The required steps for the solution are: 1. Avoid plagiarism. 2. Do not use arti

The required steps for the solution are:
1. Avoid plagiarism.
2. Do not use arti

The required steps for the solution are:
1. Avoid plagiarism.
2. Do not use artificial intelligence such as ChatGPT, etc.
3. Utilize MATLAB software and attach a screenshot of the codes used within the program for each section.
4. Explain the solution method for each section.
5. The project requires attaching MATLAB results, including codes and images (as required by the project).
6. List the names of the programs used in the project on the last page.
7. Sentence formatting is required.
8. An attachment is provided for further clarification.

Project Part 2: Identify Vulnerabilities in IT Security Scenario Aim Higher Co

Project Part 2: Identify Vulnerabilities in IT Security
Scenario
Aim Higher Co

Project Part 2: Identify Vulnerabilities in IT Security
Scenario
Aim Higher College has been the target of focused attacks from a variety of attackers. Your manager has assigned you the task to review the port and vulnerability scan data recently gathered from a typical system to determine what ports and services are exposed to attackers, and what vulnerabilities exist on that system.
Required Resources
Access to the Internet
Text sheet: Zenmap Intense Scan Results (ts_zenmapscan)
Tasks
1.Analyze the results of the Zenmap scan. Your report must answer the following questions:
What are the first five open ports as identified by the Zenmap scan?
Include the port number
Include the service name
Include a brief description of how each is used
2.The Nessus scan identified two critical vulnerabilities, identified as ID 32314 and ID 33850.
Research the vulnerabilities against the Common Vulnerabilities and Exposure (CVE)database.
Include the name and a brief description of each vulnerability.
3.Determine what can be done to protect the system and defend the campus network againstattempts to gather data, and to resolve vulnerabilities. Also determine which ports and services likely need to remain open.
4.Write a report targeted at IT management and systems administration staff explaining thevulnerabilities and protection mechanisms that Aim Higher College should adopt, which will be applied to all similar systems at the college.
Submission Requirements
Format: Microsoft Word (or compatible)
Font: Arial, size 12, double-space
Citation Style: Follow your school’s preferred style guide
Length: 2 to 4 pages

Please make a summary of the two combined provided documents. Also be sure to ad

Please make a summary of the two combined provided documents. Also be sure to ad

Please make a summary of the two combined provided documents. Also be sure to address the progress up to this point, including areas of concern, specific problems, Any Action/Decision that Needs to be Taken not Specified in the SAPP, and What Students Would Do Differently. Determines the Steps the Group Plans to Complete Prior to the Next Checkpoint. Determines the Process Used to Resolve Any Disagreements within the Group. Calculates and Outlines the Project Budget to Ensure that the Project is Staying with the Initial Budget, Including the Actual Cost Versus the Planned Budget and Explanation for Any Variance between the Two as Applicable.
We are using Trello as our main source of staying on track and assigning who does what, after that we also use email. We only really communicate when discussing who is doing what with someone else being the group leader, but we have not had any disagreements so far and have been working together quite well.

CYB 220 Project Three Milestone Guidelines and Rubric Overview A critical skill

CYB 220 Project Three Milestone Guidelines and Rubric
Overview
A critical skill

CYB 220 Project Three Milestone Guidelines and Rubric
Overview
A critical skill for you to have as a cybersecurity practitioner is to prioritize criteria, requirements, and data to determine the best course of action. The factors that influence your decisions can vary from cost to complexity, effectiveness to available resources, or best-practice to executive viewpoint. How can you evaluate the issues to determine what elements of your environment are most important?
In this assignment, you will begin analyzing information related to selecting and recommending a network protection technology solution to your manager. The final evaluation and recommendation will be submitted as Project Three in Module Seven; however, in this milestone, you will examine organizational information, consider how various factors influence the decision-making criteria, and fill in a technology evaluation of your own based on your manager’s questions.
Scenario
Your instructor will provide you with the scenario for this project in an announcement. The scenario will provide you with the beginning of a security plan that documents areas of relevance to your decision making for the project.
Additionally, a fellow analyst is completing an evaluation of network protection technologies, specifically intrusion detection systems (IDSs) and intrusion prevention systems (IPSs), to help you with your decision-making process. You will be provided with the completed evaluation matrix in Module Seven for use in completing Project Three. Your manager has also provided a list of questions that they would use to evaluate the organizational needs in an IDS or IPS.
The technology evaluation criteria and your manager’s questions can be found in the Technology Evaluation Criteria document. For your submission, you will download and fill out the Technology Evaluation Criteria Worksheet. Both of these documents can be found in the Project Three Milestone task in Module Five of your course.
Based on your analysis of the technology evaluation criteria, the details provided in the scenario, and your manager’s guiding questions, you will identify the highest priority criteria and select Fundamental Security Design Principles related to your prioritization.
Prompt
Submit a completed Technology Evaluation Criteria Worksheet, which includes a filled-out table, your prioritized list, and two Fundamental Security Design Principles that best encompass your list. You will also need to justify and explain your selections.
Specifically, you must address the critical elementslisted below.
Using the manager’s questions and the evaluation criteria, identify relevant information from the organizational security plan material in the scenario to complete the blank column in the technology evaluation criteria table in the provided worksheet.
Based on your assessment of the relevant information from the organizational security plan, provide a prioritized list of the three most essential evaluation criteria. Justify your rationale for determining the priority of your selected elements.
Select two Fundamental Security Design Principles that best encompass the priority list. Explain the correlation between your priority list and the principles you identified.
What to Submit
Download, fill out, and submit the Technology Evaluation Criteria Worksheet, which includes the technology evaluation criteria table, your prioritized list, and your chosen Fundamental Security Design Principles. Use a filename that includes the course code, the assignment title, and your name—for example, CYB_100_Project_One_Neo_Anderson.docx.

he required steps for the solution are: 1. Avoid plagiarism. 2. Do not use artif

he required steps for the solution are:
1. Avoid plagiarism.
2. Do not use artif

he required steps for the solution are:
1. Avoid plagiarism.
2. Do not use artificial intelligence such as ChatGPT, etc.
3. Utilize MATLAB software and attach a screenshot of the codes used within the program for each section.
4. Explain the solution method for each section.
5. The project requires attaching MATLAB results, including codes and images (as required by the project).
6. List the names of the programs used in the project on the last page.
7. Sentence formatting is required.
8. An attachment is provided for further clarification.

Part 1 Assignment – QuickBooks Chapter 2 Exercises The submission instructions

Part 1
Assignment – QuickBooks Chapter 2 Exercises
The submission instructions

Part 1
Assignment – QuickBooks Chapter 2 Exercises
The submission instructions for these assignments may be different than stated in the textbook. Please read these instructions thoroughly before beginning the assignment.Using the Computer Accounting with QuickBooks Online textbook, complete the following steps:Complete the Chapter 2 readings and activities in the QuickBooks Online software.
Complete Exercise 2-1.
Export the following report to Microsoft Excel.
Chart of Accounts in CLASSIC VIEW
Save and submit the file.
TIP: You will be instructed to import a CSV file as part of your Chart of Accounts setup. That file is linked here:
Save your assignment as a Microsoft Excel workbook. (Mac users, please remember to append the “.xlsx” extension to the filename.) The name of the file should be your first initial and last name, fofollowed by an underscore and the name of the assignment, and an underscore and the date. An example is shown below: Part 2
Assignment – QuickBooks Chapter 3 Exercises
The submission instructions for these assignments may be different than stated in the textbook. Please read these instructions thoroughly before beginning the assignment.Using the Computer Accounting with QuickBooks Online textbook, complete the following steps:Complete the Chapter 3 readings and activities in the QuickBooks Online software.
Complete Exercise 3-1.
Export the following reports to Microsoft Excel.
Journalfor dates 10/1/2023 – 10/30/2023
Trial Balance for dates 10/1/2023 – 10/30/2023
Profit and Loss for dates 10/1/2023 – 10/30/2023
Balance Sheet for dates for dates 10/1/2023 – 10/30/2023
Copy each report to its respective tab in the following template located below step number five: Module 02 QBO template.xlsx
Save and submit the file.Save your assignment as a Microsoft Excel workbook. (Mac users, please remember to append the “.xlsx” extension to the filename.) The name of the file should be your first initial and last name, followed by an underscore and the name of the assignment, and an underscore and the date.

CYB 220 Project One Guidelines and Rubric Overview One of the main projects for

CYB 220 Project One Guidelines and Rubric
Overview
One of the main projects for

CYB 220 Project One Guidelines and Rubric
Overview
One of the main projects for this course is the creation of a virtual systems and networking concept brief in which you will configure operating systems in a simulated environment as a proof of concept before implementing changes in the live production environment. This work is often referred to as “sandboxing.” As a security analyst, you will be asked to install and configure new settings within a virtualized environment.
The audience for this brief is the system administrator for a fictional organization at which you are employed. This brief will serve as the basis for a proposal that your manager will be creating to propose a new network configuration. You have also been asked to provide a level of justification around the basic concepts of virtual systems so that your system administrator can include that in a proposal to other organizational stakeholders.
The project leverages the skills that you have built using tools in Modules Two and Three. The project will be submitted in Module Five.
Access the GNS3 environment by navigating to the Project One – Virtual Systems and Networking Concept Brief lab.
In this assignment, you will demonstrate your mastery of the following course competency:
Describe the basic concepts and uses of virtual systems and networks
Scenario
As a security analyst, you are tasked with creating a concept brief for your system administrator. This task includes creating multiple accounts, configuring network settings, and modifying group policies. To help you complete this task, your instructor will provide you with a scenario containing network configuration settings and group policy changes that you will need to implement. Additionally, you will be asked to describe the benefits and drawbacks of virtualization technology
Prompt
Address the critical elements listed below. The codes shown in brackets indicate the course competency to which each critical element is aligned.
Virtual Systems and Networking Concept Brief
Using Virtual SystemsConfigure group policy settings to meet project specifications. Provide screenshots from the local group policy editor dialog box as evidence of each change.
Configure network resources to meet the network configuration settings. Provide a screenshot of each network setting configuration.
Conceptual Justification for Uses of Virtual SystemsDescribe the benefits of using virtualization technology in sandboxing.
Describe the drawbacks of using virtualization technology in sandboxing.
Describe a situation other than sandboxing where virtualization technology would be a valuable solution.
What to Submit
Your submission should be 1 to 3 pages in length (in addition to screenshots). Use double spacing, 12-point Times New Roman font, and one-inch margins. Any sources you use should be cited according to APA style. Use a filename that includes the course code, the assignment title, and your name—for example, CYB_100_Project_One_Neo_Anderson.docx.

Module 4 Discussion 7979 unread replies.7979 replies. Discussion you may choose

Module 4 Discussion
7979 unread replies.7979 replies.
Discussion
you may choose

Module 4 Discussion
7979 unread replies.7979 replies.
Discussion
you may choose one topic of the following
Topic 1. We all know that at any time, employers can review emails sent on their systems. Discuss whether or not all work-related emails are considered organizational records that must be retained. Be sure to use in-text citations to reference the course materials you use to create your post. Use at least 2 sources in this post. (Minimum 2 in-text sources required)
Topic 2. Why is eDiscovery important in EDRMS, and how can planning help prepare for record requests? Be sure to use in-text citations to reference the course materials you use to create your post. Use at least 2 sources in this post. (Minimum 2 in-text sources required)
Peer Post Response:
You are expected to reply to at least one response made by other students in class. (Note: No citations to readings are required for responses). The reply posts should be composed of “value-added” information reflecting your opinion and input.
Discussion Tips:
Provide your original post or response to the discussion question (minimum of 250 words) in the “Message” box of the discussion thread (Note: attachments will not be accepted). The discussion posts must be thoughtful, reflective, and supported by evidence such as assigned readings or other external publications and websites.
The initial post should address the question and include at least TWO references/citations from the readings or external material. If a link exists, provide a citation and link; otherwise, provide the complete citation using APA style.

IT 423 Project One Guidelines and Rubric Competency In this project, you will de

IT 423 Project One Guidelines and Rubric
Competency
In this project, you will de

IT 423 Project One Guidelines and Rubric
Competency
In this project, you will demonstrate your mastery of the following competency:
Implement a cloud-based system that meets organizational needs
Interface with cloud-based databases to support organizational operations
Scenario
Imagine that you are a solutions architect at a start-up organization, Your Online Database Architecture for Education, or YODAE. YODAE recently launched in the educational technology industry. The company hired you to lead the design of its cloud database, which will be used by teachers in the K-12 education system. Teachers will be able to use the cloud-based IT system and database that you design to better manage their classrooms and to create various online learning experiences for their students. The database should store information about teachers, students, and classrooms. For this project, you will design the architecture of the database system by creating an entity relationship diagram (ERD). Then you will implement your design by creating a cloud database system. The cloud database system’s architecture consists of a database, web server, webpage, and client- or server-side scripting.
Directions
To complete this project:
Review the YODAE Business Case: Review the Business Case document in the Supporting Materials section to gain a better understanding of YODAE, and of how your cloud solution will meet its organizational needs and operations.
As part of the design of the cloud-based database, create an entity relationship diagram (ERD) to show the architecture of the cloud database system. To create your ERD, refer to the YODAE ERD Example, which already includes some components of your diagram. You must add to this diagram by including the following components:
All of the appropriate entities: What are the entities that need to be included in the ERD that are described in the business case?
All of the appropriate attributes: What are five attributes for each entity?
Necessary relationships: How will the relationships between the entities be accurately presented in the diagram?
Explain Your ERD: Write 2 to 5 paragraphs about how your diagram meets the needs of YODAE and its clients. You are required to provide a brief explanation about the entities, attributes, and relationships depicted in your diagram.
After you have designed the architecture of your cloud-based application, you will be required to create it in the AWS Console through your AWS Academy Learner Lab course. To implement this, you are required to:
Set Up Virtual Server: Create an EC2 instance. Then be sure to properly install Apache web server, PHP, and MySQL on the instance. Take screenshots to confirm that you have successfully created your EC2 instance and installed the appropriate language and database system.
Deploy a Front-End Component: Install WordPress on the instance that includes connecting to your MySQL database. However, be sure that you are using the AWS Console through AWS Academy. Copy and paste the public URL to the instance to ensure that your instructor can assess your work.
Implement Database Tables: Install the database plug-in phpMyAdmin and create the database tables that you designed in your ERD, which include all columns/keys. Take a screenshot to confirm that you have created the appropriate databases depicted in your ERD.
Data Manipulation: After you have installed the database plug-in and created your new database tables, manipulate the data by completing the following:
Insert some test data into each table.
Do a Select statement that shows only students registered to a specific course.
Show a Delete statement removing a course from the Courses table.
Show a statement that changes the entry_year for a particular student.
Be sure to submit a screenshot for each of these tasks.
Interface with Database: Create a new page within the WordPress admin panel. To complete this successfully, you will need to follow the steps in the PHP code tutorial (Database Interface Instructions) in the Supporting Materials. Be sure to include screenshots of:
Your working WordPress admin page and the installed plugin.
The front-end form and view pages. Make sure to use your own name when adding a student.
What to Submit
To complete this project, you must submit the following:
Entity Relationship Diagram
You may use LucidChart, Visio, or another software application of your choice to create your diagram. The file you upload should either be a PDF, .jpeg, or .doc format.
Screenshots and Descriptions
Submit between 4 and 7 screenshots to show that you have successfully completed each step in the directions. For each screenshot, write a 1- to 3-sentence description that explains what the screenshot is showing. Your screenshots should be uploaded in .jpeg or PNG format.
Public URL for the EC2 Instance
Submit your public URL link either in a separate document that you attach, or in the comments section when you upload your files.
Supporting Materials
The following resource(s) may help support your work on the project:
YODAE Business Case
This business case provides you with more organization background and the business needs.
Database Interface Instructions
The PHP code tutorial in this document will allow you to connect to the database.
Visio 2016
This series shows you how to use Visio to create diagrams.
Getting Started in LucidChart: The Basics
This resource shows you how to use LucidChart to create diagrams.
How to Take and Annotate Screenshots on Windows 10
This resource shows you how to capture screenshots if you are using Windows 10.
How to Take a Screenshot on Your Mac
This support resource will walk you through the process of capturing a screenshot if you are using Mac OS.