GJ-CYBR-0230 - Operating Systems and Asset Security
Course Description
This course introduces Linux, an operating system commonly used by cybersecurity professionals. It provides an overview of the Linux command line through the Bash shell and how to perform actions such as to navigate and manage the file system and authenticate users. It will also provide an overview of how to interact with a database using SQL. Additionally, the course will build an understanding of how assets are classified. There will be an emphasis on common threats and vulnerabilities, and the security controls used by organizations to protect valuable information and mitigate risk.
Learner Outcomes
Explain the relationship between operating systems, applications, and hardware.
Compare a graphical user interface to a command line interface.
Identify the unique features of common Linux distributions.
Navigate and manage the file system using Linux commands via the Bash shell.
Use Linux commands via the Bash shell to authenticate and authorize users.
Describe how a relational database is organized.
Use SQL to retrieve information from a database and apply filters to SQL queries and use joins to combine multiple tables.
Discuss the role of encryption and hashing in securing assets.
Describe how to effectively use authentication and authorization.
Identify and critically assess issues and concepts related to the protection of information and information systems.
Use risk management principles to assess threats, vulnerabilities, countermeasures and impact contributions at risk in information systems.
Explain how common vulnerability exposures are identified by MITRE.
Analyze an attack surface to find risks and vulnerabilities.
Identify threats, such as social engineering, malware, and web-based exploits.