{"id":531,"date":"2025-01-30T21:55:44","date_gmt":"2025-01-30T21:55:44","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/locky\/?page_id=531"},"modified":"2026-03-25T12:48:05","modified_gmt":"2026-03-25T12:48:05","slug":"cyse-280","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/locky\/coursework\/cybersecurity-applications\/cyse-280\/","title":{"rendered":"CYSE 280"},"content":{"rendered":"\n<h3 class=\"wp-block-heading has-text-align-center\">Course Grade Received: A<\/h3>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h1 class=\"wp-block-heading has-text-align-center\">Windows System Management &amp; Security<\/h1>\n\n\n\n<p class=\"has-text-align-justify\">This course focused on Windows system administration and enterprise security, emphasizing the configuration, management, and protection of Windows client and server environments. Students gained hands-on experience with Active Directory, Group Policy, and core network services such as DNS and DHCP. The course also explored system hardening, malware mitigation, auditing, and secure virtualization within Windows-based infrastructures.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Course Objectives<\/h2>\n\n\n\n<ul>\n<li>Install, configure, and manage Windows Server environments<\/li>\n\n\n\n<li>Design and administer Active Directory domains and services<\/li>\n\n\n\n<li>Implement Group Policy for system security and configuration management<\/li>\n\n\n\n<li>Configure essential network services (DNS, DHCP, file and storage systems)<\/li>\n\n\n\n<li>Perform system auditing and analyze security logs<\/li>\n\n\n\n<li>Mitigate malware threats and secure Windows systems<\/li>\n\n\n\n<li>Implement authentication mechanisms and access control strategies<\/li>\n\n\n\n<li>Design and apply Public Key Infrastructure (PKI) concepts<\/li>\n\n\n\n<li>Secure remote access and enterprise network environments<\/li>\n\n\n\n<li>Ensure system reliability, availability, and performance<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd39 Key Skills &amp; Topics<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83e\ude9f Windows Administration<\/h3>\n\n\n\n<ul>\n<li>Windows Server installation &amp; configuration<\/li>\n\n\n\n<li>Active Directory (AD DS)<\/li>\n\n\n\n<li>Group Policy Objects (GPOs)<\/li>\n\n\n\n<li>User &amp; access management<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83c\udf10 Networking &amp; Infrastructure<\/h3>\n\n\n\n<ul>\n<li>DNS &amp; DHCP configuration<\/li>\n\n\n\n<li>File, storage, and service management<\/li>\n\n\n\n<li>Network security fundamentals<\/li>\n\n\n\n<li>Remote access configuration<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83d\udd10 Security &amp; Defense<\/h3>\n\n\n\n<ul>\n<li>System hardening (Windows environments)<\/li>\n\n\n\n<li>Malware detection &amp; mitigation<\/li>\n\n\n\n<li>Security auditing &amp; log analysis<\/li>\n\n\n\n<li>Authentication &amp; authorization models<\/li>\n\n\n\n<li>PKI fundamentals<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">\u2601\ufe0f Virtualization &amp; Enterprise Systems<\/h3>\n\n\n\n<ul>\n<li>Virtual machine deployment<\/li>\n\n\n\n<li>Secure virtualization practices<\/li>\n\n\n\n<li>Enterprise system management<\/li>\n<\/ul>\n\n\n\n<h1 class=\"wp-block-heading has-text-align-center\">Course Material<\/h1>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udee1\ufe0f Ransomware Mitigation Strategies for Windows Systems (CYSE 280)<\/h2>\n\n\n\n<p><em>Technologies &amp; Frameworks: Windows Server 2016\/2019\/2022, Windows Defender, WSUS, AppLocker, GPOs, NIST CSF, 3-2-1 Backup Strategy<\/em><\/p>\n\n\n\n<blockquote class=\"wp-block-quote\">\n<p>This research paper examines ransomware mitigation strategies for Windows servers and endpoints, using the BlackByte (2024) and WannaCry (2017) attacks as case studies. It analyzes the ransomware lifecycle, evaluates technical countermeasures, and provides actionable recommendations grounded in NIST&#8217;s Cybersecurity Framework and industry best practices.<\/p>\n<\/blockquote>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd0d Project Highlights<\/h2>\n\n\n\n<ul>\n<li>Analyzed <strong>two real-world ransomware case studies<\/strong> \u2014 WannaCry (2017) and BlackByte (2024) \u2014 identifying attack vectors, tools, and outcomes<\/li>\n\n\n\n<li>Applied the <strong>NIST CSF five-function model<\/strong> (Identify, Protect, Detect, Respond, Recover) to structure a comprehensive mitigation framework<\/li>\n\n\n\n<li>Evaluated <strong>Windows-native security tools<\/strong> including Defender, AppLocker, WSUS, GPOs, and Event Logs<\/li>\n\n\n\n<li>Developed a <strong>comparison table<\/strong> of tools, functionality, mitigation impact, and implementation complexity<\/li>\n\n\n\n<li>Proposed <strong>12 actionable recommendations<\/strong> covering backups, EDR solutions, network segmentation, authentication, and employee training<\/li>\n\n\n\n<li>Created <strong>custom flowcharts<\/strong> illustrating ransomware detection, response, and recovery phases<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd10 Security Concepts Applied<\/h2>\n\n\n\n<ul>\n<li>Ransomware lifecycle analysis (infection, propagation, execution, impact, recovery)<\/li>\n\n\n\n<li>Crypto vs. Locker ransomware differentiation<\/li>\n\n\n\n<li>EternalBlue SMB exploit and MS17-010 patch management<\/li>\n\n\n\n<li>3-2-1 backup strategy and immutable\/air-gapped storage<\/li>\n\n\n\n<li>Endpoint Detection and Response (EDR) implementation<\/li>\n\n\n\n<li>Phishing simulation and human factors integration<\/li>\n\n\n\n<li>RaaS (Ransomware-as-a-Service) threat modeling<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83e\udde0 What This Paper Demonstrates<\/h2>\n\n\n\n<p>This paper demonstrates the ability to conduct applied cybersecurity research at a professional level \u2014 analyzing real-world attack scenarios, evaluating technical defense frameworks, and translating NIST standards into practical, organization-ready recommendations for Windows environments.<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/08\/CYSE-280-Final-Research-Paper-FD-submission.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"both\" data-toolbar-fixed=\"on\">CYSE-280-Final-Research-Paper-FD-submission<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<ul class=\"wp-block-social-links has-normal-icon-size has-visible-labels has-icon-color has-icon-background-color is-style-default is-horizontal is-content-justification-center is-layout-flex wp-container-core-social-links-layout-1 wp-block-social-links-is-layout-flex\"><li style=\"color: #ffffff; background-color: #cf2e2e; \" class=\"wp-social-link wp-social-link-chain has-white-color wp-block-social-link\"><a rel=\"https:\/\/www.credly.com\/users\/carl-lochstampfor-jr noopener nofollow\" target=\"_blank\" href=\"http:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/08\/CYSE-280-Final-Research-Paper-FD-submission.pdf\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M15.6,7.2H14v1.5h1.6c2,0,3.7,1.7,3.7,3.7s-1.7,3.7-3.7,3.7H14v1.5h1.6c2.8,0,5.2-2.3,5.2-5.2,0-2.9-2.3-5.2-5.2-5.2zM4.7,12.4c0-2,1.7-3.7,3.7-3.7H10V7.2H8.4c-2.9,0-5.2,2.3-5.2,5.2,0,2.9,2.3,5.2,5.2,5.2H10v-1.5H8.4c-2,0-3.7-1.7-3.7-3.7zm4.6.9h5.3v-1.5H9.3v1.5z\"><\/path><\/svg><span class=\"wp-block-social-link-label\">Full Screen or Download<\/span><\/a><\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Windows Servers Edition History Comparison<\/h2>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-1 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\"><a href=\"https:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/05\/CYSE-280-Windows-Server-Edition-History-1.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"both\" data-toolbar-fixed=\"on\">CYSE-280-Windows-Server-Edition-History-1<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<ul class=\"wp-block-social-links has-normal-icon-size has-visible-labels has-icon-color has-icon-background-color is-style-default is-horizontal is-content-justification-center is-layout-flex wp-container-core-social-links-layout-2 wp-block-social-links-is-layout-flex\"><li style=\"color: #ffffff; background-color: #cf2e2e; \" class=\"wp-social-link wp-social-link-chain has-white-color wp-block-social-link\"><a rel=\"https:\/\/www.credly.com\/users\/carl-lochstampfor-jr noopener nofollow\" target=\"_blank\" href=\"http:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/05\/CYSE-280-Windows-Server-Edition-History-1.pdf\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M15.6,7.2H14v1.5h1.6c2,0,3.7,1.7,3.7,3.7s-1.7,3.7-3.7,3.7H14v1.5h1.6c2.8,0,5.2-2.3,5.2-5.2,0-2.9-2.3-5.2-5.2-5.2zM4.7,12.4c0-2,1.7-3.7,3.7-3.7H10V7.2H8.4c-2.9,0-5.2,2.3-5.2,5.2,0,2.9,2.3,5.2,5.2,5.2H10v-1.5H8.4c-2,0-3.7-1.7-3.7-3.7zm4.6.9h5.3v-1.5H9.3v1.5z\"><\/path><\/svg><span class=\"wp-block-social-link-label\">Full Screen &amp; Download<\/span><\/a><\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Course Grade Received: A Windows System Management &amp; Security This course focused on Windows system administration and enterprise security, emphasizing the configuration, management, and protection of Windows client and server environments. Students gained hands-on experience with Active Directory, Group Policy, and core network services such as DNS and DHCP. The course also explored system hardening,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/locky\/coursework\/cybersecurity-applications\/cyse-280\/\">Read More<\/a><\/div>\n","protected":false},"author":30379,"featured_media":0,"parent":2309,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"advanced_seo_description":"Hands-on Windows system administration and security, including Active Directory, Group Policy, DNS\/DHCP, PKI, and enterprise system hardening.","jetpack_seo_html_title":"CYSE 280 Windows System Management & Security | ODU","jetpack_seo_noindex":false,"footnotes":""},"jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/pages\/531"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/users\/30379"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/comments?post=531"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/pages\/531\/revisions"}],"predecessor-version":[{"id":2370,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/pages\/531\/revisions\/2370"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/pages\/2309"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/media?parent=531"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}