Operating System & Multimedia CyberSecurity
Overview
- General Information Security Principles
- Secure System Boot Services
- Local and remote account administration including remote access services such as SSH and WinRM
- Operating system privilege escalation and privilege presentation tools (UAC and Sudo)
- Automating Systems Setup and configuration of operating systems
- Traditional memory attacks (Stack smashing)
- Host-based Intrusion Detection and Prevention (ex. OSSEC, AIDE)
- SEIM/SOAR systems
- Linux Kernel Messages and Kernel Security modules (ex. SeLinux, AppArmor)
- Windows and *nix account administration
- Windows and *nix local firewall administration
- Operating system logging facilities for Windows and *nix
- Local System Service hardening
- Web Server hardening
The methods of instruction for this course will include lectures, seminars, demonstrations, and hands-on assignments/projects.
Assessment will be in accordance with the ÁñÁ«ÊÓƵ Evaluation Policy.
Assignments |
10% - 15% |
Midterm Exam * |
30% – 35% |
Final Exam * |
30% – 40% |
Research Project |
15% - 20% |
Total |
100% |
* Practical hands-on computer exam
In order to pass the course, students must, in addition to receiving an overall course grade of 50%, also achieve a grade of at least 50% on the combined weighted examination components (including quizzes, tests, exams).
Students may conduct research as part of their coursework in this class. Instructors for the course are responsible for ensuring that student research projects comply with College policies on ethical conduct for research involving humans, which can require obtaining Informed Consent from participants and getting the approval of the ÁñÁ«ÊÓƵ Research Ethics Board prior to conducting the research.
At the end of this course, the successful student will be able to:
- Implement and utilize the windows and Linux operating systems effectively.
- Demonstrate the process of operating system hardening.
- Configure operating systems on heterogeneous operating systems securely.
- Setup and automate patch management for computing devices.
- Setup and implementation, monitoring of System Logging using Syslog and SEIM systems.
- Implement and monitor Host Intrusion Detection and Prevention Systems.
- Manage Windows and Unix Endpoint Protection.
- Implement local file and file system encryption.
- Implement a host-based operating system kernel and jailing technologies.
- Analyze and apply security policies for data at rest and data in processing.
- Evaluate and administer host-based firewalls.
Course Materials to be provided by the instructor and/or approved textbooks from the department.
Requisites
Prerequisites
Corequisites
Courses listed here must be completed either prior to or simultaneously with this course:
- No corequisite courses
Equivalencies
Courses listed here are equivalent to this course and cannot be taken for further credit:
- No equivalency courses
Course Guidelines
Course Guidelines for previous years are viewable by selecting the version desired. If you took this course and do not see a listing for the starting semester / year of the course, consider the previous version as the applicable version.
Course Transfers
These are for current course guidelines only. For a full list of archived courses please see
Institution | Transfer Details for CSIS 4450 |
---|---|
Alexander College (ALEX) | ALEX CPSC 2XX (3) |
Athabasca University (AU) | AU COMP 3XX (3) |
Coast Mountain College (CMTN) | No credit |
College of New Caledonia (CNC) | CNC CSC 2XX (3) |
Columbia College (COLU) | COLU CSCI 2nd (3) |
Kwantlen Polytechnic University (KPU) | No credit |
LaSalle College Vancouver (LCV) | LCV VGP 4XX (3) |
Northern Lights College (NLC) | NLC ITEC 2XX (3) |
Okanagan College (OC) | OC COSC 3XX (3) |
Simon Fraser University (SFU) | SFU CMPT 4XX (3) |
Thompson Rivers University (TRU) | TRU COMP 3XXX (3) |
University Canada West (UCW) | UCW CPSC 4XX (3) |
University of Northern BC (UNBC) | UNBC CPSC 499 (3) |
University of the Fraser Valley (UFV) | UFV COMP 340 (3) |