Windows Fundamentals

Teaching Windows Fundamentals is part of both IT 101 and Cybersecurity 101. 

Windows is used across corporate environments of all sizes. Many servers run on Windows, and companies deploy Windows workstations to their employees.  

The Project Ares Learning catalog now includes

Windows Fundamentals 1

WINDOWS COMMAND SHELL - FILESYSTEM

Windows Command Shell – Filesystem

(Battle Room 1001)
This module covers the essentials for starting with the Windows operating system and command line to access the file system. A file system is a set of data structures, interfaces and APIs that work together to manage any type of file on any type of storage device, in a consistent manner.

Windows Fundamentals 2

WINDOWS PROCESSES
AND SERVICES

Windows Processes and Services

(Battle Room 1002)
This module covers the essentials of using the Windows operating system command line and PowerShell to work with processes, services, and applications. PowerShell is a task automation and configuration management program from Microsoft, consisting of a command-line shell and the associated scripting language.

Windows Fundamentals 3

WINDOWS REGISTRY

Windows Registry

(Battle Room 1003)
The Windows Registry is a hierarchical database that stores settings for the Microsoft Windows operating system and for applications that opt to use the registry. The kernel, device drivers, services, Security Accounts Manager, and user interfaces can all use the Registry. The Registry helps Windows manage and operate your computer, ensuring access to critical resources and managing important configuration settings for programs.

Windows Fundamentals 4

NETWORKING

Networking

The Circadence cyber elves are still working on this one. Look for it in the New Year.

A Windows Capstone Scenario: Microsoft 365 Introduction

With knowledge about the Windows operating system and using Microsoft security tools, this capstone scenario puts the user in the role of a blue team member tasked to investigate the indicators of an advanced threat that is conducting and attack on the network. 

Circadence © 2022 – Terms & Conditions – Privacy Policy