Skip to content

Introduction to System Security

Course

Find out how to build logging, monitoring, and auditing tools that can alert system security breaches.

Enroll Now
  • Estimated time
    1 month

  • Enroll by
    June 7, 2023

    Get access to classroom immediately on enrollment

  • Skills acquired
    Vulnerability Assessment, Access Management, File Integrity Monitoring

What You Will Learn

  1. System Security

    1 month to complete

    Explore the basics of system security and its implementation at the operating system level. Learn about implementing authentication and authorization as a means to protect access to data and services. Learn about detecting unauthorized changes to a system and how to effectively counter them. By the end, you’ll understand how to build logging, monitoring, and auditing tools that can alert system security breaches and how to effectively counter them in a real-world case.

    Prerequisite knowledge

    Basic familiarity with Cybersecurity topics

    1. Identifying Vulnerabilities

      Explore the operating system’s security model and understand CVEs and third party advisory reports. Detect vulnerabilities in software and third-party libraries and patch identified vulnerabilities

      • Authentication

        Explore Unix password storage management and its security features. Defend remote service authentication mechanisms and server hardening principles and implement encryption for data at rest and in motion.

        • Authorization

          Understand access controls and their implementation as a means for securing data. Explore ways to detect unauthorized services and processes and how to remediate them. Use networking features to prevent unauthorized access to the system or server.

          • Isolation

            Learn how to implement a chroot jail to enhance system security. Understand mandatory access control and how it differs from discretionary access control. Understand advanced attacks like buffer overflows.

            • Auditing

              Implement auditing controls on critical files and services and host-based intrusion detection. Implement file integrity monitoring through osquery. Detect the presence of malware through system scans and write YARA rules for advanced threat hunting.

              • Course Project: Responding to a Nation-State Cyber Attack

                In this project, you will implement the course learnings to investigate a Linux virtual image that was taken from the server and was compromised in the cyber espionage campaign carried out by North Udan. You will work towards identifying the infection chain along with assessing and improving the system’s resilience against malicious attacks by building scanning, monitoring, and auditing tools.

              All Our Courses Include

              • Real-world projects from industry experts

                With real-world projects and immersive content built in partnership with top-tier companies, you’ll master the tech skills companies want.

              • Real-time support

                On demand help. Receive instant help with your learning directly in the classroom. Stay on track and get unstuck.

              • Workspaces

                Validate your understanding of concepts learned by checking the output and quality of your code in real-time.

              • Flexible learning program

                Tailor a learning plan that fits your busy life. Learn at your own pace and reach your personal goals on the schedule that works best for you.

              Course offerings

              • Class content

                • Real-world projects
                • Project reviews
                • Project feedback from experienced reviewers
              • Student services

                • Student community
                • Real-time support

              Succeed with personalized services.

              We provide services customized for your needs at every step of your learning journey to ensure your success.

              Get timely feedback on your projects.

              • Personalized feedback
              • Unlimited submissions and feedback loops
              • Practical tips and industry best practices
              • Additional suggested resources to improve
              • 1,400+

                project reviewers

              • 2.7M

                projects reviewed

              • 88/100

                reviewer rating

              • 1.1 hours

                avg project review turnaround time

              Learn with the best.

              Learn with the best.

              • Abhinav Singh

                Engineer/Consultant, Amazon Web Services

                Abhinav is a cybersecurity researcher with nearly a decade of experience working for global leaders in security technology, financial institutions and as an independent consultant. He is the author of Metasploit Penetration Testing Cookbook and Instant Wireshark Starter, as well as many papers, articles, and blogs.

              System Security

              Get started today

                • Learn

                  Find out how to build logging, monitoring, and auditing tools that can alert system security breaches.

                • Average Time

                  On average, successful students take 1 month to complete this program.

                • Benefits include

                  • Real-world projects from industry experts
                  • Real-time support

                Program Details

                • Do I need to apply? What are the admission criteria?

                  No. This Course accepts all applicants regardless of experience and specific background.

                • What are the prerequisites for enrollment?

                  Successful learners have knowledge of Linux, Python, command lines, and basic cybersecurity topics.

                • How is this course structured?

                  This course is comprised of content and curriculum to support one project. We estimate that students can complete the program in one month.

                  The project will be reviewed by the Udacity reviewer network and platform. Feedback will be provided and if you do not pass the project, you will be asked to resubmit the project until it passes.

                • How long is this course?

                  Access to this course runs for the length of time specified in the payment card above. If you do not graduate within that time period, you will continue learning with month to month payments. See the Terms of Use and FAQs for other policies regarding the terms of access to our programs.

                • Can I switch my start date? Can I get a refund?

                  Please see the Udacity Program Terms of Use and FAQs for policies on enrollment in our programs.

                • What software and versions will I need in this course?

                  Learners should have access to Docker.

                System Security

                Enroll Now