This quick reference page provides a summary of the specifications of the CSSIA Windows 10 Administration Pod.

The CSSIA Windows 10 Administration Pod is a 100% virtual machine pod consisting of 3 virtual machines. Linked together through virtual networking, these virtual machines provide the environment for a student or team to perform the Windows10 Administration labs.

You may request virtual machine templates for the CSSIA Windows 10 Administration Pod from CSSIA.

 

Lab Topology

CSSIA Windows 10 Administration Pod

Virtual Machines

The virtual machines in the CSSIA Windows 10 Administration Pod are listed below. The Virtual Machine Deployment Names are provided as a suggested naming convention.

Virtual Machine Topology Name Virtual Machine Deployment Name
Server CSSIA_WIN10ADM_Master_Server
PC1 CSSIA_WIN10ADM_Master_PC1
PC2 CSSIA_WIN10ADM_Master_PC2

Storage Requirements

The Windows 10 Administration course will consume 26.1 GB of storage per each user pod instance.

Details of the storage requirements for each of the lab virtual machines in the CSSIA Windows 10 Administration Pod are provided in the table below. Some fluctuation in the numbers may occur.

Virtual Machine OVF/OVA Initial Master Pod
(thin provisioning) GB
Server 3.97 7.4
PC1 5.06 9.9
PC2 4.47 8.8
Total 13.5 26.1
 

Virtual Machine Templates

The Center for Systems Security and Information Assurance (CSSIA) provides virtual machine templates to install on the pod.

To request access to the preconfigured virtual machine templates from CSSIA:

  1. Go to the CSSIA Resources page: https://www.cssia.org/cssiaresources/
  2. Select CSSIA VM Image Sharing Agreement.
  3. Complete and submit your access request by following the instructions on the request form.
  4. CSSIA will provide, via email, password-protected download links. Access to the download links is provided only to customers who are current with their NETLAB+ support contract and are participants in the appropriate partner programs (i.e., Cisco Networking Academy, VMware IT Academy, Red Hat Academy, and/or Palo Alto Networks Cybersecurity Academy).
  5. Once all virtual machines have been downloaded, they can be deployed following the steps in the appropriate pod installation guide. Each virtual machine is deployed individually.