We may earn an affiliate commission when you visit our partners.
Course image
Prof. 沈晴霓 (Shen Qingni), Ph.D.

操作系统是计算机系统的基础软件,而系统虚拟化已成为云计算平台的核心技术,没有它们提供的安全性,这些计算机系统及其上数据的安全性都将无法保障。本课程将从理论与工程实践相结合的角度,介绍操作系统(Linux)与系统虚拟化(Xen)安全相关理论、技术和方法,包括:安全概念、安全机制、安全模型、安全体系结构、安全开发方法、安全标准与评测方法等,帮助你深入学习和理解该领域的知识体系、实践技术和方法。

Enroll now

What's inside

Syllabus

计算机系统安全的重要性与评测标准
计算机系统基本安全概念和设计思想
访问控制机制
Read more
可追究机制
连续保护机制(I)
连续保护机制(II)
安全模型(I)
安全体系结构
可信计算技术
安全操作系统的设计与实现技术案例
基于安全操作系统的应用-数据库安全
系统虚拟化安全与虚拟可信平台技术
期末考试

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
构建操作系统安全和虚拟化安全的基础知识。
实践性和理论相结合,有助于加深理解。
由资深人工智能领域专家授课,具有较高的权威性。
内容覆盖全面,涵盖操作系统安全和虚拟化安全的核心知识点。
需具备一定的计算机系统安全基础。

Save this course

Save 操作系统与虚拟化安全 to your list so you can find it easily later:
Save

Reviews summary

Comprehensive security overview

This course is described as offering a comprehensive overview of operating systems and virtualization security, and reviewers agree. One reviewer noted that the course provided a "comparatively complete understanding of security". Another reviewer remarked that the course was a good starting point for learning about operating system and virtualization security. Consider exploring this course if you seek an introduction to this subject.
Provides a comprehensive understanding of security.
"比较全面的了解了安全。"

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in 操作系统与虚拟化安全 with these activities:
Review notes on Computer System Architecture
Review the foundational concepts of computer systems to ensure you have a strong understanding before beginning the course.
Browse courses on Computer Systems
Show steps
  • Read through your notes from previous courses or textbooks on computer system architecture.
  • Make sure you understand the basic concepts such as CPU, memory, and I/O devices.
  • If there are any concepts you are unfamiliar with, do some research online or ask for help from a friend or tutor.
Explore Tutorials on Xen Virtualization
Expanding your knowledge of Xen virtualization by following online tutorials.
Show steps
  • Search online for tutorials on Xen virtualization.
  • Choose a tutorial that covers the aspects of Xen virtualization that you are interested in learning more about.
  • Follow the steps in the tutorial and experiment with the code or examples provided.
Join a Study Group with Classmates
Collaborating with other students to discuss course materials and concepts.
Show steps
  • Reach out to classmates via email or attend a meet and greet event to find potential study partners.
  • Establish a regular meeting schedule and decide which topics you will cover at each session.
  • During the sessions, engage in discussions, ask questions, and work through problems together.
Two other activities
Expand to see all activities and additional details
Show all five activities
Write a Summary of Each Lecture
Reinforcing your understanding by writing down the key points of each lecture in your own words.
Show steps
  • Attend the lectures and take detailed notes.
  • After each lecture, take some time to review your notes and identify the main points.
  • Write a summary of the lecture, using your own words and including any examples or illustrations that you found helpful.
Build a Simple Xen Virtual Machine
Applying your understanding of Xen virtualization by creating your own virtual machine.
Show steps
  • Install Xen on a host machine.
  • Create a new virtual machine using Xen.
  • Install an operating system on the virtual machine.
  • Test the virtual machine to ensure that it is working properly.

Career center

Learners who complete 操作系统与虚拟化安全 will develop knowledge and skills that may be useful to these careers:
Virtualization Architect
Virtualization Architects work to design and implement virtualization solutions for an organization. This course may be useful as it provides a foundation in system virtualization security and virtual可信平台技术.
Cloud Security Engineer
Cloud Security Engineers work to protect cloud-based systems and data from cyberattacks. This course may be useful as it provides a foundation in system virtualization security and virtual可信平台技术.
Security Analyst
Security Analysts work to identify and mitigate security risks to an organization's systems and data. This course may be useful as it provides a foundation in operating system security, system virtualization security, and security models.
Security Consultant
Security Consultants work to help organizations improve their security posture. This course may be useful as it provides a foundation in operating system security, system virtualization security, and security models.
Incident Responder
Incident Responders work to respond to and mitigate security incidents. This course may be useful as it provides a foundation in operating system security, system virtualization security, and security models.
Cybersecurity Engineer
Cybersecurity Engineers work to protect computer systems and networks from cyberattacks. This course may be useful as it provides a foundation in operating system security, system virtualization security, and security models.
Systems Administrator
Systems Administrators work to manage and maintain computer systems. This course may be useful as it provides a foundation in operating system security and system virtualization security.
Information Security Manager
Information Security Managers work to develop and implement security policies and procedures for an organization. This course may be useful as it provides a foundation in operating system security, system virtualization security, and security models.
Security Architect
Security Architects work to design and implement security solutions for an organization. This course may be useful as it provides a foundation in operating system security, system virtualization security, and security models.
Security Researcher
Security Researchers work to identify and develop new security technologies. This course may be useful as it provides a foundation in operating system security, system virtualization security, and security models.
Computer Systems Analyst
Computer Systems Analysts work to design, implement, and maintain computer systems. This course may be useful as it provides a foundation in operating system security, system virtualization security, and security models.
Penetration Tester
Penetration Testers work to identify vulnerabilities in computer systems and networks. This course may be useful as it provides a foundation in operating system security, system virtualization security, and security models.
Software Engineer
Software Engineers work to design, develop, and maintain software systems. This course may be useful as it provides a foundation in operating system security and system virtualization security.
Database Administrator
Database Administrators work to manage and maintain databases. This course may be useful as it provides a foundation in database security and system virtualization security.
Network Security Engineer
Network Security Engineers work to protect a company's network devices and data from cyberattacks. This course may be useful as it provides a foundation in system virtualization security and virtual可信平台技术, which are both essential for securing networks.

Reading list

We've selected ten books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in 操作系统与虚拟化安全.
涵盖计算机系统各个方面,包括处理器架构、操作系统、虚拟化和网络,具有很强的理论深度和广度,可以为本课程中涉及的操作系统和虚拟化安全技术提供坚实的背景知识。
全面介绍计算机安全的基本概念、技术和方法,是理解操作系统和系统虚拟化安全的基础读物。
提供操作系统设计的全面概述,包括进程、线程、内存管理、文件系统和安全。有助于理解本课程中涉及的操作系统安全概念和机制。
系统安全工程的经典著作,帮助读者理解安全工程的原则和实践,提高系统虚拟化安全的工程能力。
安全编码的权威指南,帮助读者掌握安全编码的原则和实践,提高操作系统和系统虚拟化安全的代码质量。
软件安全评估的实用指南,帮助读者掌握软件漏洞的识别和修复技术,提高操作系统和系统虚拟化安全的漏洞管理能力。
帮助开发者掌握安全软件设计的原则和实践,提高操作系统和系统虚拟化安全的软件开发能力。
网络安全的基础读物,帮助读者理解网络安全的基本概念和技术,为理解系统虚拟化安全中的网络安全方面提供背景知识。
帮助读者掌握软件故障注入技术,提高操作系统和系统虚拟化安全的测试和评估能力。

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to 操作系统与虚拟化安全.
操作系统原理(Operating Systems)
Most relevant
计算机操作系统
Most relevant
系统平台与计算环境
Most relevant
离散数学概论 Discrete Mathematics Generality
Most relevant
JAVA程序设计进阶
Most relevant
循序渐进练瑜伽
Most relevant
生物信息学: 导论与方法
Most relevant
有限元分析与应用 | Finite Element Method (FEM) Analysis and...
Most relevant
算法设计与分析 Design and Analysis of Algorithms
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser