Final presentation – Information Technology Project Management

SubjecT: Information Technology Project Management

Please check attached template and add below details for 9 slides.

Add meeting notes because we need record presentation and submit it.

Each member should individually list:

1. Four things they think was good about the project

2. Four things they thought was bad (didn’t go right or a struggle) regarding the project

3. Three areas where they think they can improve

4. Three thinks they learned

Take these individual findings and, as a team, identify:

1. Top three positive things about the project

2. Top three negative things about the project

3. Top three areas for improvement as a team

4. A brief description of the Team’s impression of the project, working remotely, and anything else you want me to know.

INT 2681 LAB 2….

 

  1. omplete Netlab 2 and submit your lab summary here.

    NETLAB 2: A. Reconnaissance With Hping/ Creating and Installing SSL Certificates. 

    1. Using hping as an ICMP utility 
    2. Using hping for port scanning. 
    3. Create a Self Self-signed certificate 
    4. Configure Apache SSL File. 
    5. Testing SSL Certificate. 
    6. NETLAB 2: B. Vulnerability Scanning With Openvas. 
    7. OpenVas initial Setup 
    8. Scanning with OpenVas 
    9. Customized Scanning with OpenVas 
    10. Which other tools can be used for vulnerability management? 
    11. NETLAB 2. C. Network Analysis/VNC As A Backdoor. 
      1. Capturing Traffic with tcpdump 
      2. Analyzing Traffic with Wireshark 
      3. Using TightVNC 
      4. Reversing VNC Connections 
    12. SAMPLE SCREENSHOT.pdf

  ASSIGNMENT SUBMISSION

  1. Text SubmissionWrite Submission
  2. Attach Files  
  3. SafeAssign accepts files in .doc, .docx, .docm, .ppt, .pptx, .odt, .txt, .rtf, .pdf, and .html file formats only. Files of any other format will not be checked through SafeAssign.
  4. Plagiarism Tools I agree to submit my paper(s) to the Global Reference Database

  ADD COMMENTS

  1. CommentsFor the toolbar, press ALT+F10 (PC) or ALT+FN+F10 (Mac).P0 WORDSPOWERED BY TINY

 

MS Access

 

  1. Describe Microsoft Access and its components (tables, relationships, forms, queries, reports).
  2. Distinguish key differences between ACCESS and EXCEL.
  3. Give a brief overview of the case study.
  4. Evaluate the ACCESS features that enabled Ken Steward to develop the daily product inspection database without programming experience or expertise.
  5. Explain the responsibilities of a database administrator as they relate to assuring data security and integrity.

 

Writing Requirements

  •  4-5 pages long. Double Space.
  • Must have an introduction with a clear thesis statement, three to four main points, and a conclusion
  • Conduct research to find relevant information using reliable sources to support your views.
  • Use at least 2 academic books and 3 scholarly articles from a library database or software manufacturer’s website.
  • Use APA style for in-text citations, and references
  • Use the Databases and APA template located in the Student Resource Center to complete the assignment.

Final paper on “Measures to Reduce Data Dump in Minimal Time”

  1. Research Paper Presentation  
    • With the information you gathered for your Research Paper, you will now create an intriguing visual presentation and present it to the class.
    • Presentation should include following slides-
    • Introduction (1 slide)
    • literature review (2 slide)
    • Analysis of the literature (1slide)
    • Discussion paragraphs 1, 2, 3 (2 slide)
    • Conclusion (1slide)
    • Title page and reference list (2 slides)
    • Your presentation should be between 5-7 minutes long; practice it several times beforehand!

300 words

 

Do a bit of research on-line. Find a criminal case that involved Digital Forensics. 

computer architecture jan 24

Read the Moore’s law then summarize briefly the law, mainly address the following two questions :

  • What can we conclude from this law ?
  • How is this law can guide the computer evolution ?

Write your original post 

Discussion 300 words

 Do you feel the benefits of cloud computing are worth the threats and vulnerabilities? Have we arrived at a point where we can trust external agencies to secure  our most precious data? Please explain your answer. 

Linux Firewall Exploration Lab

Task 1: Using Firewall

Task 2: Implementing a Simple Firewall

Task 3: Evading Egress Filtering

Task 3.b: Connect to Facebook using SSH Tunnel.

Task 4: Evading Ingress Filtering