Endpoints and Systems

Cisco Learning and Certifications via Coursera

Go to Course: https://www.coursera.org/learn/endpoints-and-systems

Introduction

### Course Review: Endpoints and Systems on Coursera In today’s digital landscape, cybersecurity is more important than ever. As more organizations move their operations online, the demand for skilled cybersecurity professionals continues to grow. If you’re an associate-level cybersecurity analyst seeking to enhance your knowledge of endpoint operating systems, Coursera’s course, **Endpoints and Systems**, is a fantastic option. #### Course Overview The **Endpoints and Systems** course offers a comprehensive look at the three most commonly used endpoint operating systems: Windows, Linux, and Mac. Designed specifically for associate-level cybersecurity analysts working in Security Operations Centers (SOCs), this course provides essential knowledge about these systems, especially focusing on Windows and Linux operating systems. By the end of the course, participants will gain a solid foundation in operating system principles, security practices, and the tools needed to effectively manage and secure endpoints in a variety of environments. #### Course Syllabus Breakdown **1. Understanding Windows Operating System Basics** The course begins with a thorough exploration of Windows OS, covering key concepts such as: - **Architecture and Components**: Students will learn the fundamental structure of the Windows operating system and the vulnerabilities associated with it. - **Processes and Threads**: Understanding how Windows handles processes and threads is crucial for identifying and troubleshooting issues within the system. - **Windows Command Line Interface**: Proficiency in using the command line is vital for executing administrative tasks efficiently and effectively. Moreover, the module covers: - Windows networking properties and how to utilize the netstat command. - The importance of Windows Event Viewer in managing system logs and events. - An introduction to Windows PowerShell, a powerful tool for administrative tasks. **2. Understanding Linux Operating System Basics** The Linux module provides insights into: - **Linux Architecture**: Understanding the unique structure of Linux and its file system is critical for any cybersecurity professional. - **File Permissions and Ownership**: Linux’s permission system is particularly relevant in securing systems against unauthorized access. - **Boot Process and Services Management**: Analysing how Linux boots and manages services can aid in troubleshooting and optimizing performance. Additional topics include package managers, Secure Shell Protocol for remote operations, and networking tools within Linux. **3. Understanding Endpoint Security Technologies** In the final module, the focus shifts to endpoint security technologies: - **Host-Based Antivirus and Firewalls**: Students will learn about key concepts such as HIPS (Host Intrusion Prevention Systems), application allow/block lists, and the use of sandboxing in network security. - **Windows Defender and Firewall**: Practical insights into the functionality of built-in security features that come with the Windows OS. This part of the course equips students with the knowledge to implement and evaluate effective security solutions in endpoint environments. #### Course Recommendations **Who Should Take This Course?** The **Endpoints and Systems** course is tailored for: - Associate-level cybersecurity analysts. - Individuals preparing for a role in Security Operations Centers. - Anyone looking to deepen their understanding of endpoint operating systems, particularly Windows and Linux. **Prerequisites**: To get the most out of this course, students should have: - Familiarity with Ethernet and TCP/IP networking. - A working knowledge of both Windows and Linux operating systems. - Basic understanding of networking security concepts. **Final Thoughts** Overall, Coursera's **Endpoints and Systems** course is a highly valuable resource for those looking to advance their cybersecurity career. The course is well-structured, offers a blend of theoretical knowledge and practical tools, and is presented in a format that is accessible to learners of all backgrounds. As the cybersecurity landscape continues to evolve, staying informed and trained in endpoint security systems is critical. I highly recommend this course for anyone looking to boost their skill set and improve their understanding of the crucial role that endpoints play in security operations. Whether you're just starting in the field or looking to solidify your existing knowledge, this course is an excellent step forward in your cybersecurity journey.

Syllabus

Understanding Windows Operating System Basics

The three most used endpoint operating systems are Windows, Linux, and Mac. When investigating security incidents, security analysts often encounter these operating systems running on servers or user end hosts. If you are an associate-level cybersecurity analyst who is working in security operation centers, this course will help you understand basic Windows operations principles. By the end of the course, you will be able to: •By the end of the course, you will be able to: • Describe the history of the Windows operating system and vulnerabilities.• Describe the Windows OS architecture and components.• Describe Windows processes, threads, and handles.• Describe virtual memory allocation in the Windows OS.• Describe Windows services and how they are used.• Describe the functionality of Windows NTFS.• Describe the Windows NTFS structure.• Describe Windows domains and local user accounts.• Describe the Windows graphical user interface and its use.• Describe how to perform tasks in Windows which may require administrator privileges.• Describe the Windows command line interface use and features.• Describe the features of the Windows PowerShell.• Describe how the net command is used for Windows administration and maintenance.• Describe how to control Windows startup services and execute a system shutdown.• Describe how to control Windows services and processes that are operating on a host.• Describe how to monitor Windows system resources with the use of Windows Task Manager.• Describe the Windows boot process, starting services, and registry entries.• Describe how to configure Windows networking properties.• Use the netstat command to view running networking functions.• Access Windows network resources and perform remote functions.• Describe the use of the Windows registry.• Describe how the Windows Event Viewer is used to browse and manage event logs.• Use the Windows Management Instrumentation to manage data and operations on Windows-based operating systems.• Understand common Windows server functions and features.• Describe commonly used third-party tools to manage to manage Windows operating systems.• Explore the Windows operating system and services. The knowledge and skills that students are expected to have before attending this course are: 1. Skills and knowledge equivalent to those learned in Implementing and Administering Cisco Solutions (CCNA) v1.0 course 2. Familiarity with Ethernet and TCP/IP networking 3. Working knowledge of the Windows and Linux operating systems 4. Familiarity with basics of networking security concepts.

Understanding Linux Operating System Basics

If you are an associate-level cybersecurity analyst who is working in security operation centers, this course will help you to understand Linux Operating System basics. By the end of the course, you will be able to: • Provide brief history and benefits of Linux operating system.• Describe Linux architecture.• Provide an overview of the Linux file system.• Describe basic file system navigation and management commands in Linux.• Describe Linux file properties and permissions.• Describe Linux commands that you can use to manage file permissions and ownership.• Describe root and sudo commands in Linux.• Describe Linux storage disks and file systems.• Describe the Linux boot process.• Describe alternate startup options in case Linux is experiencing problems or has been compromised.• Describe the proper procedure to shut down a Linux-based system for maintenance or troubleshooting.• Describe Linux system processes.• Describe mechanisms for interacting with the Linux operating system.• Explore important concepts about the Linux shell and its usage.• Explore Linux piping command output.• Describe other useful Linux command line tools.• Provide an overview of Secure Shell Protocol.• Describe Linux tools and features for managing every aspect of networking and connectivity configuration.• Describe the process of managing services in SysV environments. • Describe tools to track the services running in your Linux installation. • Provide an overview of the Domain Name System. • Explore the Linux operating system tools to test name resolation. • Explore Linux tools to view network traffic. • Configure remote syslog in context to Linux systems. • Describe requirements to run software in a Linux installation. • Explore Linux executable files and interpreters that can execute code. • Describe package managers to install software in Linux • Describe system applications used to serve clients in context to Linux. • Provide an overview of LDAP. • Explore the Linux operating system and services. To be successful in this course, you should have the following background: 1. Skills and knowledge equivalent to those learned in Implementing and Administering Cisco Solutions (CCNA) v1.0 course 2. Familiarity with Ethernet and TCP/IP networking 3. Working knowledge of the Windows and Linux operating systems 4. Familiarity with basics of networking security concepts.

Understanding Endpoint Security Technologies

If you are an associate-level cybersecurity analyst who is working in security operation centers, this course will help you understand endpoint security and familiarity with common endpoint security technologies. By the end of the course, you will be able to: • Describe the host-based personal firewall. • Describe a host-based antivirus. • Describe HIPS software. • Describe application allowed lists and blocked lists. • Describe host-based malware protection. • Describe sandboxing in the context of network security. • Describe how security analysts use file integrity checking tools and sandboxing in the context of network security. • Explore the behavior of two endpoint security applications that are part of the base Windows operating system distribution: Windows Defender and Windows Firewall. • Understand common endpoint security technologies. To be successful in this course, you should have the following background: 1. Skills and knowledge equivalent to those learned in Implementing and Administering Cisco Solutions (CCNA) v1.0 course 2. Familiarity with Ethernet and TCP/IP networking 3. Working knowledge of the Windows and Linux operating systems 4. Familiarity with basics of networking security concepts.

Overview

The three most used endpoint operating systems are Windows, Linux, and Mac. When investigating security incidents, security analysts often encounter these operating systems running on servers or user end hosts. If you are an associate-level cybersecurity analyst who is working in security operation centers, this course will help you understand basic Windows operations principles. By the end of the course, you will be able to: •By the end of the course, you will be able to: • Describe the histo

Skills

Reviews