Module 2 - Windows Operating System and Linux Operating System
Module 2 - Windows Operating System and Linux Operating System
ASSURANCE &
SECURITY 2
MODULE 2
WINDOWS OPERATING SYSTEM
AND LINUX OPERATING SYSTEM
OBJECTIVES
Upon completion of this module, the student would be able to:
Windows Overview
➢Explain the operation of the Windows Operating System.
➢Describe the history of the Windows Operating System.
➢Explain the architecture of Windows and its operation.
Windows Administration
➢Explain how to secure Windows endpoints.
➢Explain how to configure and monitor Windows.
➢Explain how Windows can be kept secure.
OBJECTIVES
Upon completion of this module, the student would be able to:
Linux Administration
➢Perform basic Linux administration tasks.
➢Explain how a Linux administrator locates and manipulates security log files..
➢Manage the Linux file system and permissions.
Linux Hosts
➢Perform basic security-related tasks on a Linux host.
➢Explain the basic components of the Linux GUI.
➢Use tools to detect malware on a Linux host.
OBJECTIVES
Upon completion of this module, the student would be able to:
▪ NTFS stores files as a series of attributes, such as the name of the file, or a timestamp.
▪ The data which the file contains is stored in the attribute $DATA, and is known as a data stream.
▪ A hard drive is divided into areas called partitions.
▪ Each partition is a logical storage unit that can be formatted to store information, such as data files or
applications.
Windows Architecture and Operations
Windows Boot Process
▪ Two types of computer firmware exist: Basic
Input-Output System (BIOS) and Unified
Extended Firmware Interface (UEFI)
▪ UEFI was designed to replace BIOS and
support the new features.
▪ Whether BIOS or UEFI, after a valid Windows
installation is located, the Bootmgr.exe file is
run.
Windows Architecture and Operations
Windows Startup and Shutdown
▪ Different entries in these registry locations define which
services and applications will start, as indicated by their entry
type.
• HKEY_LOCAL_MACHINE
• HKEY_CURRENT_USER
▪ These types include Run, RunOnce, RunServices,
RunServicesOnce, and Userinit.
▪ There are five tabs which contain the configuration options:
• General
• Boot
• Services
• Startup
• Tools
▪ It is always best to perform a proper shutdown to turn off the
computer.
Windows Architecture and Operations
Processes, Threads, and Services
▪ A process is any program that is currently executing.
▪ A thread is a part of the process that can be
executed.
▪ In Windows multiple threads can be executed at the
same time.
▪ Some of the processes that Windows runs are
services - programs that run in the background to
support the operating system and applications.
Windows Architecture and Operations
Memory Allocation and Handles
▪ The virtual address space for a process is the
set of virtual addresses that the process can
use.
▪ Each process in a 32-bit Windows computer
supports a virtual address space that enables
addressing up to 4 gigabytes.
▪ Each process in a 64-bit Windows computer
supports a virtual address space of 8 terabytes.
▪ Each user space process runs in a private
address space, separate from other user space
processes.
▪ Sysinternal’s RamMap – Used to view memory
allocation.
Windows Architecture and Operations
The Windows Registry ▪ Information about hardware, applications, users, and system
settings is stored in the Windows registry.
▪ The registry is a hierarchical database where the highest level is
known as a hive, below that there are keys, followed by
subkeys.
▪ The five hives of the Windows registry:
• HKEY_CURRENT_USER (HKCU) - Holds data
concerning the currently logged in user.
• HKEY_USERS (HKU) - Holds data concerning all the
user accounts.
• HKEY_CLASSES_ROOT (HKCR) - Holds data about
object linking and embedding (OLE) registrations.
• HKEY_LOCAL_MACHINE (HKLM) - Holds system-
related data.
• HKEY_CURRENT_CONFIG (HKCC) - Holds data about
the current hardware profile.
▪ Navigation is very similar to Windows file explorer.
Windows Configuration and Monitoring
Run as Administrator
▪ Sometimes, it is necessary to run or install
software that requires the privileges of the
Administrator.
▪ Use “Run as administrator” or open an
Administrator Command Prompt.
Windows Configuration and Monitoring
Local Users and Domains
▪ Local users and groups are managed with the
lusrmgr.msc control panel applet.
▪ A group is named and has a specific set of
permissions associated with it. A user placed
into a group will have the permissions of that
group assigned to them.
▪ A domain - type of network service where all
of the users, groups, computers, peripherals,
and security settings are stored on and
controlled by a database.
• This database is stored on computers or
groups of computers called domain
controllers (DCs).
Windows Configuration and Monitoring
CLI and PowerShell
▪ The Windows command line interface (CLI) can
be used to run programs, navigate the file
system, and manage files and folders.
▪ Another environment, called the Windows
PowerShell, can be used to create scripts to
automate tasks that the regular CLI is unable to
create.
These are the types of commands that PowerShell can execute:
•Cmdlets
•PowerShell scripts
•PowerShell functions
There are four levels of help in Windows PowerShell:
•get-help PS command
•get-help PS command [-examples]
•get-help PS command [-detailed]
•get-help PS command [-full]
Windows Configuration and Monitoring
Windows Management Instrumentation
▪ Windows Management Instrumentation (WMI)
is used to manage remote computers.
▪ Some attacks today use WMI to connect to
remote systems, modify the registry, and run
commands, therefore access should be strictly
limited.
These are the four tabs in the WMI Control Properties window:
•General
•Backup/Restore
•Security
•Advanced
Windows Configuration and Monitoring
The net Command
▪ The net command supports many other commands that follow the net command and can be
combined with switches to focus on specific output.
▪ To see a list of the net commands, type net help at the command prompt.
These are some common net commands:
•net accounts
•net session
•net share
•net start
•net stop
•net use
•net view
Windows Configuration and Monitoring
Task Manager and Resource Monitor
▪ Task Manager provides a lot of information about
what is running, and general performance of the
computer.
▪ Resource Monitor is used when more detailed
information about resource usage is needed.
There are seven tabs in the Task Manager:
•Processes
•Performance
•App history
•Startup
•Users
•Details
•Services
Resource Monitor
Basic Commands
Command Function
grep search plain-text data for lines that match a regular expression
ifconfig View or configure the settings of the network interfaces
apt-get Install software using the advanced package tool
iwconfig View or configure the network wireless settings
shutdown Logoff and shutdown the operating system
passwd Change a user password
cat Use to list the content of a text file
man Display the documentation for a specific command
Working in the Linux Shell
File and Directory Commands
Command Function
• Emmett Dulaney and Chuck Easttom. CompTIA Security+ Study Guide: Exam SY0-501 7th Edition
• David L. Prowse (2018) Pearson. CompTIA Security+ SY0-501 Cert Guide (4th Edition)
• Omar Santos/ Joseph Muniz /Stefano De Crescenzo(June 17, 2017)CCNA Cyber Ops (SECFND #210-
250 and SECOPS #210-255)Official Cert Guide Library 1st Edition