Skip to main content

All things Operating System

Introduction to Course 4

Hi! Welcome to this course on computing basics for security. My name is Kim, and I work a...

Helpful resources and tips

As a learner, you can choose to complete one or multiple courses in this program. However, to obt...

Welcome to week 1; Introduction to operating systems

How many times a week do you use a computer? For some of us, the answer might be "a lot"!...

Kim: My journey into computing

Hi, I'm Kim. I'm a technical program manager at Google.  I'm currently working in the securi...

Compare operating systems

You previously explored why operating systems are an important part of how a computer works.  In ...

Inside the operating system

Previously, you learned about what operating systems are. Now, let's discuss how they wor...

Requests to the operating system

Operating systems are a critical component of a computer. They make connections between applicati...

Resource allocation via the OS

Now we're ready to discuss a different aspect of your operating system. Not only does the...

Virtualization technology

You've explored a lot about operating systems. One more aspect to consider is that operating syst...

GUI versus CLI

Now that you've learned the inner workings of computers, let's discuss how users and operat...

The command line in use

Previously, you explored graphical user interfaces (GUI) and command-line user interfaces (CLI). ...

Ellen: My path into cybersecurity

My name is Ellen and I am a security engineering manager at Google focused in on how Google use...

Wrap-up; Glossary terms from week 1

We did it! What a great section of learning! The best thing is that we did this togethe...