Windows System Management & Security
This course provided hands-on experience in configuring, managing, and securing Windows client and server operating systems within enterprise environments. I gained proficiency in deploying and hardening Windows systems, implementing security features such as auditing and Advanced Threat Analytics, and mitigating malware threats. The course also covered secure virtualization practices, modern deployment strategies, and managing Windows environments using professional software tools, emphasizing practical application in real-world networked systems.
Skills
- Windows Server Configuration & Management
- Security Implementation & Threat Mitigation
- Virtualization & Deployment Tools
- Problem-Solving Under Constraints
- Attention to Detail
- Adaptability to New Tools & Technologies
Experience
Skill Highlighted: Windows Server Configuration & Management
Also Demonstrates: Virtualization & Deployment Tools, Attention to Detail
1-labIn this lab, I installed Windows Server 2019 and completed key setup tasks including setting the administrative password, renaming the machine using PowerShell (
Rename-Computer
), and adding server roles (Add-WindowsFeature
). I worked within a virtual lab environment to simulate real-world installation steps and completed the scenario with 100% accuracy. This lab reflects my hands-on experience with server setup, role installation, and the precision required to manage administrative settings in a Windows Server environment.
Skill Highlighted: Security Implementation & Threat Mitigation
Also Demonstrates: Windows Server Configuration & Management, Adaptability to New Tools & Technologies
2-labIn this lab, I installed the Server Core edition of Windows Server 2019 and performed system configuration entirely via command line and PowerShell. Tasks included identifying APIPA-assigned IP addresses, enabling WinRM (
winrm quickconfig
), and initiating a remote session withEnter-PSSession
. I also configured static IP settings and verified system behavior during reboots. This artifact demonstrates my adaptability to secure, minimal-interface environments and my ability to manage systems using remote command-line tools—critical for reducing attack surfaces in enterprise networks.
Skill Highlighted: Virtualization & Deployment Tools
Also Demonstrates: Security Implementation & Threat Mitigation, Problem-Solving Under Constraints
3-labIn this lab, I configured internal virtual switches using Hyper-V and tested virtual machine connectivity between guest VMs and the host system. I analyzed traffic flow, enforced isolation between network segments, and verified firewall rules to block inbound and outbound traffic between specific IP addresses. The tasks required practical knowledge of network adapter management, Hyper-V topology, and secure virtual lab practices—demonstrating my ability to deploy and troubleshoot secure network configurations in a virtualized environment.
Skill Highlighted: Security Implementation & Threat Mitigation
Also Demonstrates: Windows Server Configuration & Management, Attention to Detail
4-labIn this lab, I used tools such as
csvde.exe
,dsmod
, andnet
to create, modify, and manage user accounts in Active Directory. I implemented a batch script to automate account creation, correctly formatted user templates, assigned users to security groups, and enforced password policies like “must change password at next logon.” This lab demonstrates my ability to efficiently manage user identities and apply secure account practices using both scripts and built-in command-line utilities.
Skill Highlighted: Windows Server Configuration & Management
Also Demonstrates: Virtualization & Deployment Tools, Problem-Solving Under Constraints
5-labIn this lab, I created and managed virtual hard disks (VHDs), configured disk attributes, and worked with storage resiliency options like RAID 1 and RAID 5. I used Windows Server tools to turn off read-only attributes, verify system properties, and analyze storage configurations within Storage Spaces. This lab demonstrates my ability to provision and troubleshoot storage systems in a virtualized environment, ensuring data integrity, redundancy, and scalability under system constraints.
Skill Highlighted: Security Implementation & Threat Mitigation
Also Demonstrates: Windows Server Configuration & Management, Attention to Detail
6-lab-1In this lab, I installed and configured DNS and Active Directory Domain Services (AD DS), verifying server roles and zone behavior through simulation. I completed domain infrastructure setup tasks including installation of services, configuration of
cache.dns
, and answering scenario-based DNS resolution questions. With 100% accuracy, this lab reflects my understanding of centralized name resolution, domain role setup, and the importance of secure, reliable infrastructure components in Windows Server environments.