To complete the project, you will need the following: Access to the Internet to perform research for the project Microsoft Windows How-To, including: Optimize Windows for Better Performance: http://windows.microsoft.com/en-us/windows/optimize-windows-better-performance - optimize-windows-better-performance=windows-7 Monitor Attempts to Access and Change Settings On Your Computer / To Turn On Auditing: http://windows.microsoft.com/en-us/windows7/monitor-attempts-to-access-and-change-settings-on-your-computer What Information Appears in Event Logs? http://windows.microsoft.com/en-us/windows/what-information-event-logs-event-viewer - 1TC=windows-7 Course textbook Learning Objectives and Outcomes You will: • Explain how to assess risks, threats, and vulnerabilities • Evaluate potential outcomes of a malware attack and exposure of confidential information • Evaluate information systems security countermeasures • Explain how system hardening relates to a company’s IT security policy framework • Analyze the purposes of system hardening • Analyze security events • Evaluate information systems security activities in terms of business contributions
Get Free Quote!
386 Experts Online