CYSE 280

Windows System Management & Security

This course provided hands-on experience in configuring, managing, and securing Windows client and server operating systems within enterprise environments. I gained proficiency in deploying and hardening Windows systems, implementing security features such as auditing and Advanced Threat Analytics, and mitigating malware threats. The course also covered secure virtualization practices, modern deployment strategies, and managing Windows environments using professional software tools, emphasizing practical application in real-world networked systems.

Skills

  1. Windows Server Configuration & Management
  2. Security Implementation & Threat Mitigation
  3. Virtualization & Deployment Tools
  4. Problem-Solving Under Constraints
  5. Attention to Detail
  6. Adaptability to New Tools & Technologies 

Experience

Skill Highlighted: Windows Server Configuration & Management
Also Demonstrates: Virtualization & Deployment ToolsAttention to Detail

In this lab, I installed Windows Server 2019 and completed key setup tasks including setting the administrative password, renaming the machine using PowerShell (Rename-Computer), and adding server roles (Add-WindowsFeature). I worked within a virtual lab environment to simulate real-world installation steps and completed the scenario with 100% accuracy. This lab reflects my hands-on experience with server setup, role installation, and the precision required to manage administrative settings in a Windows Server environment.

1-lab

Skill Highlighted: Security Implementation & Threat Mitigation
Also Demonstrates: Windows Server Configuration & ManagementAdaptability to New Tools & Technologies

In this lab, I installed the Server Core edition of Windows Server 2019 and performed system configuration entirely via command line and PowerShell. Tasks included identifying APIPA-assigned IP addresses, enabling WinRM (winrm quickconfig), and initiating a remote session with Enter-PSSession. I also configured static IP settings and verified system behavior during reboots. This artifact demonstrates my adaptability to secure, minimal-interface environments and my ability to manage systems using remote command-line tools—critical for reducing attack surfaces in enterprise networks.

2-lab

Skill Highlighted: Virtualization & Deployment Tools
Also Demonstrates: Security Implementation & Threat MitigationProblem-Solving Under Constraints

In this lab, I configured internal virtual switches using Hyper-V and tested virtual machine connectivity between guest VMs and the host system. I analyzed traffic flow, enforced isolation between network segments, and verified firewall rules to block inbound and outbound traffic between specific IP addresses. The tasks required practical knowledge of network adapter management, Hyper-V topology, and secure virtual lab practices—demonstrating my ability to deploy and troubleshoot secure network configurations in a virtualized environment.

3-lab

Skill Highlighted: Security Implementation & Threat Mitigation

Also Demonstrates: Windows Server Configuration & ManagementAttention to Detail

In this lab, I used tools such as csvde.exedsmod, and net to create, modify, and manage user accounts in Active Directory. I implemented a batch script to automate account creation, correctly formatted user templates, assigned users to security groups, and enforced password policies like “must change password at next logon.” This lab demonstrates my ability to efficiently manage user identities and apply secure account practices using both scripts and built-in command-line utilities.

4-lab

Skill Highlighted: Windows Server Configuration & Management
Also Demonstrates: Virtualization & Deployment ToolsProblem-Solving Under Constraints

In this lab, I created and managed virtual hard disks (VHDs), configured disk attributes, and worked with storage resiliency options like RAID 1 and RAID 5. I used Windows Server tools to turn off read-only attributes, verify system properties, and analyze storage configurations within Storage Spaces. This lab demonstrates my ability to provision and troubleshoot storage systems in a virtualized environment, ensuring data integrity, redundancy, and scalability under system constraints.

5-lab

Skill Highlighted: Security Implementation & Threat Mitigation
Also Demonstrates: Windows Server Configuration & ManagementAttention to Detail

In this lab, I installed and configured DNS and Active Directory Domain Services (AD DS), verifying server roles and zone behavior through simulation. I completed domain infrastructure setup tasks including installation of services, configuration of cache.dns, and answering scenario-based DNS resolution questions. With 100% accuracy, this lab reflects my understanding of centralized name resolution, domain role setup, and the importance of secure, reliable infrastructure components in Windows Server environments.

6-lab-1