Operating System Concepts
Use the Operating System Concepts course and lab to understand the operating system software. The course and lab cover several topics such as data structures used in operating systems, computing environments, open-source and free operating systems, file system implementation, and many more. The course comes with labs that provide a virtual environment for users to explore and learn. The Operating system course describes the general organization of a computer system and the role of interrupts.
- Price: $279.99
- Delivery Method: eLearning
Name | Buy |
---|---|
Operating System Concepts |
Test Prep
40+ Pre Assessment Questions |
40+ Post Assessment Questions |
Features
Why choose TOPTALENT?
- Get assistance every step of the way from our Texas-based team, ensuring your training experience is hassle-free and aligned with your goals.
- Access an expansive range of over 3,000 training courses with a strong focus on Information Technology, Business Applications, and Leadership Development.
- Have confidence in an exceptional 95% approval rating from our students, reflecting outstanding satisfaction with our course content, program support, and overall customer service.
- Benefit from being taught by Professionally Certified Instructors with expertise in their fields and a strong commitment to making sure you learn and succeed.
Outline
Lessons 1:
Introduction
- What Operating Systems Do
- Computer-System Organization
- Computer-System Architecture
- Operating-System Operations
- Resource Management
- Security and Protection
- Virtualization
- Distributed Systems
- Kernel Data Structures
- Computing Environments
- Free and Open-Source Operating Systems
- Summary
- Practice Exercises
- Exercises
- Further Reading
- Bibliography
Lessons 2:
Operating-System Structures
- Operating-System Services
- User and Operating-System Interface
- System Calls
- System Services
- Linkers and Loaders
- Why Applications Are Operating-System Specific
- Operating-System Design and Implementation
- Operating-System Structure
- Building and Booting an Operating System
- Operating-System Debugging
- Summary
- Practice Exercises
- Exercises
- Further Reading
- Bibliography
Lessons 3:
Processes
- Process Concept
- Process Scheduling
- Operations on Processes
- Interprocess Communication
- IPC in Shared-Memory Systems
- IPC in Message-Passing Systems
- Examples of IPC Systems
- Communication in Client–Server Systems
- Summary
- Practice Exercises
- Exercises
- Further Reading
- Bibliography
Lessons 4:
Threads & Concurrency
- Overview
- Multicore Programming
- Multithreading Models
- Thread Libraries
- Implicit Threading
- Threading Issues
- Operating-System Examples
- Summary
- Practice Exercises
- Exercises
- Further Reading
- Bibliography
Lessons 5:
CPU Scheduling
- Basic Concepts
- Scheduling Criteria
- Scheduling Algorithms
- Thread Scheduling
- Multi-Processor Scheduling
- Real-Time CPU Scheduling
- Operating-System Examples
- Algorithm Evaluation
- Summary
- Practice Exercises
- Exercises
- Further Reading
- Bibliography
Lessons 6:
Synchronization Tools
- Background
- The Critical-Section Problem
- Peterson’s Solution
- Hardware Support for Synchronization
- Mutex Locks
- Semaphores
- Monitors
- Liveness
- Evaluation
- Summary
- Practice Exercises
- Exercises
- Further Reading
- Bibliography
Lessons 7:
Synchronization Examples
- Classic Problems of Synchronization
- Synchronization within the Kernel
- POSIX Synchronization
- Synchronization in Java
- Alternative Approaches
- Summary
- Practice Exercises
- Exercises
- Further Reading
- Bibliography
Lessons 8:
Deadlocks
- System Model
- Deadlock in Multithreaded Applications
- Deadlock Characterization
- Methods for Handling Deadlocks
- Deadlock Prevention
- Deadlock Avoidance
- Deadlock Detection
- Recovery from Deadlock
- Summary
- Practice Exercises
- Exercises
- Further Reading
- Bibliography
Lessons 9:
Main Memory
- Background
- Contiguous Memory Allocation
- Paging
- Structure of the Page Table
- Swapping
- Example: Intel 32- and 64-bit Architectures
- Example: ARMv8 Architecture
- Summary
- Practice Exercises
- Exercises
- Further Reading
- Bibliography
Lessons 10:
Virtual Memory
- Background
- Demand Paging
- Copy-on-Write
- Page Replacement
- Allocation of Frames
- Thrashing
- Memory Compression
- Allocating Kernel Memory
- Other Considerations
- Operating-System Examples
- Summary
- Practice Exercises
- Exercises
- Further Reading
- Bibliography
Lessons 11:
Mass-Storage Structure
- Overview of Mass-Storage Structure
- HDD Scheduling
- NVM Scheduling
- Error Detection and Correction
- Storage Device Management
- Swap-Space Management
- Storage Attachment
- RAID Structure
- Summary
- Practice Exercises
- Exercises
- Further Reading
- Bibliography
Lessons 12:
I/O Systems
- Overview
- I/O Hardware
- Application I/O Interface
- Kernel I/O Subsystem
- Transforming I/O Requests to Hardware Operations
- STREAMS
- Performance
- Summary
- Practice Exercises
- Exercises
- Further Reading
- Bibliography
Lessons 13:
File-System Interface
- File Concept
- Access Methods
- Directory Structure
- Protection
- Memory-Mapped Files
- Summary
- Practice Exercises
- Exercises
- Further Reading
- Bibliography
Lessons 14:
File-System Implementation
- File-System Structure
- File-System Operations
- Directory Implementation
- Allocation Methods
- Free-Space Management
- Efficiency and Performance
- Recovery
- Example: The WAFL File System
- Summary
- Practice Exercises
- Exercises
- Further Reading
- Bibliography
Lessons 15:
File-System Internals
- File Systems
- File-System Mounting
- Partitions and Mounting
- File Sharing
- Virtual File Systems
- Remote File Systems
- Consistency Semantics
- NFS
- Summary
- Practice Exercises
- Exercises
- Further Reading
- Bibliography
Lessons 16:
Security
- The Security Problem
- Program Threats
- System and Network Threats
- Cryptography as a Security Tool
- User Authentication
- Implementing Security Defenses
- An Example: Windows 10
- Summary
- Exercises
- Further Reading
- Bibliography
Lessons 17:
Protection
- Goals of Protection
- Principles of Protection
- Protection Rings
- Domain of Protection
- Access Matrix
- Implementation of the Access Matrix
- Revocation of Access Rights
- Role-Based Access Control
- Mandatory Access Control (MAC)
- Capability-Based Systems
- Other Protection Improvement Methods
- Language-Based Protection
- Summary
- Practice Exercises
- Exercises
- Further Reading
- Bibliography
Lessons 18:
Virtual Machines
- Overview
- History
- Benefits and Features
- Building Blocks
- Types of VMs and Their Implementations
- Virtualization and Operating-System Components
- Examples