Category: Other

  • Penetration Testing Report for Acme Corporation’s New System Penetration Testing Report for Acme Corp: Assessing Network Vulnerabilities and Mitigation Strategies

    Take a look at the example penetration testing report by Offense Security in the resources. Conduct a writeup similar in nature for the vulnerabilities we discovered today. This writeup must include images as seen in the example so that the customer can easily see what was found. Your paper must discuss each of the vulnerabilities we covered in this week’s lab, as well as two additional vulnerabilities that we did not discuss.
    In the resources section, you’ll see a list of vulnerabilities in Metasploitable3. Review this list to determine which additional vulnerabilities you want to exploit. When documenting these in your paper, you will need to document how you found this vulnerability. Do not state that you used a vulnerability listing for Metasploitable3. Instead, discuss the process used to identify the vulnerability (nmap scans to find open ports, Nessus to find vulnerability, etc…). Ensure that your paper revolves around the following scenario.
    Scenario:
    Acme Corporation hired you to validate a new system added to its network. They believe this system is secure and ready to be added, but company policy requires a completed penetration test to verify security. The policy dictates that the penetration test be conducted first as a white-box test to ensure that the system can be completely verified. As such, the project manager at Acme Corp has provided you with the credentials to the box. This allows you not only to conduct an uncredentialed scan, but also a credentialed scan.
    They want the test to start as if the hacker has access to the internal network, but does not know anything. As such, the test must start with only barebones information (you know the subnet you are on, but you do not know credentials). After you get an initial scan of the network using no credentials, they request that you use the provided credentials to get more accurate scans and more accurate testing.
    Paper Requirements:
    Written Communication: Write in a professional manner using APA 7th Edition and formatting with correct grammar, usage, and mechanics.
    Narrative: The Narrative must start as if you do not know any username and password. As such, an uncredentialed scan must run, as well as nmap scans. After you get the initial uncredentialed scans, you must use the credentials to scan the VMs.
    APA Formatting: Any resources and citations used are formatted according to APA 7th Edition.
    Length: 3-5 Pages (not including Title Page, References, and any Abstract/Executive Summary)
    Font and font-size: Any of the acceptable APA7 fonts.
    Vulnerabilities: 5 Vulnerabilities are discussed. Those that we found in the Lab this week, and two additional ones you discovered by yourself.
    Take a look at the example penetration testing report by Offense Security in the resources. Conduct a writeup similar in nature for the vulnerabilities we discovered today. This writeup must include images as seen in the example so that the customer can easily see what was found. Your paper must discuss each of the vulnerabilities we covered in this week’s lab, as well as two additional vulnerabilities that we did not discuss.
    In the resources section, you’ll see a list of vulnerabilities in Metasploitable3. Review this list to determine which additional vulnerabilities you want to exploit. When documenting these in your paper, you will need to document how you found this vulnerability. Do not state that you used a vulnerability listing for Metasploitable3. Instead, discuss the process used to identify the vulnerability (nmap scans to find open ports, Nessus to find vulnerability, etc…). Ensure that your paper revolves around the following scenario.
    Scenario:
    Acme Corporation hired you to validate a new system added to its network. They believe this system is secure and ready to be added, but company policy requires a completed penetration test to verify security. The policy dictates that the penetration test be conducted first as a white-box test to ensure that the system can be completely verified. As such, the project manager at Acme Corp has provided you with the credentials to the box. This allows you not only to conduct an uncredentialed scan, but also a credentialed scan.
    They want the test to start as if the hacker has access to the internal network, but does not know anything. As such, the test must start with only barebones information (you know the subnet you are on, but you do not know credentials). After you get an initial scan of the network using no credentials, they request that you use the provided credentials to get more accurate scans and more accurate testing.
    Paper Requirements:
    Written Communication: Write in a professional manner using APA 7th Edition and formatting with correct grammar, usage, and mechanics.
    Narrative: The Narrative must start as if you do not know any username and password. As such, an uncredentialed scan must run, as well as nmap scans. After you get the initial uncredentialed scans, you must use the credentials to scan the VMs.
    APA Formatting: Any resources and citations used are formatted according to APA 7th Edition.
    Length: 3-5 Pages (not including Title Page, References, and any Abstract/Executive Summary)
    Font and font-size: Any of the acceptable APA7 fonts.
    Vulnerabilities: 5 Vulnerabilities are discussed. Those that we found in the Lab this week, and two additional ones you discovered by yourself.

    Resources:
    https://www.offensive-security.com/reports/sample-penetration-testing-report.pdf
    https://github.com/rapid7/metasploitable3/wiki/Vulnerabilities

    Tips for Creating a Strong Cybersecurity Assessment Report

  • “IMC Plan for Product X: Driving Growth and Success in the New Year”

    Part 1 covers the current marketing strategies used by the product & sets the communications objectives for the new year. Use the template to develop your IMC Plan. You can either:
    1. Copy the slides and use them as guides to develop your own format. However, all the topics must be covered.
    2. If you use the template, keep the headings, but remove all the directions and tips for a professional presentation.
    Customize your project with your own graphics and artwork, or just use this template. Check out the Effective Power Point Presentation Tips in your Marketing Toolbox under course resources.
    Add additional slides if you need more space to effectively present key information. But use the numbering system already in the template.

  • “Concept Map: Steps and Considerations for Placing an Order”

    I need help with a concept map .
    Important Info
    The order was placed through a short procedure (customer skipped some order details).
    Please clarify some paper details before starting to work on the order.
    Type of paper and subject
    Number of sources and formatting style
    Type of service (writing, rewriting, etc)

  • “Cultural Insights from Episode 2 of “Call My Agent”” Title: “Cultural Insights from Episode 2 of “Call My Agent”” In episode 2 of season one of “Call My Agent,” titled “Line and Image

    First of all, you need to watch episode 2 of season one of the French TV show “Call My Agent” and describe that episode.
    you will BRIEFLY outline episode 2 of season one of this show and describe the main events (3 sentences max) and most importantly, you will explain the cultural points that you discovered during the episode.
    Remember to only watch and describe episode 2.
    This show can be found in Netflix.

  • Connecting with the Elements: My Experience with Earth and Water When I first embarked on this assignment to connect with the elements, I was both excited and nervous. I have always been drawn to the natural world and its elements, but I had never

    1) Describe your experience 1)greeting, 2) feeling, 3) expressing gratitude with the EARTH element. What was this like for you? Did you have thoughts? Did you experience emotions? Did you have sensory experiences–sight, smell, taste, touch, hearing. Were you indoors or outdoors? Both? Share any experiences you would like to share and if you have any questions please ask. Be specific, write: ″When I greeted I . . . .″ ″For me what I experienced during the ′feeling′ stage was . . . ″ ″When I expressed gratitude, I experienced . . . ″
    2) Next write about your experience with the WATER element. Follow the instructions above.
    If you have any questions about this assignment, email me. Please write between 4 and 6 pages double-spaced 12 pt is fine. 

  • “Case Study Analysis: Examining Student Performance and Teacher Strategies” Introduction: In this case study analysis, we will be examining the performance of a group of students and the strategies used by their teacher to improve their academic achievement. The study will focus on

    The a-s-s-e-s-s-m-e-n-t will
    Case Study Analysis
    Please see the questions shown in the screenshot. I will send you all the info after being hired, eg PPTs, student access etc. Please send a draft in 12hrs -1 day time, day 2, and day 3 as well. + Will need to draft some questions to ask the teacher and revise base on feedback (Send bk ard in 1 day max)

  • Title: Annotated Bibliography: Evaluating Sources for a Meteorology Research Project

    The reason the annotated bibliography is included as part of the research project is that writing an annotated bibliography is important in that it provides excellent preparation for the final presentation. One of the issues regarding any type of research, especially in meteorology, is the credibility of the sources used, particularly those obtained from various websites. By forcing you to evaluate each of your potential sources carefully, the annotated bibliography helps you determine if in fact the source you chose is credible and helps you determine how relevant it is to your topic and understand the topic better which will help you develop your presentation.
    For this project, you will assess three sources to include:
    1) a complete citation for each source,
    2) a summary of each source, and
    3) an evaluation of each source.
    Please see the attached sample annotated bibliography and grading criteria.

  • “Interpreting the Data: Key Findings and Implications”

    I would like the ″Interpretation″ section of this report completed referring to the data in the results section which I have already completed.

  • The Evolution and Impact of the National Health Information Infrastructure (NHII)

    From the National Health Information Infrastructure (NHII) legislation of the 1990s to current day Health Information Technology for Economic and Clinical Health (HITECH) legislation and the health information technology, the NHII continues to evolve, but at a more rapid pace. Part of that evolution has included not only the public and private health infrastructure development between the health providers, CDC, and the states but also many nongovernment partners, such as the commercial MEDLINE Plus, the Agency for Healthcare Quality and Research (AHQR), and many more. Consider the NHII’s evolution and its achievements over the last two decades and share your understanding of its many components and how they work together to provide greater access to health information. How is that information used to build healthier communities What are the key drivers in the evolution of the NHII? How do you envision the NHII will evolve and function in the coming years? You may review the following resources: Cusack, C. M., Hripcsak, G., Bloomrosen, M., Rosenbloom, S. T., Weaver, C. A., Wright, A., . . . Mamykina, L. (2013). The future state of clinical data capture and documentation: A report from AMIA’s 2011 policy meeting. Journal of the American Medical Informatics Association, 20, 134–140. Retrieved from http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3555335/pdf/amiajnl-2012-001093.pdf Agency for Healthcare Research and Quality. (n.d.). National guideline clearinghouse. Retrieved from http://www.guideline.gov/ CDC. (2013). National notifiable diseases surveillance system (NNDSS): Data collection and reporting. Retrieved from http://wwwn.cdc.gov/nndss/script/DataCollection.aspx U.S. Department of Health and Human Services. (n.d.). The national health information infrastructure (NHII): Site index. Retrieved from http://aspe.hhs.gov/sp/nhii/siteindex.html U.S. Department of Health and Human Services. (n.d.). Health information privacy: HITECH act enforcement interim final rule. Retrieved from http://www.hhs.gov/ocr/privacy/hipaa/administrative/enforcementrule/hitechenforcementifr.html HealthIT.gov (n.d.). Retrieved from http://www.healthit.gov/ Submission Details: Write your response in a minimum of 300–400 words, providing relevant references. Apply APA standards to citation of sources. Respond to at least two students’ postings.

  • “Breaking Boundaries: A Critical Analysis of Trevor Copp and Jeff Fox’s TED Talk on Gender Roles in Ballroom Dance”

    https://www.ted.com/talks/trevor_copp_and_jeff_fox_ballroom_dance_that_breaks_gender_rolesI’ll send instructions later