Chevron Left
Back to Operating Systems: Overview, Administration, and Security

Learner Reviews & Feedback for Operating Systems: Overview, Administration, and Security by IBM

4.6
stars
5,450 ratings

About the Course

51% of organizations are planning to increase security investments as a result of a breach (IBM Report). Companies need skilled IT support and cybersecurity professionals now more than ever. Whether you’re just starting out or switching to tech, this course provides the critical operating systems (OS) knowledge you need to move forward. Operating systems are fundamental to all aspects of computing. In this course, you’ll learn foundational concepts common to all operating systems and the unique aspects of Windows, Linux, and MacOS. You’ll explore OS file systems and the associated security features. You'll discover the macOS features that revolutionized OS functionality. Plus, you’ll investigate virtualization and containerization. Additionally, through labs and a final project, you’ll get hands-on managing virus and threat protection, configuring user accounts and permissions with command-line tools, and securing systems against threats. If you’re looking to get started IT or cybersecurity, enroll today to gain essential knowledge in operating systems that enables you to work towards a career in cybersecurity, system administration, network engineering, or IT support....

Top reviews

AW

Invalid date

waoh.....finally done after so many fail in my quiz. the course is great but the narrator are not speaking up. the audio aint clear enough but i enjoy the course.

KS

Invalid date

There is no practical part . T choose this topic , i think it consists practical parT but i am disappointed.

but thanks i got different other conceepts.

THANKS TO IBM TEAM.

Filter by:

726 - 750 of 1,075 Reviews for Operating Systems: Overview, Administration, and Security

By VIJAY V A

•

Apr 28, 2020

Good

By ZBES s

•

Jan 6, 2024

ass

By Rik C

•

Mar 13, 2023

fun

By Jefferson S V

•

Jan 30, 2021

top

By Umesh G

•

Nov 28, 2020

:)

By Vivek R

•

Sep 9, 2020

ok

By Bunyodbek G

•

Apr 25, 2024

n

By Juan A G C

•

Sep 5, 2023

.

By Syed S A

•

Mar 24, 2023

.

By Akarshan S

•

Feb 10, 2023

.

By أمينه ع خ ا

•

Jan 25, 2023

v

By ASMA A A F A

•

Jan 15, 2023

س

By Trigun J

•

Aug 28, 2022

By Chrystalla I

•

Feb 9, 2022

.

By Saood A

•

Aug 29, 2021

5

By Chandrashekara K

•

Dec 23, 2020

g

By Alexis P

•

Nov 21, 2020

E

By Raj D

•

Aug 6, 2020

A

By Kapil C

•

Jul 20, 2020

.

By Yusri A

•

Aug 23, 2023

In an increasingly digital world, the imperative for robust cybersecurity practices has never been more evident. "Comprehensive Insights into Cybersecurity Roles, Processes, and Operating System Security" presents a meticulous exploration of the dynamic landscape of cybersecurity, shedding light on essential roles, intricate processes, and the critical realm of operating system security.

The authors' deep understanding of the subject matter is palpable throughout the text. Their systematic approach to delineating various cybersecurity roles provides an invaluable resource for individuals and organizations striving to comprehend the multifaceted responsibilities that safeguard our digital realm. From the proactive vigilance of penetration testers to the strategic oversight of security architects, each role is dissected with clarity and precision.

The book's real strength, however, lies in its elucidation of cybersecurity processes. In a field where methodologies can make or break an organization's defense mechanisms, the authors offer a comprehensive overview of the processes that underpin a resilient cybersecurity infrastructure. Whether it's the intricacies of threat hunting, incident response, or vulnerability management, the text navigates these processes deftly, making it an indispensable guide for practitioners and students alike.

A significant portion of the book is dedicated to operating system security, and rightly so. Operating systems serve as the bedrock of digital operations, and their protection is paramount. The authors delve deep into the core principles of OS security, from access controls and authentication mechanisms to secure boot processes. In an era marked by rampant cyber threats, this section equips readers with the knowledge needed to fortify their systems against an array of potential vulnerabilities.

While the book excels in many aspects, there are a few areas where it could be further enhanced. The rapidly evolving nature of cybersecurity necessitates a continuous update cycle, and a companion website or online resources could provide readers with the latest insights and emerging trends. Additionally, more practical examples, case studies, and hands-on exercises would empower readers to apply the theoretical knowledge gained from the text.

In conclusion, "Comprehensive Insights into Cybersecurity Roles, Processes, and Operating System Security" stands as a commendable contribution to the cybersecurity literature. Its meticulous exploration of roles, processes, and operating system security, combined with the authors' evident expertise, makes it an essential read for both novices seeking to enter the field and seasoned professionals aiming to bolster their knowledge. With a few enhancements, this book could become an unrivaled companion in the journey toward a more secure digital landscape.

By La V D S

•

Apr 14, 2021

A great experience with Coursera once again as I have access to the learning resources at anytime and I can learn at my own pace; the concepts are explained with so much clarity and examples which makes it easy to understand. I am taking a break for a week to review the first two courses for a better understanding but also to rest my brain and then I will take the third one.

The way the courses are presented almost made me addicted in a way that I just wanted to go the hear what next, what next and what next until I finished in 2 courses in 4 days each while they are designed to complete in 4 weeks, I could study for 16 hours in a row, wow.

Thanks

By Tania V C D

•

Jan 30, 2021

I learned a lot in this course, the professors know a lot about the topics, give some interesting examples, and explain as clearly as possible. About the quizzes, some questions were quite easy but the main one, which evaluates the knowledge learned throughout a full module, summarizes very well the key ideas. The only issue I found is the class material, the quality of the slides is not good and we don't access to those, also the quality of the audio sometimes was not the best which interrupts the understanding of some key ideas. In general, is a good course.

By Emad M

•

Feb 10, 2023

Definitely better than the first IBM course "Introduction to cyber security" , more focused on points . better instructors , better audio and overall quality , but still needs some improvement in the quality

the course is actually pretty easy (even if u don't have a background in cyber security) i don't recommend u taking it unless your gonna finish the whole 8 courses of IBM and take the professional certificate at the end , the knowledge given by this course is basic and u cant find it anywhere else with even a better Presentation and for free

By Renaud L

•

Sep 4, 2019

"Cybersecurity Roles, Processes, and OS Security" contained some redundant material (in week 1 and 2) from the previous course, "Introduction to Cybersecurity Tools and Cyber Attacks", regarding access management and CIA triade. However, weeks 3 and 4 on OS and virtualization were good introductions. I would suggest to add more security material regarding Windows and Linux however, because there is barely anything about it. The title of the course is thus slightly misleading.

By Naif A

•

Oct 12, 2020

A good amount of the videos are not clear audio-wise and visually, some of the things are INAUDIBLE and the transcripts in those cases do not help at all. I think it would be better off for you guys and for us to update the videos with a higher resolution and a better speaker or at least for that speaker to speak through a more CLEAR microphone and take their time when saying the terms.