Create a Resource Guide PowerPoint that you would give to your parents of the students in your classroom, (you choose the grade level between Prek and 3rd Grade.)

Resource Guide Powerpoint-Create a Resource Guide PowerPoint that you would give to your parents of the students in your classroom, (you choose the grade level between Prek and 3rd Grade.) This guide should include information about how parents can implement music and movement into the child’s everyday life. It should include apps, songs, exercise, links. It should also include a list of books or information that parents can reference and books that the child can also read that will integrate music and movement. Your Powerpoint should be a minimum of 5 slides.

Ratio analysis paper and Powerpoint

Powerpoint

Presentation via power point by your group. All participate! Be prepared to verbally discuss what you discovered about the firm and how you think they have been doing, and may be doing in the future.  Maximize 10 slides not including intro and summary page.

Word write-up

A minimum 4-page word summary of the findings from the analysis. Some background on the firm: what industry do they compete in? What challenges do they have? Political? Regulatory? Economical? Who are competitors?

Risk, Threat, and Vulnerability Management 12pages + PowerPoint in two days =120

Many companies and agencies conduct IT audits to test and assess the rigor of IT security controls in order to mitigate risks to IT networks. Such audits meet compliance mandates by regulatory organizations. Federal IT systems follow Federal Information System Management Act (FISMA) guidelines and report security compliance to US-CERT, the United States Computer Emergency Readiness Team, which handles defense and response to cyberattacks as part of the Department of Homeland Security. In addition, the Control Objective for Information Technology (COBIT) is a set of IT security guidelines that provides a framework for IT security for IT systems in the commercial sector.

These audits are comprehensive and rigorous, and negative findings can lead to significant fines and other penalties. Therefore, industry and federal entities conduct internal self-audits in preparation for actual external IT audits, and compile security assessment reports.

In this project, you will develop a 12-page written security assessment report and executive briefing (slide presentation) for a company and submit the report to the leadership of that company.

There are six steps to complete the project. Most steps in this project should take no more than two hours to complete, and the project as a whole should take no more than three weeks to complete. Begin with the workplace scenario, and then continue to Step 1.

Step 1: Conduct a Security Analysis Baseline

In the first step of the project, you will conduct a security analysis baseline of the IT systems, which will include a data-flow diagram of connections and endpoints, and all types of access points, including wireless. The baseline report will be part of the overall security assessment report (SAR).

You will get your information from a data-flow diagram and report from the Microsoft Threat Modeling Tool 2016. The scope should include network IT security for the whole organization. Click the following to view the data-flow diagram: [diagram and report]

Include the following areas in this portion of the SAR:

  1. Security requirements and goals for the preliminary security baseline activity.
  2. Typical attacks to enterprise networks and their descriptions. Include Trojans, viruses, worms, denial of service, session hijacking, and social engineering. Include the impacts these attacks have on an organization.
  3. Network infrastructure and diagram, including configuration and connections. Describe the security posture with respect to these components and the security employed: LAN, MAN, WAN, enterprise. Use these questions to guide you:
    1. What are the security risks and concerns?
    2. What are ways to get real-time understanding of the security posture at any time?
    3. How regularly should the security of the enterprise network be tested, and what type of tests should be used?
    4. What are the processes in play, or to be established to respond to an incident?
    5. Workforce skill is a critical success factor in any security program, and any security assessment must also review this component. Lack of a skilled workforce could also be a security vulnerability. Does the security workforce have the requisite technical skills and command of the necessary toolsets to do the job required?
    6. Is there an adequate professional development roadmap in place to maintain and/or improve the skill set as needed?
    7. Describe the ways to detect these malicious code and what tactics bad actors use for evading detection.
  4. Public and private access areas, web access points. Include in the network diagram the delineation of open and closed networks, where they co-exist. In the open network and closed network portion, show the connections to the Internet.
  5. Physical hardware components. Include routers and switches. What security weaknesses or vulnerabilities are within these devices?
  6. Operating systems, servers, network management systems.
    1. data in transit vulnerabilities
      1. endpoint access vulnerabilities
      2. external storage vulnerabilities
      3. virtual private network vulnerabilities
      4. media access control vulnerabilities
      5. ethernet vulnerabilities
  7. Possible applications. This network will incorporate a BYOD (bring your own device) policy in the near future. The IT auditing team and leadership need to understand current mobile applications and possible future applications and other wireless integrations. You will use some of this information in Project 2 and also in Project 5.

The overall SAR should detail the security measures needed, or implementations status of those in progress, to address the identified vulnerabilities. Include:

  1. remediation
  2. mitigation
  3. countermeasure
  4. recovery

Through your research, provide the methods used to provide the protections and defenses.

From the identification of risk factors in the risk model, identify the appropriate security controls from NIST SP 800-53A and determine their applicability to the risks identified.

The baseline should make up at least three of the 12 pages of the overall report.

When you have completed your security analysis baseline, move on to the next step, in which you will use testing procedures that will help determine the company’s overall network defense strategy.

Step 2: Determine a Network Defense Strategy

You’ve completed your initial assessment of the company’s security with your baseline analysis. Now it’s time to determine the best defenses for your network.

Start by reading a publication by the National Institute of Standards and Technology, NIST-SP-800-115 Technical Guide to Information Security Testing and Assessment, and outline how you would test violations. Identify how you will assess the effectiveness of these controls and write test procedures that could be used to test for effectiveness. Write them in a manner to allow a future information systems security officer to use them in preparing for an IT security audit or IT certification and accreditation. Within this portion of the SAR, explain the different testing types (black box testing, white box testing).

Include these test plans in the SAR. The strategy should take up at least two of the 12 pages of the overall report.

Click the following link to learn more about cybersecurity for process control systems: Cybersecurity for Process Control Systems

After you’ve completed this step, it’s time to define the process of penetration testing. In the next step, you’ll develop rules of engagement (ROE).

Step 3: Plan the Penetration Testing Engagement

Now that you’ve completed your test plans, it’s time to define your penetration testing process. Include all involved processes, people, and timeframe. Develop a letter of intent to the organization, and within the letter, include some formal rules of engagement (ROE). The process and any documents can be notional or can refer to actual use cases. If actual use cases are included, cite them using APA format.

This portion should be about two pages of the overall 12-page report.

After you have outlined the steps of a penetration testing process, in the next step you will perform penetration testing. During the testing, you will determine if the security components are updated and if the latest patches are implemented, and if not, determine where the security gaps are.

Step 4: Conduct a Network Penetration Test

You’ve defined the penetration testing process, and in this step, you will scan the network for vulnerabilities. Though you have some preliminary information about the network, you will perform a black box test to assess the current security posture. Black box testing is performed with little or no information about the network and organization.

To complete this step, you will use industry tools to carry out simulated attacks to test the weaknesses of the network.

Your assessments within the lab will be reported in the SAR.

Complete This Lab

Here are some resources that will help you complete the lab:

Step 5: Complete a Risk Management Cost Benefit Analysis

You’ve completed the penetration testing, and now it’s time to complete your SAR with a risk management cost benefit analysis. Within this analysis, think about the cost of violations and other areas if you do not add the controls. Then add in the cost for implementing your controls.

When you have finished with the cost benefit analysis, which should be at least one page of your overall report, move to the final step, which is the completed SAR. As part of the final assignment, remember that you will need to create a slide presentation as part of the executive briefing, and submit that along with the SAR.Step 6: Compile the SAR, Executive Briefing, and Lab Report

You have completed comprehensive testing in preparation for this audit, provided recommended remediations, and developed a set of recommendations. Now you are ready to submit your SAR and executive briefing.

The requirements for Project 1 are as follows:

  1. Executive briefing: A three- to five-slide visual presentation for business executives and board members.
  2. Security assessment report (SAR): Your report should be 12 pages minimum, double-spaced with citations in APA format. The page count does not include figures, diagrams, tables or citations.

Step 6: Compile the SAR, Executive Briefing, and Lab Report

You have completed comprehensive testing in preparation for this audit, provided recommended remediations, and developed a set of recommendations. Now you are ready to submit your SAR and executive briefing.

The requirements for Project 1 are as follows:

  1. Executive briefing: A three- to five-slide visual presentation for business executives and board members.
  2. Security assessment report (SAR): Your report should be 12 pages minimum, double-spaced with citations in APA format. The page count does not include figures, diagrams, tables or citations.

Explain exactly what it means to maintain an ethical culture within the organization. 

For this assignment, you will take on the role of a Vice President of a major organization. The CEO has assigned you the responsibility of educating the leaders within the organization of the importance of maintaining an ethical culture. The tone of the presentation should be of a persuasive nature as you will also be asking these leaders to take this initiative to each of their areas. As you compile this presentation, include the following:

  1. Explain exactly what it means to maintain an ethical culture within the organization.
  2. Analyze the role that culture plays in global business ethics.
  3. Describe and persuade on the importance and rationale for maintaining an ethical culture within the entire organization. Think about methods that could be used to motivate towards ethical business practices.
  4. Recommend tactical methods that might be used within each of their areas.

Your PowerPoint presentation should be 12-14 slides, not including the title slide and reference slide. All sources used must be referenced and paraphrased. Directly quoted material must have accompanying citations and be cited per APA guidelines.

Use of speaker notes is required as well. In the speaker notes, you will provide what you would say if you were actually giving the presentation to an audience. Please write your notes in complete sentences and adhere to typical grammar and/or punctuation rules.

Create a 10- to 12-slide presentation with speaker notes and audio. Your audience is the City Council members who are responsible for deciding whether the city invests in resources to set in motion the smart parking space app. 

Assignment Content

  1. Purpose 
    This assignment illustrates how data analytics can be used to create strategies for sustainable organizational success while integrating the organization’s mission with societal values. You’ll apply statistical time series modeling techniques to identify patterns and develop time-dependent demand models. You’ll practice organizing and delivering a presentation to senior decision-makers. The PowerPoint presentation includes an audio component in addition to speaker notes.Resources: Microsoft Excel®, DAT565_v3_Wk6_Data_FileScenario: A city’s administration isn’t driven by the goal of maximizing revenues or profits but instead looks at improving the quality of life of its residents. Many American cities are confronted with high traffic and congestion. Finding parking spaces, whether in the street or a parking lot, can be time consuming and contribute to congestion. Some cities have rolled out data-driven parking space management to reduce congestion and make traffic more fluid.

    You’re a data analyst working for a mid-size city that has anticipated significant increments in population and car traffic. The city is evaluating whether it makes sense to invest in infrastructure to count and report the number of parking spaces available at the different parking lots downtown. This data would be collected and processed in real-time, feeding an app that motorists can access to find parking space availability in different parking lots throughout the city.

    Instructions: Work with the provided Excel database. This database has the following columns:

    • LotCode: A unique code that identifies the parking lot
    • LotCapacity: A number with the respective parking lot capacity
    • LotOccupancy: A number with the current number of cars in the parking lot
    • TimeStamp: A day/time combination indicating the moment when occupancy was measured
    • Day: The day of the week corresponding to the TimeStamp
    • Insert a new column, OccupancyRate, recording occupancy rate as a percentage with one decimal. For instance, if the current LotOccupancy is 61 and LotCapacity is 577, then the OccupancyRate would be reported as 10.6 (or 10.6%).
    • Using the OccupancyRate and Day columns, construct box plots for each day of the week. You can use Insert > Insert Statistic Chart >Box and Whisker for this purpose. Is the median occupancy rate approximately the same throughout the week? If not, which days have lower median occupancy rates? Which days have higher median occupancy rates? Is this what you expected?
    • Using the OccupancyRate and LotCode columns,construct box plots for each parking lot. You can use Insert > Insert Statistic Chart >Box and Whisker for this purpose. Do all parking lots experience approximately equal occupancy rates?Are some parking lots more frequented than others? Is this what you expected?
    • Select any 2 parking lots. For each one, prepare as catter plot showing occupancy rate against TimeStamp for the week 11/20/2016 –11/26/2016. Are occupancy rates time dependent? If so, which times seem to experience highest occupancy rates? Is this what you expected?
    • Presentation: 
      Create a 10- to 12-slide presentation with speaker notes and audio. Your audience is the City Council members who are responsible for deciding whether the city invests in resources to set in motion the smart parking space app.Complete the following in your presentation:
    • Outline the rationale and goals of the project.
    • Utilize boxplots showing the occupancy rates for each day of the week. Include your interpretation of results.
    • Utilize box plots showing the occupancy rates for each parking lot. Include your interpretation of results.
    • Provide scatter plots showing occupancy rate against time of day of your selected four parking lots. Include your interpretation of results.
    • Make a recommendation about continuing with the implementation of this project.

Create a 5- to 6-slide PowerPoint presentation that explores professional ethics and responsibilities. You can use information from the CSU Online Library or other reliable sources. (Note: Websites such as Wikipedia are not acceptable academic sources.) You may use the slide notes function to explain slide contents as necessary. In your presentation, address the following topics:

Hello everyone, I have an Assignment for you today. This assignment must be DONE by Friday, April 17, 2020, no later than 10 pm. By the way, I need this assignment to be PLAGIARISM FREE & a Spell Check when completed. Make sure you READ the instructions CAREFULLY. Now without further ado, the instructions to the assignments are below:

Instructions

Create a 5- to 6-slide PowerPoint presentation that explores professional ethics and responsibilities. You can use information from the CSU Online Library or other reliable sources. (Note: Websites such as Wikipedia are not acceptable academic sources.) You may use the slide notes function to explain slide contents as necessary. In your presentation, address the following topics:

  • professional ethics and responsibilities of intermediaries;
  • professional ethics, responsibilities, and loyalty of managers; and
  • professional ethics and responsibilities of employees to the community.

In addition to the information on professional ethics and responsibilities, provide at least one example of each topic above. Cite your sources, and create a reference slide using proper APA formatting. The title and reference slides are not included in the slide count.

Below I’ve attached a Study Guide that should help you with this assignment. Click on the Study Guide and look where it say “reading assignment”. There should be seven reading assignment (or rather articles) to look over to help you with this assignment. No need to worry about the first reading assignment. By the way if the 2nd article link doesn’t work. I’ve attached that article below as well.

Emergency Management

The Critical Assignment requires research and completion of a narrated PowerPoint presentation. There is NO PAPER to complete the assignment. This critically evaluative research project requires students to research an emergency management/disaster topic that has occurred in the United States. Student selection was previously approved by the professor. The narrated PowerPoint will be the equivalent of an APA developed paper that encompasses the material garnered during the course term in assessing the disaster and provide a critically evaluative outcome, including areas where emergency personnel provided emergency services in an acceptable manner and point out those areas where there was a breakdown in emergency services. The presentation must include faith integration from the student’s perspective. The narrated PowerPoint must be NO MORE THAN 15 minutes in length with corresponding number of slides. The PowerPoint must conform to APA guidelines and formatting requirements, including a title slide, abstract slide, and reference section, or works cited section.

Analyze how personal experience affects one’s interpretation of humanities texts.

The final project asks you to demonstrate that you have gained mastery of these objectives:

  • Explain how and why study of the Humanities is relevant to contemporary human experience.
  • Analyze how personal experience affects one’s interpretation of humanities texts.

Throughout this course, you have discovered how looking at life from different perspectives expands your view of the world, and provides a richer experience of life both individually and collectively.

  • In Unit 1 you learned about mythology, heroes and villains, philosophy, and ethics. You saw how philosophy can frame an idea or situation completely differently depending upon the way that you look at things.
  • In Unit 2 you learned about the importance of perception and point of view in the creation of individual and collective memories. The way that people see life is the way that they remember life.
  • In Unit 3 you discovered the different ways that religion shapes the reality of the followers, as well as the impact that different religions have on life globally. Again, this opportunity to examine other ways of thinking expands your own perceptions so that you understand the perspectives of others a bit better.
  • In Unit 4 you found different ways of expressing the stories that shape your life, and the lives of others. You read the dark tale of premeditated murder from Edgar Allen Poe and saw how his protagonist justified a heinous act. Poetry is found in all types of forms, and you constructed your own story and poem to start building your final assessment.
  • In Unit 5 you found music in all its multiple shapes and forms. From classical through death metal, music adds a depth to the experience of life that no other medium possesses. You added music to your final project story, and expanded the depth of your story.
  • Unit 6 expanded the definition of visual arts from just drawings or paintings to architecture, 3D art, and dance. By adding multiple forms of expression to your final project, you tell a more meaningful and emotionally powerful story to really draw your audience closer to your experience.
  • Unit 7 provided the framework to see the world through the different cohorts of people. Life looks very differently to people at different times of their lives. The impact of culture and cohort adds another framework for you to reflect upon your story and think about other ways of perceiving your experiences.

Instructions: In this final project, tell your story through a presentation and reflection on how other people may perceive your story.

  • You will create a 4 to 8 minute presentation.
    • You can choose to do either of the following:
      • Record a narrated presentation that is 4-8 minutes in length.
      • Using the speaker notes in the presentation include a script of what would be said on each slide.  The script needs to be a total of 1000-1500 words. Make sure to view the word count for the presentation.
  • In a Word document, provide a reflection on your final story and analyze your choices.

Estimated time to complete: 4 hours

IBM Marketing Report and PowerPoint

Marketing Plan for IBM Technology Written Report

Be sure to use the same headings as the marketing plan outline

Refer to the core assessment checklist to write a high-quality report.

The report should contain a cover page, a table of contents, reference page and appendices when necessary. The entire written paper should be 10-12 pages long. Be sure to use the same headings as seen below for your written report.

-Initial research on defining target market

-Demand forecast

-Complete value proposition

-Define how you will deliver satisfaction and maintain customer loyalty, customer profile, demos and other important information

-Specific market segmentation, targeting, and positioning statements

-Develop “branding” strategy for your produce/service

-Decide on brand name,

-Develop equity position and include the decisions in developing the brand strategy.

-Product/service’s brand positioning

-Differentiated brand positioning of your product/service

-Identifying who the market leaders are for your chosen product/service

-Identifying the niche that your product/service is in

-Deciding whether your product/service is going to be a leader, follower, or challenger to well-established products or brands

-Setting product strategy/designing or managing services

-Developing pricing strategies and programs

-Product or service strategy

-Advertising program complete with objectives, budget; advertising message and creative strategy

-Media decisions, and sales and promotional materials

-Direct market channels plans (if applicable)

-Consumer-adoption process for your new product

-How the consumer will learn about your new product/service and how quickly they will adopt it

-How the product will be targeted to the heavy users and early adopters first, then early, and late majorities

-The estimated time for full adoption.

1. Executive Summary

2. Situation Analysis

a. Market Summary (demographics, needs, trends, growth)

b. SWOT

c. Competition

d. Product Offerings

e. Distribution

3. Marketing Strategy

a. Mission/Objectives (marketing and financial)

b. Target Markets

c. Positioning

d. Strategies

e. Marketing Mix/Program

f. Marketing Research

4. Financials

a. Break-Even Analysis

b. Sales Forecast

c. Expense Forecast

5. Controls

a. Implementation

b. Marketing Organization

c. Contingency Planning

Marketing Plan for IBM Technology Power Point

1. The PowerPoint summary should be 10-12 slides long.

2. The PowerPoint should mirror the written analysis, but just in summary and not copy and paste.

3. Bullet points, charts and graphs are encouraged as tools to help complete your summary.

Create seven slides where you can share your hobbies, interesting times in your life, or just different things about you. You should not include any personal information such as your address, social security number, student ID, or anything sensitive that you would not share with a stranger.

For this discussion, you will use Microsoft PowerPoint to advertise yourself. You should have at least nine (9) slides of information plus a title slide for your presentation for a total of ten (10) slides. Follow the directions below.

  1. Choose a slide design that suits you. On your first (title) slide, include a title of your choosing to introduce yourself (criminal justice lawyer)  In the subheading, include the course number, assignment number, and your name.
  2. Create seven slides where you can share your hobbies, interesting times in your life, or just different things about you. You should not include any personal information such as your address, social security number, student ID, or anything sensitive that you would not share with a stranger. Keep any personal information about yourself, your friends, or your family private. Make sure that whatever you choose to share is classroom-appropriate and does not contain nudity, profanity, vulgarity, obscenity, or anything illegal.
  3. Create one slide that will be an “invitation” to your graduation party. Identify the who, what, when, where, and why of the party details. Include appropriate graphics and text formatting to make your invitation appealing.
  4. You will also include one slide that addresses your computer safety. Include your references in the Notes section.
  5. All slides should be formatted creatively and appropriately.
  6. Use the Notes section to describe the special creative touches you added so you make sure you get credit for them. This is a chance to explore the creative features of the software. Have fun and be creative..
  • Share your process of creating this slideshow including challenges, new insights, and any other experiences you have had with Microsoft PowerPoint.