I need an explanation for this Computer Science question to help me study.
Course Name: Application Security
Textbook: Solomon, Michael. Security Strategies in Windows Platforms and Applications, Third Edition. Burlington, MA: Jones & Bartlett, 2021.
Provide a 500 word (or 2 pages double spaced) minimum reflection.
Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.Share a personal connection that identifies specific knowledge and theories from this course.
Demonstrate a connection to your current work environment.
You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.
****This is a Practical Connection Assignment
****consider me working as a Cloud Engineer or Linux Administrator which ever is easy for you to elaborate to apply the skills gained from this course to apply at my work environment.
So far the Topics covered in this course:
–>Lesson 1: Microsoft Windows and the Threat Landscape
Required Readings Chapter 1: Microsoft Windows and the Threat Landscape
Chapter 2: Security in the Microsoft Windows Operating System
Lab Implementing Access Controls with Windows Active Directory (3e)
—->Lesson 2: Access Controls in Microsoft Windows, and Encryption Tools and Technologies
Required Readings Chapter 3: Access Controls in Microsoft Windows
Chapter 4: Microsoft Windows Encryption Tools and Technologies
Lab Using Access Control Lists to Modify File System Permissions on Windows Systems (3e)
—->Lesson 3: Microsoft Windows Malware Protection and Group Policy Control
Required Readings Chapter 5: Protecting Microsoft Windows against Malware
Chapter 6: Group Policy Control in Microsoft Windows
Lab Configuring Microsoft Encrypting File System and BitLocker Drive Encryption (3e)
—->Lesson 4: Microsoft Windows Auditing and Backup and Recovery Tools
Required Readings Chapter 7: Microsoft Windows Security Profile and Audit Tools
Chapter 8: Microsoft Windows Backup and Recovery Tools
Lab Identifying and Removing Malware from Windows Systems (3e)