We may earn an affiliate commission when you visit our partners.
Course image
Cisco Learning & Certifications

The three most used endpoint operating systems are Windows, Linux, and Mac. When investigating security incidents, security analysts often encounter these operating systems running on servers or user end hosts. If you are an associate-level cybersecurity analyst who is working in security operation centers, this course will help you understand basic Windows operations principles. By the end of the course, you will be able to:

•By the end of the course, you will be able to:

• Describe the history of the Windows operating system and vulnerabilities.

• Describe the Windows OS architecture and components.

Read more

The three most used endpoint operating systems are Windows, Linux, and Mac. When investigating security incidents, security analysts often encounter these operating systems running on servers or user end hosts. If you are an associate-level cybersecurity analyst who is working in security operation centers, this course will help you understand basic Windows operations principles. By the end of the course, you will be able to:

•By the end of the course, you will be able to:

• Describe the history of the Windows operating system and vulnerabilities.

• Describe the Windows OS architecture and components.

• Describe Windows processes, threads, and handles.

• Describe virtual memory allocation in the Windows OS.• Describe Windows services and how they are used.

• Describe the functionality of Windows NTFS.

• Describe the Windows NTFS structure.

• Describe Windows domains and local user accounts.

• Describe the Windows graphical user interface and its use.

• Describe how to perform tasks in Windows which may require administrator privileges.• Describe the Windows command line interface use and features.

• Describe the features of the Windows PowerShell.

• Describe how the net command is used for Windows administration and maintenance.

•Describe how to control Windows startup services and execute a system shutdown.

• Describe how to control Windows services and processes that are operating on a host.

• Describe how to monitor Windows system resources with the use of Windows Task Manager.

• Describe the Windows boot process, starting services, and registry entries.

• Describe how to configure Windows networking properties.

•Use the netstat command to view running networking functions.

•Access Windows network resources and perform remote functions.

•Describe the use of the Windows registry.

•Describe how the Windows Event Viewer is used to browse and manage event logs.

• Use the Windows Management Instrumentation to manage data and operations on Windows-based operating systems.• Understand common Windows server functions and features.

• Describe commonly used third-party tools to manage to manage Windows operating systems.

• Explore the Windows operating system and services.

The knowledge and skills that students are expected to have before attending this course are:

1. Skills and knowledge equivalent to those learned in Implementing and Administering Cisco Solutions (CCNA) v1.0 course

2. Familiarity with Ethernet and TCP/IP networking

3. Working knowledge of the Windows and Linux operating systems

4. Familiarity with basics of networking security concepts.

Enroll now

What's inside

Syllabus

Understanding Windows Operating System Basics
The three most used endpoint operating systems are Windows, Linux, and Mac. When investigating security incidents, security analysts often encounter these operating systems running on servers or user end hosts. If you are an associate-level cybersecurity analyst who is working in security operation centers, this course will help you understand basic Windows operations principles. By the end of the course, you will be able to: •By the end of the course, you will be able to: • Describe the history of the Windows operating system and vulnerabilities.• Describe the Windows OS architecture and components.• Describe Windows processes, threads, and handles.• Describe virtual memory allocation in the Windows OS.• Describe Windows services and how they are used.• Describe the functionality of Windows NTFS.• Describe the Windows NTFS structure.• Describe Windows domains and local user accounts.• Describe the Windows graphical user interface and its use.• Describe how to perform tasks in Windows which may require administrator privileges.• Describe the Windows command line interface use and features.• Describe the features of the Windows PowerShell.• Describe how the net command is used for Windows administration and maintenance.• Describe how to control Windows startup services and execute a system shutdown.• Describe how to control Windows services and processes that are operating on a host.• Describe how to monitor Windows system resources with the use of Windows Task Manager.• Describe the Windows boot process, starting services, and registry entries.• Describe how to configure Windows networking properties.• Use the netstat command to view running networking functions.• Access Windows network resources and perform remote functions.• Describe the use of the Windows registry.• Describe how the Windows Event Viewer is used to browse and manage event logs.• Use the Windows Management Instrumentation to manage data and operations on Windows-based operating systems.• Understand common Windows server functions and features.• Describe commonly used third-party tools to manage to manage Windows operating systems.• Explore the Windows operating system and services. The knowledge and skills that students are expected to have before attending this course are: 1. Skills and knowledge equivalent to those learned in Implementing and Administering Cisco Solutions (CCNA) v1.0 course 2. Familiarity with Ethernet and TCP/IP networking 3. Working knowledge of the Windows and Linux operating systems 4. Familiarity with basics of networking security concepts.
Read more
Understanding Linux Operating System Basics
If you are an associate-level cybersecurity analyst who is working in security operation centers, this course will help you to understand Linux Operating System basics. By the end of the course, you will be able to: • Provide brief history and benefits of Linux operating system.• Describe Linux architecture.• Provide an overview of the Linux file system.• Describe basic file system navigation and management commands in Linux.• Describe Linux file properties and permissions.• Describe Linux commands that you can use to manage file permissions and ownership.• Describe root and sudo commands in Linux.• Describe Linux storage disks and file systems.• Describe the Linux boot process.• Describe alternate startup options in case Linux is experiencing problems or has been compromised.• Describe the proper procedure to shut down a Linux-based system for maintenance or troubleshooting.• Describe Linux system processes.• Describe mechanisms for interacting with the Linux operating system.• Explore important concepts about the Linux shell and its usage.• Explore Linux piping command output.• Describe other useful Linux command line tools.• Provide an overview of Secure Shell Protocol.• Describe Linux tools and features for managing every aspect of networking and connectivity configuration.• Describe the process of managing services in SysV environments. • Describe tools to track the services running in your Linux installation. • Provide an overview of the Domain Name System. • Explore the Linux operating system tools to test name resolation. • Explore Linux tools to view network traffic. • Configure remote syslog in context to Linux systems. • Describe requirements to run software in a Linux installation. • Explore Linux executable files and interpreters that can execute code. • Describe package managers to install software in Linux • Describe system applications used to serve clients in context to Linux. • Provide an overview of LDAP. • Explore the Linux operating system and services. To be successful in this course, you should have the following background: 1. Skills and knowledge equivalent to those learned in Implementing and Administering Cisco Solutions (CCNA) v1.0 course 2. Familiarity with Ethernet and TCP/IP networking 3. Working knowledge of the Windows and Linux operating systems 4. Familiarity with basics of networking security concepts.
Understanding Endpoint Security Technologies
If you are an associate-level cybersecurity analyst who is working in security operation centers, this course will help you understand endpoint security and familiarity with common endpoint security technologies. By the end of the course, you will be able to: • Describe the host-based personal firewall. • Describe a host-based antivirus. • Describe HIPS software. • Describe application allowed lists and blocked lists. • Describe host-based malware protection. • Describe sandboxing in the context of network security. • Describe how security analysts use file integrity checking tools and sandboxing in the context of network security. • Explore the behavior of two endpoint security applications that are part of the base Windows operating system distribution: Windows Defender and Windows Firewall. • Understand common endpoint security technologies. To be successful in this course, you should have the following background: 1. Skills and knowledge equivalent to those learned in Implementing and Administering Cisco Solutions (CCNA) v1.0 course 2. Familiarity with Ethernet and TCP/IP networking 3. Working knowledge of the Windows and Linux operating systems 4. Familiarity with basics of networking security concepts.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Provides foundational knowledge in Microsoft Windows operating systems' and services' basic functions, architecture, and principles
Examines common Microsoft Windows' tools to manage and configure networks and connectivity
Suitable for associate-level cybersecurity analysts who work in security operation centers
Covers advanced topics such as sandboxing and file integrity checking, which are essential for network security
Taught by Cisco Learning & Certifications, a reputable organization known for its expertise in networking and cybersecurity

Save this course

Save Endpoints and Systems to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Endpoints and Systems with these activities:
Practice Linux Commands
Practice Linux Commands: Completing practice drills on Linux commands will solidify your understanding of them and prepare you for successfully using them in the course.
Browse courses on Linux Commands
Show steps
  • Use the course materials to practice using Linux commands.
  • Find online resources and tutorials that provide practice exercises for Linux commands.
Troubleshoot Linux Issues
Refresh your skills in Troubleshooting Linux Issues: Revisiting and practicing troubleshooting techniques will improve your problem-solving abilities and prepare you for real-world scenarios in the course.
Browse courses on Linux Troubleshooting
Show steps
  • Review the course materials on Linux troubleshooting.
  • Create a virtual environment or use a physical device to simulate Linux issues.
Discuss Windows Features
Discuss Windows Features: Engaging in peer discussions on Windows Features will enhance your understanding of the concepts and allow you to learn from others' perspectives.
Show steps
  • Join or create a study group with classmates.
  • Choose a specific topic related to Windows Features to discuss.
Two other activities
Expand to see all activities and additional details
Show all five activities
Configure Endpoint Security
Configure Endpoint Security: By practicing configuring Endpoint Security, you will improve your ability to apply these concepts to your projects and assignments in the course.
Browse courses on Endpoint Security
Show steps
  • Review the course materials on Endpoint Security.
  • Set up a virtual environment or use a physical device to practice configuring Endpoint Security.
Consolidate Course Notes
Consolidate Course Notes: Compiling your notes will help you synthesize the information and reinforce your understanding of the course materials.
Show steps
  • Review your lecture notes, readings, and assignments.
  • Create a centralized document or digital space to organize your notes.

Career center

Learners who complete Endpoints and Systems will develop knowledge and skills that may be useful to these careers:
Information Security Analyst
The Information Security Analyst role is responsible for protecting an organization's computer networks and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. The course on Endpoints and Systems will provide you with the knowledge and skills you need to succeed in this role. You will learn about the different types of endpoint devices, their vulnerabilities, and how to protect them from attack. You will also learn about the different types of security controls that can be implemented to protect an organization's network and systems.
Security Engineer
The Security Engineer role is responsible for designing, implementing, and maintaining an organization's security infrastructure. The course on Endpoints and Systems will provide you with the knowledge and skills you need to succeed in this role. You will learn about the different types of security technologies that are available, and how to deploy and configure them to protect an organization's network and systems.
Cybersecurity Analyst
The Cybersecurity Analyst role is responsible for analyzing an organization's security risks and threats. The course on Endpoints and Systems will provide you with the knowledge and skills you need to succeed in this role. You will learn about the different types of security threats that are available, and how to detect and mitigate them.
Network Administrator
The Network Administrator role is responsible for managing an organization's computer networks. The course on Endpoints and Systems will provide you with the knowledge and skills you need to succeed in this role. You will learn about the different types of network devices that are available, and how to configure and manage them to provide a secure and reliable network.
Systems Administrator
The Systems Administrator role is responsible for managing an organization's computer systems. The course on Endpoints and Systems will provide you with the knowledge and skills you need to succeed in this role. You will learn about the different types of operating systems that are available, and how to configure and manage them to provide a secure and reliable computing environment.
IT Auditor
The IT Auditor role is responsible for reviewing an organization's IT systems and controls to ensure that they are compliant with regulations and standards. The course on Endpoints and Systems will provide you with the knowledge and skills you need to succeed in this role. You will learn about the different types of IT audits that are performed, and how to conduct them effectively.
Security Consultant
The Security Consultant role is responsible for providing advice and guidance to organizations on how to improve their security posture. The course on Endpoints and Systems will provide you with the knowledge and skills you need to succeed in this role. You will learn about the different types of security threats that are available, and how to develop and implement security solutions to mitigate them.
Incident Responder
The Incident Responder role is responsible for responding to and investigating security incidents. The course on Endpoints and Systems will provide you with the knowledge and skills you need to succeed in this role. You will learn about the different types of security incidents that can occur, and how to respond to them effectively.
Penetration Tester
The Penetration Tester role is responsible for testing an organization's security defenses to identify vulnerabilities that could be exploited by attackers. The course on Endpoints and Systems will provide you with the knowledge and skills you need to succeed in this role. You will learn about the different types of penetration tests that are performed, and how to conduct them effectively.
Malware Analyst
The Malware Analyst role is responsible for analyzing malware to identify its capabilities and how to mitigate it. The course on Endpoints and Systems will provide you with the knowledge and skills you need to succeed in this role. You will learn about the different types of malware that are available, and how to analyze them effectively.
Vulnerability Manager
The Vulnerability Manager role is responsible for identifying and managing vulnerabilities in an organization's IT systems. The course on Endpoints and Systems will provide you with the knowledge and skills you need to succeed in this role. You will learn about the different types of vulnerabilities that are available, and how to assess and mitigate them.
Forensics Analyst
The Forensics Analyst role is responsible for investigating and analyzing digital evidence to identify and apprehend criminals. The course on Endpoints and Systems will provide you with the knowledge and skills you need to succeed in this role. You will learn about the different types of digital evidence that can be collected, and how to analyze it effectively.
Security Architect
The Security Architect role is responsible for designing and implementing an organization's security architecture. The course on Endpoints and Systems will provide you with the knowledge and skills you need to succeed in this role. You will learn about the different types of security architectures that are available, and how to develop and implement them effectively.
Chief Information Security Officer (CISO)
The Chief Information Security Officer (CISO) role is responsible for overseeing an organization's security strategy and operations. The course on Endpoints and Systems will provide you with the knowledge and skills you need to succeed in this role. You will learn about the different aspects of information security, and how to develop and implement a comprehensive security strategy.
Information Security Manager
The Information Security Manager role is responsible for managing an organization's information security program. The course on Endpoints and Systems may be useful for this role, as it will provide you with a foundation in information security. You will learn about the different aspects of information security, and how to develop and implement a comprehensive security program.

Reading list

We've selected 11 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Endpoints and Systems.
Provides a comprehensive overview of the Linux kernel, covering topics such as process scheduling, memory management, and device drivers. It valuable resource for anyone who wants to understand how Linux works.
Provides a comprehensive overview of endpoint security, covering topics such as malware protection, intrusion detection, and incident response. It valuable resource for anyone who wants to understand how to protect endpoints from cyberattacks.
Provides a comprehensive overview of computer viruses, covering topics such as how they work, how to detect them, and how to protect against them. It valuable resource for anyone who wants to understand how to protect endpoints from malware.
Provides a comprehensive overview of Linux administration, covering topics such as installation, configuration, and management. It valuable resource for anyone who wants to understand how to manage Linux.
Provides a comprehensive overview of network security, covering topics such as cryptography, firewalls, and intrusion detection. It valuable resource for anyone who wants to understand how to protect networks from cyberattacks.
Provides a comprehensive overview of malware analysis, covering topics such as how to identify malware, how to analyze malware, and how to protect against malware. It valuable resource for anyone who wants to understand how to protect endpoints from malware.
Provides a comprehensive overview of computer forensics, covering topics such as how to collect evidence, how to analyze evidence, and how to present evidence. It valuable resource for anyone who wants to understand how to investigate cybercrimes.
Provides a comprehensive overview of penetration testing, covering topics such as how to identify vulnerabilities, how to exploit vulnerabilities, and how to protect against vulnerabilities. It valuable resource for anyone who wants to understand how to protect endpoints from cyberattacks.
Provides a comprehensive overview of exploitation, covering topics such as how to identify vulnerabilities, how to exploit vulnerabilities, and how to protect against vulnerabilities. It valuable resource for anyone who wants to understand how to protect endpoints from cyberattacks.
Provides a comprehensive overview of security engineering, covering topics such as how to design secure systems, how to implement secure systems, and how to test secure systems. It valuable resource for anyone who wants to understand how to protect endpoints from cyberattacks.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Endpoints and Systems.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser