CSS 201: Operating System and Asset Security

Course Description

This course introduces Linux, an operating system commonly used by cybersecurity professionals. It provides an overview of the Linux command line through the Bash shell and how to perform actions such as to navigate and manage the file system and authenticate users. It will also provide an overview of how to interact with a database using SQL. Additionally, the course will build an understanding of how assets are classified. There will be an emphasis on common threats and vulnerabilities, and the security controls used by organizations to protect valuable information and mitigate risk. (3 credits)

Prerequisite

  • CSS 101: Cybersecurity Fundamentals

Student Learning Outcomes (SLOs)

Upon completion of the course, the students will be able to:

  1. Explain the relationship between operating systems, applications, and hardware.
  2. Compare a graphical user interface to a command line interface.
  3. Identify the unique features of common Linux distributions.
  4. Navigate and manage the file system using Linux commands via the Bash shell.
  5. Use Linux commands via the Bash shell to authenticate and authorize users.
  6. Describe how a relational database is organized.
  7. Use SQL to retrieve information from a database and apply filters to SQL queries and use joins to combine multiple tables.
  8. Discuss the role of encryption and hashing in securing assets.
  9. Describe how to effectively use authentication and authorization.
  10. Identify and critically assess issues and concepts related to the protection of information and information systems.
  11. Use risk management principles to assess threats, vulnerabilities, countermeasures, and impact contributions at risk in information systems.
  12. Explain how common vulnerability exposures are identified by MITRE.
  13. Analyze an attack surface to find risks and vulnerabilities.
  14. Identify threats, such as social engineering, malware, and web-based exploits.

Course Activities and Grading

AssignmentsWeight

Discussion (Weeks 1-8)

16%

Assignment Activities (Weeks 1-8)

72%

Labs (Weeks 2, 3, 5, 6)

12%

Total

100%

Required Textbooks

  • No required textbook. This course utilizes Coursera and the Google Tools of the Trade: Linux and SQL course which is part of the Google Cybersecurity Certificate program. The first time you access a Coursera course, you will have to set up your Coursera account. Please make sure to use your charteroak.edu email address. It may also ask you to provide a secondary email. You may use a personal email if you wish. Then, enroll in the course.

Course Schedule

Week

SLOs

Readings and Exercises

Assignments

1

1, 2

Topics: Introduction to Operating Systems

  • Complete Week 1 required readings and viewings
  • Review Getting Started information in Blackboard
  • Review the course syllabus
  • Review the Lecture material
  • Participate in the discussions
  • Activity: Introduction to Operating Systems
  • Activity: Working with Files in Windows and Linux

2

3,4

Topic: The Linux Operating System, Users and Permissions

  • Complete Week 2 required readings and viewings
  • Review the Lecture material
  • Participate in the discussions
  • Activity: Linux Operating System
  • Activity: Users, Administrators, Groups and Permissions
  • Submit the Week 2 - Lab 1

3

5

Topic: Linux Commands in the Bash Shell

  • Complete Week 3 required readings and viewings
  • Review the Lecture material.
  • Participate in the discussions.
  • Activity: Tools of the Trade: Linux and SQL
  • Activity: Package and Software Management
  • Submit the Week 3 – Lab 2

4

6,7

Topic: Filesystems, Databases and SQL

  • Complete Week 4 required readings and viewings
  • Review the Lecture material.
  • Participate in the discussions.
  • Activity: Databases and SQL
  • Activity: Filesystems

5

8

Topic: Introduction to Asset Security

  • Complete Week 5 required readings and viewings
  • Review the Lecture material.
  • Participate in the discussions.
  • Activity: Introduction to Asset Security
  • Activity: Process Management
  • Submit the Week 5 - Lab 3

6

9,10

Topics: Protect Organizational Assets

  • Complete Week 6 required readings and viewings
  • Review the Lecture material
  • Participate in the discussions
  • Activity: Protect Organizational Assets
  • Activity: Pelcgbybtl (Cryptology)
  • Submit the Week 6 - Lab 4

7

11,12

Topics: Vulnerabilities in Systems

  • Complete Week 7 required readings and viewings
  • Review the Lecture material
  • Participate in the discussions
  • Activity: Vulnerabilities in Systems
  • Activity: Security Threats
  • Submit the Week 7 – Assignment 1

8

13,14

Topics: Threats to Asset Security

  • Complete Week 8 required readings and viewings
  • Review the Lecture material
  • Participate in the discussions
  • Activity: Threats to Asset Security
  • Submit the Week 8 - Assignment 2
  • Complete Course Evaluation

COSC Accessibility Statement

Charter Oak State College encourages students with disabilities, including non-visible disabilities such as chronic diseases, learning disabilities, head injury, attention deficit/hyperactive disorder, or psychiatric disabilities, to discuss appropriate accommodations with the Office of Accessibility Services at OAS@charteroak.edu.

COSC Policies, Course Policies, Academic Support Services and Resources

Students are responsible for knowing all Charter Oak State College (COSC) institutional policies, course-specific policies, procedures, and available academic support services and resources. Please see COSC Policies for COSC institutional policies, and see also specific policies related to this course. See COSC Resources for information regarding available academic support services and resources.