Data analysis – Community grant – k Nearest Neighbor and Naive Bayes

See attached file

Part 1

write an Executive Summary of a research proposal in your area to an audience of lay reviewers. Method to be adopted may be the k-Nearest-Neighbor data mining technique or Naive Bayes. The goal is to convince the panel that your project should be funded.

Part 2

A

Identify a current (open within the last year) granting opportunity in community-based research. This may be anywhere on the planet – the goal is simply to leverage the language used in the scope of projects to frame your responses in subsequent steps. Provide the title of the granting opportunity and the hyperlink. 

B

In ten or more sentences, write a compelling narrative explaining (1) the problem your research question will address, (2) why and how that problem is important, and (3) how findings from your work will transform the space (e.g. recidivism rates, access to healthcare, financial education, etc). one image is acceptable if properly referenced, annotated, and labeled. 

C

In ten or more sentences, (1) explain what k-Nearest-Neighbor analysis/Naive Bayes is, (2) how it will be used in your research, (3) the data set you will analyze, and (4) your anticipated outcomes. It is recommended that the final sentence in this section tie into what was presented in Section A. 

20210405

Do some basic research on security certifications.

See https://www.giac.org/.

Write  a brief summary of certifications that are open. 
Consider if any of the certifications would be valuable for your career.
Investigate and report on exam options. 500 words

Week 3 Assignment

 

Instructions 

Please watch this video: https://youtu.be/ctij93rBmsM which is an hour long video on anti-forensics.

Instructions

Now that you have watched the video – please complete this assignment. 

1. What did you learn?
2. Did you learn anything that surprised you such as “I didn’t know I could use this technique to try to hide data?!”
3. Please list at least four different ways that an bad actor may try to obfuscate their tracks.
4. Once you have identified four different ways that a bad actor may try to evade scrutiny, please identify how you might be able to uncover those techniques.

Cloud Computing

 Chapter 1 topics:

  • Define and discuss cloud computing.
  • Discuss how cloud computing has changed how companies budget for software solutions.
  • Compare and contrast SaaS, PaaS, and IaaS, and provide an example of each.
  • Define scalability and discuss how the cloud impacts it.
  • List three advantages and three disadvantages of cloud computing.

 Chapter 2 topics:

  • Define and describe PaaS
  • List the benefits of PaaS
  • Describe the potential disadvantages of PaaS
  • Describe how a cloud-based database management system differs from an on-site database.
  • List the computing resources normally provided with PaaS.

Wk 5 – Apply: Summative Assessment: Lab Reflection

 

After completing this week’s labs, reflect on what you learned and respond to the following questions in 1 to 2 pages: 

  • Reflecting on the lab exercises you completed this week, how do these techniques apply in day-to-day cybersecurity operations?
  • Consider the regulatory requirements surrounding privacy and security of information you learned about this week. Using an industry with which you are familiar, explain the laws that regulate information security in this business sector. What types of security operations and practices do these laws translate to?

Cite sources to support your assignment.

Format your citations according to APA guidelines.

data science and big data analytics

 Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. Requirements:

  • Provide a 500 word (or 2 pages double spaced) minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
File

PRESENTATION ASSIGNMENT

 Attached Files:

This presentation should summarize what you learned from your Word Assignment about your chosen careers. You will be able to complete the PowerPoint presentation with features you learned in the attachment. Your presentation must include: SUmmary of work Excel (Evaluation Matrix) and Description of two careers (Advance Registered nurse and cybersecurity analyst) used Microsoft Word Documents

  1. Themes 
  2. Transitions  
  3. Pictures  
  4. Animation  
  5. Audio – Audio should enhance the purpose of your presentation. Do not just add random music or read your slides. 
  6. Video (convert the PowerPoint into a video)   

You are required to follow Guy Kawasaki’s 10 20 30 rule. This rule is you should have no more than 10 slides, you should not talk for more than 20 minutes and you should not use a font size that is less than 30 points. Look Guy up and see what his background is. Check out his web page. He explains the rule nicely in this short video:

http://www.youtube.com/watch?v=-M13SObffog