Categories
IT, Web

Advanced Cloud Portfolio Report ● Executive Summary (< 1 page) ● Plan Scope (3–4

Advanced Cloud Portfolio Report
● Executive Summary (< 1 page)
● Plan Scope (3–4 pages)
○ Overview of Cloud Portfolio
○ BallotOnline Cloud Service Catalog Overview
○ Summary
● Monthly Cost Analysis (3–4 pages)
○ Monthly Cost Overview
○ Data and Use Cases
○ Data Analysis
○ Findings and Summary
● Total Cost of Ownership Analysis (3–4 pages)
○ Total Cost of Ownership (TCO) Overview
○ Data and Use Cases
○ TCO Analysis
○ Findings and Summary
● Return on Investment Analysis (3–4 pages)
○ Return on Investment (ROI) Overview
○ Data and Use Cases
○ ROI Analysis
○ Findings and Summary
● Conclusion (<1 page)

Categories
IT, Web

Online exams. 1.5 hours exam. Intro to cs. Java. 4 question. I have included a e

Online exams. 1.5 hours exam. Intro to cs. Java. 4 question. I have included a example
Comments from Customer
– Start date: 16 December, 10 AM (GMT -5), 6 PM (GMT +3)
– Duration: 90 min
– Format: 4 questions Java

Categories
IT, Web

It’s cover sheet exam please can you give me solutions for each task Comments fr

It’s cover sheet exam please can you give me solutions for each task
Comments from Customer
Discipline: Information technology services management

Categories
IT, Web

Online exams : Need a live coder for 2 hours Exam will be online and proctored.

Online exams : Need a live coder for 2 hours
Exam will be online and proctored.
It is a C programming exam for 2 hours.
Exam will have two programming questions which are 1 hour each.
You can email me the solution and I can then submit on my online exam portal.
Exam hours : 7:30 PM – 9: 30 PM .
This is for Vancouver , Canada ( PST )
Comments from Customer
– Start date: 9 December, 7:30 PM (GMT -8, PST), 10 December, 5:30 AM (GMT +3)
– Duration: 120 min
– Format: two programming questions, live coder

Categories
IT, Web

BACKGROUND: One of the key objectives of this course is to teach you to think li

BACKGROUND:
One of the key objectives of this course is to teach you to think like a Cybersecurity Leader. Leaders help establish scalable strategy, processes and standards. The only way this type of leadership can be effective is communicating with the remainder of the organization, which means documentation and training.
You have also learned in this class that polices and procedures should be driving a cybersecurity or information security program.
OBJECTIVE:
The objective of this assignment is for you to develop cybersecurity policies that you would use in a fictitious organization.
You will NOT be writing procedures (i.e., no step by step instructions) or standards (e.g., 256-bit symmetric encryption keys).
GRADING:
You will earn full points by ensuring that key policy elements listed below are addressed, and the policies are written in a professional manner. Review the lecture material on what the purpose of a policy is and how it is structured. You can also use Google for ideas, but the writing must be in your own words. Do not copy-paste from the web, as TurnItIn will reveal that plagiarism. There should not be any references listed, as this all your own thinking and writing, based on what you have learned and ideas you find from researching.
You may discuss and brainstorm with other students, but again, you must write your own words….TurnItIn will reveal shared content as well.
PEER REVIEW: While the instructor makes the final grading decision, two of your peers will review your policies for quality and completeness, and share their opinion with the instructor. This process helps you continue to learn, as you see how others have written their policies. It’s harder to write a policy than it seems!
View your peers as employees of the organization you would develop these policies for. Ask yourself, will they easily understand the policies? Would their use of these polices actually protect the organization’s data?
BACKGROUND:
You are writing a policy for a single doctor dental practice located in an office complex.
There are 4 employees (the dentist, two dental hygienists and an office manager).
There are 3 desktop computers (the office manager computer (used for collecting credit card payments and scheduling appointments) and two computers beside the dental chairs (used for taking x-rays and recording health details).
You can assume computers never leave the office.
The EHR software used by the practice is tab32 Links to an external site.(for managing the practice).
Microsoft 365 Business Basic Links to an external site.for web browser-based email only (Teams and Sharepoint are NOT used).
You can assume patient data is never emailed.
The office is secured with two external doors that are locked after hours and everyone in the organization is given a metal key to unlock.
There are no video cameras, but the last person to leave activates an alarm.
The front door is unlocked during the day and the office manager greets anyone that may come through that door.
DELIVERABLES:
Create a single document called “ACME Dental Workforce Security Policies” and save as a PDF that you attach and upload.
The audience for these polices is everyone within the organization, meaning the “entire workforce” (employees, contractors and volunteers).
These policies should tell the workforce what to do in their daily activities to ensure security of the organization’s data.
The document should be at least 1,000 words in length.
The document should contain at a minimum policy items that address the following:
Secure use of the EHR
Account and password use
Accessing from home or public computers
Printing patient data
Logging off
Secure use of Microsoft 365 for email
Account and password use
Accessing from home or public computers
Detecting and reporting phishing emails
Opening attachments
Clicking on links from un-known senders
Forwarding company email to external recipients
Forwarding company email to employee’s personal email accounts
Emailing patient data (or not!)
Using the EHR and Microsoft 365 from a BYOD device (e.g., personal phone, personal computer at home)
Prohibiting company data on personal cloud-applications (e.g., DropBox)
Using (or not!) the EHR and Microsoft 365 from a public computer (e.g., computer in the lobby of a hotel)
Company Computers
Use of company computers for personal needs and random web surfing
Use of company computers for illegal, dangerous or inappropriate activities
Accepting software updates
Never disabling antivirus and other security controls
Office security
Securing the office after-hours
Sharing of keys
Visitors (not patients, but friends or family of the employees)
Leaving the front door unattended
Other concerns
Attending periodic security training sessions
Reporting concerns that patient privacy or security has been violated
Reporting issues or concerns with computers, email or the EHR
Comments from Customer
Discipline: cybersecurity

Categories
IT, Web

BACKGROUND: One of the key objectives of this course is to teach you to think li

BACKGROUND:
One of the key objectives of this course is to teach you to think like a Cybersecurity Leader. Leaders help establish scalable strategy, processes and standards. The only way this type of leadership can be effective is communicating with the remainder of the organization, which means documentation and training.
You have also learned in this class that polices and procedures should be driving a cybersecurity or information security program.
OBJECTIVE:
The objective of this assignment is for you to develop cybersecurity policies that you would use in a fictitious organization.
You will NOT be writing procedures (i.e., no step by step instructions) or standards (e.g., 256-bit symmetric encryption keys).
GRADING:
You will earn full points by ensuring that key policy elements listed below are addressed, and the policies are written in a professional manner. Review the lecture material on what the purpose of a policy is and how it is structured. You can also use Google for ideas, but the writing must be in your own words. Do not copy-paste from the web, as TurnItIn will reveal that plagiarism. There should not be any references listed, as this all your own thinking and writing, based on what you have learned and ideas you find from researching.
You may discuss and brainstorm with other students, but again, you must write your own words….TurnItIn will reveal shared content as well.
PEER REVIEW: While the instructor makes the final grading decision, two of your peers will review your policies for quality and completeness, and share their opinion with the instructor. This process helps you continue to learn, as you see how others have written their policies. It’s harder to write a policy than it seems!
View your peers as employees of the organization you would develop these policies for. Ask yourself, will they easily understand the policies? Would their use of these polices actually protect the organization’s data?
BACKGROUND:
You are writing a policy for a single doctor dental practice located in an office complex.
There are 4 employees (the dentist, two dental hygienists and an office manager).
There are 3 desktop computers (the office manager computer (used for collecting credit card payments and scheduling appointments) and two computers beside the dental chairs (used for taking x-rays and recording health details).
You can assume computers never leave the office.
The EHR software used by the practice is tab32 Links to an external site.(for managing the practice).
Microsoft 365 Business Basic Links to an external site.for web browser-based email only (Teams and Sharepoint are NOT used).
You can assume patient data is never emailed.
The office is secured with two external doors that are locked after hours and everyone in the organization is given a metal key to unlock.
There are no video cameras, but the last person to leave activates an alarm.
The front door is unlocked during the day and the office manager greets anyone that may come through that door.
DELIVERABLES:
Create a single document called “ACME Dental Workforce Security Policies” and save as a PDF that you attach and upload.
The audience for these polices is everyone within the organization, meaning the “entire workforce” (employees, contractors and volunteers).
These policies should tell the workforce what to do in their daily activities to ensure security of the organization’s data.
The document should be at least 1,000 words in length.
The document should contain at a minimum policy items that address the following:
Secure use of the EHR
Account and password use
Accessing from home or public computers
Printing patient data
Logging off
Secure use of Microsoft 365 for email
Account and password use
Accessing from home or public computers
Detecting and reporting phishing emails
Opening attachments
Clicking on links from un-known senders
Forwarding company email to external recipients
Forwarding company email to employee’s personal email accounts
Emailing patient data (or not!)
Using the EHR and Microsoft 365 from a BYOD device (e.g., personal phone, personal computer at home)
Prohibiting company data on personal cloud-applications (e.g., DropBox)
Using (or not!) the EHR and Microsoft 365 from a public computer (e.g., computer in the lobby of a hotel)
Company Computers
Use of company computers for personal needs and random web surfing
Use of company computers for illegal, dangerous or inappropriate activities
Accepting software updates
Never disabling antivirus and other security controls
Office security
Securing the office after-hours
Sharing of keys
Visitors (not patients, but friends or family of the employees)
Leaving the front door unattended
Other concerns
Attending periodic security training sessions
Reporting concerns that patient privacy or security has been violated
Reporting issues or concerns with computers, email or the EHR
Comments from Customer
Discipline: cybersecurity

Categories
IT, Web

Write a detailed report discussing the algorithm used by the operating system to

Write a detailed report discussing the algorithm used by the operating system to provide security to the computer system and user. Discuss all sections of the algorithm in detail.

Categories
IT, Web

Write a detailed report discussing the algorithm used by the operating system to

Write a detailed report discussing the algorithm used by the operating system to provide security to the computer system and user. Discuss all sections of the algorithm in detail.

Categories
IT, Web

Cloud Advanced Features Runbook Executive Summary (<1 page) Plan Scope (<1 page)

Cloud Advanced Features Runbook
Executive Summary (<1 page)
Plan Scope (<1 page)
● Cloud Advanced Features Overview
Advanced Data Protection Solutions in the Cloud (2–3 pages)
● Data Backup and Restore Using Amazon S3
● Summary
Advanced Data Security Solutions in the Cloud (2–3 pages)
● AWS Key Management Services Overview
● Summary
AWS Securing Data at Rest with Encryption (2–3 pages)
● Overview
● Scaling Your Encryption at Rest Capabilities With AWS KMS
● Summary
High Availability of Data in the Cloud (3-4 pages)
● Overview
● Near-Zero Downtown Migrations to AWS
● Summary
Advanced Resources Monitoring and Metering in the Cloud (2–3 pages)
● Overview
● Cloud Insights Deployment
● Summary
Deploying a Comprehensive Service Catalog (2–3 pages)
● Overview
● AWS Service Catalog
● Summary
Conclusion (<1 page)

Categories
IT, Web

Assignment of data visualisation and storry telling Tasks (All tasks are equally

Assignment of data visualisation and storry telling
Tasks (All tasks are equally weighted):
Using Tableau create a simple story on the topic:
• The biggest volcano eruptions – brief history
Remember:
• Justify the topic
• Remember about the chronology of events
• Avoid overloading your information
• Remember that your project must be the basis for further discussions
Answer the questions and justify:
• What are the best practices in story telling?
• What are the types of stories?
Covered learning outcomes: L01, L02
At least 2000, at most 2200 words