This document provides instructions for hardening Windows servers to improve security. It describes removing unnecessary roles and services, configuring the Windows firewall, applying security baselines, and resetting passwords. The lab is divided into three sections - the first involves manually hardening a server, the second applies what was learned with alternative methods, and the third involves independent challenges. Upon completing the lab, students will have hands-on experience hardening Windows servers in various ways to reduce vulnerabilities and unauthorized access. Screenshots and descriptions of the configuration changes are required deliverables.
csc3412 Assignment 1Semester 1, 2014Due Date Midnight.docxfaithxdunce63732
csc3412 Assignment 1
Semester 1, 2014
Due Date: Midnight 31 March 2014, AEST
This assignment consists of 3 questions each of equal value. They
consist of common tasks required of a system administrator—tasks
I have had to do at some time in the past.
Clear Layout
It is vitally important that your assignment is clearly laid out with
questions and parts of questions clearly defined. It must be a
straight forward matter for the examiner to determine that you
have completed each exercise satisfactorily. We want quality not
quantity. Poorly organised submissions will be rejected or receive
a poor mark.
A text file or PDF/A document typeset using vanilla LATEX are
preferred over a document produced by a word-processor. If you
must use Microsoft Word please export your document as PDF/A1
not PDF.
Command Output
When answering these questions you will have to run commands
under Linux—whenever a command is run you will need to:
a. explain in your own words the purpose of the command in the
context of the assignment question. (Please do not just copy
the “Description” section from the man page!) Also, you
need to explain in your own words all terminology used—as
if you were explaining to an average user! (Please show you
understand what you are doing!)
b. show that the command worked—either from its output or
the output from another command. For example
prompt> dd if=/dev/zero of=Crypt.fs bs=1M count=32
32+0 records in
1 PDF/A is an archival format of PDF that embeds all fonts used in the doc-
ument within the PDF file. To ensure PDF/A format in Word check “ISO-
19005-compliant (PDF/A)” under “Options” when saving a file as PDF.
LATEX produces PDF/A by default.
32+0 records out
33554432 bytes (34 MB) copied, 0.109063 s, 308 MB/s
prompt> ls -l Crypt.fs
-rw-r--r-- 1 user user 33554432 2014-02-25 10:18 Crypt.fs
c. To capture text output from programs you will have to redi-
rect the output to a file or use the command script. If you
are using the command script turn off the tty escape se-
quences that change the colour of console text—the escape
sequences will appear in output file and make it impossible
to read.
2
Question 1 (marks 20)
On modern networked computers, maintaining the correct time on
each machine is important. Computers on a LAN or WAN with
different times can cause problems.
In about a page and in your own words explain why it is im-
portant for computers to maintaining the correct time and more
importantly explain how do they do it.
In your explanation make certain to include discussions on the
following linked topics:
• The computer’s hardware clock (also called the Real Time
Clock or RTC)
• The computer’s software clock (also called the kernel or sys-
tem clock)
• In Linux, how they are syncronised and why do they need to
be syncronised? (See Exercise 2.35 from the Study Book)
• What is UTC and why is it used? (UTC: Coordinated Uni-
versal Time, or Temps Universel Coordonné, and if you want—
you can expla.
Part 4 Scripting and Virtualization (due Week 7)Objectives1. .docxkarlhennesey
Part 4: Scripting and Virtualization (due Week 7)Objectives
1. To learn scripting on Windows and Linux
2. To add virtualization with a Linux distributionStepsPart 1—Windows Scripting
Basic Script: Scripting is useful for small programming projects or quick tasks. Often, these programs are short and meant for small problems. Unlike compiled programming languages, scripting languages are generally interpreted. Batch files or scripts are created to automate tasks and may contain several commands in one file. Scripts can be created in Notepad. These are short files that run each command in sequence at file execution. The windows command-line interface can be used to run scripts.
Below are some commands.
Echo = Displays a message in the batch file
Echo. displays a blank line
@command turns off the display of the current command
@echo off = does not echo back text
cls = clears your screen
:: = Adds comments to your code; this line will not be displayed
Start = used to start a windows application
Creating a Basic Script
cls
@echo off
::Your Name
echo "Creating a data dump file"
ipconfig /all > C:\Scripts\config_info.txt
echo end of script
Open Notepad by going to Start-> All Programs -> Accessories-> Notepad.
Type the above script into Notepad.
Create a directory named Scripts on the C:\ drive. Save this file in the C:\Scripts folder as myscript.cmd.
Do not close your Notepad file. To run, open a command prompt by typing cmd in the Search Programs and Files box when you click the Start button or search for cmd.
Change directory to the C:\Scripts folder by typing the following.
cd c:\Scripts
Then type in the following.
myscript.cmd
The script should run and will create a file.
Use the dir command to see what files are created.
Keep both the Notepad file and the command prompt open for the next step.
You can also shut down a computer from a script. This is helpful for remote shutdown in a networking situation. Add the following commands to your script and save it in Notepad. (Note: The ping command, though normally used for networking, here waits 4 seconds.)
shutdown /s /t 60 /c "Local shutdown in 1 minute!"
ping -w 1000 0.0.0.0 > nul
shutdown /a
echo "Shutdown has been aborted"
Click back to the command prompt.
Type in myscript.cmd to run the script.
You should see the script attempt to shut down, then abort the shutdown.
Keep both your Notepad and command prompt open.
Environment variables are built-in system variables available for all Windows processes describing users, paths, and so on.
Some common environment variables are as follows.
%PATH% = contains a list of directories with executable files, separated by semicolons. To add a path:
SET PATH = %PATH%;C:\Windows\Eclipse
%DATE% and %TIME% = current date and time
%RANDOM% = returns a random number between 0 and 32767
%WINDIR% = points to the windows directory C:\Windows
%PATHEXT% = displays executable file extensions ie .com, .exe, .bat, .cmd, .vbs, .vbe, ...
Assessment item 1 File Systems and Advanced Scripting .docxdavezstarr61655
Assessment item 1
File Systems and Advanced Scripting
Value: 15%
Due Date: 26-Aug-2018
Return Date: 31-Aug-2018
Length: 15 - 20 pages including screenshots
Submission method options: Alternative submission method
Task
back to top
In this assignment you will develop simple scripts to manage the user and file system whilst
developing some expertise in managing a complex file system.
Part 1: Automated Account Management (4 marks)
You have been asked by your boss to prepare two shell scripts which manage user information.
You are to prepare a simple shell script which reads a text file called users.txt. The file is in the
form
dfs /home/dfs Daniel Saffioti
and creates these users on the system without any interactive input. To do this you will need to
use the adduser(1) and passwd(1) commands. You will need to randomly produce the password
and report this to the administrator.
You can assume the fields being username, home directory and GCOS string are separate by a
single white space.
You can assume all users are in the same group.
The program should output the username and generated password once created.
Part 2: Design of a File System (3 marks)
https://outlines.csu.edu.au/delivery/published/ITC333/201860/SM/I/outline.html#contentPanel
You work for the Information Technology Department in your University and you have been
asked to build a server to store user data (home directories).
The volumes can grow without bounds, so it was felt that the ZFS file system should be used for
each volume. The operating system itself need not be on a ZFS volume.
All volumes including the operating system should be engineered in such a way to ensure the
best data protection is afforded in the event of local disk failure. It is expected that no more than
1 hours worth of data will be lost.
The volumes required are as follows:
1. uni0 with mount point /users/ug& quota of 200G.
2. uni1 with mount point /users/pg& quota of 200G.
3. uni2 with mount point /users/deleted& reservation of 100G.
4. uni3 with mount point /users/staff& reservation of 100G.
5. uni4 with mount point /users/guest & reservation of 250G.
Given the above your task is as follows define a strategy for how you will ensure the volumes
outlined above are provisioned whilst ensuring there data protection. Document this accordingly
along with a suitable rationale for your design.
Part 3: Implementing the Filesystem (4 marks)
Given the strategy defined in part two, your job is to implement the storage system.
1. To do this install the latest version of Ubuntu Server on a virtual machine. You will need to
ensure the networking is bridged and the root portioning is managed appropriately. You will
need to add additional virtual disks to meet the storage needs above.
2. Install the ZFS package and configure it such that pools of storage are created to meet the above
requirements including redundan.
OFM SOA Suite 11gR1 – Installation DemonstrationSreenivasa Setty
Complete step-by-step installation instructions with screen captures to install and configure WebLogic Server and SOA Suite 11g R1.
This document is a fine extract of various installation documents, along with installation planning notes, and post installation verification points.
BLCN532 Lab 1Set up your development environmentV2.0.docxmoirarandell
BLCN532 Lab 1
Set up your development environment
V2.0
Introduction
This course introduces students to blockchain development for enterprise environments. Before you can develop software applications, you need to ensue your development environment is in place. That means you’ll need all the tools and infrastructure installed and configured to support enterprise blockchain software development projects.
In this lab you’ll set up your own Hyperledger Fabric development environment and install the course software from the textbook. When you finish this lab, you’ll have a working development environment and will be ready to start running and modifying blockchain applications.
The instructions in your textbook are for Mac and Linux computers.
However
, there is no guarantee that your installation of MacOS or Linux is completely compatible with the environment in which the commands from the textbook work properly. For that reason, I
STRONGLY SUGGEST
that you acquire an Ubuntu 16.04 Virtual Machine (VM) for your labs. Using an Ubuntu 16.04 VM will make the labs far easier to complete.
The instructions in this course’s labs assume that your computer runs the Windows operating system. If you run MacOS or Linux, you can get
Vagrant
and
VirtualBox
for those operating systems and follow the gist of the “Initial setup for Windows computers”.
Lab Deliverables:
To complete this lab, you must create a
Lab Report file
and submit the file in iLearn. The Lab Report file must be a Microsoft Word format (.docx), and have the filename with the following format:
BLCN532_SECTION_STUDENTID_LASTNAME_FIRSTNAME_Lab01.docx
· SECTION is the section number of your current course (2 digits)
· STUDENTID is your student ID number (with leading zeros)
· LASTNAME is your last name, FIRSTNAME is your first name
To get started, create a Microsoft Word document (.docx) with the correct filename for this lab. You’ll be asked to enter text and paste screenshots into the lab report file.
NOTE: All screenshots MUST be readable. Use the Ubuntu Screen Capture utility (see the lab video.) Make sure that you label each screenshot (i.e. Step 2.1.3) and provide screenshots in order. For commands that produce lots of output, I only want to see the last full screen when the command finishes. Provide FULL screenshots, NOT cropped images.
SECTION 1: Initial setup for Windows computers (Chapter 3)
Step 1.1: Install Oracle Virtualbox (Windows, Linux, MacOS)
Oracle Virtualbox is an open source virtualization environment that allows you to run multiple virtual machines and containers on a single personal computer. Virtualbox is free and it is easy to install.
In your favorite web browser, navigate to:
https://www.virtualbox.org/
and click the “Download Virtualbox” button. Click the “Windows hosts” link to download the main installation executable. You should also click the “All supported platforms” under the “Extension Pack” heading to download extra software supp.
csc3412 Assignment 1Semester 1, 2014Due Date Midnight.docxfaithxdunce63732
csc3412 Assignment 1
Semester 1, 2014
Due Date: Midnight 31 March 2014, AEST
This assignment consists of 3 questions each of equal value. They
consist of common tasks required of a system administrator—tasks
I have had to do at some time in the past.
Clear Layout
It is vitally important that your assignment is clearly laid out with
questions and parts of questions clearly defined. It must be a
straight forward matter for the examiner to determine that you
have completed each exercise satisfactorily. We want quality not
quantity. Poorly organised submissions will be rejected or receive
a poor mark.
A text file or PDF/A document typeset using vanilla LATEX are
preferred over a document produced by a word-processor. If you
must use Microsoft Word please export your document as PDF/A1
not PDF.
Command Output
When answering these questions you will have to run commands
under Linux—whenever a command is run you will need to:
a. explain in your own words the purpose of the command in the
context of the assignment question. (Please do not just copy
the “Description” section from the man page!) Also, you
need to explain in your own words all terminology used—as
if you were explaining to an average user! (Please show you
understand what you are doing!)
b. show that the command worked—either from its output or
the output from another command. For example
prompt> dd if=/dev/zero of=Crypt.fs bs=1M count=32
32+0 records in
1 PDF/A is an archival format of PDF that embeds all fonts used in the doc-
ument within the PDF file. To ensure PDF/A format in Word check “ISO-
19005-compliant (PDF/A)” under “Options” when saving a file as PDF.
LATEX produces PDF/A by default.
32+0 records out
33554432 bytes (34 MB) copied, 0.109063 s, 308 MB/s
prompt> ls -l Crypt.fs
-rw-r--r-- 1 user user 33554432 2014-02-25 10:18 Crypt.fs
c. To capture text output from programs you will have to redi-
rect the output to a file or use the command script. If you
are using the command script turn off the tty escape se-
quences that change the colour of console text—the escape
sequences will appear in output file and make it impossible
to read.
2
Question 1 (marks 20)
On modern networked computers, maintaining the correct time on
each machine is important. Computers on a LAN or WAN with
different times can cause problems.
In about a page and in your own words explain why it is im-
portant for computers to maintaining the correct time and more
importantly explain how do they do it.
In your explanation make certain to include discussions on the
following linked topics:
• The computer’s hardware clock (also called the Real Time
Clock or RTC)
• The computer’s software clock (also called the kernel or sys-
tem clock)
• In Linux, how they are syncronised and why do they need to
be syncronised? (See Exercise 2.35 from the Study Book)
• What is UTC and why is it used? (UTC: Coordinated Uni-
versal Time, or Temps Universel Coordonné, and if you want—
you can expla.
Part 4 Scripting and Virtualization (due Week 7)Objectives1. .docxkarlhennesey
Part 4: Scripting and Virtualization (due Week 7)Objectives
1. To learn scripting on Windows and Linux
2. To add virtualization with a Linux distributionStepsPart 1—Windows Scripting
Basic Script: Scripting is useful for small programming projects or quick tasks. Often, these programs are short and meant for small problems. Unlike compiled programming languages, scripting languages are generally interpreted. Batch files or scripts are created to automate tasks and may contain several commands in one file. Scripts can be created in Notepad. These are short files that run each command in sequence at file execution. The windows command-line interface can be used to run scripts.
Below are some commands.
Echo = Displays a message in the batch file
Echo. displays a blank line
@command turns off the display of the current command
@echo off = does not echo back text
cls = clears your screen
:: = Adds comments to your code; this line will not be displayed
Start = used to start a windows application
Creating a Basic Script
cls
@echo off
::Your Name
echo "Creating a data dump file"
ipconfig /all > C:\Scripts\config_info.txt
echo end of script
Open Notepad by going to Start-> All Programs -> Accessories-> Notepad.
Type the above script into Notepad.
Create a directory named Scripts on the C:\ drive. Save this file in the C:\Scripts folder as myscript.cmd.
Do not close your Notepad file. To run, open a command prompt by typing cmd in the Search Programs and Files box when you click the Start button or search for cmd.
Change directory to the C:\Scripts folder by typing the following.
cd c:\Scripts
Then type in the following.
myscript.cmd
The script should run and will create a file.
Use the dir command to see what files are created.
Keep both the Notepad file and the command prompt open for the next step.
You can also shut down a computer from a script. This is helpful for remote shutdown in a networking situation. Add the following commands to your script and save it in Notepad. (Note: The ping command, though normally used for networking, here waits 4 seconds.)
shutdown /s /t 60 /c "Local shutdown in 1 minute!"
ping -w 1000 0.0.0.0 > nul
shutdown /a
echo "Shutdown has been aborted"
Click back to the command prompt.
Type in myscript.cmd to run the script.
You should see the script attempt to shut down, then abort the shutdown.
Keep both your Notepad and command prompt open.
Environment variables are built-in system variables available for all Windows processes describing users, paths, and so on.
Some common environment variables are as follows.
%PATH% = contains a list of directories with executable files, separated by semicolons. To add a path:
SET PATH = %PATH%;C:\Windows\Eclipse
%DATE% and %TIME% = current date and time
%RANDOM% = returns a random number between 0 and 32767
%WINDIR% = points to the windows directory C:\Windows
%PATHEXT% = displays executable file extensions ie .com, .exe, .bat, .cmd, .vbs, .vbe, ...
Assessment item 1 File Systems and Advanced Scripting .docxdavezstarr61655
Assessment item 1
File Systems and Advanced Scripting
Value: 15%
Due Date: 26-Aug-2018
Return Date: 31-Aug-2018
Length: 15 - 20 pages including screenshots
Submission method options: Alternative submission method
Task
back to top
In this assignment you will develop simple scripts to manage the user and file system whilst
developing some expertise in managing a complex file system.
Part 1: Automated Account Management (4 marks)
You have been asked by your boss to prepare two shell scripts which manage user information.
You are to prepare a simple shell script which reads a text file called users.txt. The file is in the
form
dfs /home/dfs Daniel Saffioti
and creates these users on the system without any interactive input. To do this you will need to
use the adduser(1) and passwd(1) commands. You will need to randomly produce the password
and report this to the administrator.
You can assume the fields being username, home directory and GCOS string are separate by a
single white space.
You can assume all users are in the same group.
The program should output the username and generated password once created.
Part 2: Design of a File System (3 marks)
https://outlines.csu.edu.au/delivery/published/ITC333/201860/SM/I/outline.html#contentPanel
You work for the Information Technology Department in your University and you have been
asked to build a server to store user data (home directories).
The volumes can grow without bounds, so it was felt that the ZFS file system should be used for
each volume. The operating system itself need not be on a ZFS volume.
All volumes including the operating system should be engineered in such a way to ensure the
best data protection is afforded in the event of local disk failure. It is expected that no more than
1 hours worth of data will be lost.
The volumes required are as follows:
1. uni0 with mount point /users/ug& quota of 200G.
2. uni1 with mount point /users/pg& quota of 200G.
3. uni2 with mount point /users/deleted& reservation of 100G.
4. uni3 with mount point /users/staff& reservation of 100G.
5. uni4 with mount point /users/guest & reservation of 250G.
Given the above your task is as follows define a strategy for how you will ensure the volumes
outlined above are provisioned whilst ensuring there data protection. Document this accordingly
along with a suitable rationale for your design.
Part 3: Implementing the Filesystem (4 marks)
Given the strategy defined in part two, your job is to implement the storage system.
1. To do this install the latest version of Ubuntu Server on a virtual machine. You will need to
ensure the networking is bridged and the root portioning is managed appropriately. You will
need to add additional virtual disks to meet the storage needs above.
2. Install the ZFS package and configure it such that pools of storage are created to meet the above
requirements including redundan.
OFM SOA Suite 11gR1 – Installation DemonstrationSreenivasa Setty
Complete step-by-step installation instructions with screen captures to install and configure WebLogic Server and SOA Suite 11g R1.
This document is a fine extract of various installation documents, along with installation planning notes, and post installation verification points.
BLCN532 Lab 1Set up your development environmentV2.0.docxmoirarandell
BLCN532 Lab 1
Set up your development environment
V2.0
Introduction
This course introduces students to blockchain development for enterprise environments. Before you can develop software applications, you need to ensue your development environment is in place. That means you’ll need all the tools and infrastructure installed and configured to support enterprise blockchain software development projects.
In this lab you’ll set up your own Hyperledger Fabric development environment and install the course software from the textbook. When you finish this lab, you’ll have a working development environment and will be ready to start running and modifying blockchain applications.
The instructions in your textbook are for Mac and Linux computers.
However
, there is no guarantee that your installation of MacOS or Linux is completely compatible with the environment in which the commands from the textbook work properly. For that reason, I
STRONGLY SUGGEST
that you acquire an Ubuntu 16.04 Virtual Machine (VM) for your labs. Using an Ubuntu 16.04 VM will make the labs far easier to complete.
The instructions in this course’s labs assume that your computer runs the Windows operating system. If you run MacOS or Linux, you can get
Vagrant
and
VirtualBox
for those operating systems and follow the gist of the “Initial setup for Windows computers”.
Lab Deliverables:
To complete this lab, you must create a
Lab Report file
and submit the file in iLearn. The Lab Report file must be a Microsoft Word format (.docx), and have the filename with the following format:
BLCN532_SECTION_STUDENTID_LASTNAME_FIRSTNAME_Lab01.docx
· SECTION is the section number of your current course (2 digits)
· STUDENTID is your student ID number (with leading zeros)
· LASTNAME is your last name, FIRSTNAME is your first name
To get started, create a Microsoft Word document (.docx) with the correct filename for this lab. You’ll be asked to enter text and paste screenshots into the lab report file.
NOTE: All screenshots MUST be readable. Use the Ubuntu Screen Capture utility (see the lab video.) Make sure that you label each screenshot (i.e. Step 2.1.3) and provide screenshots in order. For commands that produce lots of output, I only want to see the last full screen when the command finishes. Provide FULL screenshots, NOT cropped images.
SECTION 1: Initial setup for Windows computers (Chapter 3)
Step 1.1: Install Oracle Virtualbox (Windows, Linux, MacOS)
Oracle Virtualbox is an open source virtualization environment that allows you to run multiple virtual machines and containers on a single personal computer. Virtualbox is free and it is easy to install.
In your favorite web browser, navigate to:
https://www.virtualbox.org/
and click the “Download Virtualbox” button. Click the “Windows hosts” link to download the main installation executable. You should also click the “All supported platforms” under the “Extension Pack” heading to download extra software supp.
"Docker best practice", Станислав Коленкин (senior devops, DataArt)DataArt
Docker best practice
про Docker, лучшие практики в написании Dockerfile, проблемы большого количества слоев (Layers) в images и подходы по оптимизации Layers в images, функционал multi-stage builds, подходы к безопастности контейнеров и Hosts системе, подходы дебагинга и мониторинга.
iLAB OVERVIEWScenario and SummarySuccessful database recovery re.docxrochellscroop
iLAB OVERVIEW
Scenario and Summary
Successful database recovery relies on the database being backed. This is what enables the database to recover data that were lost due to a media failure, loss of power, or any other type of disaster. Each time the online line redoes logs filled up in a log group, the DBMS issues a log switch that will move the log writer process from the current redo log group to the next one in line. The archive background process begins archiving the data in the full online log group files to the archive log files. This is done simultaneously for each log file in the group. If media recovery is needed at the time that the database needs recovery, then the DBMS will search through the archived log files to find the ones that need to be used.
In Part 1, you will use mysqldump command to dump database, expand tables, and restore database.
In Part 2, you will use MySQL Workbench to back up, expand tables, and restore the database.
Note:
Be sure that you are making screenshots and save in Lab4 Report.
Deliverables
Grading of the lab assignment will be based on the following.
Assignment Step
Description
Points
Part 1: Take Dump/Backup and restore database using command line
Step 1
Taking a backup of the database
5
Step 2
Expand table
5
Step 3
Restore and recover the database
10
Part 2: Backup and Recovery using MySQL Workbench
Step 1
Taking a backup of the database using Export to
Dump Project Folder
5
Step 2
Taking a backup of the database using Export to
self-contained file
5
Step 3
Expand table
5
Step 4
Restore database using Import from
Dump Project Folder
10
Step 5
Expand table
5
Step 6
Restore database using Import from
self-contained file
10
Total iLab Points
60
The Report file should be a single file called yourname_Lab_4.doc to submit to the Dropbox for the Week 4 iLab.
Your report should show any queries, create statements, or other SQL code, along with the resulting return from the database.
iLAB STEPS
Part 1: Take Dump/Backup and Restore Database Using Command Line
Step 1: Taking a Backup of the Database
1.
Go to
MySQL Command line – Unicode
and enter password.
2.
There are several databases here now. To list them, type:
Mysql>show databases;
3.
Identify required database;
You have to make database backup to be used later to restore.
4.
Confirm the location of mysqldump utility on your local machine.
Usually, it is:
C:\Program Files\MySQL\MySQL Server5.6\bin
5.
Go to
Start - Accessories – Point to Command Prompt and
right-click on Run as administrator
(to be able to have all types of access on PC).
6.
Set up location using cd command: type in Command prompt:
C:\user username>cd C:\ and
press Enter
C:\>cd Program Files and
press Enter
C:\\Program Files> cd MySQL and
press Enter.
C:\Program Files\MySQL>cd MySQL Server5.6\ and
press Enter.
C:\Program Files\MySQL\MySQL Server5.6>cd and
press Enter.
7.
Use mysqldump utility.
a)
In Command prompt, type:
Mysqldump –uroot –p databasen.
A closer quick understanding of different backup technologies and pros and cons backup & recovery,ntbackup,types of backups, windows backup path so far, differential backup, incremental backup, full backup, mirror backup. If you have have anyqueries please contact me at jabvtl@gmail.com
Apache Flink Crash Course by Slim Baltagi and Srini PalthepuSlim Baltagi
In this hands-on Apache Flink presentation, you will learn in a step-by-step tutorial style about:
• How to setup and configure your Apache Flink environment: Local/VM image (on a single machine), cluster (standalone), YARN, cloud (Google Compute Engine, Amazon EMR, ... )?
• How to get familiar with Flink tools (Command-Line Interface, Web Client, JobManager Web Interface, Interactive Scala Shell, Zeppelin notebook)?
• How to run some Apache Flink example programs?
• How to get familiar with Flink's APIs and libraries?
• How to write your Apache Flink code in the IDE (IntelliJ IDEA or Eclipse)?
• How to test and debug your Apache Flink code?
• How to deploy your Apache Flink code in local, in a cluster or in the cloud?
• How to tune your Apache Flink application (CPU, Memory, I/O)?
After a brief recap of what p2 is and depicting the overall vision, the presenter will show how this vision is realized and how the improvements made to both the runtime (core and UI) and the tooling in Galileo pave the way for a better provisioning solution at Eclipse.
For more classes visit
www.snaptutorial.com
NTC 324 Assignment Week 1 Individual Installation Storage and Compute with Microsoft Windows Server 2016 Lab Report
NTC 324 Assignment Week 2 Individual Installation Storage and Compute with Microsoft Windows Server 2016 Lab Report
NTC 324 Assignment Week 2 Individual Configure Disks, Volumes, and Server Storage
NTC 324 Assignment Week 3 Individual Installation
For more classes visit
www.snaptutorial.com
NTC 324 Assignment Week 1 Individual Installation Storage and Compute with Microsoft Windows Server 2016 Lab Report
NTC 324 Assignment Week 2 Individual Installation Storage and Compute with Microsoft Windows Server 2016 Lab Report
NTC 324 Assignment Week 2 Individual Configure Disks, Volumes, and Server Storage
NTC 324 Assignment Week 3 Individual Installation Storage and Compute with Microsoft Windows Server 2016 Lab Report
NTC 324 Assignment Week 3 Individual Create Hyper-V® VHD and VHDX Virtual Drives
IBM Index 2018 Conference Workshop: Modernizing Traditional Java App's with D...Eric Smalling
Slides from my 2.5 hour hands-on workshop covering Docker basics, the Docker MTA program and how it applies to legacy Java applications and some tips on running those apps in containers in production.
This is an enterprise plugin for DB2 monitoring. It is able to check the status of an instance connection and report it back to pandora. For more information visit the following webpage: http://pandorafms.com/index.php?sec=Library&sec2=repository&lng=es&action=view_PUI&id_PUI=396
Assignment ContentIn your first meeting, you will have to .docxwilliejgrant41084
Assignment Content
In your first meeting, you will have to present a security overview presentation.
Create
a 10- to 12-slide, multimedia-rich presentation in which you provide:
A definition of cybersecurity and further explain how cybersecurity differs from enterprise security
A timeline of cyber milestones, including graphics and a brief explanation of the milestone
An explanation of why knowing cyber milestones is important for improving security for the organization's current and future environment
A chart presenting 4 strategies that could be used to determine the organization's current security environment, the impact of the strategy, and resources (personnel, finances, etc.)
Your presentation should also include:
Speaker notes
At least 2 references to support the presented facts/etc. Format your citations according to APA guidelines.
Note:
"Multimedia-rich" presentation typically means including several of the following: appropriate charts, graphics, video or audio samples, or images
.
Assignment ContentMany different threats can arise to the .docxwilliejgrant41084
Assignment Content
Many different threats can arise to the confidentiality, integrity, and availability of data-at-rest, data-in-transit, and processing. Some threats may affect only 1 of these security risks (like confidentiality only), and other threats affect more than 1 or even all these risks.
Create
a 1- to 2-page table in Microsoft Word identifying a minimum of 6 threats using the column headers and details below:
Threat
Threat to Type of Data
Confidentiality/Integrity/Availability
Mitigation Suggestion
Within your table:
Identify relevant threats. List 1 per column.
Determine the type of data threatened (data-at-rest, data-in-transit, or processing). Identify the data type in the column.
Determine if confidentiality, integrity, or availability was affected. Use the labels C, I, and/or A in the column.
Describe the mitigation plan in 2 to 3 sentences in the column.
Example:
Threat
: Password Compromise
Threat to Type of Data
: Data-At-Rest
Confidentiality/Integrity/Availability
: C & I
Mitigation
: Employ a strong password that is changed at regular intervals. Do not share your password or write it down on sticky notes on your desk.
Include
a short paragraph that highlights 2 access control techniques or policies that enforce security.
Cite
at least 2 resources to support your assignment.
Format
your assignment according to APA guidelines.
Submit
your assignment.
Resources
Center for Writing Excellence
Reference and Citation Generator
Grammar and Writing Guides
Copyright 2020 by University of Phoenix. All rights reserved.
Use this space to build your submission.
You can add text, images, and files.Add Content
.
More Related Content
Similar to Creating a Scheduled Backup and Replicating System Folders Introduct.docx
"Docker best practice", Станислав Коленкин (senior devops, DataArt)DataArt
Docker best practice
про Docker, лучшие практики в написании Dockerfile, проблемы большого количества слоев (Layers) в images и подходы по оптимизации Layers в images, функционал multi-stage builds, подходы к безопастности контейнеров и Hosts системе, подходы дебагинга и мониторинга.
iLAB OVERVIEWScenario and SummarySuccessful database recovery re.docxrochellscroop
iLAB OVERVIEW
Scenario and Summary
Successful database recovery relies on the database being backed. This is what enables the database to recover data that were lost due to a media failure, loss of power, or any other type of disaster. Each time the online line redoes logs filled up in a log group, the DBMS issues a log switch that will move the log writer process from the current redo log group to the next one in line. The archive background process begins archiving the data in the full online log group files to the archive log files. This is done simultaneously for each log file in the group. If media recovery is needed at the time that the database needs recovery, then the DBMS will search through the archived log files to find the ones that need to be used.
In Part 1, you will use mysqldump command to dump database, expand tables, and restore database.
In Part 2, you will use MySQL Workbench to back up, expand tables, and restore the database.
Note:
Be sure that you are making screenshots and save in Lab4 Report.
Deliverables
Grading of the lab assignment will be based on the following.
Assignment Step
Description
Points
Part 1: Take Dump/Backup and restore database using command line
Step 1
Taking a backup of the database
5
Step 2
Expand table
5
Step 3
Restore and recover the database
10
Part 2: Backup and Recovery using MySQL Workbench
Step 1
Taking a backup of the database using Export to
Dump Project Folder
5
Step 2
Taking a backup of the database using Export to
self-contained file
5
Step 3
Expand table
5
Step 4
Restore database using Import from
Dump Project Folder
10
Step 5
Expand table
5
Step 6
Restore database using Import from
self-contained file
10
Total iLab Points
60
The Report file should be a single file called yourname_Lab_4.doc to submit to the Dropbox for the Week 4 iLab.
Your report should show any queries, create statements, or other SQL code, along with the resulting return from the database.
iLAB STEPS
Part 1: Take Dump/Backup and Restore Database Using Command Line
Step 1: Taking a Backup of the Database
1.
Go to
MySQL Command line – Unicode
and enter password.
2.
There are several databases here now. To list them, type:
Mysql>show databases;
3.
Identify required database;
You have to make database backup to be used later to restore.
4.
Confirm the location of mysqldump utility on your local machine.
Usually, it is:
C:\Program Files\MySQL\MySQL Server5.6\bin
5.
Go to
Start - Accessories – Point to Command Prompt and
right-click on Run as administrator
(to be able to have all types of access on PC).
6.
Set up location using cd command: type in Command prompt:
C:\user username>cd C:\ and
press Enter
C:\>cd Program Files and
press Enter
C:\\Program Files> cd MySQL and
press Enter.
C:\Program Files\MySQL>cd MySQL Server5.6\ and
press Enter.
C:\Program Files\MySQL\MySQL Server5.6>cd and
press Enter.
7.
Use mysqldump utility.
a)
In Command prompt, type:
Mysqldump –uroot –p databasen.
A closer quick understanding of different backup technologies and pros and cons backup & recovery,ntbackup,types of backups, windows backup path so far, differential backup, incremental backup, full backup, mirror backup. If you have have anyqueries please contact me at jabvtl@gmail.com
Apache Flink Crash Course by Slim Baltagi and Srini PalthepuSlim Baltagi
In this hands-on Apache Flink presentation, you will learn in a step-by-step tutorial style about:
• How to setup and configure your Apache Flink environment: Local/VM image (on a single machine), cluster (standalone), YARN, cloud (Google Compute Engine, Amazon EMR, ... )?
• How to get familiar with Flink tools (Command-Line Interface, Web Client, JobManager Web Interface, Interactive Scala Shell, Zeppelin notebook)?
• How to run some Apache Flink example programs?
• How to get familiar with Flink's APIs and libraries?
• How to write your Apache Flink code in the IDE (IntelliJ IDEA or Eclipse)?
• How to test and debug your Apache Flink code?
• How to deploy your Apache Flink code in local, in a cluster or in the cloud?
• How to tune your Apache Flink application (CPU, Memory, I/O)?
After a brief recap of what p2 is and depicting the overall vision, the presenter will show how this vision is realized and how the improvements made to both the runtime (core and UI) and the tooling in Galileo pave the way for a better provisioning solution at Eclipse.
For more classes visit
www.snaptutorial.com
NTC 324 Assignment Week 1 Individual Installation Storage and Compute with Microsoft Windows Server 2016 Lab Report
NTC 324 Assignment Week 2 Individual Installation Storage and Compute with Microsoft Windows Server 2016 Lab Report
NTC 324 Assignment Week 2 Individual Configure Disks, Volumes, and Server Storage
NTC 324 Assignment Week 3 Individual Installation
For more classes visit
www.snaptutorial.com
NTC 324 Assignment Week 1 Individual Installation Storage and Compute with Microsoft Windows Server 2016 Lab Report
NTC 324 Assignment Week 2 Individual Installation Storage and Compute with Microsoft Windows Server 2016 Lab Report
NTC 324 Assignment Week 2 Individual Configure Disks, Volumes, and Server Storage
NTC 324 Assignment Week 3 Individual Installation Storage and Compute with Microsoft Windows Server 2016 Lab Report
NTC 324 Assignment Week 3 Individual Create Hyper-V® VHD and VHDX Virtual Drives
IBM Index 2018 Conference Workshop: Modernizing Traditional Java App's with D...Eric Smalling
Slides from my 2.5 hour hands-on workshop covering Docker basics, the Docker MTA program and how it applies to legacy Java applications and some tips on running those apps in containers in production.
This is an enterprise plugin for DB2 monitoring. It is able to check the status of an instance connection and report it back to pandora. For more information visit the following webpage: http://pandorafms.com/index.php?sec=Library&sec2=repository&lng=es&action=view_PUI&id_PUI=396
Assignment ContentIn your first meeting, you will have to .docxwilliejgrant41084
Assignment Content
In your first meeting, you will have to present a security overview presentation.
Create
a 10- to 12-slide, multimedia-rich presentation in which you provide:
A definition of cybersecurity and further explain how cybersecurity differs from enterprise security
A timeline of cyber milestones, including graphics and a brief explanation of the milestone
An explanation of why knowing cyber milestones is important for improving security for the organization's current and future environment
A chart presenting 4 strategies that could be used to determine the organization's current security environment, the impact of the strategy, and resources (personnel, finances, etc.)
Your presentation should also include:
Speaker notes
At least 2 references to support the presented facts/etc. Format your citations according to APA guidelines.
Note:
"Multimedia-rich" presentation typically means including several of the following: appropriate charts, graphics, video or audio samples, or images
.
Assignment ContentMany different threats can arise to the .docxwilliejgrant41084
Assignment Content
Many different threats can arise to the confidentiality, integrity, and availability of data-at-rest, data-in-transit, and processing. Some threats may affect only 1 of these security risks (like confidentiality only), and other threats affect more than 1 or even all these risks.
Create
a 1- to 2-page table in Microsoft Word identifying a minimum of 6 threats using the column headers and details below:
Threat
Threat to Type of Data
Confidentiality/Integrity/Availability
Mitigation Suggestion
Within your table:
Identify relevant threats. List 1 per column.
Determine the type of data threatened (data-at-rest, data-in-transit, or processing). Identify the data type in the column.
Determine if confidentiality, integrity, or availability was affected. Use the labels C, I, and/or A in the column.
Describe the mitigation plan in 2 to 3 sentences in the column.
Example:
Threat
: Password Compromise
Threat to Type of Data
: Data-At-Rest
Confidentiality/Integrity/Availability
: C & I
Mitigation
: Employ a strong password that is changed at regular intervals. Do not share your password or write it down on sticky notes on your desk.
Include
a short paragraph that highlights 2 access control techniques or policies that enforce security.
Cite
at least 2 resources to support your assignment.
Format
your assignment according to APA guidelines.
Submit
your assignment.
Resources
Center for Writing Excellence
Reference and Citation Generator
Grammar and Writing Guides
Copyright 2020 by University of Phoenix. All rights reserved.
Use this space to build your submission.
You can add text, images, and files.Add Content
.
Assignment ContentMany information security policies cross the.docxwilliejgrant41084
Assignment Content
Many information security policies cross the entire spectrum of an organization.
Module 04, “Network Security Policy Design and Implementation,” of EC Council CND Courseware provides an extensive list of information security policies.
Choose
5 information security policies.
Find
an example of each policy on the Internet. Academic institutions and federal government agencies tend to publish their information security policies that are open to public view.
Write
a 2- to 3-page summary of the policies and examples you found in a Microsoft® Word document. Include the following for each of the policies:
Purpose of the policy
Owner of the policy
Audience of the policy
Co-dependencies with other policies
A link to the policy example
Cite
references to support your assignment.
Format
your citations according to APA guidelines.
.
Assignment ContentMaintaining a healthy work-life balance .docxwilliejgrant41084
Assignment Content
Maintaining a healthy work-life balance contributes greatly to overall satisfaction and general happiness.
Write
a 350- to 700-word reflection on maintaining a healthy balance between having a career and having a personal life. Include the following:
Describe what a healthy work-life balance looks like for you.
Describe how you will know if you are not maintaining a healthy balance.
Outline a plan for re-creating balance once it has been lost.
Include
a minimum of two sources.
.
Assignment ContentIn this section, you will be evaluating .docxwilliejgrant41084
Assignment Content
In this section, you will be evaluating various strategies and making recommendations for the organization.
Develop
a 10-15 PowerPoint presentation strategic evaluation in which you include the following:
Evaluate potential business level strategies for the organization.
Assess potential corporate level strategies for the organization.
Assess potential global strategies for the organization.
Recommend a strategy or combination of strategies the organization should implement, and include a rationale for that recommendation.
Format
your presentation consistent with APA guidelines.
.
Assignment ContentIssues related prejudice, discrimination.docxwilliejgrant41084
Assignment Content
Issues related prejudice, discrimination, and aggression are present in many different aspects of offender behavior and interactions. Sometimes it could be an offender's prejudicial attitude that produces a negative consequence, but it could also be aspects of the criminal justice system that have been ineffectively designed to address these issues. This assignment asks you to analyze the issues that relate to the concepts during offender rehabilitation.
Write
a 1,050- to 1,400-word analysis of the occurrence of prejudice, discrimination, and aggression among offenders while receiving correctional program support services for rehabilitation. Include the following:
Determine possible causes of aggressive behavior in this setting, according to the theories of aggression.
Describe possible effects of prejudice, discrimination, and aggression on offenders and their social relationships.
Describe potential organizational issues that may arise due to prejudice, discrimination, or aggression.
Describe possible methods to prevent issues related to these concepts from recurring.
Include
a minimum of three sources.
Format
your paper according to APA guidelines.
.
Assignment ContentIn your first meeting, you will have to pres.docxwilliejgrant41084
Assignment Content
In your first meeting, you will have to present a security overview presentation.
Create
a 10- to 12-slide, multimedia-rich presentation in which you provide:
A definition of cybersecurity; further explain how cybersecurity differs from enterprise security
A timeline of cyber milestones; including graphics and a brief explanation of the milestone
An explanation of why knowing cyber milestones is important for improving security for the organization's current and future environment
A chart presenting 4 strategies that could be used to determine the organization's current security environment, the impact of the strategy, and resources (personnel, finances, etc.)
Your presentation should also include:
Speaker notes
At least 2 references to support the presented facts/etc. Format your citations according to APA guidelines.
Note:
"Multimedia-rich" presentation typically means including several of the following: appropriate charts, graphics, video or audio samples, or images
Note:
The page assignment length requirement applies to the content of the assignment. Start the assignment with an APA formatted title page and add a reference section with at least two professional references. Use the references in the text of the assignment. Make sure to check the SafeAssign originality score.
.
Assignment ContentIn Week 1, you discussed GIG, Inc.s ben.docxwilliejgrant41084
Assignment Content
In Week 1, you discussed GIG, Inc.'s benefits and concerns with moving to the cloud. Last week, you created a high-level diagram of a system using built-in AWS that provided reliability, availability, and continuity across the migrated environment.
This week,
choose
one of the following database scenarios:
Transactional database (e.g., eCommerce)
Analytic database (query very large datasets)
Internet scale application (serves content and stores both structured or unstructured data)
Create
a diagram in Microsoft® Visio® that applies built-in AWS that visualizes the chosen system and implementation steps.
Create
a 6- to 8-slide presentation that outlines the following:
Overview of AWS database options
The best AWS database service for the chosen scenario
Support the decision with evidence
Outline the key features of the given database
Submit
your diagram and presentation.
.
Assignment ContentIn the health care industry, a variety of st.docxwilliejgrant41084
Assignment Content
In the health care industry, a variety of structures, facilities, and services serve different functions. You must understand what these are and why each is important.
Complete
the
Knowing Your Health Care Functions, Structures, and Facilities
worksheet.
Cite
any references to support your assignment.
Format
your assignment according to APA guidelines.
.
Assignment ContentIn the health care industry, a variety o.docxwilliejgrant41084
Assignment Content
In the health care industry, a variety of structures, facilities, and services serve different functions. You must understand what these are and why each is important.
Complete
the
Knowing Your Health Care Functions, Structures, and Facilities
worksheet.
Cite
any references to support your assignment.
Format
your assignment according to APA guidelines.
.
Assignment ContentIn the workplace, a team manages many p.docxwilliejgrant41084
Assignment Content:
In the workplace, a team manages many projects. As you progress in this class, you will do various tasks that build upon one another to develop your final project. Review the requirements of the Week 6 Government Overview Final Project assignment.
Select San Antonio, Texas for your final project. Use the internet to access the latest annual budget and Comprehensive Annual Financial Report (CAFR). You will also use this for multiple projects throughout the course.
Write a 150-250-word overview of the government, each of our parts with a sources cited page 150 words per topic.
Include the following information in your overview:
· Major industries located in the entity
· Budget calendar
Format your paper consistent with APA guidelines to include, at a minimum, the APA cover page, Introduction, level headers for each required assignment discussion point, Conclusion and Reference page.
.
Assignment ContentImagine that your hospital has recently me.docxwilliejgrant41084
Assignment Content
Imagine
that your hospital has recently merged with a group of clinical centers. As a high-level executive, you and your team have been asked to combine the two cultures.
Create
2 slide voice-over presentation using either Microsoft® PowerPoint® or websites such as Google Slides™, Adobe® Slate, or Prezi.
Identify
the following in your presentation:
The challenges in merging the two cultures
Cite
2 reputable references to support your assignment (e.g., trade or industry publications, government or agency websites, scholarly works, or other sources of similar quality).
.
Assignment ContentImagine you have been working for a health c.docxwilliejgrant41084
Assignment Content
Imagine
you have been working for a health care organization for an extended period of time. It is clear that you have a wealth of information about the accountability and liability that individuals and organizations should be aware of. You have been asked to present to new employees to inform them of the importance of being an accountable individual in a health care organization.
Select
a representative from the health care industry below who will represent the perspective of your presentation:
Physician's front office manager
Convey
the importance of accountability and liability implications for individuals and organizations in the health care industry and in which you:
Evaluate the state statutory and regulatory enactments relative to patient rights and responsibilities. (125+ words)
Evaluate the federal statutory and regulatory enactments relative to patient rights and responsibilities. (125+ words)
Include and identify the introduction, subtitles, and conclusion
APA format
2 or more peer-reviewed references
.
Assignment ContentImagine your Learning Team is the human reso.docxwilliejgrant41084
Assignment Content
Imagine
your Learning Team is the human resources management team at the
Patton-Fuller Community Hospital virtual organization
. The new chief executive officer (CEO) of your hospital has asked your team to prepare a presentation about human resources at the hospital.
Explore the current and future state of human resources in health care. Answer the following questions:
What are some current human resources issues in health care?
What are some future human resources issues in health care?
How may effective human resources management deal with these issues?
Include how Patton-Fuller’s HR mission statement and goals do or do not meet the changing issues and needs.
Include
paragraph sub-headings
Include
introduction, 4-5 body paragraphs, conclusion, and references page.
Include
at least 3 references.
Format
citations according to APA guidelines.
***Please use (PF) as an in-text citation when you pull anything from the document. I will add the correct citation and reference. Thank you.
.
Assignment ContentImagine you have been hired to conduct a s.docxwilliejgrant41084
Assignment Content
Imagine
you have been hired to conduct a social engineering penetration test by a flooring sales and installation company with showrooms, warehouses, and offices throughout the state. Recently, several employees, including the company’s president, fell prey to a phishing scam. The company’s leadership realized they needed to better understand social engineering to better protect the company, the employees, and their customers. The first step is to present a general overview of social engineering and how social engineering threats function in preparation for the social engineering penetration test to the leadership team.
Create
a 10- to 12-slide media-rich presentation with speaker notes providing your client with details on how the social engineering penetration test will be conducted. Include the following information:
Explain
the concept of social engineering and how it can threaten the security of an organization.
Describe
human-, computer-, and mobile-based methods of social engineering.
Explain
differences between social engineering threats from inside and outside an organization.
Identify
tools and techniques used in a social engineering campaign.
Explain
how credentials are captured.
Describe
the target audience and what characteristics will be exploited in your social engineering penetration test.
Format
your references according to APA guidelines.
.
Assignment ContentImagine you are working as a manager in a lo.docxwilliejgrant41084
Assignment Content
Imagine you are working as a manager in a local hospital. You received some patient satisfaction survey data and were asked to review the data and consider the impact on consumer relations.
Review
the
Patient Satisfaction Survey
.
Answer
the prompts provided based on the Patient Satisfaction Survey Data.
Cite
a minimum of one reference to support your assignment.
Format
your assignment according to APA guidelines.
.
Assignment ContentImagine you have just been promoted as.docxwilliejgrant41084
Assignment Content
Imagine
you have just been promoted as the new CIO of your organization. The CEO has asked you to set standards for systems integrity, ethics, and vendor relations for the IT organization.
Complete
the
Standards Matrix
to set standards for systems and people. Include three standards for each of the following:
System integrity
Ethical IT operations
Vendor relations
Include
the following for each standard:
How the standard must be applied
How to ensure the standard is met (how it is measured)
What to do when the standard is not met
How to mitigate against future failures when a standard is not met
Submit
your assignment.
.
Assignment ContentImagine you are the office manager at .docxwilliejgrant41084
Assignment Content
Imagine
you are the office manager at a small doctor’s office. As the office manager, you are in charge of educating new employees.
Write
a 700- to 1,050-word reference guide describing electronic data interchange (EDI). Complete the following in your reference guide:
Define EDI.
Explain how using EDI facilitates electronic transactions.
Explain how HIPAA has changed how health care information is transmitted in EDI.
Describe the relationship between Electronic Health Records, reimbursement, HIPAA, and EDI transactions.
Cite
2 outside sources to support your assignment.
Format
your assignment according to APA guidelines.
Submit
your assignment.
.
Assignment ContentImagine you are asked to design an inf.docxwilliejgrant41084
Assignment Content
Imagine
you are asked to design an informational workshop for parents as part of an early intervention program to reduce the occurrence of juvenile delinquency in the community.
Create
a 10- to 12-slide Microsoft® PowerPoint® presentation that
provides parents with general information to help them understand the role of parenting in protecting their children from delinquent behavior.
Consider
the needs of your audience when creating the presentation.
Include
the following in your presentation:
1. Positive parenting strategies aimed at building protective factors against delinquency
2. Links to local community resources related to parenting
3. An explanation of the family structure (single parent, working moms, absent father, etc.) and how it relates to delinquency
4. An overview of the three common forms of parenting styles as described in Ch. 2 of
Juvenile Delinquency and Antisocial Behavior
and how they relate to delinquency
5. A description of the relationship between conflict within the family, including divorce or breakup of the family unit, and delinquent behavior
6. Detailed speaker notes
7. A minimum of 3 peer-reviewed resources
Format
your presentation consistent with APA guidelines.
.
Assignment ContentImagine you are an IT manager for an org.docxwilliejgrant41084
Assignment Content
Imagine
you are an IT manager for an organization and you are advocating for an update of the organization’s configuration management and change management practices. Write as if to members of the Board of the organization.
Write
a 1- to 2-page change management and configuration management plan to present to the board using a Business writing format (Memo, Analysis, or Proposal). Address the following:
Explain change management practices and the benefits of updating and implementing such practices.
Identify best practices for change management process including policy, procedures, systems changes to hardware and software, and business operations.
Outline a configuration management plan for systems and process changes to the computing environment and business environment.
Business Writing Guides
Note
: Media-rich slides are not required for this assignment, but you are encouraged to include media as appropriate.
Include 2-3 references in APA format.
Format
citations according to APA guidelines.
.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
2024.06.01 Introducing a competency framework for languag learning materials ...
Creating a Scheduled Backup and Replicating System Folders Introduct.docx
1. Creating a Scheduled Backup and Replicating System Folders
Introduction
Disaster recovery (DR) and business continuity (BC) are key
elements in any security program. While not the responsibility
of a security practitioner, DR and BC plans should exist for all
information systems in an organization, and system backups are
traditionally the cornerstone of every disaster recovery plan.
With the advent of virtualization, many organizations are
moving away from traditional server backups and instead
relying on cloning and redundancy for their backup and
recovery needs. Regardless, traditional file and folder backups
still play an important role.
If traditional server backups are used, they should be configured
to meet the needs of defined organizational policies and data
classification standards. In common practice, incremental data
backups occur daily for data stored that day, while complete
system backups may be scheduled weekly. In addition, the
backup strategy for many organizations includes a process for
moving data that has been backed up to an offsite vault for safe
keeping. One popular backup strategy is nicknamed the “son-
father-grandfather” backup strategy, where the “son” is the
daily/nightly backup, the “father” is a weekly backup, and the
“grandfather” is a monthly backup of the system. Often, the
father backup is graduated to grandfather status and is kept off-
site for safekeeping in case of a disaster at the main site.
The Windows Distributed File System (DFS) can be used to
replicate files, folders, and data across many servers
automatically. There are two main types of full server backups:
bare metal and cloning. Bare metal backups allow a server to be
restored on new hardware (or virtual hardware). Clones are
copies of virtual servers that can be kept offline until they are
2. needed.
There are four kinds of data backups:
· Full: Full backups backup all data, even if it has not changed.
· Incremental: Incremental backups backup only changed files.
· Differential: Differential backups backup all files that have
changed since the last full backup.
· Mirror: Mirror backups copy all data from one location to
another redundant location.
In this lab, you will install the Windows Distributed File
System and Windows Server Backup features from the
PowerShell command line. You will schedule a daily backup of
the C:ERPdocuments folder on the TargetWindows01 server
and replicate this backup to the TargetWindows02 server using
the DFS Replication feature.
Lab Overview
Each section of this lab is assigned at your instructor’s
discretion. Please consult your instructor to confirm which
sections you are required to complete for your lab assignment.
SECTION 1 of this lab has three parts, which should be
completed in the order specified.
1. In the first part of the lab, you will install the Distributed
File System (DFS) and configure the network shares required
for data replication.
2. In the second part of the lab, you will use the DFS
Management console to configure DFS to create a mirror backup
of the C:Archive folder on the TargetWindows01 server.
3. 3. In the third part of the lab, you will install Windows Server
Backup on a Windows Server 2019 machine and schedule a
backup of the ERPdocuments folder and its sub-folders.
SECTION 2 of this lab allows you to apply what you learned in
SECTION 1 with less guidance and different deliverables, as
well as some expanded tasks and alternative methods. You will
also use PowerShell commands to configure DFS and create a
script that will back up the specified folders.
Finally, if assigned by your instructor, you will explore the
virtual environment on your own in SECTION 3 of this lab to
answer a set of questions and challenges that allow you to use
the skills you learned in the lab to conduct independent,
unguided work, similar to what you will encounter in a real-
world situation.
Learning Objectives
Upon completing this lab, you will be able to:
1. Install Microsoft’s Distributed File System (DFS) on a
Windows Server 2019 machine
2. Configure DFS to replicate data from a Windows Server 2019
machine
3. Install Windows Server Backup from PowerShell
4. Schedule a backup using Windows Server Backup on a
Windows Server 2019 machine
5. Verify DFS replication on a Windows Server 2019 machine
6. Section 2: Use PowerShell to configure DFS.
7. Section 2: Schedule a backup using a robocopy script.
Topology
This lab contains the following virtual machines. Please refer to
the network topology diagram below.
· TargetWindows01 (Windows Server 2019) [Domain
4. Controller]
· TargetWindows02 (Windows Server 2019)
Tools and Software
The following software and/or utilities are required to complete
this lab. Students are encouraged to explore the Internet to learn
more about the products and tools used in this lab.
· Windows Distributed File System (DFS)
· Windows PowerShell
· Windows Server Backup
Deliverables
Upon completion of this lab, you are required to provide the
following deliverables to your instructor:
SECTION 1:
1. Lab Report file including screen captures of the following;
· successful DFS and net share commands on TargetWindows01;
· successful DFS and net share commands on TargetWindows02;
· Review Settings and Create Namespace page;
· Confirmation page;
· Namespace entries;
· successful backup schedule on the Summary page;
· contents of the backup folder on TargetWindows01;
· contents of the backup folder on TargetWindows02;
2. Any additional information as directed by the lab:
· none;
5. SECTION 2:
1. Lab Report file including screen captures of the following:
· net share results on TargetWindows01;
· net share results on TargetWindows02;
· new namespace in the DFS Management console;
· completed Robocopy script;
· contents of the Section2 folder on the TargetWindows01
server;
· contents of the Section2 folder on the TargetWindows02
server;
2. Any additional information as directed by the lab:
· none.
SECTION 3:
1. Analysis and Discussion
2. Tools and Commands
3. Challenge Exercise
Section 1: Hands-On Demonstration
Part 1: Install Windows DFS and Create Network Shares
6. 13. Make a screen capture showing the successful DFS and net
share commands on TargetWindows01 and paste it into the Lab
Report file.
19. Make a screen capture showing the successful DFS and net
share commands on TargetWindows02 and paste it into the Lab
Report file.
Part 2: Configure DFS
8. Make a screen capture showing the Review Settings and
Create Namespace page and paste it into your Lab Report file.
26. Make a screen capture showing the Confirmation page and
paste it into your Lab Report file.
29. Make a screen capture showing the Namespace entries and
paste it into the Lab Report file.
Part 3: Install and Configure Windows System Backup
18. Make a screen capture showing the successful backup
schedule on the Summary page and
paste it into the Lab Report file.
28. Make a screen capture showing the contents of the backup
folder on TargetWindows01 and
paste this into your Lab Report file.
7. 33. Make a screen capture showing the contents of the backup
folder on TargetWindows02 and
paste this into your Lab Report file.
Section 2: Applied Learning
Part 1: Install Windows DFS and Create Network Shares
8. Make a screen capture showing the net share results on
TargetWindows01 and paste it into the Lab Report file.
13. Make a screen capture showing the net share results on
TargetWindows01 and paste it into the Lab Report file.
Part 2: Configure DFS
12. Make a screen capture showing the new namespace in the
DFS Management console and
paste it into your Lab Report.
Part 3: Create and Execute a Robocopy Script
9. Make a screen capture showing the completed Robocopy
script and paste it into your Lab Report file.
16. Make a screen capture showing the contents of the Section2
folder on the TargetWindows01 server and paste it into your
Lab Report file.
8. 19. Make a screen capture showing the contents of the Section2
folder on the TargetWindows02 server and paste it into your
Lab Report file.
Section 3: Challenge and Analysis
Note: The following challenge questions are provided to allow
independent, unguided work, similar to what you will encounter
in a real situation. You should aim to improve your skills by
getting the correct answer in as few steps as possible. Use
screen captures in your lab document where possible to
illustrate your answers.
Part 1: Analysis and Discussion
In Section 2 of this lab, you used Robocopy in the script to copy
files from one remote machine to another. Robocopy was
selected because it is native to Windows and is a robust tool
with a variety of switches for customizing the command line.
Use the Internet to research an alternative to Robocopy that
could be used in the script. Explain your choice.
Answers will be unique to each student. Alternative products
can be found by searching for “Robocopy alternatives”. Not all
alternatives will be able to match the robust options.
Part 2: Tools and Commands
Use the Internet to research Robocopy switches and then
construct a command line that will use Robocopy to copy files
in restart mode from a source to a destination mirroring the
folder structure and using FAT file times. The command should
retry the copy in case of a failed attempt.
robocopy sourcedrive:path destinationdrive:path /MIR /FFT
/R:3 /W:10 /Z
Part 3: Challenge Exercise
Use the Internet to research the alternative product you
9. identified in the Analysis and Discussion question and then
construct a command that would replace the Robocopy
command in the script used in Section 2 of this lab.
Hardening Windows Systems for Security Compliance
Introduction
Hardening a computer is the process of identifying as many of
its vulnerabilities as possible and implementing
countermeasures to those vulnerabilities. Countermeasures to
vulnerabilities can take on many different forms. Some
countermeasures are technical controls that protect a vulnerable
asset, while other countermeasures simply remove the
vulnerability.
Windows Server operating systems install various default
features that could increase the computer’s attack surface. One
of the first steps in hardening any Windows computer is to
consider what its purpose will be and then only install the
minimum features and services that it needs to carry out its
purpose. However, you can’t always install the minimum
features. In some cases, you’ll need to circle back after
installation and disable or remove items that were added during
installation. Fortunately, Microsoft publishes online
documentation that provides guidance to security administrators
on potentially unneeded services and helps reduce the attack
surface of Windows computers. You can use this documentation
to determine if any services present on a Windows computer
should be disabled or removed.
Security administrators will also need to harden the servers
using Windows Firewall to eliminate other network access
methods. The Windows Firewall with Advanced Security
configuration option allows more granular control over inbound
and outbound traffic based on ports, programs, IP addresses,
computers, users, and more.
In this lab, you will examine the installed roles and services of
a Windows Server 2016 computer and identify features that you
really don’t need. You’ll remove an entire role, which includes
multiple services, and then disable additional services to harden
10. your server. You will then use the built-in Windows Firewall to
prevent unauthorized access to the server.
Lab Overview
Each section of this lab is assigned at your instructor’s
discretion. Please consult your instructor to confirm which
sections you are required to complete for your lab assignment.
SECTION 1 of this lab has three parts, which should be
completed in the order specified.
1. In the first part of the lab, you will manually harden the
security posture of a Windows Server 2016 machine by
removing an unnecessary server role.
2. In the second part of the lab, you will manually harden the
security on a Windows Server 2016 machine by disabling
unnecessary services.
3. In the last part of the lab, you will manually harden the
security on a Windows Server 2016 machine by changing the
internal firewall configuration.
SECTION 2 of this lab allows you to apply what you learned in
SECTION 1 with less guidance and different deliverables, as
well as some expanded tasks and alternative methods. You will
import a security baseline GPO from the Security Compliance
Toolkit, reset the DSRM password on TargetWindows01, and
use the Windows Defender Firewall with Advanced Security to
edit Inbound Rules.
Finally, you will explore the virtual environment on your own
in SECTION 3 of this lab. You will answer questions and
complete challenges that allow you to use the skills you learned
in the lab to conduct independent, unguided work, similar to
what you will encounter in a real-world situation.
Learning Objectives
Upon completing this lab, you will be able to:
1. Define system hardening as it applies to securing Windows
11. Server Operating Systems
2. Harden Windows Server 2016 by using the Windows Security
Manager to remove roles
3. Harden Windows Server 2016 by stopping and disabling
services to optimize performance and security
4. Harden Windows Server 2016 by activating the Windows
Firewall
5. Section 2: Harden Windows Server 2019 by using security
baselines to create new Group Policy Objects
6. Section 2: Harden a Domain Controller by updating the
DSRM password
7. Section 2: Harden Windows Server 2019 by editing inbound
rules in the Windows Defender Firewall
Topology
This lab contains the following virtual machines. Please refer to
the network topology diagram below.
· TargetWindows01 (Windows Server 2019) [Domain
Controller]
· TargetWindows04 (Windows Server 2016)
Tools and Software
The following software is required to complete this lab.
Students are encouraged to explore the Internet to learn more
about the products and tools used in this lab.
· Security Compliance Toolkit (SKT)
· Group Policy Management Console (GPMC)
· Ntdsutil
· Windows Firewall
· Windows Defender Firewall with Advanced Security
Deliverables
Upon completion of this lab, you are required to provide the
following deliverables to your instructor:
12. SECTION 1:
1. Lab Report file including screen captures of the following;
· current Roles and Server Groups;
· updated Roles and Server Groups;
· disabled DHCP Server service;
· results of the first ping test on TargetWindows01;
· enabled Windows Firewall for all three profiles;
· results of the second ping test on TargetWindows01;
2. Any additional information as directed by the lab:
· describe how the firewall changes affected the results.
SECTION 2:
1. Lab Report file including screen captures of the following:
· Microsoft's recommended Password and Account Lockout
policy settings;
· linked MSDomainSecurity2019 object;
· implemented Password and Account Lockout policy settings;
· successful DSRM password change;
· results of the first ping test on TargetWindows04;
· results of the second ping test on TargetWindows04;
2. Any additional information as directed by the lab:
13. · discuss how the firewall changes affected the results.
SECTION 3:
1. Analysis and Discussion
2. Tools and Commands
3. Challenge Exercise
Section 1: Hands-On Demonstration
Part 1: Remove Unnecessary Server Roles
5. Make a screen capture showing the current Roles and Server
Groups and paste it into your Lab Report file.
17. Make a screen capture showing the updated Roles and
Server Groups and paste it into your Lab Report file.
Part 2: Remove Unnecessary Services
8. Make a screen capture showing the disabled DHCP Server
service and paste it into your Lab Report file.
Part 3: Secure the Windows Firewall
4. Make a screen capture showing the results of the first ping
test on TargetWindows01 and
paste it into the Lab Report file.
14. 15. Make a screen capture showing the enabled Windows
Firewall for all three profiles and paste
it into the Lab Report file.
19. Make a screen capture showing the results of the second
Ping test and paste it into the Lab Report file.
20. In the Lab Report file, describe how the firewall changes
affected the results. Below is an example; Answer may vary by
student.
The ping is no longer successful since because the firewall is
blocking ping responses from the target. Since the default
configuration blocks all incoming connections unless explicitly
allowed, we’d have to create a rule that allows ICMP pings to
get successful responses again.
Section 2: Applied Learning
Part 1: Apply Windows Security Baselines
5. Make a screen capture showing Microsoft's recommended
Password and Account Lockout policy settings and paste it into
your Lab Report file.
18. Make a screen capture showing the linked
MSDomainSecurity2019 object and paste it into your Lab
Report file.
15. 22. Make a screen capture showing the implemented Password
and Account Lockout policy settings and paste it into your Lab
Report file.
Part 2: Reset the DSRM Password
7. Make a screen capture showing the successful DSRM
password change and paste it into your Lab Report file
Part 3: Secure the Windows Defender Firewall
3. Make a screen capture showing the results of the first ping
test on TargetWindows04 and
paste it into your Lab Report file.
16. Make a screen capture showing the results of the second
ping test on TargetWindows04 and
paste it into your Lab Report file.
17. In the Lab Report file, describe how the firewall changes
affected the results. Below is an example; Answer may vary by
student.
After disabling all ICMPv4 traffic – ICMP echo requests (pings)
included -- the TW04 machines is unable to penetrate the
firewall we’ve erected on TW01.
Section 3: Lab Challenge and Analysis
Note: The following challenge questions are provided to allow
independent, unguided work, similar to what you will encounter
in a real situation. You should aim to improve your skills by
getting the correct answer in as few steps as possible. Use
16. screen captures in your lab document where possible to
illustrate your answers.
Part 1: Analysis and Discussion
Why would disabling services be important in securing and
optimizing server performance? What determines which services
are disabled?
Below is an example; Answer may vary by student.
Disabling unnecessary services decreases the attack surface area
of a server. Any services exposed to the network increase the
server’s vulnerability, so disabling would make them mostly
unavailable to be used by a bad actor as vector for entry. And
by disabling unnecessary services, you free up memory and
computing resources from the server, which naturally increases
performance.
Services are disabled and enabled depending on the programs
you install which require them. It’s up to you which services
remain enabled, and some are easier to determine the value and
consequences of than others (not acting as a DHCP server?
Disable DHCP on that server). However, Microsoft also
provides guidelines for which services it recommends disabling.
Starting in Win2019, these guidelines are applied by default.
Part 2: Tools and Commands
Use the Internet to research a command line statement that will
add a new Inbound rule for the Windows Defender Firewall with
Advanced Security that will allow all traffic from TCP port
8088 on all security profiles. Name the new rule “yourname port
8088”, replacing yourname with your own name. Make a screen
capture of your executed command line statement.
Below is an example; Answer may vary by student.
Part 3: Challenge Exercise
In the Windows Firewall with Advanced Security, create a new
Outbound rule to deny HTTP/HTTPS traffic on the
TargetWindows01 server. Apply the changes and use screen
17. captures to document your changes and the result of the rule in
the browser window.
-/i New Outbound Rule Wizard X
Action
Specify the action to be taken when a connection matches the
conditions specified in the rule.
Sleps:
· Rule Type
· Protocol andPorts
· Action
· Profile
· Name
What action should be taken when a connection matches the
specified conditions?
0 Allow lhe conneclion
This includes connections that are protected withIPsec as well
as those are not.
0 Allow the onnection if it is secure
This includes only connections that have been authenticated by
usingIPsec. Connections willbe secured using the settings in
IPsec properties andrules in the Connection Security Rule node.
@ Bloc.!; lhe conneclion
19. fl New Outbound Rule Wizard X
Name
Specif}' the name and description of this rule.
Steps:
Rule T}'pe
· Protocol and Ports
· Action Profile Name
!:lame:
IDen}' HTTP/HTTPS
Qescription (optional):
Denies the usual ports used b}' HTTP/HTTPS (80
an
443)
21. □ X
ti Window5 Defender Fircw II wit l
Outbound Rules
,= = = = = = = = = = = = = =
Name
0 Deny HTTP/HTTPS
S @{Micro,oft.AAD.BrokerPlugin_1000.143...
S @{Microsoft.AAD.BrokerPlugin_1000.143...
D @{Microsoft.AccountsControl_10.0.1439,,,
=
= = = = = = = = =
Group
@{Microsoft.AAD,BrokerPlu,,,
@{Microsoft.AAD,BrokerPlu.,,
@{Microsoft.AccountsContr...
= =
Profile
All All All
All
=
= = =
Enabled
Yes Yes Yes
22. Yes
=
=
A "
B A A
A
Actions
t=O auatbaoa.u. anaadaaRu.aale,aaaa========-
New Rule...
V Filter by Profile
V Filter by St t c
El Inbound Rule5 1
Outbound Rules
! Connection Security Rub
23. ) _ Monitoring
And the result of this rule, after its application, is that I am now
unable to reach the IIS homepage on TW04 from TW01, which
IS reachable without the rule (screenshot below).