a 350–700-word response to the following prompts: Based on your experience with

a 350–700-word response to the following prompts: Based on your experience with this week’s labs and reading, what are some of the risks associated with mobile devices?
How was the importance of mitigating security exposures revealed through these labs? What procedures can be done to secure mobile devices?
Explain how you would use these mitigating security exposure skills in your career. Which functions from this set of labs do you see yourself using? Why?

Kindly follow the instructions below: (Please Note: I have attached an Excel fil

Kindly follow the instructions below:
(Please Note: I have attached an Excel file that contains a list of possible topics to write about!)
The first part: pick a topic related to cybersecurity, write a research question on it, and base your research on at least 4 valid and trustworthy resources (Wikipedia is not a valid resource). The research question must be narrowed down and precise. It cannot be general. Discuss and analyze the topic you’ve chosen – this part should take up 1 Microsoft Word page and exactly 1 page (each resource basis must be followed by an APA citation).
The second part: ask one of the popular AI engines (Chat GPT / Gemini / Co-Pilot etc.) the same research question you’ve come up with in the first part, and document their answer in the paper – this part should take up half a Microsoft Word page.
The third and final part: compare the AI’s findings with yours and determine how precise and relevant the AI’s answer is, as opposed to what you have discovered – This part should also take half a Microsoft Word page.
Throughout the paper, you must write precisely and offer examples when possible. Avoid writing in a general form.
Total pages – two (not including the reference list and the title page).
Document Type – Microsoft Word (.docx).
Font – Arial, font size – 11.
Line Spacing – 1.15.

Instructions If you didn’t last week: Download VMware Player, Virtual Box, or us

Instructions
If you didn’t last week:
Download VMware Player, Virtual Box, or use Hyper-V to build a Windows 10 virtual machine. These free applications can be placed on your personal computer:
Oracle Virtual Box (free)
VMware Player (free)
Hyper-V (available on Windows 8.1 and 10)
You can also get an evaluation copy of Windows 10.
Download the Windows Upgrade Proof of Concept Template and follow the instructions in the document.
In this project, you will practice installing and configuring Windows 10 on a virtual machine and document the process with screenshots and written explanations. You will need to take screenshots from the virtual machine (VM) from this project for the Project 3 presentation, so do not delete the VM.
Follow the Windows Installation Instructions to create the proof of concept. Once you have completed these tasks, write a report that documents the steps you followed in installing Windows 10, detailing which version you installed as well as the steps you completed after the installation.

Network Traffic Analysisusing Wireshark To complete this part of the quiz you ne

Network Traffic Analysisusing Wireshark
To complete this part of the quiz you need to download the following packet capture file available via goo
gle drive. Please note that you must be logged in with your Monash email
account on the browser you are using for this quiz to access the google drive. Make sure you are logged
out of all your personal google accounts if you encounter a request access page.
Link to Apollo Node PCAP file

Network Traffic Analysisusing Wireshark To complete this part of the quiz you ne

Network Traffic Analysisusing Wireshark
To complete this part of the quiz you need to download the following packet capture file available via goo
gle drive. Please note that you must be logged in with your Monash email
account on the browser you are using for this quiz to access the google drive. Make sure you are logged
out of all your personal google accounts if you encounter a request access page.
Link to Apollo Node PCAP file

UK Government Data Skills Survey of 2022 Some links to help you get started: htt

UK Government Data Skills Survey of 2022
Some links to help you get started:
https://www.ibm.com/uk-en
https://skillsbuild.org/about
https://digital-skills-jobs.europa.eu/en/inspiration/resources/ibm-skillsbuild-empowering-digital-skills-all
IBM Skills Build overview:
https://bit.ly/PathWaytoLearning
UK Government Data Skills Survey (2022):
https://explore-education-statistics.service.gov.uk/find-statistics/employer-skills-survey/2022
Further research (as required) is to be carried out by the student.
4. Analyze the data contained in the UK Government Skills Employment Survey of 2022.
Select a dataset that will support your analysis, cleanse the data as required.
5. Analyze the skills needs currently addressed by the IBM Skills Build program.
Prepare a quality dataset that will support your analysis, by using the sources given.
6. Import the data into a data analytics platform of your choice. It is recommended to use SAS Enterprise Miner, which was introduced as part of the university short course.
7. Transform the raw data by carrying out your own analysis using the software tools and produce compelling, meaningful, and relevant visualizations. Discuss your analysis in the report.
The analysis must include (but not limited to):
– An as-is breakdown of skills supported by the IBM Skills Build program
– A to-be recommendation of skills content for IBM Skills Build, to support today’s skills shortfalls
– A sector-wise analysis
8. Frame the data set based on the requirement, apply linear regression model and interpret the results using the features of the software tool, to predict the trend of future increased skills needs. Discuss your findings in report.
The analysis must include (but not limited to):
– Projected skills shortfalls
– Sector-wise analysis
PLEASE USE SAS MINER ENTERPRISE in the latest version of the window
Take a screen shot of each step
show a proof
analyse
and send all the excel sheet + CSV + CODES

Assignment 1 Your post must be at least 200 words. Please include: For the

Assignment 1 Your post must be at least 200 words.
Please include:
For the duration of this course, you will be the Chief Data Officer (CDO) of a fictional firm of your choice.
You have a data enterprise that contains structured and unstructured data
As the CDO, you built your company’s first data warehouse or a data lake
How will your data enterprise support the business?
List the projects that you chose to undertake
Prioritize them
Write a short bullet describing why this project is on your list
Assignment 2
Discussion Topics:Respond to the following scenario. Include justification as to why you selected the response you did. Then, name 4 different MFA products that can be used with the cloud. Write a brief summary of each.Paulo has configured multifactor authentication on his AWS account using a virtual MFA application on his phone. When he signs into his account on a computer in his school’s computer lab, he is prompted to enter his password, and then he’s asked for a code from his phone’s app. Which category of MFA does the code represent? Something you are
Something you know
Something you have
Something you do. Length requirements: Initial post must be at least 300 words.

NOTE- 1) APA format
2) NO plagiarism
3)NO AI generated text
4)write reference separately like assignment 1 and 2
5)What ever written in questions i need like same answers No extra NO missing

Below attached is the final capstone project. You need to rewrite it without AI

Below attached is the final capstone project. You need to rewrite it without AI and no similarity to the previous paper. Follow the APA7 format. I require the “Phase I” done in next 4 days and then I can increase the deadline for the rest of paper if you need. Please maintain the format of the tables as done in the paper
AI and Plagiarism Report that is less than 10% is must. Otherwise, answer couldn’t be accepted.