101

 

ince the 1960’s we have seen a steady stream of more women entering the workplace. The 2000’s brought more women to senior leadership positions. This shift in the workforce has created challenges and opportunities for all. Increased sexual harassment cases, balancing life and family, and equal wages and job opportunities are just a few of the challenges. Organizations, and federal and state governments, are finding ways to address these issues.

Based on your readings this week (see Content – Week 8 – Reading and Resources), what should organizations do to ensure that the disparity between compensation and job opportunities among men and women in the workplace is mitigated and ultimately eliminated? Be creative in your answer!

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

hrmt fn

 

Instructions

Topic: Resolving conflict and dealing with difficult people in the workplace

Research Project Instructions:

IMPORTANT!! Read all information provided in this section before beginning your final project. Your final project accounts for 25% of your grade. As such, this project is critical to your final grade!

Submit your work as an MS PowerPoint ATTACHMENT. No other file format can be accepted (i.e., no .pdf, read-only formats, etc.).

The final project requires you to develop a PowerPoint slide presentation for use as a training tool with line managers and supervisors on how to resolve conflict, as well as deal with difficult people, in the workplace. Many organizations hold such training programs at least annually with line management as a refresher in order to ensure that employee conflicts and aggressive behavior are dealt with expeditiously, assertively, Instructions: and proactively, in order to prevent such behavior from taking place at work. As such, your presentation should briefly outline (i.e., no more than 2-3 slides) the negative issues associated with allowing conflict in the workplace to go unchecked, and focus the majority of your presentation (i.e., 8-10 slides) on the positive measures, programs, and processes that organizations can/do adopt to mitigate conflict and negative employee behavior in the workplace.

Many organizations have extended conflict resolution programs beyond Human Resource Development (HRD) programs and processes by changing human resource management (HRM) policies and programs to meet the special needs of the new workforce. A growing number of organizations are holding managers formally accountable for resolving employee concerns and/or grievance internally, within their departments. For example, incorporating such goals and objectives into their performance evaluation process. As the HRD manager for your organization, what new training programs and processes would you propose to senior management to develop effective training and conflict resolutions methods that will ultimately lead to a climate in which all employees can thrive within the organization and contribute to its success?

Submission Instructions: Submit your work as an MS PowerPoint (.ppt) presentation. The body of your presentation should include at least 10-12 presentation slides, in addition to a title slide, introduction slide(s), and references at the end of your presentation for a total of no more than 15 slides. PowerPoint presentations longer than 15 slides will not be read after the 15th slide. As such, please ensure that all assignment questions are answered within the first 15 slides, as your grade will be based on the first 15 slides received.

Your grade will be based on your ability to follow assignment instructions, research conducted, the effectiveness of the training proposed, critical thinking and analysis, and APA format.

Please support your ideas, arguments, and opinions with independent research, include at least three (3) supporting references or sources (do NOT use encyclopedias, Wikipedia, unknown, undated, or anonymous sources, such as brief articles from websites), include a reference section (i.e., 1-2 slides), and cite all sources properly in the text of each slide, in accordance with the 6th edition of the APA manual, Chapters 6 & 7.

Helpful Tips:

Your grade will be based upon:

  • research conducted
  • effectiveness of the training presentation as a communication tool,
  • critical thought and analysis, and
  • APA format.

Students are encouraged to use the Notes section of the slides in formulating the presentation as a way to minimize lengthy narrative on the slides. This approach will allow the use of bullet points on the slides but demonstrate the depth and scope of the research conducted in the Notes section.
I encourage you to go online to Purdue OWL, or Excelsior OWL, which have writing labs for students. Look up PowerPoint presentations in APA format in the search box. These websites will have helpful tips on best practices.

References:

Excelsior OWL: http://owl.excelsior.edu/posts/view/277

Purdue OWL: https://owl.english.purdue.edu/owl/resource/560/17/

Reminder:
Please ensure that you review the grading rubric for this assignment carefully, to ensure that you receive the highest possible grade for your work!

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Unit 5 IT595

 

Work on your project milestone 2 and report your evidence to support that the milestone was completed.

Submit a 2-page status report that includes research conducted for the project that outlines cybersecurity principles. Also, describe the tasks completed in this milestone in an updated work breakdown structure (WBS), in Excel, Word, or Project, showing the actual time it took to complete each task. Finally, describe lessons learned while implementing this milestone. In addition, demonstrate that the milestone is fully completed by showing sufficient evidence. Depending on the project, the evidence can take the form of research findings, diagrams, designs, screenshots, databases, queries, source code, configurations, videos, policies, etc. Your evidence should result in at least 5 pages. This is in addition to your 2-page status report. If your evidence is in the form of videos, the videos should be at least 8–10 minutes long. This is only for your evidence.

Assignment Requirements

You should follow current APA format.

  

Milestone 2: Risk Assessment & Architecture Design

The second model evaluates the risk and defines the dangerous areas and threats at the organization’s endpoint. The assessment will include monitoring network traffic, reading the access logs, and regularly testing potential attack scenarios. Consequently, an appropriate Zero Trust architecture compatible with the organization’s settings will be developed. Some design features are micro-segmentation to reduce the possibility of lateral movement, implementation of MFA to enhance the access controls, and choosing EDR for accurate time threat identification. Scalability will also be considered in the architectural design to allow for growth within the organization in the future.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Capstone Project Topic Selection

Instructions

Hello Class!

Welcome to Week # 1. For this week’s assignment, Please see below:

Assignment Instructions:

Please select your Capstone Project Topic idea paper by submitting a topic based on previous research and coursework that you have completed in Cybersecurity or on a Cybersecurity topic that peaks your interest. Your topic needs to be closely related to at least one of the course objectives (listed below for your convenience). Your Capstone Project Topic paper will be analyzed to determine if it meets the criteria for a full Capstone project. If it does, you will be permitted to begin fleshing out your final Capstone Project that will be due in Week # 7. If your project topic requires further work or needs to be changed altogether, you will be notified as such.

REQUIREMENTS:

  1. 2 – 3 Pages in length in APA format (not including a cover page and reference section)
  2. Papers need to be double spaced and in 12 point times new roman font
  3. Chosen Topic
  4. Introduction on Relevancy
  5. Your Research Questions (Resources below)
    1. https://writingcenter.gmu.edu/writing-resources/research-based-writing
    2. https://www.monash.edu/library/help/assignments-research/developing-research-questions
  6. Review of Literature (just a small discussion of approximately 5 potential sources.
  7. Reference Section (you will need at least 5 references – for the final Capstone Project Paper you will need 20-25)

MISCELLANEOUS:

  1. Use current and real world data to make your points, not just the textbook.
  2. Your references should not be more than 5 years old.
  3. Your Capstone Project Topic assignment is due by Sunday not later than 11:59 p.m. Eastern time.

 COURSE OBJECTIVES:

CO-1: Examine the various aspects of cybersecurity including the relationship between cyber defense, cyber operations, cyber exploitations, cyber intelligence, cybercrime, Cyberlaw within Federal and State Laws

CO-2: Deconstruct the processes and goals of cyber forensics investigations including the importance of search warrants and chain of custody in a forensic investigation of computer related crimes 

CO-3: Prepare a plan to manage functions that encompass overseeing a program or technical aspect of a security program at a high level ensuring currency with changing risk and threat environments.

CO-4: Prepare a plan to design functions that encompass scoping a program or developing procedures, processes, and architectures that guide work execution at the program and/or system level.

CO-5: Develop strategies and plans for security architecture consisting of tools, techniques, and technologies to detect and prevent network penetration, and to design effective cybersecurity countermeasures.

CO-6: Develop a policy to analyze network designs, topologies, architectures, protocols, communications, administration, operations, and resource management for wired, wireless, and satellite networks that affect the security of the cyberspace. 

CO-7: Develop a policy to implement functions that encompass putting programs, processes, or policies into action within an organization.

CO-8: Prepare a plan to evaluate functions that encompass assessing the effectiveness of a program, policy, process, or security service in achieving its objectives. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Summative Assessment: Project Management Email

Read the Customer Support Inc. Case Study. This case study will be used throughout this course.

You are the designated project manager. You have been assigned a project to implement access to the HR department software. It was suggested to you that the HR director thinks this project should be completed using the Agile methodology. Based on the type of work to be done, this project is best suited for a waterfall project methodology.

For this assignment, you will write an email to the HR director regarding the project methodology you plan to use, the team roles you need to put together for the project, and a task list for the project.

Write a 175- to 350-word email to the HR director who needs the project done in which you:

  • Compare waterfall and Agile project management methodologies.
  • Explain why waterfall is the right methodology for this project. The HR director mentioned wanting to use Agile methodology for this project, but you know waterfall is the right choice.
  • Identify 3 to 4 other roles you need on your project team to complete the Customer Support Inc. project, such as project sponsor, business analyst, scrum master, or program manager. Explain how each team member will contribute to this project. Be specific to the project you are working on, not just generic job roles.

Create 20 tasks for this project. You can use the provided Microsoft Excel task spreadsheet or another software application of your choice to create the task list. Include at least the following for each task: 

  • Task name
  • Estimated time to complete the task in hours
  • Prerequisite tasks blocking completion
  • Identify which team member is responsible for the task (The responsible party should be one of the team members you identified earlier.)
  • Additional notes

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Week 2: Opening Material

Assignment Instructions:

You will be presenting a preliminary copy of the Opening Material, the content may change later in the course, but I am looking for a solid submission. In the Table of Contents, please make sure to breakdown each of the sections and their subsections.

REQUIREMENTS:

  • 4 – 6 Pages in length in APA format (not including a cover page and reference section)
  • Cover Page
  • Table of Contents
  • Foreword
  • Abstract
  • Introduction (make sure you explain why your topic is relevant and what research question(s) you are trying to answer)
  • Reference Section

NOTE: The sections at the end of the course will be:

  • Cover Page
  • Table of Contents
  • Foreword
  • Abstract
  • Introduction
  • Literature Review
  • Discussion
  • Recommendations and Conclusions
  • References

MISCELLANEOUS:

  1. Use current and real world data to make your points, not just the textbook
  2. Your references should not be more than 5 years old
  3. Your assignment is due by Sunday not later than 11:59 p.m. Eastern time.

 COURSE OBJECTIVES:

CO-1: Examine the various aspects of cybersecurity including the relationship between cyber defense, cyber operations, cyber exploitations, cyber intelligence, cybercrime, Cyberlaw within Federal and State Laws

CO-2: Deconstruct the processes and goals of cyber forensics investigations including the importance of search warrants and chain of custody in a forensic investigation of computer related crimes 

CO-3: Prepare a plan to manage functions that encompass overseeing a program or technical aspect of a security program at a high level ensuring currency with changing risk and threat environments.

CO-4: Prepare a plan to design functions that encompass scoping a program or developing procedures, processes, and architectures that guide work execution at the program and/or system level.

CO-5: Develop strategies and plans for security architecture consisting of tools, techniques, and technologies to detect and prevent network penetration, and to design effective cybersecurity countermeasures.

CO-6: Develop a policy to analyze network designs, topologies, architectures, protocols, communications, administration, operations, and resource management for wired, wireless, and satellite networks that affect the security of the cyberspace. 

CO-7: Develop a policy to implement functions that encompass putting programs, processes, or policies into action within an organization.

CO-8: Prepare a plan to evaluate functions that encompass assessing the effectiveness of a program, policy, process, or security service in achieving its objectives. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

a1

Create an E-R model based on the following scenarios:
Note: https://app.diagrams.net/ is a free web application for
creating diagrams. I have provided a video showing how to use
this application. You are welcome to use the modeling software
of your choice (Visio, Lucid Charts, etc.). Your models must use
crows’ foot notation. Cardinality and modality are
not required this week.

 
a. At Woof and Wisdom Training LLC, a client is identified by a
client number. Each client has a first name, last name, address,
state, zip code, and phone number.

b. At Woof and Wisdom Training LLC, a pet is identified by a pet id.
Each pet has a species, name, and date of birth.

c. Woof and Wisdom Training LLC teaches many courses. Each
course is identified by a course number. A course has a name,
start date, end date, and location.

d. At Woof and Wisdom Training LLC, a pet is identified by a pet id.
Each pet has a species, name, and date of birth. A client is
identified by a client number. Each client has a first name, last
name, address, state, zip code, and phone number. It is assumed
that a client may have many pets, but a pet will only belong to
one client.

e. Woof and Wisdom Training LLC teaches many courses. Each
class is identified by a course number. A course has a name,
start date, end date, and location.  A pet may take many
different courses with Woof and Wisdom Training. A course may
have more than one pet registered. Woof and Wisdom Training
would like to keep a record of what pets attended which classes,
what grade they received, and their registration date. You will need three entities to model this scenario properly. As a hint, think of the relationship between the pet and
course entities.  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

IT 595 Unit 7

 

Work on your project milestone 3 and report your evidence to support that the milestone was completed.

Submit a 2-page status report that includes recommendations for stakeholders pertaining to cybersecurity theories and frameworks for managing risks, threats, or vulnerabilities. Also, describe the tasks completed in this milestone in an updated work breakdown structure (WBS), in Excel, Word, or Project, showing the actual time it took to complete each task. Finally, describe lessons learned while implementing this milestone. In addition, demonstrate that the milestone is fully completed by showing sufficient evidence. Depending on the project, the evidence can take the form of research findings, diagrams, designs, screenshots, databases, queries, source code, configurations, videos, policies, etc. Your evidence should result in at least 5 pages. This is in addition to your 2-page status report. If your evidence is in the form of videos, the videos should be at least 8–10 minutes long. This is only for your evidence.

Milestone 3:

 

Milestone 3: Implementation and Testing

The third and final milestone is the implementation of Zero Trust as a security model and conducting tests to assess its efficiency. The steps will involve deploying and setting up some of the chosen tools and technology within existing systems. The system’s security will also be assessed using the process referred to as penetration testing. Furthermore, there will be a User Acceptance Testing to capture feedback and fix some problems with the product’s usability. This milestone emphasizes iterative testing and improvement that confirms that the deployed system is operational and technically functional.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Computer Science Need 300 to 350 words Assignment : In APA Format with 2 references

Current laws that govern cyberspace are inadequate to handle advances in the Internet and computing technologies. In your opinion, is this an accurate statement? Support your position or answer with a few examples.  

Note: Requirement

 between 300-350 words

  • in-text citations and at least two (2) references using the APA style
  • double spaced
  • Include title page (required). 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

help needed

Write a menu driven program to allow the user to 1) Push, 2) Pop, 3) Print, and 4) Quit.

You must use separate compilation with files main.c, boolean.h, stack.h, and stack.c

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now