[Solved] Course Lab Guidelines Pdf

[Solved] Course Lab Guidelines Pdf

Log in to InfoSec to complete the labs below and take screenshots at the steps below:

  1. Configuring and Testing the Linux-Based Firewall – Step 22 – Checking Outbound FTP
  2. Configuring and Testing the Linux-Based Firewall – Step 33 – Display of Current Rules
  3. Configuring and Testing the Linux-Based Firewall – Step 34 – Results of NMAP Showing the 5 ports Are Open
  4. Using Internal Services from An External Machine – Step 15 – Five Green Checks for Testing Account Settings

To complete this assignment, review the prompt and grading rubric in the Lab Guidelines and Rubric. Refer to the Course Lab Guidelines PDF document to view the screenshots you will need to take to complete this lab. Screenshots must include your name and date. When you have finished your work, submit the assignment in a Microsoft Word document with the associated screenshots for grading and instructor feedback.

[Solved] Mitigate Intentional Threats

[Solved] Mitigate Intentional Threats

In Module Four, you will submit 10 security policies as part of the planned solution to mitigate the 10 security gaps identified in the Case Document. There should be one policy per security gap identified in the Case Document. Consider policies that address topics such as remote access, encryption and hashing (to control data flow), auditing network accounts, configuration change management (to reduce unintentional threats), segregation of duties, mandatory vacation (to mitigate intentional threats), personally identifiable information breaches, media protection, and social engineering. This milestone focuses on security functionality, and each policy should be no longer than one page.

Specifically, the following critical elements must be addressed:

  1. What is your proposal for mitigating the identified human factors that pose a threat to the organization’s security posture? Describe the specific policies, processes, and practices that must be in place to address each of the following.
    1. Unintentional Threats: What strategies can protect against human errors made due to cognitive factors? What strategies can protect against human errors made due to psychosocial and cultural factors?
    2. Intentional Threats: What strategies can protect against social engineering?
  2. Data Flow: How do you make sure that the data sender and the data receiver have a sound connection? How do you ensure that data is not tampered with or altered from its intended meaning? What strategies do you propose to address poor communication?

What to Submit

Your paper must be submitted as a 10-page Microsoft Word document, with double spacing, 12-point Times New Roman font, and one-inch margins, in APA format. Each policy should be no longer than one page.

See attached Case document…

[Solved] Four Access Control Measures

[Solved] Four Access Control Measures

Access control is a security measure that ensures that all types of data are protected from unauthorized disclosure or modification. Access control approaches determine how users interact with data and other network resources.

In an initial post:

  • Explain a scenario where you would apply one of the four access control measures. Why would you select one over the others?
  • Continue the discussion by evaluating how mandatory vacation can be used as a tool to detect fraud and help employees release their work stress.

[Solved] Many Small Businesses Lack

[Solved] Many Small Businesses Lack

Businesses use high-speed internet connections to connect offices, store data, and use cloud computing to manage customer relationships, billing, and office productivity. Many small businesses lack a robust firewall that can protect them from external threats resulting from these activities. Instead, they use the onboard firewall on their Windows PC coupled with the minimal protection offered by a residential-grade router. Such solutions do not offer much protection from sophisticated threats; however, it makes sense to upgrade to a true business-class firewall. For this discussion, you will assume the role of a network administrator for a small business. The business needs to install firewalls on its network. For your main post, describe how you will configure the rules of the firewall to allow the actions to occur seamlessly. Pick one of the following examples and explain how the rules need to be adjusted to allow users and the network to operate cohesively.

  • The firewall prevented certain applications from working correctly over the internet.
  • Users are blocked from specific websites due to the personal security settings on their computers.
  • Users are unable to connect or access LAN devices or applications from the internet.
  • Users are unable to play online games or view videos through modem routers.
  • Program is unable to update or install correctly when prompted.

[Solved] Identify Two Current Events

[Solved] Identify Two Current Events

 

Please Use The Template Provided At Bottom Of Page,

And Remember, The Margins Are Preset At One Inch All Around, Thus, You May Have To Reset Yours!

1. Using ‘newsworthy’ sources only, identify one current event related to pubic health at the local level.

You may choose your hometown or the university community.

2. Using ‘newsworthy’ sources only, identify two current events related to public health in America

at the national level.

This means you must choose a state outside of your state of residence or the university.

3. Using ‘newsworthy’ sources only, identify two current events related to public health in America

at the world level.

This means that your are looking at ‘America’ across the world which includes, Guam, Puerto Rico,

the Trust Territories of the United States, military bases, and scientific posts!

You are expected to know what the terms local level, national level, and world level mean.

For the four events outside your local level cite source in APA style, identify the author or producer,

and provide a brief description.

Please use the template provided at the bottom.

The template is preformatted in Word using one inch margins all the way around,

so be sure to reset your documents!

[Solved] Two Public Service Announcements

[Solved] Two Public Service Announcements

 

This assignment has a total of ten activities, some required components and components that you get to choose!

There are a total of ten items required to be viewed for this assignment as indicated:

A: Two Public Service Announcements As Assigned

B: Two Television Commercials Of Your Choice*

C: One Feature Cinematic Film Or Made For Television Movie*

D: Any Five U.S. Government .gov Videos Of Your Choice: Each From Five Different Websites!

* You may choose any video publicly available product that has an intentional and clear public health relationship.

Start Here:

Please Create A New Assignment Page And Title It ‘Public Health Communications’.

Set the page aside for a moment and start your activities. 

Here are the assignment details:

A: Two Public Service Announcements

View Two Public Service Announcements Posted On You Tube Chosen For You

Part I. Review: ‘Fourth of July Safety’ By Kyle N. Horne:

 

This assignment has a total of ten activities, some required components and components that you get to choose!

There are a total of ten items required to be viewed for this assignment as indicated:

A: Two Public Service Announcements As Assigned

B: Two Television Commercials Of Your Choice*

C: One Feature Cinematic Film Or Made For Television Movie*

D: Any Five U.S. Government .gov Videos Of Your Choice: Each From Five Different Websites!

* You may choose any video publicly available product that has an intentional and clear public health relationship.

Start Here:

Please Create A New Assignment Page And Title It ‘Public Health Communications’.

Set the page aside for a moment and start your activities. 

Here are the assignment details:

A: Two Public Service Announcements

View Two Public Service Announcements Posted On You Tube Chosen For You

Part I. Review: ‘Fourth of July Safety’ By Kyle N. Horne:

[Solved] Source Using Apa Style

[Solved] Source Using Apa Style

 

The activities in this are all going to center around discovering what exactly is is public health:

There are three assignments:

1.) Defining And Discussing The Term ‘Public’,

2.) Defining And Discussing The Term ‘Health’,

3.) Defining And Discussing The Term ‘Public Health’

Student Learning Outcomes

By the end of this module a student should be able to:

 

Begin By Creating A Page Titled, “Definitions’

Next, Complete These Five Activities:

1.) Define And Discuss The Term ‘Public’

    Locate definitions from two credible sources, with one being a government source.

       Cut and paste or retype the definitions word for word.

       Cite each source using APA style

    Provide a brief of your findings by discussing similarities and differences in a one to two sentence overview.

2.) Define And Discuss The Term ‘Health’,

       Locate definitions from two credible sources, with one being a government source .

       Cut and paste or retype the definitions word for word.

       Cite each source using APA style

    Provide a brief of your findings by discussing similarities and differences in a one to two sentence overview.

3.) Define And Discuss The Term ‘Public Health’

       Locate definitions from two credible sources, with one being a government source.

       Cut and paste or retype the definitions word for word.

       Cite each source using APA style

    Provide a brief of your findings by discussing similarities and differences in a one to two sentence overview.

4.) Define And Discuss The Term ‘Safety’

    Locate definitions from two credible sources, with one being a government source.

       Cut and paste or retype the definitions word for word.

       Cite each source using APA style

    Provide a brief of your findings by discussing similarities and differences in a one to two sentence overview.

5.) Define And Discuss The Terms:

       A.) ‘Environmental Health’ and 

B.) ‘Sanitation’

    Locate definitions from two credible sources, with one being a government source.

       Cut and paste or retype the definitions word for word.

       Cite each source using APA style

    Provide a brief of your findings by discussing similarities and differences in a one to two sentence overview.

[Solved] Spiritual Health Mental Health

[Solved] Spiritual Health Mental Health

Use the attached document to complete.  Please Complete The Health Concepts Review Form.
The Document Is Located Is Long But Fairly easy To Do!
You Can Access The Document By Clicking On The Link Below.
Hint: Read Through The Entire Document And You Will See The Instructions At The End!  For each of the ten health concepts you are required to find one definition and read about that health concept.  This Assignment requires you to critically think about ten health concepts universally recognized by health professionals as critical to health. These health concepts provide a basis for what a healthy people, family, communities, and nations are built upon:

Spiritual Health

Mental Health

Physical Health

Social Health

Environmental Health

Financial Health

Cultural Health

Community Health

Cyber Technical Health

Future Health

[Solved] Likely Incorrect Required Criteria

[Solved] Likely Incorrect Required Criteria

Instructions

Ms. Reloj is teaching second grade. One of her responsibilities is to teach her students how to tell time. She is concerned that her students will think that learning how to tell time is boring. What recommendations do you have for Ms. Reloj? Fill out the table located in the handout and submit the completed table as your Chapter 7 assignment.

Your primary goal in this assignment is to apply the concepts discussed in the section “Key Ideas in Information Processing Theory.”  You should use your textbook’s Development and Practice section titled, “Developmental Trends: Basic Information Processing Abilities at Different Age Levels” as a guide.

Please refer to this handout (Word). You can see my video reflection below. Keep in mind, this was recorded in a previous semester and any dates are likely incorrect

Required criteria for full credit: 

  • Provide three recommendations for each section that is targeted to address the specific implication of information processing.  
  • Each recommendation is explained clearly.   
  • Grammar accurate/APA formatting 

[Solved] Studying Spelling Words Identify

[Solved] Studying Spelling Words Identify

Application Exercise​ 8.1: Assessing and Monitoring Fluency

In the following​ video, Ms. Martin employs two strategies to improve​ students’ fluency and expressiveness in reading.

Reading with Expression

Based on her comments to her​ students, why is Ms. Martin teaching students to read​ expressively? 

What is the relationship between reading expressively and reading​ fluently?

Describe two strategies Ms. Martin models and teaches to help her students read with expression. Explain how these strategies relate to​ comprehension? 

 Application Exercise​ 8.2: K-W-L Activity

In this​ video, an algebra teacher introduces a unit on equations to students who are English language learners. She begins by engaging students in a​ K-W-L activity.

KWL to Solve Equations

Why do you think this algebra teacher is conducting a​ K-W-L activity at the beginning of the unit on​ equations? 

To what extent do you think these students need additional background information in order to comprehend informational text about​ equations? Support your answer. 

 Application Exercise​ 8.3: Reading Comprehension

In this​ video, Ms. Martin introduces a new word and engages students in a discussion of the meaning of the word. She emphasizes the importance of comprehension and the use of text to provide clues.

Understanding Motivation 

Why is it important for Ms. Martin to engage students in this discussion about motivation before students read the​ text? 

Describe how Ms. Martin checks for understanding during the discussion and explain why this step is important. 

Application Exercise​ 9.1: Assessing and Teaching the Writing Process

In this​ video, second-grade teacher Ms. Jansuz is conducting a writing workshop. She coaches​ Sofia, a struggling​ writer, and scaffolds the process of writing an opinion piece.

 Writing Workshop 

Describe the graphic organizer Sofia is using and identify the part of the writing process in which such a tool is recommended.  

How do you think the graphic organizer will help this struggling writer when she drafts her opinion​ piece?

Application Exercise​ 9.2: Teaching Spelling

In this​ video, an elementary school teacher models processes that help students learn the spellings of words.

Studying Spelling Words 

Identify instructional strategies the teacher demonstrates in this spelling lesson. 

How might these strategies help students at any grade level who struggle with​ spelling? 

Based on recommendations in the​ text, identify alterations that should be made to this spelling lesson in order to increase learning success for students with learning disabilities. 

 Application Exercise​ 9.3: Teaching Handwriting

In this​ video, a general education teacher and a special education teacher work together to present a handwriting lesson.

 Grade 1 Handwriting (Esther Nodal, Amanda Kerekes) 

 Identify the component of handwriting that is emphasized in this lesson and explain why this is particularly important for students with learning disabilities.

Why do you think the teacher chose to practice these particular letters​ together?