Project: Securing a Business Network
Reconnaissance
Criteria | Meet Specification |
---|---|
The student is able to identify the hardware in use on this virtual PC. |
Student will complete the Hardware section in the worksheet. This includes providing at least one screenshot of the system settings screen. |
The student is able to identify the software applications in use on this virtual PC |
|
The student is able to identify the user accounts in use on this virtual PC. |
Student will complete the Accounts section in the worksheet by naming at least 5 user accounts on the virtual PC. This includes providing at least one screenshot of the Accounts screen. |
The student is able to identify the service and the security settings on the PC and explain vulnerabilities and risks with these settings. |
|
Securing the PC
Criteria | Meet Specification |
---|---|
The student is able to recommend an industry security baseline and justify the choice |
|
The student is able to secure a Windows 10 PC following a security baseline. |
Students will choose 3 from the 5 security areas provided in the System and Security section. Answer ALL questions and provide screenshots as asked in the areas they choose. |
Securing Access
Criteria | Meet Specification |
---|---|
The student is able to identify user accounts found on the sample computer and identify vulnerabilities and risks associated |
Student will answer ALL questions asked in the User accounts sections. This includes:
|
The student is able to identify current access and authentication policies and setting new policies. |
Student will answer ALL questions asked in the Setting Access and Authentication Policies, and auditing and logging sections. This includes
|
Securing Applications
Criteria | Meet Specification |
---|---|
The student is able to identify applications running on the sample computer, remove unwanted applications, and identify vulnerabilities and risks associated |
Student will answer ALL questions and provide screenshots in the Remove unneeded or unwanted applications, Default browser and Windows Services sections.
|
The student is able to identify patching and updates of PC and applications and make setting changes |
Student will answer ALL questions and provide screenshots in the Patching and updates section.
|
Securing Files and Folders
Criteria | Meet Specification |
---|---|
The student is able to identify the access of files and secure files |
Student will answer ALL questions and provide screenshots in section. This include:
|
Optional: Basic Computer Forensics (Advanced)
Criteria | Meet Specification |
---|---|
The student is able to locate suspicious files in PC |
Student will locate suspicious files by looking through unwanted users’ folder |
Tips to make your project standout:
- Students answer the topics listed as “Advanced Students” in the template.
- Students complete at least four of the security areas in Section 2, Securing the PC
- Students complete Section 6, Basic Computer Forensics