{"id":416,"date":"2024-11-25T20:46:16","date_gmt":"2024-11-25T20:46:16","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/?page_id=416"},"modified":"2024-11-25T21:04:34","modified_gmt":"2024-11-25T21:04:34","slug":"cyse280","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/cyse280\/","title":{"rendered":"CYSE280"},"content":{"rendered":"\n<p class=\"has-text-align-center has-black-color has-text-color has-link-color has-large-font-size wp-elements-674e0ad53d70fe78e51200bc58e73884\"><strong>Windows System Management and Security<\/strong><\/p>\n\n\n\n<p>This course introduces tools and techniques used to configure, manage and implement Windows and its security-related features. Students will install, configure, manage and secure Windows client &amp; server operating systems and related networking environment using a variety of software tools. This course also details how to mitigate malware threats, identify security issues by using auditing and the Advanced Threat Analysis feature in Windows Server, secure virtualization platform, and use new deployment options for enhancing the security.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p class=\"has-large-font-size\"><strong>Course Work:<\/strong><\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-content\/uploads\/sites\/31888\/2024\/11\/The-Evolution-of-Malware.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of The-Evolution-of-Malware.\"><\/object><a id=\"wp-block-file--media-dc4a2ff6-5148-419a-b608-5578a5e97a0f\" href=\"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-content\/uploads\/sites\/31888\/2024\/11\/The-Evolution-of-Malware.pdf\">The-Evolution-of-Malware<\/a><a href=\"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-content\/uploads\/sites\/31888\/2024\/11\/The-Evolution-of-Malware.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-dc4a2ff6-5148-419a-b608-5578a5e97a0f\">Download<\/a><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-content\/uploads\/sites\/31888\/2024\/11\/CYSE-280-Homework-3-sp24.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of CYSE-280-Homework-3-sp24.\"><\/object><a id=\"wp-block-file--media-0d480a00-c402-4ed8-a4d1-1e625afecdfd\" href=\"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-content\/uploads\/sites\/31888\/2024\/11\/CYSE-280-Homework-3-sp24.pdf\">CYSE-280-Homework-3-sp24<\/a><a href=\"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-content\/uploads\/sites\/31888\/2024\/11\/CYSE-280-Homework-3-sp24.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-0d480a00-c402-4ed8-a4d1-1e625afecdfd\">Download<\/a><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-content\/uploads\/sites\/31888\/2024\/11\/CYSE-280-Homework-5-sp24.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of CYSE-280-Homework-5-sp24.\"><\/object><a id=\"wp-block-file--media-e0789879-d356-4da7-98e0-5e538760f045\" href=\"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-content\/uploads\/sites\/31888\/2024\/11\/CYSE-280-Homework-5-sp24.pdf\">CYSE-280-Homework-5-sp24<\/a><a href=\"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-content\/uploads\/sites\/31888\/2024\/11\/CYSE-280-Homework-5-sp24.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-e0789879-d356-4da7-98e0-5e538760f045\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Windows System Management and Security This course introduces tools and techniques used to configure, manage and implement Windows and its security-related features. Students will install, configure, manage and secure Windows client &amp; server operating systems and related networking environment using a variety of software tools. This course also details how to mitigate malware threats, identify&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/cyse280\/\">Read More<\/a><\/div>\n","protected":false},"author":25798,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-json\/wp\/v2\/pages\/416"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-json\/wp\/v2\/users\/25798"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-json\/wp\/v2\/comments?post=416"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-json\/wp\/v2\/pages\/416\/revisions"}],"predecessor-version":[{"id":440,"href":"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-json\/wp\/v2\/pages\/416\/revisions\/440"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-json\/wp\/v2\/media?parent=416"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}