Why Operating System Security Matters

The average person spends over 7 hours a day on their computer, yet most don't know how to secure and lock down their operating system effectively. With the many cyber-based threats we all face daily, you must know how to protect your computer and the data that resides on it.




Comprehensive Learning Resources

This course shows you how to protect your Windows or Mac computer through practical demonstrations of built-in security features and proven best practices.

  • 5 Hours of Video Lecture: In-depth instruction covering user accounts, permissions, encryption, firewalls, backups, and system hardening.
  • Live Demonstrations: Watch real-time demonstrations for both Windows 10 and Mac, showing you exactly how to implement security measures.
  • Built-In Security Features: Learn to leverage the powerful security tools already included in your operating system—no expensive third-party software required.
  • Lifetime Access: Learn at your own pace with permanent access to all materials and future updates.


What You'll Learn

This course is Part 3 of a comprehensive cybersecurity series. While Parts 1 and 2 covered security fundamentals and online privacy, Part 3 focuses on securing your Windows or Mac computer at the operating system level.

  • OS Protection Fundamentals: Understand the core principles of operating system security, defense in depth, and the CIA Triad as applied to desktop computing.
  • User Accounts & Permissions: Learn about administrator vs. standard user accounts, why proper account management matters, and how to configure file and directory permissions in Windows and Mac.
  • File & Disk Encryption: Discover how encryption protects your data, and see live demonstrations of BitLocker (Windows), FileVault (Mac), and VeraCrypt for cross-platform encryption.
  • Data Storage & Backups: Master backup strategies including full, incremental, and differential backups. Understand RAID configurations, and learn to set up Windows system images, restore points, and Mac Time Machine.
  • Host-Based Firewalls: Configure Windows Firewall and Mac firewall settings, understand when to use third-party alternatives, and implement proper firewall rules.
  • Antivirus & Application Control: Learn about built-in antivirus solutions (Windows Defender, Mac XProtect), explore third-party options, and configure application execution controls like UAC and Gatekeeper.
  • Updates & System Hardening: Understand the critical importance of patching, configure automatic updates, and implement additional hardening measures like securing the boot process and managing privacy settings.


What Students Are Saying

"Thanks Alton for the excellent course. The course is very useful as it provides lots of information on the built-in features in the OS that can reduce cybersecurity risks and better protect our own data. I believe any individuals or small business owners who only have limited financial resources or computer-related knowledge should be able to benefit from the course by adopting the recommended measures or changes in the OS settings to improve cybersecurity."

— Maggie Mok ⭐⭐⭐⭐⭐




"Course was very easy to follow and provided an excellent overview of Operating Systems and best practices to secure them."

— Michael Manzelmann ⭐⭐⭐⭐⭐




"Another banger by Alton. I've learned so much in this course I'm looking forward to the next one"

— Andrea A ⭐⭐⭐⭐⭐

Course curriculum

    1. Section Introduction

    2. Understanding Account Types

      FREE PREVIEW
    3. Live Demo: Microsoft to Local User Account

    4. Live Demo: Creating Windows 10 Local User Accounts

    5. Live Demo: Creating Mac OS Local User Accounts

    6. Live Demo: Exploring Windows Standard User Privileges

    7. Live Demo: Exploring Mac Standard User Privileges

    1. Section Introduction

    2. CIA Triad Refresher

    3. Importance of File & Directory Permissions

    4. Basic NT File System (NTFS) Permissions

    5. Live Demo: Basic NTFS Permissions

      FREE PREVIEW
    6. Live Demo: Verifying Windows Permissions with Effective Access

    7. Understanding Mac Permissions

    8. Live Demo: Mac Permissions

    1. Section Introduction

    2. Understanding Encryption

    3. Live Demo: Windows Encrypted File System (EFS)

    4. Live Demo: BitLocker

    5. Live Demo: Mac FileVault

      FREE PREVIEW
    6. Live Demo: VeraCrypt

    1. Section Introduction

    2. The Importance of Data Storage & Backups

    3. Understanding Backups

    4. Understanding RAID

      FREE PREVIEW
    5. Storage Solutions

    6. Live Demo: My NAS and Cloud Storage Strategy

    7. Live Demo: Creating & Restoring Windows System Images

    8. Live Demo: Using Windows System Restore Points

    9. Live Demo: Exploring Windows Backup

    10. Live Demo: Mac Time Machine

    11. Local vs. Cloud Storage and Backups

About this course

  • $49.95
  • 71 lessons
  • 5 hours of video content

Your Instructor & Practical Approach

About Alton Hardin

Alton is the founder of Alton Teaches LLC and a former college professor. He spent 12 years as a cybersecurity specialist at the U.S. Department of Treasury working in governance, risk, and compliance. He holds an MBA in Information Assurance and Security Management and multiple certifications including CISSP, Security+, and Network+.

250,000+ students taught across cybersecurity and IT courses. 90,000+ copies sold of his bestselling books.




Windows & Mac Coverage

This course focuses exclusively on Windows 10 and Mac operating systems—the platforms used by over 90% of desktop and laptop users worldwide. You'll see live demonstrations for both operating systems covering:

  • Windows 10 Security Features: BitLocker encryption, Windows Defender, Windows Firewall, UAC (User Account Control), NTFS permissions, system restore points, and Group Policy settings.
  • Mac Security Features: FileVault encryption, XProtect, Mac Firewall, Gatekeeper, file permissions, Time Machine backups, and system preferences hardening.
  • Cross-Platform Tools: VeraCrypt for encryption, third-party firewall and antivirus options, and universal security best practices that apply to both platforms.


Note: Linux is not covered in this beginner course as Linux security heavily relies on command-line operations, which are not beginner-friendly.


Ready to Secure Your Computer?

Join 250,000+ students learning practical operating system security. Lifetime access, 14-day money-back guarantee.

Common Questions

Do I need to complete Parts 1 and 2 before taking this course?

Parts 1 and 2 are recommended but not required. This course focuses specifically on operating system security for Windows and Mac. While I occasionally reference concepts from earlier courses (like the CIA Triad or defense in depth), you can look up any unfamiliar terms if needed.


I use Linux. Will this course help me?

This course focuses exclusively on Windows 10 and Mac. Linux is not covered because Linux security relies heavily on command-line operations, which are not beginner-friendly. This course is designed for the 90%+ of users on Windows and Mac platforms.


Is this course technical? Do I need IT experience?

Yes, this is technical content—we cover encryption, permissions, firewalls, and system configurations in depth. However, it's designed for absolute beginners with no IT experience required. Everything is demonstrated step-by-step for both Windows and Mac, showing you exactly what to do.


Do I need to buy expensive security software?

No. This course focuses primarily on the powerful built-in security features already included in Windows 10 and Mac. You'll learn to leverage BitLocker, FileVault, Windows Defender, built-in firewalls, and more—no expensive third-party software required.


How long will it take to complete?

The course contains 5 hours of video content. Most students complete it within one to two weeks, but you have lifetime access so you can learn at your own pace.


What's included with enrollment?

You get 5 hours of video lectures with live demonstrations for both Windows 10 and Mac, practical security configurations, and lifetime access to all materials.


What's the difference between Parts 1, 2, and 3?

Part 1 covers essential cybersecurity concepts and workplace security. Part 2 focuses on personal online security—browser privacy, VPNs, Tor, password management, and email security. Part 3 (this course) covers operating system security for Windows and Mac—user accounts, permissions, encryption, backups, firewalls, and system hardening. Each course stands alone.


What if I'm not satisfied?

We offer a 100% satisfaction guarantee. If you are unsatisfied with your purchase, you may request a refund within 14 days of the original purchase date.