Microsoft Designing Security for Windows Network
I. Course Prefix/Number: CNS 203
Course Name: Microsoft Designing Security for Windows Network
Credits: 3 (3 lecture; 1 lab)
III. Course (Catalog) Description
IV. Learning Objectives
Upon completing this course, students will be able to:
- Plan a framework for network security.
- Identify threats to network security.
- Analyze security risks.
- Design security for physical resources and for computers.
- Test security for accounts and for authentication.
- Manage security for data and for data transmission.
- Modify security for network perimeters.
- Test and analyze an incident response procedure.
- Design an acceptable use policy.
- Optimize policies for managing networks.
- Create an operations framework for managing security.
V. Academic Integrity and Student Conduct
• plagiarism (turning in work not written by you, or lacking proper citation),
• falsification and fabrication (lying or distorting the truth),
• helping others to cheat,
• unauthorized changes on official documents,
• pretending to be someone else or having someone else pretend to be you,
• making or accepting bribes, special favors, or threats, and
• any other behavior that violates academic integrity.
There are serious consequences to violations of the academic integrity policy. Oakton's policies and procedures provide students a fair hearing if a complaint is made against you. If you are found to have violated the policy, the minimum penalty is failure on the assignment and, a disciplinary record will be established and kept on file in the office of the Vice President for Student Affairs for a period of 3 years.
Please review the Code of Academic Conduct and the Code of Student Conduct, both located online at
VI. Sequence of Topics
- Introduction to Designing Security
- Creating a Plan for Network Security
- Identifying Threats to Network Security
- Analyzing Security Risks
- Creating a Security Design for Physical Resources
- Creating a Security Design for Computers, Accounts, and Authentication
- Creating a Security Design for Data, and for Data Transmission
- Creating a Security Design for Network Perimeters
- Designing Responses to Security Incidents
- Designing an Acceptable Use Policy
- Designing Policies for Managing Networks
- Designing an Operations Framework to Manage Security
VII. Methods of Instruction
Course may be taught as face-to-face, hybrid or online course.
VIII. Course Practices Required
- Read course materials – textbook, and Self-Test
- Attend and participate in class lecture and lab.
- Complete required assignments, exercises, quizzes, and exams.
- Complete LAN projects.
Course may be taught as face-to-face, media-based, hybrid or online course.
IX. Instructional Materials
- Textbook and Lab book: Microsoft Official Curriculum for Windows
- Current Self-Test Software
- Software manuals
X. Methods of Evaluating Student Progress
Quizzes, examinations, completion of lab assignments, exercises; and several Local Area Networks (LAN) projects.
XI. Other Course Information
If you have a documented learning, psychological, or physical disability you may be entitled to reasonable academic accommodations or services. To request accommodations or services, contact the Access and Disability Resource Center at the Des Plaines or Skokie campus. All students are expected to fulfill essential course requirements. The College will not waive any essential skill or requirement of a course or degree program.
Oakton Community College is committed to maintaining a campus environment emphasizing the dignity and worth of all members of the community, and complies with all federal and state Title IX requirements.
Resources and support for
- pregnancy-related and parenting accommodations; and
- victims of sexual misconduct
Resources and support for LGBTQ+ students can be found at www.oakton.edu/lgbtq.