project 2

  Now that you understand and have created a virtual machine,  your Caduceus CTO, Eliza, has asked you to extend that application and  provision infrastructure in the cloud. Specifically, you will provision a  Windows operating system in the cloud. The provisioned infrastructure  could be accessed by any end-user device client. This includes a desktop  running Microsoft Windows, a Mac device running Apple MacOS, iPad,  Android Tablet, and even a Google Chromebook. You will use any of the  aforementioned end-user devices to access the provision infrastructure  once this is set up.

Step 1: Log in to the AWS Dashboard

CMIT 495 requires you to complete hands-on assignments in the Amazon Web Services (AWS) virtual environment.To get started, log in to the AWS free account you created in Week 1.

Step 2: Download the Week 2 Assignment Template

Next, watch the video and download the template from the Cloud Computing Assignment Resources page. You will answer the questions and embed the appropriate screenshots of your cloud infrastructure provision as you work.When providing a detailed overview of the steps required to  install the Windows operating system on the virtual machine, make sure  to include screenshots of each step in the process. Specific details and  instructions are included within the Week 2 Assignment Template.

Step 3: Install and Configure a Microsoft Windows Operating System

  • Provision cloud infrastructure via Amazon and a OS platform (PaaS) by installing and configuring a Microsoft Windows operating system that can be accessed on demand by any end-user device.   
    • Research and use AWS documentation and tutorials for instructions and guidance to complete the assignment.  
    • Consult the AWS Connection Documentation in order to connect to the Microsoft Windows operating system.  
    •     How Will My Work Be Evaluated? The following evaluation criteria aligned to the competencies will be used to grade your assignment:  
    • 1.4.1: Produce grammatically correct material in standard academic English that supports the communication.  
    • 2.2.3: Explain the assumptions underlying viewpoints, solutions, or conclusions.  
    • 2.3.1: State conclusions or solutions clearly and precisely.  
    • 3.1.1: Identify quantitative information that is relevant to a problem or situation.  
    • 3.1.2: Analyze quantitative data using an appropriate method.  
    • 10.1.1: Identify the problem to be solved.  
    • 11.1.3: Install software.  
    • 11.3.1: Add and update systems as required.  
    • 11.2.1: Configure technology according to stakeholder specifications and requirements.  

Step 4: Upload Your Work to the Assignment Folder

  • When complete, export your file as a PDF and upload to the LEO Assignments Folder (e.g., Project 2 – Cloud Computing).  

Step 5: Stop and Terminate Your Amazon Instance

After you complete the Week 2 Assignment, stop and terminate your  Amazon deployment/instances so you do not receive any unexpected charges  on your account. 

SyncSession Assignment with 3 Pages with proper citation and APA format

 

For this assignment research, a company or use one that you are familiar with that has experienced information security change in the workplace. What information assurance change occurred, and were there any barriers to the change faced by the organization? Finally, what are the best practices when managing change 

 

Your work will be at least three pages (not including cover, abstract, references) APA paper.       Proper citation and APA format needed.  This is  SyncSession Assignment .

IA week8 DB

 

Hello,

i need this paper by 10/14 afternoon.

Strictly No plagiarism please use your own words.

Describe some ways that an organization can recover it’s IT resources from a natural disaster (fire, flood, hurricane, tornado etc.). What controls should have been in place in order to be able to retrieve this data?

An initial post must be between 300 words.

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

Blockchain In finance and Banking Industry

Require help with PPT , need content for 5 slides.

– ways problem can be solved using Blockachain in Finance and Banking industry (Provide 1 solution with model (3 slides)

-cost associates with innovation the field 

discussion-2

 

Do a bit of research on-line. Find a criminal case that involved Digital Forensics. 

Using WORD, write an ORIGINAL brief essay of 300 words or more .describing the case and the how digital forensics were used  in the investigation

Cyber Law- week 5 Discussion

 When asked if you “accept the terms” of downloaded software, describe how clicking “yes” indicates you have entered into a contract. Discuss whether you have ever read these terms of use before you clicked and what the terms say. 

Post should be 500 words and add references in APA format. 

Case paper: Best practices for operational excellence

 

Case Paper: Best practices for operational excellence

Continuing your work with your organization, for week 5 research best practices for operational excellence based on the course readings. In your paper for this week include the following:

– Identify and justify 2 specific recommendations you have for the organization
– Provide an outline for a change management plan to implement your 2 recommendations
– Discuss your plan for working with the people who will be involved or impacted by your recommendations
– Conclude with your thoughts on the expected benefits or outcomes after implementing your recommended changes

Write your responses to these questions in a 2-3 page APA-formatted paper (not including the cover page or references page). Use the APA template provided in the course. Use unique in-text headings for each question–do not re-state the questions as the headings. Support your responses with citations in your paper that match the references provided.

WSH and VBScript

All posts must be a minimum of 250-300 words. APA reference. 100% original work. no plagiarism.

1. What are pros / cons of using command line arguments / parameters, why use them?