0524 - Systems and Platform Security in Practice
Course Description
As organizations increasingly rely on cloud computing, understanding and mitigating modern security threats is essential for IT professionals. This course provides an introduction to security issues in modern computing systems and platforms, with a particular focus on cloud computing environments. You will examine common causes of security breaches and learn methods to detect, isolate, and prevent them effectively.
By the end of this course, you will be able to identify common attack vectors in modern cloud environments and evaluate the effectiveness and limitations of security features offered by operating systems, compilers, and hardware.
Using a simulated lab environment, you will build practical skills in identifying vulnerabilities, applying tools and techniques for bug detection and sandboxing, and exploring the latest advancements in hardware security.
This nine-week course includes:
- A one-hour live orientation session
- Weekly optional drop-in Q&A sessions with the instructor
- Weekly online learning and hands-on lab activities
Overview
- Cutting-edge content: Dive into the latest cybersecurity challenges, tools, and techniques that address emerging threats and vulnerabilities in modern systems and cloud environments. This course provides practical skills rooted in the most current advancements in the field.
- Focus on critical topics: Build expertise in three critical areas of:
- Program security: Learn to identify vulnerabilities, attack vectors, and mitigation techniques to safeguard software systems.
- Operating system security: Understand OS security risks and implement processes to protect against threats.
- Hardware security: Explore cutting-edge hardware-based security capabilities that enhance overall system protection.
- Practical lab-based learning: Experience the impact of common vulnerabilities and attacks through hands-on labs, explore sandbox evasion and access control, familiarize yourself with commonly used tools for bug finding, and learn more about the latest hardware security technologies.
- Showcase your learning: Summarize your learning by creating a detailed plan to implement multi-layered security controls in your organization, addressing real-world challenges with the strategies and techniques gained from the course.
- Flexible learning experience: Progress at your own pace with a generous timeline for tasks and detailed lab guides. Recorded orientation sessions provide additional flexibility for busy schedules.
- Expert support: Connect with your instructor through weekly live Q&A sessions and actively monitored discussion forums. Receive personalized guidance to enhance your learning experience and address challenges as they arise.
System requirements
- Students will use the online CloudLabs platform to complete the hands-on labs. No software installation needed.
Who Should Enrol
This course is for mid-career professionals looking to specialize in cloud security to stay competitive, improve job prospects, and earn certifications that are increasingly in demand within modern tech ecosystems.
- Programmers/Developers: As cloud platforms become more integral to software deployment, understanding cloud-specific security measures ensures their code is resilient to vulnerabilities, integrates secure development practices, and complies with industry standards.
- Cybersecurity Professionals: The shift to cloud computing introduces new security challenges such as data privacy, access control, and securing distributed infrastructure. Mastering cloud security helps them mitigate emerging threats, improve cloud incident response, and safeguard critical assets.
- IT Professionals: Managing and securing cloud infrastructures requires specialized knowledge of how to protect cloud platforms and data. This course equips them with the skills to maintain secure cloud operations, monitor environments for security breaches, and implement compliance frameworks.
What You Will Learn
- Explain the risks associated with cloud infrastructure and platforms
- Identify attack vectors for virtual machines or cloud-based applications
- Articulate how endpoint security helps mitigate attacks
- Demonstrate how to design secure authentication and access control schemes
- Describe security features provided in modern operating systems
- Describe how to augment the security of cloud applications automatically
- Model how to find vulnerabilities with state-of-the-art tools
- List state-of-the-art hardware-assisted security techniques
- Analyse potential side-channels in hardware and discuss fixes for them
- Summarise how to plan and implement security controls in cloud setting
Module Title |
Main Topics / Learning Outcomes |
Module 1: Introduction to Systems and Platform Security |
|
Module 2: Common Attack Vectors |
|
Module 3: Security Features in Operating Systems |
|
Module 4: Compiler-Assisted Security |
|
Module 5: Hardware-Assisted Security |
|