Foundations in Secure Systems Administration
Time limit: 180 days
Instructor: Casey O'Brien
Full course description
This course will introduce the learner to the technical fundamentals of secure systems administration; that is, the secure installation, configuration, upkeep, and reliable operation of computing systems (especially multi-user systems, e.g., servers), both on-premises and in the cloud. The course also provides the broad-based knowledge and skills necessary to prepare students for further study in other specialized cybersecurity fields (e.g., penetration testing, secure dev ops).
Course content:
- Introduction to secure systems administration
- Commands and command line utilities
- File systems
- Shells
- Automation
- Identity & access management (IdAM)
- Network & server management
- Systems security
What You’ll Learn:
- Work fluently in Windows and Linux systems via command-line interface, managing files, processes, users, and groups.
- Install, configure, and maintain essential services (e.g., web, e-mail) and automate routine administrator tasks.
- Configure host- and server-level security controls in both on-premises and cloud-based environments.
- Monitor hybrid environments, understand system logs, and situate these technical operations within the broader human and organizational context of cybersecurity.
Who Should Enroll:
Designed for learners who want to build practical system administration skills through a security lens - especially those moving into a cyber role from IT, operations, or infrastructure backgrounds. Also, a good fit for those completing the Foundations in Secure Networking course and ready for deeper technical work.
Why It Matters:
System administration is where many vulnerabilities arise; knowing how to manage and secure systems is critical for defending them. These capabilities are core to roles such as system security analyst, DevSecOps engineer, penetration tester, or systems architect.
This course is part of the University of Illinois Cybersecurity Certificate, developed by the Information Trust Institute (ITI), a National Center of Academic Excellence in Cybersecurity. Learners may enroll in courses individually or complete all three to earn the full certificate.

