{"id":772,"date":"2024-05-10T21:14:13","date_gmt":"2024-05-10T21:14:13","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/hbramow\/?page_id=772"},"modified":"2024-05-10T21:39:46","modified_gmt":"2024-05-10T21:39:46","slug":"cyse-280-windows-system-management-and-security","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/hbramow\/cyse-280-windows-system-management-and-security\/","title":{"rendered":"CYSE 280 &#8211; Windows System Management and Security"},"content":{"rendered":"\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p class=\"has-text-align-center has-pale-ocean-gradient-background has-background has-x-large-font-size\"><strong>Windows System Management and Security<\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n<p>This Windows System course teachers the tools and techniques that are available for students to:\u00a0 \u00a0implement Windows programs, configure the programs\/settings and to management Windows.\u00a0 The security features are also included in this program for the system.\u00a0 It included the:\u00a0 installation techniques, configurations, and management to secure the Windows programs, both the server and client.\u00a0 It also included the environment:\u00a0 the network and the operating systems (OS) and the necessary software tools. Mitigation of cyber threats is also included (malware threats), and students identified the security issues.\u00a0 This meant they used an audit, but also the Advanced Threat Analysis in Windows.\u00a0 Server, secure virtualization platform, and use new deployment options for enhancing the security.<\/p>\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Research Paper &#8211; &#8220;Windows System Management and Security&#8221;<\/h2>\n\n\n<div class=\"ead-preview\"><div class=\"ead-document\" style=\"position: relative;padding-top: 90%;\"><div class=\"ead-iframe-wrapper\"><iframe src=\"\/\/docs.google.com\/viewer?url=https%3A%2F%2Fsites.wp.odu.edu%2Fhbramow%2Fwp-content%2Fuploads%2Fsites%2F33714%2F2024%2F05%2FCYSE-280-H-bramow-01187330-Windows-Sys-Sec-Vul-Paper.pdf&amp;embedded=true&amp;hl=en\" title=\"Embedded Document\" class=\"ead-iframe\" style=\"width: 100%;height: 100%;border: none;position: absolute;left: 0;top: 0;visibility: hidden;\"><\/iframe><\/div>\t\t\t<div class=\"ead-document-loading\" style=\"width:100%;height:100%;position:absolute;left:0;top:0;z-index:10;\">\n\t\t\t\t<div class=\"ead-loading-wrap\">\n\t\t\t\t\t<div class=\"ead-loading-main\">\n\t\t\t\t\t\t<div class=\"ead-loading\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/hbramow\/wp-content\/plugins\/embed-any-document\/images\/loading.svg\" width=\"55\" height=\"55\" alt=\"Loader\">\n\t\t\t\t\t\t\t<span>Loading&#8230;<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"ead-loading-foot\">\n\t\t\t\t\t\t<div class=\"ead-loading-foot-title\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/hbramow\/wp-content\/plugins\/embed-any-document\/images\/EAD-logo.svg\" alt=\"EAD Logo\" width=\"36\" height=\"23\"\/>\n\t\t\t\t\t\t\t<span>Taking too long?<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<p>\n\t\t\t\t\t\t\t<div class=\"ead-document-btn ead-reload-btn\" role=\"button\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/hbramow\/wp-content\/plugins\/embed-any-document\/images\/reload.svg\" alt=\"Reload\" width=\"12\" height=\"12\"\/> Reload document\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<span>|<\/span>\n\t\t\t\t\t\t\t<a href=\"https:\/\/sites.wp.odu.edu\/hbramow\/wp-content\/uploads\/sites\/33714\/2024\/05\/CYSE-280-H-bramow-01187330-Windows-Sys-Sec-Vul-Paper.pdf\" class=\"ead-document-btn\" target=\"_blank\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/hbramow\/wp-content\/plugins\/embed-any-document\/images\/open.svg\" alt=\"Open\" width=\"12\" height=\"12\"\/> Open in new tab\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Windows System Management and Security This Windows System course teachers the tools and techniques that are available for students to:\u00a0 \u00a0implement Windows programs, configure the programs\/settings and to management Windows.\u00a0 The security features are also included in this program for the system.\u00a0 It included the:\u00a0 installation techniques, configurations, and management to secure the Windows programs,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/hbramow\/cyse-280-windows-system-management-and-security\/\">Read More<\/a><\/div>\n","protected":false},"author":27054,"featured_media":113,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/hbramow\/wp-json\/wp\/v2\/pages\/772"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/hbramow\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/hbramow\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/hbramow\/wp-json\/wp\/v2\/users\/27054"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/hbramow\/wp-json\/wp\/v2\/comments?post=772"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/hbramow\/wp-json\/wp\/v2\/pages\/772\/revisions"}],"predecessor-version":[{"id":782,"href":"https:\/\/sites.wp.odu.edu\/hbramow\/wp-json\/wp\/v2\/pages\/772\/revisions\/782"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/hbramow\/wp-json\/wp\/v2\/media\/113"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/hbramow\/wp-json\/wp\/v2\/media?parent=772"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}