Homework

  

Please be sure to answer the questions fully and in essay/short answer format. There should not be any 1 or 2 word/sentence responses to any of the questions. Use your own words. Copied answers will NOT be accepted.

assignment 1

 Search the web to find a Cloud provider. Now search the companies website to answer as many of the questions you provided below. Atleast 50-100 words

  1. What are the models of delivery?
  2. What security measures offered?
  3. Does iCloud support external collaboration? How?
  4. Is the solution secure?
  5. What capabilities are offered to facilitate mobile growth?
  6. What capabilities does the cloud offer?
  7. How will the solution influence the corporation’s operations, especially the information technology department?

Share the name of the Cloud provider and the answers to the questions with the class.

Linux Environment

There is attachment ,In which you ll know how to do this …..

Lab #1-1 The Linux Environment

In this lab you will learn about the environment you will be using to do your lab assignments. The labs will utilize a Lab Notebook which, you will create and is required to be kept up since it will help you in your midterm and final exams.

The first lesson is getting into the ssh environment to access the lab area.

Refer to the attachment lab work 1-1

Lab #1-2 Navigating the Linux Environment

In this lab you will learn how to navigate in the environment you will use to do your lab assignments. The labs will utilize a Lab Notebook which, you will create and is required to be kept up since it will help you in your midterm and final exams.

The second lesson is navigating the Linux hierarchy.

Refer to the attachment Lab work 2-2

Writing Requirements

  • Use the APA template located in the Student Resource Center to complete the assignment.
  • You will keep notes on each lab these lab notes are your responsibilities

wk8.2 research paper

 

Use standard APA writing and the application of the Blooms taxonomy(highest level of analysis) to answer the following questions. 2-4 pages to each questions without the cover page and references.

Approach this from a research perspective, apply what you have learned from this course and add other resources as applicable. Find 5 -7 Scholarly papers to support your response to each question.

2. You have just been named the Project Manager of IT Governance Enterprise Wide Initiative within a company. who do you think should own the Project, the Chief Information Officer (CIO), Chief Security Officer (CISO) or Chief Operating Officer (COO) and why?

Define and relate these different terminologies and Information Governance (IG), Data Governance (DG) and Information Technology Governance (ITG), E-Discovery, Digital Assets; how do you see IT Governance evolving in the next 5 years? What framework will you adopt to in implementing the IT Governance Initiative, and demonstrate its applicability. 

Dissertation Outline cyber security

In 250-300 words outline your dissertation topic and goals for this semester as they relate to your dissertation course. If you do not have a dissertation topic please revert those you are considering. Also, include ways that you could improve your dissertation, as well as areas you may be struggling with. 

Simple Excel projects

Please contact me if you are good in word, powerpoint and excel. These are simple projects that has an instruction file and a pre- made file. All you have to do is follow the steps and edit  the pre-made file. I have total 11 projects. I am attaching a sample file. 

Windows Registery forensics

Written Paper: 1-2 pages

PowerPoint presentation: 8 slides on the same question below

The project will be to analyze a compromised system and provide forensic analysis in the form of a narrative report and example graphical images (Jpeg format) from your analysis.
1) Select some Microsoft Windows operating system disk image that has been compromised. You may search for your own image or use the following known image that can be downloaded from: http://www.forensickb.com/2008/01/forensic-practical.html
2) You may select any Windows Registry forensics analysis tool or the tool discussed in the text, RegRipper. You will need to download and install the tool
3) You may use any resources available to understand and use the tool of your choice. You need to provide an APA formatted reference for any resources (books, white papers, or websites) you use to become familiar with the tool
4) Write a narrative/paper focused on your forensics analysis of the compromised image you used for the project
5) Provide a minimum of two JPEG images that capture reporting or some other evidence of the use of the tool
The Final Paper should be in APA format, although for this assignment, you may single space. Provide a cover page, a one-page Executive Summary of the analysis investigation, similar to what you might do for a real-world investigation. Provide 1 to 2 pages (single-spaced) of subsequent narrative related to your observations and experiences using the tool, including setup. Answer the following questions: Did you find evidence that was expected? What other evidence was observed or what other evidence would have been helpful? Was the evidence sufficient to provide a clear report of what happened? Provide a short conclusion. The references for your paper should be included at the end of the report.

Python Functions

1) Write a function that calculates the volume of a sphere with radius r for only values > 0, return 0 otherwise . V=4/3  π r^3

2)  Write a function that finds you weight in stones using the formula.  mstone = mkgx2.2/14

3) Write a function that takes some monetary amount from the user in dollars, and then display exact changes for this amount using the minimum number of coins. For example, $0.97 shows 3 quarters, 2 dimes, and 2 pennies. 

 

Output: 
change_it(97)

The change for 97 cents is:
3 quarters
2 dimes
2 pennies

 Write an function to calculate both Ohm’s Law and Power transferred. The function takes i and r as inputs and prints the results (see output below). Calculate only if both i and r are > 0. 

 

FORMULA
 i is current, v is voltage, r is resistance, p is power
 p = i * v   # power = current * volatage
 v = i * r   # voltage = current * resistance
def ohms_law(i, r): 
   '''
     i is current
     r is resistance
   '''
   # check if both i and r are greater than 0
   # calculate v and p
   # PRINT v and p
omhs_law(5, 5)
v = 25 p = 125

omhs_law(-5, -5)
0

Configure Servers

 

Discussion Question 1:

As an administrator for your company, you manage a large server that is running Windows Server 2016 and that has about 8 TB of disk space that you can allocate to be used by other servers. Describe how to configure the servers such that the two other servers running Windows Server 2016 can use the disk space just as if the disk space was local?

Discussion Question 2:

You are setting up a class so that you can train several junior administrators on Windows Server 2016 Hyper‐V. You don’t have dedicated Hyper‐V hosts, but you do have plenty of resources on your current Hyper‐V environment. Describe your proposed solution.