When doing the active directory lab I started with flashing a drive using rufus to make a windows server 2022 drive. I then did a fresh install on a pc. After setting up the pc I used server manager to configure Active Directory. Add roles and features -> then use the wizard to set up Active Directory and - Domain Services (AD DS). After setting up Active Directory (AD), I made the computer the Domain Controller which also makes that server the primary DNS. I then went into users and computers and made the four Organization Units (OU's) and the 4 Users and Groups.
I began by flashing a thumb drive with Windows Server, followed by configuring Active Directory and Domain Services AD DS within the Server Manager. Once AD was set up, I prepared another PC by installing Windows 11 via a flash drive and assigning it the appropriate IP address. Next, I created an Organizational Unit OU within the server and added a user for the new PC. I used this OU to apply group policies to both computers and users within the unit. I then configured a user policy to restrict access to the Command Prompt and the graphing calculator because you cant have it….. Additionally, I applied a computer policy to display a custom message upon user login.
The File Sharing Lab outlines the process of managing file sharing within an Active Directory AD structure for a company called Company Data, organized into departments such as ENG, IT, HR, and MRKT. Each department has its own computers, users, and groups. Key concepts include: File shares are network connections to shared folders, and SMB Server Message Block) is the protocol used for Windows file sharing. The main folder, Company Data, is shared with all departments, with Full Control permissions at the share level. NTFS permissions, which define access controls, are inherited from the toplevel folder C drive), but inheritance can be disabled for finer control at department levels. For file share management, permissions are configured by removing default access (like the "Everyone" group), adding department-specific permissions, and setting access at the NTFS Security tab and Advanced Sharing settings. The process includes setting up shared access, adjusting permissions, and managing inheritance to ensure each department has appropriate access to its specific files.
Introduction -> Social Engineering -> Phishing (Best email practices) -> Password Hygiene -> Secure your surroundings.
CIA Triad. Confidentiality, keeping things confidential. Not sharing passwords. Keeping students things like transcript confidential. Ferpa is a set of laws in cybersecurity to protect students (Family education). Keeping students address grades etc confidential. PCI DSS, Payment card industry. Availability, keeping the information or business running and available. IT support or help desk could be considered Availability because they need access to whats being used. Helping your boss get into a meeting. Being available to help is also a stem of IT help desk. Elder fraud, also ICCC from the FBI. Basically what age groups are scammed the most. 60 and up are the most scammed group 3 billion and increasing as a industry. Social engineering is also the bigger things inside of the scams. OSINT Frame work. Ooof. Cybersecurity is a function of risk. Risk management. Threat modeling, defining the threats. What are you defending from. Should a university be on a military installation level.
How to start in CyberSecurity
Start by identifying what data is critical to your operation. Identify the critical IT and technologies that are needed every day. Power is needed especially for IT class. Computers being up and operational. Seeing grades and assignments (Moodle has to be up). LMS needs to be up. Student data where is it at and how is it (Being kept up). Network documentation is very important. Manual on the network map of the environment. For example if theres a AD server, you need to know physically where its at as well as what switch it connects to what vlan etc etc. If no one knows where database is or something on the network that goes down it needs to be labeled somewhere so that its accessible. In a technical environment there are typically end devices, network device, servers. End device, is a computer or phone a “End user” thats working on there device for everyday use. Looking at end users the “user land”. Law of least priv. You only need what you need to do your job. There should be change forms in place to allow people to request access, giving it the time of day from a formal perspective. Not giving everyone full perms. Network device - connects multiple devices together.