CSS 347: Security Strategies in Windows Platforms and Applications

Course Description

This course will focus on security implementations for various Windows platforms and applications. Areas of study involve identifying and examining security risks, security solutions, and tools available for various Windows platforms and applications. (3 credits)

Prerequisites

  • ENG 101: English Composition 1
  • ENG 102: English Composition 2
  • ITE 145: Fundamentals of Information Systems Security
  • ITE 220: Networking and Data Communication (Recommended)

Student Learning Outcomes (SLOs)

Students who successfully complete this course will be able to:

  1. Explain information security and how it applies to the Microsoft Windows operating systems.
  2. Explain security features of the Microsoft Windows operating systems.
  3. Implement secure access controls when setting up Microsoft Windows in a given organization.
  4. Set up encryption in a given organization to secure Windows environment.
  5. Install controls to protect a given Windows system from malware.
  6. Define and apply Group Policy controls in Microsoft Windows.
  7. Explain profile and audit tools to keep Windows systems secure.
  8. Perform backup and restore operations on a given Windows system.
  9. Design techniques to protect Windows networks from security vulnerabilities.
  10. Develop a security administration framework to ensure your organization meets its security policy goals.
  11. Identify and implement the most effective security controls to make computers and networks as secure as possible.
  12. Design techniques to protect given Windows application software from security vulnerabilities.
  13. Apply best practices for handling a given Microsoft Windows system and application incident.
  14. Include security concerns as early as possible in the software development process.
  15. Apply best practices to securing Microsoft Windows computers, networks, and applications.

Course Concepts

  1. Windows security vulnerabilities
  2. Microsoft Windows hardening strategies
  3. Windows system monitoring techniques
  4. Backup and restore operations
  5. Security incident handling tactics

Course Activities and Grading

AssignmentsWeight

Discussions

10%

Project

40%

Lab Assignments

20%

Final Exam

30%

Total

100%

Required Textbooks

Available through Charter Oak State College's online bookstore

  • Solomon, Michael. Security Strategies in Windows Platforms and Applications - with Access Code. 3rd ed., Sudbury, MA: Jones & Bartlett, 2021. ISBN-13: 9781284266351
    • Note: This is a bundle which includes the textbook and the Access Code required for this course. We discourage students from purchasing “used” materials from other sources due to access codes not working properly.

 

Recommended Resources

Not available through bookstore and these resources will be additional costs to the students.

  • Sivarajan, Santhosh. Getting Started with Windows Server Security. Packt Publishing, 2015. ISBN-13: 978-1784398729
  • Moskowitz, Jeremy. Group Policy: Fundamentals, Security, and the Managed Desktop. 3rd. ed. Sybex, 2015. ISBN-13: 978-1119035589
  • Svidergol, et al. Mastering Windows Server 2016. Sybex, 2018. ISBN-13: 978-1119404972
  • Stokes, Singer, and Diver. Windows 10 for Enterprise Administrators: Modern Administrators' guide based on Redstone 3 version. Packt Publishing, 2017. ISBN-13: 978-1786462824
  • Miroshnikov, Andrei. Windows Security Monitoring: Scenarios and Patterns. Wiley Publishing, 2018. ISBN-13: 978-1119390640
  • Microsoft Security
  • SANS Internet Storm Center
  • Windows Community

Course Schedule

Week

SLOs

Readings and Exercises

Assignments

1

1, 2

Topic: Security Features in Microsoft Windows

  • Readings:
    • Chapter 1 “Microsoft Windows and the Threat Landscape”
    • Chapter 2 “Security in the Microsoft Windows Operating System”
  • Read assigned chapters
  • Review the Lecture material
  • Participate in the discussion
  • Submit Project Part 1
    • Active Directory Recommedations
  • Submit Week 1 Lab
    • Implementing Access Controls with Windows Active Directory

2

3,4

Topic: Access Controls in Microsoft Windows

  • Readings:
    • Chapter 3 “Access Controls in Microsoft Windows”
    • Chapter 4 “Microsoft Windows Encryption Tools and Technologies”
  • Read assigned chapters
  • Review the Lecture material
  • Participate in the discussion
  • Submit Project Part 2
    • Access Controls Procedure Guide
  • Submit Week 2 Labs
    • Using Access Control Lists to Modify File System Permissions on Windows Systems
    • Configuring Microsoft Encrypting File System and BitLocker Drive Encryption

3

5,6

Topic: Protecting Microsoft Windows Systems

  • Readings:
    • Chapter 5 “Protecting Microsoft Windows against Malware”
    • Chapter 6 “Group Policy Control in Microsoft Windows”
  • Read assigned chapters
  • Review the Lecture material
  • Submit Project Part 3
    • Malware Policy Procedure Guide
  • Submit Project Part 4
    • Group Policy Objects Recommendations
  • Submit Week 3 Labs
    • Identifying and Removing Malware from Windows Systems
    • Managing Group Policy Within the Microsoft Windows Environment

4

7,8

Topics: Microsoft Windows Security Profile, Group Policy Controls, Windows Backup & Recovery Tools

  • Readings:
    • Chapter 7 “Microsoft Windows Security Profile and Audit Tools”
    • Chapter 8 “Microsoft Windows Backup and Recovery Tools”
  • Read assigned chapters
  • Review the Lecture material
  • Participate in the discussion
  • Submit Project Part 5
    • Security Audit Procedure Guide
  • Submit Project Part 6
    • System Restoration Procedure Guide
  • Submit Week 4 Labs
    • Auditing Windows Systems for Security Compliance
    • Creating a Scheduled Backup and Replicating System Folders

5

9, 10

Topic: Securing Microsoft Windows Networks

  • Readings:
    • Chapter 9 “Microsoft Windows Network Security”
    • Chapter 10 “Microsoft Windows Security Administration”
  • Read assigned chapters
  • Review the Lecture material
  • Participate in the discussion
  • Submit Project Part 7
    • Network Security Controls Recommendations

6

11, 12

Topic: Securing the Microsoft Windows Operating System & Applications

  • Readings:
    • Chapter 11 “Hardening the Microsoft Windows Operating System”
    • Chapter 12 “Microsoft Application Security”
  • Read assigned chapters
  • Review the Lecture material
  • Submit Project Part 8
    • Windows Hardening Recommendations
  • Submit Week 6 Labs
    • Hardening Windows Systems for Security Compliance
    • Securing Internet Client and Server Applications on Windows Systems

7

13,14,15

Topics: Microsoft Windows Incident Handling and Managment & Security Life Cycle & Windows Best Practices

  • Readings:
    • Chapter 13 “Microsoft Windows Incident Handling and Management”
    • Chapter 14 “Microsoft Windows and the Security Life Cycle”
    • Chapter 15 “Best Practices for Microsoft Windows and Application Security”
  • Read assigned chapters
  • Review the Lecture material
  • Participate in the discussion
  • Submit Project Part 9
    • Secure Windows Applications Policy
  • Submit Project Part 10
    • Evidence Collection Policy
  • Submit Week 7 Lab
    • Investigating Security Incidents within the Microsoft Windows Environment

8

1-15

Topics: Course Review and Final Examination

  • Readings:
    • None
  • Complete Final Exam
  • Complete the Course Evaluation

COSC Accessibility Statement

Charter Oak State College encourages students with disabilities, including non-visible disabilities such as chronic diseases, learning disabilities, head injury, attention deficit/hyperactive disorder, or psychiatric disabilities, to discuss appropriate accommodations with the Office of Accessibility Services at OAS@charteroak.edu.

COSC Policies, Course Policies, Academic Support Services and Resources

Students are responsible for knowing all Charter Oak State College (COSC) institutional policies, course-specific policies, procedures, and available academic support services and resources. Please see COSC Policies for COSC institutional policies, and see also specific policies related to this course. See COSC Resources for information regarding available academic support services and resources.