This module aims to equip students with a comprehensive understanding of host security, spanning from operating systems to applications and safeguarding information. Students will learn to identify key components and layers necessary for securing an operating system, compare various operating systems (Windows, Linux, Mac OS), and implement security measures for applications. The course covers essential concepts such as Authentication, Authorization, and Accountability (AAA). Key topics include the structure of processing nodes, physical and network security, virtualization, OS kernel, and application security. Students will delve into operating system security practices, including policy development, hardening, file system security, user management, logging, and continuous vulnerability assessment. Application security concepts will be explored through principles such as Least Privilege, Separation of Duties, Defense in Depth, and secure design. The module emphasizes continuous assessment and the application of security principles to minimize vulnerabilities and enhance overall system integrity.