Information Technology

Writing Assignment (1-2 pages)

Writing Assignment (1-2 pages)

Watch the Week Two video lecture on technology planning. Describe the major differences between strategic technology planning and tactical technology planning. Then discuss how both types of planning can positively impact an organization’s functional and secure infrastructure.

Click here to see the video lecture for this week entitled, Introduction to Networks:

https://wilmington-university-tutorial.teachable.com/courses/microsoft-office-tutorials4/lectures/17669972

Hi, you may need my login info to access the video. mjones074@my.wilmu.edu, 670Black2tlp!

please include the in-text citations and references; provide the url link to all journal articles you use as references. Use current (meaning within the past 2 years) scholarly journal articles as references and use APA 6th edition format. Thanks!

Writing Assignment (1-2 pages) Read More »

YOU NEED TO WRITE 250 WORDS CORRELATING my job responsibilities(Electrical Engineer) TO MY COURSE (CYBER SECURITY)

YOU NEED TO WRITE 250 WORDS CORRELATING my job responsibilities(Electrical Engineer) TO MY COURSE (CYBER SECURITY)

1. Need to Correlate my job responsibilities(ELECTRICAL ENGINEER) with the eight-week online course Cybersecurity.

YOU NEED TO WRITE 250 WORDS CORRELATING my job responsibilities(ELECTRICAL ENGINEER) TO MY COURSE CYBER SECURITY

THESE ARE TOPICS COVERED IN MY COURSE

This course examines aspects of cyber security and the associated computer and network hardware and software used to identify harmful digital activities and associated actions used to prevent harmful data breaches. Students will investigate network domains such as Internet, Intranet, Extranet, and the different instantiations of Cloud Computing. Studies will include: 1) domain and network layers of the OSI model; 2) intrusion detection system (IDS)

– systems used to monitor network traffic for suspicious activity and issues alerts when such activity is discovered; 3) intrusion prevention systems (IPS) which operates much line IDS but adds a layer of security to reject (or nullify) the potentially malicious activity; 4) Honeypots – used to attract harmful activities in order to understand the mechanisms used; malicious software 6) software vulnerabilities; 7) cryptography – the practice and study of techniques for secure communication in the presence of third parties called adversaries; 8) encryption and decryption techniques used to secure data and limit the potential for data breaches. Please see Cyber Security Knowledge Areas in this syllabus for additional details.

YOU NEED TO WRITE 250 WORDS CORRELATING my job responsibilities(Electrical Engineer) TO MY COURSE (CYBER SECURITY) Read More »

Infotech in Global economy

Infotech in Global economy

I need points on how the knowledge, skills, or theories of the above course have been applied and how it is useful for a Network administrator in his work environment.

Provide a 500 word or 2 pages double spaced minimum reflection.
Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
Share a personal connection that identifies specific knowledge and theories from this course.
Demonstrate a connection to your current work environment.

Infotech in Global economy Read More »

Benefits of virtualization software, security concerns highlighted by server sprawl

Benefits of virtualization software, security concerns highlighted by server sprawl

Discuss the benefits of virtualization software, as described in the text (Page 138 of attachment). Do you agree/disagree with these benefits, or can you think of additional benefits not already presented?

Also discuss the security concerns highlighted by server sprawl and how you would propose to solve those in your (real or hypothetical) organization.

At least one scholarly source should be used. Use proper citations and references in your post.

Benefits of virtualization software, security concerns highlighted by server sprawl Read More »

Scroll to Top