{"id":239,"date":"2023-02-13T22:54:19","date_gmt":"2023-02-13T22:54:19","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=239"},"modified":"2024-12-05T19:24:49","modified_gmt":"2024-12-05T19:24:49","slug":"cyse-494","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/branden-barnes\/cyse-494\/","title":{"rendered":"CYSE 280"},"content":{"rendered":"\n<h1 class=\"wp-block-heading has-text-align-center\">Windows System Management and Security<\/h1>\n\n\n\n<blockquote class=\"wp-block-quote\">\n<p>This course introduces tools and techniques used to configure, manage and implement Windows and its security-related features.<\/p>\n\n\n\n<p>Students will install, configure, manage and secure windows&#8217; client &amp; server operating systems, and related networking environment using a variety of software tools.<\/p>\n\n\n\n<p>This course also details how to mitigate malware threats, identify security issues by using auditing and the Advanced Threat Analysis feature in Windows Server, secure your virtualization platform, and use new deployment options for enhancing security.<\/p>\n\n\n\n<p>Topics include designing Active Directory, authentication for Windows, group security and policy, service security, remote access security, planning a public key infrastructure, securing file resources, Internet Protocol Security, and additional Windows security topics.<\/p>\n<cite>Gladden, M. (2023). Windows System Management and Security Syllabus. Old Dominion University Canvas.<\/cite><\/blockquote>\n\n\n\n<p>This course has the following key learning outcomes (Gladden, 2023):<\/p>\n\n\n\n<p><strong>KNOWLEDGE<\/strong><\/p>\n\n\n\n<p>1.1.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Describe the fundamental concepts of Operating Systems<\/p>\n\n\n\n<p>1.2.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Describe General Security Concepts and related terminology<\/p>\n\n\n\n<p><strong>SKILLS<\/strong><\/p>\n\n\n\n<p><strong>Part1<\/strong><\/p>\n\n\n\n<p>2.1&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Install and configure Windows Server<\/p>\n\n\n\n<p>2.2&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Configure Windows Active Directory<\/p>\n\n\n\n<p>2.3&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Configure Windows Services such DNS, DHCP, File and Storage<\/p>\n\n\n\n<p>2.4&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Managing System Reliability, and availability<\/p>\n\n\n\n<p><strong>Part2<\/strong><\/p>\n\n\n\n<p>2.5&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Secure hosts, applications, and network traffic.<\/p>\n\n\n\n<p>2.6&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Manage malware and social engineering threats.<\/p>\n\n\n\n<p>2.7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Securing and administering a Network<\/p>\n\n\n\n<p><strong>VALUE<\/strong><\/p>\n\n\n\n<p>3.1. Work collaboratively and ethically to achieve organizational goals<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Course Material<\/h1>\n\n\n\n<p>Implementing Hyper-V and Rapid Server Deployment &amp; Introduction to Active Directory and Account Management<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/branden-barnes\/wp-content\/uploads\/sites\/32766\/2024\/12\/cyse280-hw-5.pdf\" type=\"application\/pdf\" style=\"width:100%;height:280px\" aria-label=\"Embed of cyse280-hw-5.\"><\/object><a id=\"wp-block-file--media-30268583-60e2-4542-ab19-814bd4c3b7e9\" href=\"https:\/\/sites.wp.odu.edu\/branden-barnes\/wp-content\/uploads\/sites\/32766\/2024\/12\/cyse280-hw-5.pdf\">cyse280-hw-5<\/a><a href=\"https:\/\/sites.wp.odu.edu\/branden-barnes\/wp-content\/uploads\/sites\/32766\/2024\/12\/cyse280-hw-5.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-30268583-60e2-4542-ab19-814bd4c3b7e9\">Download<\/a><\/div>\n\n\n\n<p>Windows Management &amp; Cybersecurity Research Paper:<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/branden-barnes\/wp-content\/uploads\/sites\/32766\/2024\/12\/cyse-280-research-paper.pdf\" type=\"application\/pdf\" style=\"width:100%;height:200px\" aria-label=\"Embed of cyse-280-research-paper.\"><\/object><a id=\"wp-block-file--media-10a2f1d5-7648-4b00-8e2f-0d33c74d8b6b\" href=\"https:\/\/sites.wp.odu.edu\/branden-barnes\/wp-content\/uploads\/sites\/32766\/2024\/12\/cyse-280-research-paper.pdf\">cyse-280-research-paper<\/a><a href=\"https:\/\/sites.wp.odu.edu\/branden-barnes\/wp-content\/uploads\/sites\/32766\/2024\/12\/cyse-280-research-paper.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-10a2f1d5-7648-4b00-8e2f-0d33c74d8b6b\">Download<\/a><\/div>\n\n\n\n<p>Configuring and Managing Data Storage, Configuring and Managing Network Services, Configuring Resource Access, Configuring Printing:<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/branden-barnes\/wp-content\/uploads\/sites\/32766\/2024\/12\/homework-10-cyse-280.pdf\" type=\"application\/pdf\" style=\"width:100%;height:200px\" aria-label=\"Embed of homework-10-cyse-280.\"><\/object><a id=\"wp-block-file--media-cb898e0f-5848-488d-b20c-00401256ca55\" href=\"https:\/\/sites.wp.odu.edu\/branden-barnes\/wp-content\/uploads\/sites\/32766\/2024\/12\/homework-10-cyse-280.pdf\">homework-10-cyse-280<\/a><a href=\"https:\/\/sites.wp.odu.edu\/branden-barnes\/wp-content\/uploads\/sites\/32766\/2024\/12\/homework-10-cyse-280.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-cb898e0f-5848-488d-b20c-00401256ca55\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Windows System Management and Security This course introduces tools and techniques used to configure, manage and implement Windows and its security-related features. Students will install, configure, manage and secure windows&#8217; client &amp; server operating systems, and related networking environment using a variety of software tools. This course also details how to mitigate malware threats, identify&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/branden-barnes\/cyse-494\/\">Read More<\/a><\/div>\n","protected":false},"author":26292,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/branden-barnes\/wp-json\/wp\/v2\/pages\/239"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/branden-barnes\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/branden-barnes\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/branden-barnes\/wp-json\/wp\/v2\/users\/26292"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/branden-barnes\/wp-json\/wp\/v2\/comments?post=239"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/branden-barnes\/wp-json\/wp\/v2\/pages\/239\/revisions"}],"predecessor-version":[{"id":584,"href":"https:\/\/sites.wp.odu.edu\/branden-barnes\/wp-json\/wp\/v2\/pages\/239\/revisions\/584"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/branden-barnes\/wp-json\/wp\/v2\/media?parent=239"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}