Skip to main content

Operating System Security Training

Real-world skills taught by professionals who actually defend systems every day. We focus on practical defense techniques that you can start using immediately.

Request Program Details

Three Pathways, One Goal

Choose the track that fits your current experience. Each program runs independently starting September 2025.

Foundation Track

14 weeks

Perfect if you're switching careers or just starting out. We cover Linux and Windows security basics without assuming you already know everything.

  • Command line essentials for both systems
  • User permissions and access control
  • Basic firewall configuration
  • System hardening fundamentals

Practitioner Track

18 weeks

For IT professionals who want to specialize in security. We skip the basics and dive into defensive architecture.

  • Threat modeling for OS environments
  • Advanced access controls and policies
  • Intrusion detection setup
  • Incident response procedures

Advanced Track

22 weeks

Designed for security professionals handling enterprise systems. We cover sophisticated attack vectors and defense strategies.

  • Kernel-level security mechanisms
  • Custom security module development
  • Complex threat hunting techniques
  • Security automation frameworks

Learn From Active Practitioners

Our instructors work in security daily. They bring current challenges and real solutions to the classroom.

Ruben Kowalski security instructor

Ruben Kowalski

Linux Security Specialist

Spent eight years securing banking infrastructure. Ruben focuses on teaching practical hardening techniques that actually get used in production environments.

Vera Lindstrom Windows security expert

Vera Lindstrom

Windows Defense Expert

Former incident responder at a healthcare provider. Vera teaches how to spot compromise indicators before they become full breaches.

Astrid Chen threat analysis instructor

Astrid Chen

Threat Analysis Lead

Works with government systems where failures make headlines. Astrid shares threat modeling frameworks that help prioritize limited security resources.

Security professional analyzing system configurations

What You'll Actually Be Able To Do

Configure Defensive Systems

Set up monitoring, logging, and access controls that detect problems before they escalate. You'll configure real tools on actual systems.

Respond To Security Events

Follow structured procedures when something looks wrong. We practice incident response with scenarios based on actual breaches.

Communicate Risk Clearly

Explain security issues to people who aren't technical. This matters more than you'd think when trying to get budget or support for fixes.

Next Cohort Starts Fall 2025

Classes run twice weekly in the evenings. Lab access stays open so you can practice whenever your schedule allows.

We cap enrollment at 24 students per track to keep the experience hands-on. Applications open in June for the September start.

Get Application Info

Important Dates

June 15 Applications open for all tracks
August 8 Final application deadline
August 20 Acceptance notifications sent
September 9 All programs begin
September 16 Lab environment access opens