INTRODUCTION TO CYBERSECURTY

Part I:  Course Feedback.  Please provide feedback on the course. What did you like, what did you learn, what did you not like and what can I do to improve the course?  Part II:  Mr Scott is considering partnering with a company.  The transaction is not public yet and Mr. Scott has asked what we … Read more

INTRODUCTION TO CYBERSECURTY

Assuming you are planning to work in the Northern Virginia area after graduation.  There are some resources to prepare you for this.  This week’s discussion is about planning for your future.   1. 1.  Review the 2022 Labor Market: https://www.nvcc.edu/osi/labor-market/_docs/23-001-IndexSurveyReport22-final-web.pdfLinks to an external site. 2.  2. Download and read/review the Greater Washington Technology Workforce Needs Assessment report.  … Read more

Career Path

For this assignment, you will conduct research on the career path (Software Developer) you plan to pursue and develop a PowerPoint presentation that addresses the following: Professional Organizations. Find a minimum of three professional organizations that may help someone enter the desired career field. Volunteer Opportunities. Identify volunteer opportunities related to the field you are … Read more

Communications

Explain why you agree or disagree with some of the suggestions covered this week for improving project communications, such as creating a communications management plan, stakeholder analysis, or performance reports for IT software development projects. Justify your response. What other suggestions do you have?

INTRODUCTION TO CYBERSECURTY

Discussion 3 Physical Vulnerability assessment of security perimeters of TechWorx. Assignment: Mr. Scott wants a Physical vulnerability assessment of the security perimeters of TechWorx.  Chapters 3.6 (Gupta and Goyal) Chapter 4 (Fennelly) Minimum Requirements: Inside the Techworx building: 1st-floor reception and access to stairs, elevators, loading dock, and restrooms 2d floor offices and conference rooms … Read more

assingment

Overview One important project planning activity is to create a communication  plan that helps establish clear and efficient lines of communication. In  this assignment, you will create a communication plan for the XYZ  Business Workflow project. Prompt Create a communication plan for the XYZ Business Workflow software  development project team. Use the scenario and project … Read more

diss 5 soft

 Find a simple recipe in a cookbook or online. Rewrite your recipe using a combination of pseudocode with either a flowchart or an IPO chart. Be sure you declare your variables in the pseudocode. Discuss what role thinking through a recipe like this plays in better programming.

Introducing to Cybersecurty

During this quarter we will use a fictitious company called TechWorx.   Your boss is the CEO, Mr. Mike Scott.  He does not know a lot about IT or Cybersecurity so he will rely on your recommendations and expertise.   He recently was at a meeting where the McCumber Cube came up.  He is interested in your … Read more

Data modeling

A: (Scenario) Make up a description of your own proposed scenario, this scenario must include: 1. At least Four Entities (Written as a paragraph). 2. Entities Attributes (Written as a paragraph). 3. Describe the relationship between such entities (Written as a paragraph). B: (ER Diagrams): After you finish and complete your own scenario in part … Read more