Skip to content

Carl Lochstampfor Jr. ePortfolio

Cybersecurity Undergraduate at Old Dominion University (ODU)

  • Home
    • About Me
    • Certifications
    • Awards & Recognitions
    • Goals & Future Plans
  • Milestone Projects
  • Resume
  • Coursework
    • Cybersecurity Foundations
      • CYSE 250: Basic Cybersecurity Programming
      • CYSE 300: Intro to Cybersecurity
      • CYSE 301: Cybersecurity Techniques and Operations
      • IT 315: Intro to Networking & Security
      • CYSE 462: Cybersecurity Fundamentals
      • MATH
    • Cybersecurity Applications
      • CYSE 270: Linux for Cybersecurity
      • CYSE 280: Windows System Management & Security
    • Tech & Society
      • CYSE 200T: Cybersecurity, Technology, & Society
      • CYSE 201S: Cybersecurity & Social Science
    • Law & Ethics
      • CYSE 406: Cyber Law
  • Blog
  • News
  • Contact

Category: Windows

Malicious Code and Activity – Mitigation Methods

Overview of malicious code threats and mitigation methods, including detection, containment, system hardening, user awareness, and modern cybersecurity defenses.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Ransomware Mitigation Strategies for Windows Systems: Securing Servers and Endpoints

Explores ransomware mitigation strategies for Windows systems, including backups, hardening, access controls, monitoring, and endpoint protection for servers and endpoints.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

The NotPetya Cybersecurity Attack & Breach

Explains the NotPetya cybersecurity attack, how it spread, why it caused widespread damage, and the key lessons learned about resilience, segmentation, and global cyber risk.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Darknet Diaries: Jeremy from Marketing

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Darknet Diaries: Stuxnet

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Darknet Diaries: ZeuS

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...

Windows Server ed. History

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on X (Opens in new window)
  • Click to email a link to a friend (Opens in new window)

Like this:

Like Loading...
Proudly powered by WordPress | Theme: Dyad by WordPress.com.
%d
    We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Accept