operating systems by demonstrating support skills and designing and implementing security processes. Identify security threats and monitor security implementations. Use best practices to configure operating systems to industry security standards.
Upon successful completion, students will be able to identify network security risks, security design, and monitoring solutions; identify sources of computer threats, evaluate potential practices, tools, and technologies to protect individual network systems; establish and sustain an operating system security plan utilizing systems and application security tools; and implement procedures to secure and monitor audit logs and set system administrator alerts.
32 lecture hours + 32 lab hours
Recommended Prerequisite: ITSY1342