02. Project Instructions

Project Instructions

Windows 10 Environment

ND545 C1 L6 02 Windows 10 Environments Video

Summary

In this project, you are given a “broken” Windows 10 PC and asked to figure out what’s wrong with it and then make changes to fix and secure it. The process of analyzing and applying security happens in workplaces around the globe and is exactly what cybersecurity professionals do daily. This project gives you the opportunity to apply what you’ve learned in the course by investigating a Windows 10 PC, securing it, and then explaining what you found and did in your security report. The same skills you use on one PC can be applied to thousands.

Project template

ND545 C1 L6 03 Instructions Video

Summary

As a part of this project, you are given a document template (on the next page) that contains the high-level steps you’ll take as part of securing a typical computer system. You'll use the virtual Windows 10 PC to answer the questions and challenges listed in the project document. For each step, you need to write your answers in the document template, explain how you got the answers, and provide screenshots showing your work.

To take a screenshot on a Windows system, you can use the Snipping Tool or Snip & Sketch application (Windows logo key + Shift + S). To take a screenshot on a Macintosh system, press and hold these three keys together: Shift, Command, and 3. You can then paste the image into your report.

It’s important that you read through the entire document before securing the system and completing your report.

Advice for students

  • This project is based on instruction throughout the course. It takes you through the NIST CSF, CIS Controls, and Hacker Lifecycle. If you get stuck, go back to that section in the course and review the material.
  • It's important that you write each of the steps you take and use screenshots to show your work.
  • You should keep in mind that there are numerous ways to solve each of the challenges. You should use the method you are most comfortable with rather than getting the "right" answers. That's why it's important to show your work in your report.
  • Complete all of the sections in the template. Credit is given for partial answers.
  • There are many security problems with the sample PC. The intent is to give you a challenge based on what you've learned in this course and what you'll see in real life. Have fun exploring.