Reflection Paper

Provide a reflection of at least 2 pages, double spaced of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 
· Provide a minimum two (2) page, double spaced reflection paper
· Use proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. 
· Coversheet, reference list, figures and tables don’t count toward the two (2) page count.
· Share a personal connection that identifies specific knowledge and theories from this course. 
· Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 
· You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting below course objectives were applied or could be applied in the workplace. 

Course Objectives:
Upon completion of this course, the student will:
· Explain information security and how it applies to the Microsoft Windows operating systems.
· Explain security features of the Microsoft Windows operating systems
· Implement secure access controls when setting up Microsoft Windows in a given organization 
· Set up encryption in a given organization to secure Windows environment
· Install controls to protect a given Windows system from malware
· Define and apply Group Policy controls in Microsoft Windows
· Explain profile and audit tools to keep Windows systems secure
· Perform backup and restore operations on a given Windows system
· Design techniques to protect Windows networks from security vulnerabilities
· Develop a security administration framework to ensure your organization meets its security policy goals
· Identify and implement the most effective security controls to make computers and networks as secure as possible
· Design techniques to protect given Windows application software from security vulnerabilities
· Apply best practices for handling a given Microsoft Windows system and application incident
· Include security concerns as early as possible in the software development process
Apply best practices to securing Microsoft Windows computers, networks, and applications 

myhomeworkgeeks (28431)
New York University

Hire an Expert to Help you

Hire Verified Expert

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
The price is based on these factors:
Academic level
Number of pages
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more
Have a homework question? Get help from verified tutors now!
error: Content is protected !!

Are You Looking For Assignment Help? We Can Certainly Assist You