Cyber security focuses on protecting computer systems from unauthorized access or being otherwise damaged or made inaccessible. Information security is a broader category that protects all information assets, whether in hard copy or digital form.

In this course you'll study network security and vulnerability assessment, information security policy and governance, digital forensics, and ethical hacking.

Also, you will learn how to administer networks, troubleshoot hardware/software problems, and determine the best ways to protect customers and clients from vulnerabilities within the network.

An operating system is software that manages the computer hardware, as well as providing an environment for application programs to run. Perhaps the  most visible aspect of an operating system is the interface to the computer system it provides to the human user.

To best utilize the CPU, modern operating systems employ multiprogramming, which allows several jobs to be in memory at the same time, thus ensuring that the CPU always has a job to execute. Time-sharing systems are an extension of multiprogramming wherein CPU scheduling algorithms rapidly switch between jobs, thus providing the illusion that each job is running concurrently.

The operating system must ensure correct operation of the computer system. To prevent user programs from interfering with the proper operation of the system, the hardware has two modes: user mode and kernel mode.

Operating systems must also be concerned with protecting and securing the operating system and users.