The aim of this course is to introduce students to different operating systems (OS) and how to apply their inherent security features. This course will address theoretical concepts of operating system security, security architectures of current operating systems, and details of security implementation using best practices to configure operating systems to industry security standards. It also emphasises how to use tools and techniques to decrease risks arising from vulnerabilities in operating systems and applications.