Design and implement hybrid networking.

Complete the following modules:

Module-1: Introduction to Azure virtual networks (1 hr. 18 min) – You will learn how to design and implement fundamental Azure Networking resources such as virtual networks, public and private IPs, DNS, virtual network peering, routing, and Azure Virtual NAT. https://docs.microsoft.com/en-us/learn/modules/introduction-to-azure-virtual-networks/Links to an external site.

Module-2: Design and implement hybrid networking (1 hr. 3 min) – You will learn how to design and implement hybrid networking solutions such as Site-to-Site VPN connections, Point-to-Site VPN connections, Azure Virtual WAN, and Virtual WAN hubs. https://docs.microsoft.com/en-us/learn/modules/design-implement-hybrid-networking/Links to an external site.

Module-3: Design and implement network monitoring (44 min) – You will learn to design and implement network monitoring solutions such as Azure Monitor and Network watcher. https://docs.microsoft.com/en-us/learn/modules/design-implement-network-monitoring/Links to an external site.

Module-4: Design and implement network security (1 hr. 26 min) – You will learn to design and implement network security solutions such as Azure DDoS, Network Security Groups, Azure Firewall, and Web Application Firewall. https://docs.microsoft.com/en-us/learn/modules/design-implement-network-security-monitoring/Links to an external site.

Module-5: Explore Azure networking services (38 min) – In this module, you’ll take a look at several of the core networking resources that are available in Azure. You’ll learn about Azure Virtual Network, which you can configure into a customized network environment that meets your company’s needs. You’ll also learn how you can use Azure VPN Gateway and Azure ExpressRoute to create secure communication tunnels between your company’s different locations. https://docs.microsoft.com/en-us/learn/modules/azure-networking-fundamentals/Links to an external site.

Prepare a full report of ALL 5 modules highlighting

all network functionalities you have learned

major screen captures of all hands-on exercises that you completed

difficulties encountered

new tools/technologies you learned

how you would use your skills in the design and setup of cloud-based networks

security features that would strengthen the network

given your experience with this project what would be your next move

Report format: APA-7

Prepare a PowerPoint presentation that compares how 802.11a works and lists the advantages and disadvantages of 802.11a over 802.11g.

Instructions:

Your presentation will be graded on content to include grammar and spelling.

Assignment:
The Baypoint Group (TBG) needs your help with a presentation for Academic Computing Services (ACS), a nationwide organization that assists colleges and universities with technology issues. ACS needs more information about the differences between the IEEE 802.11a and IEEE 802.11g standards so that their salespeople will be better equipped to sell this wireless technology to schools.

Deliverables

Prepare a PowerPoint presentation that compares how 802.11a works and lists the advantages and disadvantages of 802.11a over 802.11g. Because ACS is a technical group, the presentation should have a high level of technical detail. Your presentation should last 15-20 minutes.

Discuss ways by Exposing Hackers Through Forensic Investigations

Exposing Hackers Through Forensic Investigations

Requirements:

1. Using the outline provided, prepare a report on your approved topic from Week 2 with a minimum of 7-pages, no less, but more is acceptable.

2. References (10 minimum). You may use resources from any library, government library, or any peer-reviewed reference (Wikipedia and any other publicly-reviewed source are not accepted).

3. The paper must have a title page, reference list and be in APA format. The information within your title page and reference list will not count towards the minimum word count.

4. The paper will be subjected to checking against plagiarism. The paper must follow acceptable originality criteria (no more than 15% max total, and 2% per individual source match are allowed).

5. Correct spelling and grammar.

6. APA formatting: Title page, in paragraph citations, and the Reference list.

7. At a minimum include the following:

Detailed description of the area researched

Technology involved

Future trends

Global implications

Are people hesitant to use the Internet or wireless technology for purchases due to security concerns?

Explain the implications of security breaches on technology adoption.

Are people hesitant to use the Internet or wireless technology for purchases due to security concerns?

Are people hesitant to use technology because of privacy concerns? Are these concerns warranted and are they influenced by age, race, or gender? Explain.

Again,do not just copy and paste information from the internet.

Discuss four of the differentiators and also four ramp components.

Instructions:

Your essay will be graded on content to include grammar and spelling.  While there is no end to what you might write, you must convey your thoughts in an essay of at least 500 words or more, excluding cover page and references section.

Assignment: Discuss four of the differentiators and also four RAMP Components.

Your essay should include examples for each differentiator / Ramp component discussed.

What are some important best practices for protecting privacy for information collected,stored,used,and transferred by the US federal government?

Briefing Statement

Prepare a 5 to 7 paragraph briefing statement which answers the following four questions:

1. What is privacy? Is it a right? An expectation? Discuss differing definitions, e.g. “the average person” definition vs. a legal definition, and how these differences impact risk assessments for privacy protections (or the lack thereof).

2. What are some important best practices for protecting privacy for information collected,stored,used,and transferred by the US federal government?

Identify and discuss three or more best practice recommendations for reducing risk by improving or ensuring the privacy of information processed by or stored in an organization’s IT systems and databases.

3. Explain why federal government agencies and departments required to complete PIA’s. Should every federal IT system have a PIA? Why or why not?

4. Name and briefly describe 3 benefits to citizens which result from the use of PIA’s. (Considering citizen’s needs for privacy and the protection of the privacy of individuals whose information is collected, processed, transmitted, and stored in federal government IT systems and databases.)

Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your posting.

Describe the five project management process groups, the typical level of activity for each,and the interactions among them.

Information Technology Project Management

Describe the five project management process groups, the typical level of activity for each,and the interactions among them

Understand how the project management process groups relate to the project management knowledge areas

Discuss how organizations develop information technology (IT) project management methodologies to meet their needs

Describe the multitenancy characteristic in relation to IT resources allocation.What is their effectiveness?

Multitenancy characteristic

Each question should have a sub-heading and be explained distinctly. You must cite your sources in-text and provide your references at the bottom using the APA format. Each question should have a minimum of one page. 12-point font size, Arial, double line spacing throughout.

1. List and describe the set of distinct characteristics for an IT environment to be classified as an effective cloud. (you must sub-head each characteristic when explaining)

2. Describe the ubiquitous access characteristic. of what importance are these to cloud computing

3. Describe the multitenancy characteristic in relation to IT resources allocation.What is their effectiveness?

4. Describe the Infrastructure-as-a-Service (IaaS) cloud delivery model and it relates to the provisioning of raw, infrastructure-centric IT resources. Explain also how cloud consumers gain a high level of operational governance control with IaaS.

What is your prediction for future cyber security landscape beyond COVID-19?

Reflective paper

Reflect on Cyber attacks on the aftermath of COVID-19

Do you notice any increase of Cyber attacks during COVID-19?

What is your prediction for future cyber security landscape beyond COVID-19?

References:

https://theconversation.com/coronavirus-pandemic-has-unleashed-a-wave-of-cyber-attacks-heres-how-to-protect-yourself-135057

https://cybermagazine.com/top10/10-high-profile-cyber-attacks-2021

https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/972399/Cyber_Security_Breaches_Survey_2021_Statistical_Release.pdf