Security Strategies in Windows Platforms and Applications, Second Edition

Security Strategies in Windows Platforms and Applications, Second Edition

Michael G. Solomon
ISBN-13: 978-1-284-03165-2
396 pages
© 2014

Learn More
Request a Review Copy

  • Description
  • Applied Labs
  • Table of Contents
  • Course Objectives
  • Resources

The majority of individuals, students, educators, businesses, organizations, and governments use Microsoft Windows, which has experienced frequent attacks against its well-publicized vulnerabilities. Revised and updated to keep pace with this ever changing field, Security Strategies in Windows Platforms and Applications, Second Edition focuses on new risks, threats, and vulnerabilities associated with the Microsoft Windows operating system. Particular emphasis is placed on Windows XP, Vista, and 7 on the desktop, and Windows Server 2003 and 2008 versions. It highlights how to use tools and techniques to decrease risks arising from vulnerabilities in Microsoft Windows operating systems and applications. The book also includes a resource for readers desiring more information on Microsoft Windows OS hardening, application security, and incident management. With its accessible writing style, and step-by-step examples, this must-have resource will ensure readers are educated on the latest Windows security.

Key Features

  • New information on Windows 2012 and its four different editions
  • New information on malware, ransomware, and spyware
  • The latest on Agile Software Development, including its history, purpose, and definition
  • Discussion of hacktivists and examples of some of their recent attacks
  • New information on Windows 2012 and DAC, Managed Service Accounts, and Expression-based Security Audit Policy
  • Discusses new BitLocker features

This title is available with Virtual Security Cloud Labs – delivered in a first-of-its-kind cloud computing environment- that provides a fully immersive mock IT infrastructure enabling hands-on-experiential learning. An integrated lab manual is available to assist you with these labs.

Lab #1: Implementing Access Controls with Windows Active Directory
Lab #2: Using Access Control Lists to Modify File System Permissions on Windows Systems
Lab #3: Configuring Bitlocker and Windows Encryption
Lab #4: Identifying and Removing Malware From Windows Systems
Lab #5: Managing Group Policy within the Microsoft Windows Environment
Lab #6: Creating a Scheduled Backup and Replicating System Folders
Lab #7: Securing Servers with the Security Configuration Wizard and the Windows Firewall
Lab #8: Securing Internet Client and Server Applications on Windows Systems
Lab #9: Protecting Digital Evidence, Documentation, and the Chain of Custody
Lab #10: Hardening Windows Server Security Using Microsoft Baseline Security Analyzer
Part 1: The Microsoft Windows Security Situation
Chapter 1: Windows and the Threat Landscape
Chapter 2: Security in Microsoft Windows OS
Part 2: Managing and Maintaining Microsoft Windows Security
Chapter 3: Access Controls in Microsoft Windows
Chapter 4: Microsoft Windows Encryption Tools and Technologies
Chapter 5: Protecting Microsoft Windows Against Malware
Chapter 6: Group Policy Controls in Microsoft Windows
Chapter 7: Microsoft Windows Security Profile and Audit Tools
Chapter 8: Microsoft Windows Backup and Recovery Tools
Chapter 9: Microsoft Windows Network Security
Chapter 10: Microsoft Windows OS Security Administration
Part 3: Microsoft Windows OS and Application Security Trends and Directions
Chapter 11: Hardening the Windows OS
Chapter 12: Microsoft Application Security
Chapter 13: Microsoft Windows Incident Handling and Management
Chapter 14: Microsoft Windows and the Security Lifecycle
Chapter 15: Best Practices for Microsoft Windows and Application Security
  1. Explain security features of the Microsoft Windows operating systems.
  2. Implement secure access controls when setting up Microsoft Windows in a given organization.
  3. Set up encryption in a given organization to secure Windows environment.
  4. Install controls to protect a given Windows system from malware.
  5. Apply Group Policy controls and profile and audit tools to keep Windows systems secure.
  6. Perform backup and restore operations on a given Windows system.
  7. Design techniques to protect given Windows networks and systems from security vulnerabilities.
  8. Design techniques to protect given Windows application software from security vulnerabilities.
  9. Apply best practices for handling a given Microsoft Windows system and application incident.
  10. Apply best practices while managing changes to Windows and its applications.

Instructor Resources include:

  • PowerPoint Lectures
  • Instructor’s Guide
  • Test and Quiz Items
  • Sample Syllabus
  • Case Scenarios/Handouts
  • Handouts
  • Projects
  • Study Guide
  • Time on Task
  • Content Map