MUST HAVE CISCO PACKET TRACER!!! Overview This project, due in Module Seven, inv

MUST HAVE CISCO PACKET TRACER!!!
Overview
This project, due in Module Seven, involves reconfiguring a network with a network diagram and providing a network design rationale based on the architectural requirements presented in a scenario. The audience for this diagram and rationale is the network administrator for a fictional organization at which you are employed as a junior security analyst for the purposes of this assignment. As you will find in the workplace, there is often not just one correct answer to any given set of specifications when developing a network diagram. There may be many configurations to respond to each scenario. This project represents an authentic demonstration of the related course competency because, as a junior security analyst, you will often be asked to troubleshoot and design a variety of networks and network configurations that meet business needs.
In this assignment, you will demonstrate your mastery of the following course competency:
Design IP addressing and supporting services to meet architectural requirements
Scenario
In the course announcements, your instructor will post a real-world scenario that includes the minimum specifications on which your work will be based. You will also be provided with a Packet Tracer native file (.pkt) that you will open into the Packet Tracer application to use as the base diagram for your network. You will use the scenario and the provided Packet Tracer lab environment to do your work.
Prompt
You must address the critical elements listed below.
Network Diagram
Organize the essential components required in the given minimum specifications so that they collectively constitute a functional system.
IP networking
Subnet masks
Network (DHCP) infrastructure
Network address translation (NAT) protocol
Use annotations that address all the organizational requirements that were identified in the scenario you were provided.
Network Design Rationale
Describe your rationale for how you organized the components so that they constitute a functional system. Provide a rationale for each component:
IP networking
Subnet masks
Network (DHCP) infrastructure
Network address translation (NAT) protocol and port address translation (PAT) protocol
What to Submit
Your submission should include two files: a PDF and a Word document. For the network diagram, print your Packet Tracer native file (.pkt) as a PDF, which you should submit for grading. Submit your network design rationale as a Word document with double spacing, 12-point Times New Roman font, and one-inch margins. It should be 1 to 2 pages in length and should be written in APA format.

Instructions You’ve won the business! Faster Computing has agreed to the project

Instructions
You’ve won the business! Faster Computing has agreed to the project. As the final stage of pre-implementation, you have been asked to produce a training guide that will demonstrate how to install Linux and provide an overview of several common commands, as follows:
(11.1.3: Install the software.)
Use a hypervisor of your choice to install Linux. Many hypervisors are available, such as Oracle’s VirtualBox, which is a free download. In addition, as part of UMGC’s agreement with VMware, you can download VMware Workstation for free. See below for specific screenshot requirements. You should include at least 3 screenshots (e.g., disk partitioning, timezone selection, creating the default account). Each screenshot should be accompanied by a brief explanation of what you did.
NOTE: It is not necessary to include screenshots of installing the hypervisor software.
(1.2.3: Explain specialized terms or concepts to facilitate audience comprehension.)
Demonstrate command-line operations that will provide the following information:
A listing of files in a directory and common file attributes
The current directory (hint: also known as the present working directory)
Create a file, then copy it to a different directory
Create a second file and move it to a different directory
Remove the first file, as well as the copy you created
The manual page for a given command
Create a text file, then use an editor to modify the content. Then display the content of the modified file
(1.4.2: Use vocabulary appropriate for the discipline, genre, and intended audience.)
In the above section (demonstrate CLI operations) show the commands with options/arguments (e.g., ls, cp, mv, rm) in your documentation as well as in your screenshots.
(11.2.1: Configure technology according to stakeholder specifications and requirements.)
Show running processes on the system. Demonstrate how to search for a specific process
Forcibly stop a running process
In the above section (demonstrate CLI operations) show the commands with options/arguments (e.g., top, kill, -9, ps) in your documentation as well as in your screenshots.
(13.1.1: Create documentation appropriate to the stakeholder.)
The deliverable for the final phase of the project is a written paper with screenshots. There is no minimum or maximum page requirement, but all of the requirements must be met. Use the Training Guide Template to record your work. This section will be graded upon the overall usefulness of the training guide to the organization.
(11.3.1: Add and update systems as required.)
This portion of the training guide helps determine your submission is unique.
Important Requirement
On the final screenshot, you need to open a command line and type in the following commands (without the quotes):
“date”
“echo CMIT391”
“echo ” (Replace your name here with your name)
The recommended format is to provide screenshots incorporated within the written narrative. The screenshots must all be your own. Screenshots from external sources are not permitted. You must include the specific screenshot listed above or your project will not be accepted.
(1.1.4: Explain the relationship between the ideas presented to enhance clarity and comprehension.)
The training guide must have a cover page, an introduction, summary, and at least 3-5 references. For your references follow the APA formatting and style guide version 7.
(1.2.2: Employ a format, style, and tone appropriate to the audience, context, and goal.)
Employ proper spelling and grammar. All Linux commands must be lower case.
(2.2.3: Explain the assumptions underlying viewpoints, solutions, or conclusions.)
In your conclusion of at least a paragraph, summarize why using Linux is beneficial for employees, management, and the organization as a whole.
How Will My Work Be Evaluated?
In this training guide, you will demonstrate how to install Linux and provide an overview of common commands for your client/customer. You’ll be combining your technical skills with effective communication techniques to provide learning resources for the client/customer.
The following evaluation criteria aligned to the competencies will be used to grade your assignment:
1.1.4: Explain the relationship between the ideas presented to enhance clarity and comprehension.
1.2.2: Employ a format, style, and tone appropriate to the audience, context, and goal.
1.2.3: Explain specialized terms or concepts to facilitate audience comprehension.
1.4.2: Use vocabulary appropriate for the discipline, genre, and intended audience.
2.2.3: Explain the assumptions underlying viewpoints, solutions, or conclusions.
11.1.3: Install the software.
11.2.1: Configure technology according to stakeholder specifications and requirements.
11.3.1: Add and update systems as required.
13.1.1: Create documentation appropriate to the stakeholder.

The Linux operating system is widely used in industry, especially for servers. W

The Linux operating system is widely used in industry, especially for servers. Why do you believe this is the case?
If you’ve worked with Linux previously, share your experiences. How would you compare it with other operating systems—like Windows?
If you have little or no experience with it, what are your perceptions?
In addition to your primary forum response, post at least two follow-up responses to your classmates

I have a virus that need to be analyzed, which an ec-council homework (Cyber Jou

I have a virus that need to be analyzed, which an ec-council homework (Cyber Journeyman I (Windows Threat Hunting)):
The questions are:
Question 1
What PE packer was used to pack the downloader (C:UsersLabUserDownloadss2023.exe)? (Answer format: xxx)
Question 1
For the malicious file to trigger a download, a file with a specific MD5 hash must exist on the system. What is the MD5 hash value? (Answer format: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx)
Question 2
What is the MD5 hash of the downloaded executable? (Answer format: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx)
Question 3
s2023.exe downloads a file when executed. What is the URL to this file? (Answer format: xxxx://xx.xx.x.x:xxxx/xxxxx.xxx)
Question 4
The downloaded executable file calls RegCreateKeyEx when executed. What is the string passed as the second parameter of the API when it is called? (Answer format: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx)
Can you help me in that, if so, I will upload the exe file

Deliverable 1: DB Analysis & Query (60 points) D1: DB Project Analysis & Query:

Deliverable 1: DB Analysis & Query (60 points)
D1: DB Project Analysis & Query: Develop a reasonable and realistic plan and outline the steps to accomplish the integrated project by the end of the course. You can also refer to Garden Glory project questions in §1~3 of the Textbook (at the end of each chapter).
Using these data presented in the list, state assumptions about functional dependencies among the columns of data. Justify your assumptions on the basis of these sample data and also on the basis of what you know about service businesses. Indicate what assumptions need to be checked with the users (GG) and what suggestions you may have about the determinants/keys (e.g., do you need a surrogate key?)
v Hint: refer to Text Chapter 2 for ” Functional Dependency ” and apply that technique to the GG project case
Based on the above analysis and assumptions, split the sample list into tables such that each has only one theme. Demonstrate that the modification problems you identified in question 2 have been eliminated.
v Hint: refer to Text Chapter 2 for ” Normalization Process ” and apply that technique to the GG project case. You can also refer to the 9 possible designs provided in the GG Project Questions section at the end of Chapter 2 in Text book, and choose the best one you believe.

Deliverable 1: DB Analysis & Query (60 points) D1: DB Project Analysis & Query:

Deliverable 1: DB Analysis & Query (60 points)
D1: DB Project Analysis & Query: Develop a reasonable and realistic plan and outline the steps to accomplish the integrated project by the end of the course. You can also refer to Garden Glory project questions in §1~3 of the Textbook (at the end of each chapter).
Using these data presented in the list, state assumptions about functional dependencies among the columns of data. Justify your assumptions on the basis of these sample data and also on the basis of what you know about service businesses. Indicate what assumptions need to be checked with the users (GG) and what suggestions you may have about the determinants/keys (e.g., do you need a surrogate key?)
v Hint: refer to Text Chapter 2 for ” Functional Dependency ” and apply that technique to the GG project case
Based on the above analysis and assumptions, split the sample list into tables such that each has only one theme. Demonstrate that the modification problems you identified in question 2 have been eliminated.
v Hint: refer to Text Chapter 2 for ” Normalization Process ” and apply that technique to the GG project case. You can also refer to the 9 possible designs provided in the GG Project Questions section at the end of Chapter 2 in Text book, and choose the best one you believe.

Task 1: In this task, you will use the scenario to develop an investigative plan

Task 1:
In this task, you will use the scenario to develop an investigative plan of action that will prepare your investigative team to conduct an analysis of the gathered evidence. After reviewing the lesson material within the Course of Study, you will be ready to start the task. First, read the task scenario to gain an understanding of what the task is asking for. Use the task requirements and rubric as a guide to develop your paper.

Overview As a security analyst, even though it may not relate immediately to you

Overview
As a security analyst, even though it may not relate immediately to your day-to-day job, it’s a best practice to be aware of emerging trends in the industry because they may eventually affect your organization. Think about how fast mobile devices have evolved and become pervasive in both business and personal applications. Managing emerging technologies requires a two-pronged approach: the technological aspect and the social aspect. You might need to upgrade your system and your policies that affect employee behaviors. There is often no right or wrong answer when integrating emerging technologies as long as the technology isn’t detrimental to your system; however, following best practices as defined by the industry, staying current with trade publications, and networking with your peers will help you be successful. As you address the technological and policy-related updates of implementing emerging technology in your organization, it is important to think about what it means to use the technology and adhere to the policies you are updating. Using a systems-thinking approach can help with this.
Scenario
You are a cybersecurity analyst, and your organization has noticed a new trend. More and more employees are bringing their personal devices to work and connecting them to the company’s Wi-Fi. The security team has recognized this as an issue and has decided to create a new segmented network for employees to use for their personal devices. This is a more secure solution because it separates data traffic for personal use and allows the organization to encrypt the communication. This benefits both the employees who want to use their personal devices at work and the organization.
This change to the system includes two steps from two different teams. The IT team is going to build the isolated secure network for employees only, and the security team needs to update the bring your own device (BYOD) policy. Your manager has asked you to draft the update to this policy. Your requirement is to update the policy to reflect the changes in the system in response to this new initiative.
Prompt
Review your organization’s BYOD policy in the Module Six Activity document linked in the Supporting Materials below. After reviewing the BYOD policy, write a response in which you describe a possible modification you would make to this policy to reflect the changes in the system from the scenario. Your response should also describe the impact that this policy update could have on organizational culture.
You must address the critical elements listed below.
Policy Update
Identify three of the most important policy statements from the BYOD policy and explain why they are essential to protecting the organization.
Describe a possible revision to the BYOD policy to meet the new requirement from the emerging workplace trend.
Organizational Impacts
Describe the impacts of this policy update on the organizational culture. For example, if you are aware that your use of personal devices on the company network is being monitored, would this change your behavior? Should it?
From a systems thinking approach, explain how this policy update may affect other organizational processes. For example, will the policy update affect the workflow of other employees?
What to Submit
Your submission should be 1 to 2 pages in length. Use double spacing, 12-point Times New Roman font, and one-inch margins. All sources must be cited using APA format. Use a file name that includes the course code, the assignment title, and your name—for example, CYB_123_Assignment_Firstname_Lastname.docx.
Supporting Materials
The following resource supports your work on the assignment:
Resource: Module Six Activity
This document describes your organization’s BYOD policy. Use this resource to complete the activity.

Overview As a security analyst, even though it may not relate immediately to you

Overview
As a security analyst, even though it may not relate immediately to your day-to-day job, it’s a best practice to be aware of emerging trends in the industry because they may eventually affect your organization. Think about how fast mobile devices have evolved and become pervasive in both business and personal applications. Managing emerging technologies requires a two-pronged approach: the technological aspect and the social aspect. You might need to upgrade your system and your policies that affect employee behaviors. There is often no right or wrong answer when integrating emerging technologies as long as the technology isn’t detrimental to your system; however, following best practices as defined by the industry, staying current with trade publications, and networking with your peers will help you be successful. As you address the technological and policy-related updates of implementing emerging technology in your organization, it is important to think about what it means to use the technology and adhere to the policies you are updating. Using a systems-thinking approach can help with this.
Scenario
You are a cybersecurity analyst, and your organization has noticed a new trend. More and more employees are bringing their personal devices to work and connecting them to the company’s Wi-Fi. The security team has recognized this as an issue and has decided to create a new segmented network for employees to use for their personal devices. This is a more secure solution because it separates data traffic for personal use and allows the organization to encrypt the communication. This benefits both the employees who want to use their personal devices at work and the organization.
This change to the system includes two steps from two different teams. The IT team is going to build the isolated secure network for employees only, and the security team needs to update the bring your own device (BYOD) policy. Your manager has asked you to draft the update to this policy. Your requirement is to update the policy to reflect the changes in the system in response to this new initiative.
Prompt
Review your organization’s BYOD policy in the Module Six Activity document linked in the Supporting Materials below. After reviewing the BYOD policy, write a response in which you describe a possible modification you would make to this policy to reflect the changes in the system from the scenario. Your response should also describe the impact that this policy update could have on organizational culture.
You must address the critical elements listed below.
Policy Update
Identify three of the most important policy statements from the BYOD policy and explain why they are essential to protecting the organization.
Describe a possible revision to the BYOD policy to meet the new requirement from the emerging workplace trend.
Organizational Impacts
Describe the impacts of this policy update on the organizational culture. For example, if you are aware that your use of personal devices on the company network is being monitored, would this change your behavior? Should it?
From a systems thinking approach, explain how this policy update may affect other organizational processes. For example, will the policy update affect the workflow of other employees?
What to Submit
Your submission should be 1 to 2 pages in length. Use double spacing, 12-point Times New Roman font, and one-inch margins. All sources must be cited using APA format. Use a file name that includes the course code, the assignment title, and your name—for example, CYB_123_Assignment_Firstname_Lastname.docx.
Supporting Materials
The following resource supports your work on the assignment:
Resource: Module Six Activity
This document describes your organization’s BYOD policy. Use this resource to complete the activity.