Create a final portfolio focused on a particular position in your career field. Your final project will include an ATS Resume with a cover letter, an audio or video submission of your elevator pitch, as well as a screenshot of your professional email signature. Include the following four (4) sections in your final portfolio: 1. ATS Resumé: Instructions: Include the following in your ATS resumé: • Your current contact information • Job objective/summary • Educational history • Experience:

 Overview: Create a final portfolio focused on a particular position in your career field. Your final project will include an ATS Resume with a cover letter, an audio or video submission of your elevator pitch, as well as a screenshot of your professional email signature. Include the following four (4) sections in your final portfolio: 1. ATS Resumé: Instructions: Include the following in your ATS resumé: • Your current contact information • Job objective/summary • Educational history • Experience: Employment, volunteer experience, and extracurricular experience, if applicable • Special skills: Occupation-specific and transferable skills that relate to the position • Awards and achievements Requirements: • Include the job description with your resumé submission. Use only information relevant to the position in your resumé. • Resumé should be free of any images, designs, charts, tables, and be wellstructured, clear, and concise. • Include core industry keywords and a significant number of keywords from the job description. • Be sure the resumé is easy to understand, and all abbreviations spelled out. • Submit your resume in Word format. 2. Cover Letter: Instructions: Your cover letter should include the following components: • The first paragraph should indicate the position you’re interested in applying for and CTC301 – Professional Success Seminar Unit 8 Final Portfolio – ATS Resumé, Cover Letter, Elevator Pitch, and Email Signature how you learned about the position. If a network contact knows people at the company to which you’re applying, consider mentioning that person’s name and your connection. • The next paragraph or two should explain why you’re suited for the job. If you have experience or qualifications of particular value to the employer, call them out clearly. If you have little experience but a solid education, mention it and any special awards that may interest an employer. • Conclude your cover letter. The final paragraph should express your interest in the position and thank the person for their time. Requirements: • Be sure your letter is targeted, concise, structured, and specific to the job position. • Include all of the required components, as listed above. • Be sure your tone and vocabulary are professional and use clear and error-free writing and grammar. 3. Elevator Pitch: Instructions: • Introduce yourself with your first and last name at the start of the pitch. • Include three (3) keywords. Consider the following as you choose your keywords: o Your career goal o The key knowledge, skills, abilities, and other relevant information that sets you apart as the best fit for a particular job/career (Refer to your resume for this information.) • For each of your keywords, include relevant details and a very brief example that demonstrates how the keyword applies to you. The example can be from your current work, a prior job, a college course, a volunteer activity, or even a family responsibility. • Include other key knowledge, skills, abilities, and relevant information that sets you apart as the best fit for a particular job/career (Refer to your resume for this information.) • At the end of the pitch, thank the other person. You may want to ask the other person a question, such as, “May I send you my resume?” Business cards may be exchanged. Requirements: • Audio or video format required. • The tone should be conversational. • The pitch should be approximately 30 seconds in length. 4. Email Signature: Your email signature tells the world who you are, what brand you represent, what role you play, your contact information, and the links to your social media. Instructions: Include the following elements into your email signature: • Full name • College and year of graduation • High-quality picture (in high-quality) • Direct phone number • Website and/or social network sites Requirements: • Submit a screenshot of your email signature with your portfolio. 
 ATS resumé includes only information relevant to the position. 
 ATS resumé format is free of any images, designs, charts, and tables. It is well structured, clear, and concise. 
 ATS resumé contains core industry keywords and a significant number of keywords from the job description. 
 Job description is included with the submission. 
The job that i am going for which should be shown as the job im applying to is a cyber security analyst 
*I included an old resume for you to take some information off of.

A group of researchers conducted an experiment to determine which vaccine is more effective for preventing getting the flu. They tested two different types of vaccines: a shot and a nasal spray. To test the effectiveness, 1000 participants were randomly selected with 500 people getting the shot and 500 the nasal spray. Of the 500 people were treated with the shot, 80 developed the flu and 420 did not. Of the people who were treated with the nasal spray, 120 people developed the flu and 380 did not. The level of significance was set at .05. The proportion of people who were treated with the shot who developed the flu = .16, and the proportion of the people who were treated with the nasal spray was .24. The calculated p value = .0008. For this essay, describe the statistical approaches (e.g., identify the hypotheses and research methods) used in this excerpt from a research study.  Interpret the statistical results and examine the limitations of the statistical methods.  Finally, evaluate the research study as a whole and apply what you have learned about hypothesis testing and inferential statistics by discussing how you might conduct a follow-up study. Your essay must address the following points: Describe the research question for this experiment. What were the null and alternative hypotheses? Were the results of this test statistically significant? If so, why were they significant?

Essay 1A group of researchers conducted an experiment to determine which vaccine is more effective for preventing getting the flu. They tested two different types of vaccines: a shot and a nasal spray. To test the effectiveness, 1000 participants were randomly selected with 500 people getting the shot and 500 the nasal spray. Of the 500 people were treated with the shot, 80 developed the flu and 420 did not. Of the people who were treated with the nasal spray, 120 people developed the flu and 380 did not. The level of significance was set at .05. The proportion of people who were treated with the shot who developed the flu = .16, and the proportion of the people who were treated with the nasal spray was .24. The calculated p value = .0008.
For this essay, describe the statistical approaches (e.g., identify the hypotheses and research methods) used in this excerpt from a research study.  Interpret the statistical results and examine the limitations of the statistical methods.  Finally, evaluate the research study as a whole and apply what you have learned about hypothesis testing and inferential statistics by discussing how you might conduct a follow-up study.
Your essay must address the following points:

Describe the research question for this experiment.

What were the null and alternative hypotheses?
Were the results of this test statistically significant?
If so, why were they significant?

Would the researchers reject or fail to reject the null hypothesis?
Do the results provide sufficient evidence to support the alternative hypothesis?
Was the sample appropriate for this study?  Explain your answer.
What are some possible limitations to this study?
Discuss how you would conduct a follow up study to this one. Explain your answer.
Describe the difference between practical and statistical significance.

Essay 2A researcher has investigated the relationship between IQ and grade point average (GPA) and found the correlation to be .75.
For this essay, critique the results and interpretation of a correlational study.

Evaluate the correlational result and identify the strength of the correlation.
Examine the assumptions and limitations of the possible connection between the researcher’s chosen variables. 
 Identify and describe other statistical tests that could be used to study this relationship.

Your essay response must address the following questions:

How strong is this correlation?

Is this a positive or negative correlation?
What does this correlation mean?

Does this correlation imply that individuals with high Intelligence Quotients (IQ) have high Grade Point Averages (GPA)? 
 Does this correlation provide evidence that high IQ causes GPA to go higher?

What other variables might be influencing this relationship?

What is the connection between correlation and causation?
What are some of the factors that affect the size of this correlation?
Is correlation a good test for predicting GPA? 

 If not, what statistical tests should a researcher use, and why?

Essay 3A researcher has recorded the reaction times of 20 individuals on a memory assessment. The following table indicates the individual times:

 2.2

 4.7

 7.3

 4.1

 9.5

 15.2

 4.3

 9.5

 2.7

 3.1

 9.2

 2.9

 8.2

 7.6

 3.5

 2.5

 9.3

 4.8

 8.5

 8.1

 

In this essay, demonstrate your ability to organize data into meaningful sets, calculate basic descriptive statistics, interpret the results, and evaluate the effects of outliers and changes in the variables.  You may use Excel, one of the many free online descriptive statistics calculators, or calculate the values by hand and/or with a calculator. 
Next, separate the data into two groups of 10; one group will be the lower reaction times, and the second group will be the higher reaction times.  Then, address the following points in your essay response:

Calculate the sum, mean, mode, median, standard deviation, range, skew, and kurtosis for each group.
How do the two groups differ? 
 Are there any outliers in either data group?
What effect does an outlier have on a sample?

Lastly, double each sample by repeating the same 10 data points in each group.  You will have a total of 20 data points for each group. After completing this, address the following in your essay response:

Calculate the following for the new data groups: sum, mean, mode, median, standard deviation, range, skew, and kurtosis.
Did any of the values change?
How does sample size affect those values?

Part B: Research Study CritiqueIn this second portion of the Final Exam, you will identify and critically evaluate a quantitative research article based on a social science topic.  Your selected article must include a research question(s) and/or hypothesis(es) and utilize statistical analyses covered in the course. The article must be peer-reviewed and published within the last 10 years.
In the body of your critique, describe the statistical approaches used, the variables included, the hypothesis(es) proposed, and the interpretation of the results.   In your conclusion, suggest other statistical approaches that could have been used and, if appropriate, suggest alternative interpretations of the results.  This process will allow you to apply the concepts learned throughout the course in the interpretation of actual scientific research. Your critique must include the following sections:

Introduction: This section will include a general introduction of the quantitative study from a peer-reviewed source published within the last 10 years.  The research questions and/or hypothesis(es) as well as the purpose of the study should be clearly defined.
Methods: Describe and evaluate the procedures and methods of data collection, measures/instruments used, the participants and how they were selected, and the statistical techniques used.
Results: In this section describe and critique the results presented in the study.
Discussion: Discuss and evaluate the efficacy of the results presented in the study.  Address, the strengths, weaknesses, and limitations of the study, and suggest future research directions.  Include additional forms of statistical analyses as part of the suggestions for future research.

The Research Study Critique:

Must be three to four double-spaced pages in length (excluding title and reference pages) and formatted according to APA style as outlined in the Ashford Writing Center.  Use 12-point font, with 1-inch margins.  
Must use the sections and headings described above. 
 Must address the article with critical thought by examining, reflecting, and evaluating the article from an objective viewpoint and by using facts to support your argument. Refer to the Critical Thinking Community website for further assistance.
Must end with a conclusion that summarizes your critical evaluation.
Must use one quantitative research study from a peer-reviewed source that was published within the last 10 years.
Must properly cite the source article in APA style as outlined in the Ashford Writing Center.
Must include a separate reference page, formatted according to APA style as outlined in the Ashford Writing Center. 

Define physical evidence.  You may use a number of resources to research the methods and significance of evidence in this scenario.  Consider using articles form juried forensic publications, information from the AIU library, or textbooks from this or other classes you might have had.  Identify the evidence you found and what evidence might still be available. Include proper handling and packaging techniques for your evidence.  Explain the importance of expert testimony and the report writing that would be involved.  Explain the role the forensic scientist in the laboratory will have with your submitted evidence, and explain the techniques the forensic scientist will use to process your evidence.

Assignment Details
When preparing for a crime scene reconstruction consideration must be made concerning the types of evidence you are using to come to the conclusion that you are basing the reconstruction on. Real evidence for physical evidence is the best source of producing a reconstruction. The relevance of the physical evidence must be established. For example, it a shooting reconstruction was done based on a ricochet off a wall that struck the victim the angle of impact from the wall where the bullet initially impacted and struck the victim will allow you to determine the line where the shooter stood when he or she fired and hit the wall. The problem is if the line is unobstructed evidence must be located that helps establish where the shoot was when he or she fired.  On that line stemming from the wall a cartridge casing will be significant. Shoe impression along the line may be from the shooter or it may be anyone who happened to walk there before or after the shooting took place. So the cartridge casing is likely to be ejected from the shooters weapon and give the reconstruction team an idea of where the shooter was when he or she fired. The footwear impression may or may not be that of the shooter so it is circumstantial even though it is a physical artifact and should be collected.
Crime scene reconstruction can be done by setting the scene up with personnel playing the roles of suspect, victim, and witnesses.  It can also be done by placing crime scene dummies in locations for the same people.  The more modern method is using a LASER scanner that videos, charts, and measures the entire scene and be used to reconstruct the scene in a white room. 
Scenario: Tim and Rhonda just got engaged. They are having a small gathering to celebrate at a local restaurant called the Dew Drop Inn. Rhonda had finally gotten her divorce from James who had been very abusive both physically and emotionally. They have no children. Dinner was finishing up about 8:00 PM and the party was moving into the bar. Out of the blue, James showed up at the restaurant bar and accused Tim of being the reason that Rhonda divorced him (James).
A fist fight broke out when James tried to grab Rhonda and Tim interceded. James grabbed a beer bottle and smashed Tim in the head. Tim pulled out a compact pistol and placed it directly against James’ chest and shot James dead with a single bullet through the heart. Tim grabbed Rhonda and ran from the restaurant, where they jumped into his 2014 Red Honda Civic and drove to Rhonda’s apartment where they both lived. 
The police went to the apartment where Rhonda and Tim lived and noted the Red Honda Civic was parked in front of the apartment. A search warrant for seizing the car and searching Rhonda and Tim’s apartment was obtained. James was found to be out on parole for a burglary in which he had served two years in prison. Rhonda was home but Tim was not. Rhonda told the police that she had been receiving threatening emails form James, her ex-husband who was threatening to kill her, Tim, and then himself. She had saved the emails on her Tablet.  The search revealed a men’s white dress shirt in the hamper covered with what appeared to be high velocity blood spatter consistent with gunshot blowback.  A box of 9mm cartridges with ten rounds missing was found in the dresser of the night stand. An empty pistol box for a 9mm Glock model 26 compact pistol was found next to the ammunition.  
Research the following points, and write a 4–6-page paper fully explaining each point:

Define physical evidence. 
You may use a number of resources to research the methods and significance of evidence in this scenario.  Consider using articles form juried forensic publications, information from the AIU library, or textbooks from this or other classes you might have had.  Identify the evidence you found and what evidence might still be available. Include proper handling and packaging techniques for your evidence. 
Explain the importance of expert testimony and the report writing that would be involved. 
Explain the role the forensic scientist in the laboratory will have with your submitted evidence, and explain the techniques the forensic scientist will use to process your evidence.

discuss how three D printers or any different types of artificial intelligence can be utilized in construction, medicine or any other field.

Our Analytical Report
Each student is expected to take the role of a consultant in his/her field of science.
Students are expected to focus on finding solutions for major technical problems. These solutions can present new trends in technology and science. For example, you can discuss how three D printers or any different types of artificial intelligence can be utilized in construction, medicine or any other field. A school for the blind might want advice on how they can utilize IT to facilitate communication amongst the blind and between the blind and the rest of society. A semiconductor manufacturer might have CPU overheating problems and want research-based professional advice on how to solve this problem. Examples abound!
The report must be scholarly and original. The student must demonstrate sound understanding of the format of a technical report, knowledge of purpose and audience, fluency of linguistic expression, and good technical know-how.
Any delay in the submission of tasks or failure to follow up on teacher’s feedback will result in the loss of points.
All submissions must have a title and date stated on the cover page.
Students are expected to email me their topics by Thursday 14/09/2023, submit a copy of their first draft via Safe Assign no later than Thursday 12/10/2023. Students are also requested to submit their final draft on Tuesday 14/11/2023(via SafeAssign)
For your paper:
Font: Times New Roman
Spacing: Double space ALL YOUR PAGES
Margins: DO NOT CHANGE the margins in Word. Keep the margins standard and identical on ALL PAGES of your project
Font Size: 12
Word Count: Your project will be 500 words for each student. For Example, a group of three would write 1500 words.
The Front Matter
Page 1: Cover page
This page contains
– The title of your project
– Your name and the names of your group members
– University name
Please follow the same order.
Page 1: Cover page in APA
Create a special running head for this page.
Running head ( title in all capital letters + page number ( left hand side)
Page 2: The table of contents (Centered, not bolded)
Running head appears only as the title all in capital + page number (left hand side corner) just as in the rest of the research paper.
Page 3: List of figures and graphs (optional) (Centered, not bolded)
This page follows the same format as the table of contents. However, it does not include the subheadings in your paper. It rather includes the list of tables and graphs in your report and the corresponding page on which they can be found.
Page 4: Abstract (Centered, not bolded). Do Not Indent)
An abstract is a one paragraph made up of a couple of sentences copied and pasted from each section of your technical report.
Use the same language and the same organization as your technical report
Make sure the abstract is BRIEF. If you write more than half a page, it means you wrote too much.
The Report Proper :
These sections will contain the actual write up of your research findings. Here are some important tips
Introduction: (Centered, not bolded)
Center your title on the page; don’t use boldface type or underlining with the title. In APA papers, the title usually replaces the heading “Introduction”. In the introduction, cover the following sections.
Move 1: Define the subject and mention your research question
Move 2: State the purpose
Move 3: State the main point
Move 4: Stress the importance
Move 5: Offer background information
Move 6: Forecast the organization
2.Literature Review (Optional): Centered, boldface
3.Methodology: Centered, boldface
Mention the types of sources you used.
4.Results and discussion of results: Centered, boldface
Summarize the results of the study
Make an obvious transition
Opening – summarize major results
Devote at least one paragraph to each of the major results.
5.Conclusion and Recommendations: Centered, boldface
State the recommendations
Re-emphasize importance of study
Create an action plan
Look to the future
6.The End Matter
References: Centered, not bolded
General Guidelines
Makesure to use IN TEXT citations
Makesure to include ONE GRAPH at least on each page and not more.
Make sure to use information from a variety of sources (notless than 3).
Remember the following sections are not headings, and that is why we do not use boldface
Abstract
Introduction
References
Appendix
Submission Content
(Topic) role of analytical CRM tools in digital marketing

Global Warming: The Catastrophic Effects of Three Degrees of Warming Three degrees of global warming would be catastrophic, but the world is well on its way there. Since the industrial revolution, the earth has warmed between 1.1 and 1.3 degrees Celsius. Children born today are up to seven times more likely to face extreme weather than their grandparents. If global temperatures do rise by three degrees, what would the world look like?

The Economist
Global Warming: The Catastrophic Effects of Three Degrees of Warming
Three degrees of global warming would be catastrophic, but the world is well on its way there. Since the industrial revolution, the earth has warmed between 1.1 and 1.3 degrees Celsius. Children born today are up to seven times more likely to face extreme weather than their grandparents. If global temperatures do rise by three degrees, what would the world look like?
Effects of Three Degrees of Warming
Rising sea levels
Desertification
Increased storm surges
More frequent droughts
Increased flooding
Climate migration
Climate scientist Yuri Rogel has spent the last 10 years modeling future climate scenarios for the United Nations. There is still a 1 in 4 chance that, under current policies, we would hit three degrees by the end of the century. This is just one of the scenarios Yuri looks at. Another one imagined that all policy promises are kept. The most optimistic assumes that all promises have been kept and net zero targets are met, where our best estimate ends up around 2 degrees at the end.
In some parts of the world, the effects of inaction are already clear. The slums of climate migrants are moving to Bangladesh’s capital and are filling up with climate migrants. In many parts of Australia, New York City, and the United States, people are becoming increasingly concerned about climate migrants. Smallholders and small-scale farmers around the world are particularly vulnerable to climate change, and there are over 600 million of them around the world. Smallholders with farms under two hectares produce around a third of the global food supply.
The Village of Toguru
In Fiji, rising waters are already upending lives due to this rising sea level and climate change. The village of Toguru in Fiji is being swallowed by the sea. The villages of Togarwar and Togarai have seen over half the village disappear. If we do not have the sea wall, then it will keep eroding, and time will come when the world will be only roads. The rising waters have been swallowed by rising waters. In fact, it is becoming more and more. The world is at risk of losing entire villages and small communities due to rising sea levels and climate change.
The Threat of High Wet Bulb Temperatures
The average daytime temperature has crept up by nearly half a degree in the last 20 years. High so-called wet bulb temperatures are on the rise. A high wet bulb temperature is a measure of heat and humidity. Humans cool themselves by sweating, but in these conditions when relative humidity is near 100 percent, sweat doesn’t evaporate well, so people can’t cool down even if given unlimited shade and water. The body can’t lose heat, and so it gets hotter and hotter. The Philippines and Myanmar are just two countries that will also see an increase in storm surges in a three-degree world. To escape many will move often to urban areas. Half of the world’s population already lives in cities, almost a third in slums. For them, a three-degree world could be deadly.
The Economist on a Three Degree World
The Economist has recently published a cover package on what a three degree world might look like. The magazine explains that a three degree world could lead some places to the brink of societal collapse. Despite existing pledges, greenhouse gas emissions are still set to rise by 16% from 2010 levels by 2030. The need to act has never been clearer. There’s still time to reduce emissions so that a three degrees world remains fiction rather than becoming fact.
Adaptation vs Mitigation
The Economist says that adaptation will reduce suffering, but it doesn’t mean that it will eliminate suffering. Suffering is built into this whole process of heating up the planet. Adaptation will only get the world so far, but that’s why increasing efforts on mitigation are important.
Avoiding a Three Degree World
The Economist believes that the best way to deal with a 3 degree world is not to go to a three degree world. The magazine says that there’s a need to work towards negative emissions that could bring down the temperature after it peaks. It is important to reduce greenhouse gases that can bring down temperatures after it peaks. Adaptation will not eliminate suffering. The need for more work towards negative emissions is to reduce carbon emissions that can bring down temperature after peak levels is important. There’s still a need to reduce the emissions that are not to reduce global emissions that have never been to a low levels of carbon emissions.

What are the challenges of providing health care to a female offender population that may not exist in a male prison?

Old Case Study
You applied and were accepted in an internship program of a state-level, Female Correctional Health Care Operation in the Southeastern United States and your primary responsibility is to work on the assigned projects related to the provision of inmate health care.
Case Study Associated Materials:
***Correctional Health Care Delivery: Unimpeded Access to Care Section 2 and 4 are recommended for the main reference in working on this assignment.
The Health and Health Care of US Prisoners: Results of a Nationwide Survey
Public Health Behind Bars
Sample Tool Control Policy
Inmate Sick Call Procedures-Corrections
Case Study Details: For the incarcerated population in the United States, health care is a constitutionally guaranteed right under the provisions of the eight amendments which is the prohibition against cruel and unusual punishment (see Estelle v. Gamble). This particular prison can hold in excess of 1,728 offenders and routinely houses between 1,600 and 1,700 women on any given day. This institution incarcerates all custody classes to include minimum security, medium security, close custody, death row, and pretrial detainees.
The health care operation provides the highest level of care for female offenders in the state. The health care facility is a 101 thousand square foot, 150 bed, three-story building that cost the taxpayers $50 million dollars to construct and is a hybrid of an ambulatory care center, long-term care center, and behavioral care center. The health care facility also houses an assisted living dorm.
The patient demographic includes women who have multiple co-morbidities including substance abuse, seriously persistent mental illnesses (SPMI), diabetes, cardiovascular disease, cancer, morbid obesity, HIV / AIDs, hepatitis, etc. On any given day there will also be 30 to 60 offenders who are pregnant, with 98% of those offenders having a history of substance abuse; all pregnant offenders are considered high-risk. The dental health of this patient population is exceptionally horrendous because of excessive drug abuse coupled with a sugary diet and poor oral hygiene practices. It is not uncommon for a 23-year-old to need all of her teeth extracted.
There are approximately 300 FTEs to include correctional staff that operate the facility and provide care to the offender population. The healthcare facility is comprised of the following directorates: (a) Medical, (b) Nursing, (c) Behavioral Health, (d) Pharmacy, (e) Dental, (f) Medical Records, (g) Health Service Support, and (h) Operations and Security.
Although the health care facility has a vast amount of capability, there limitations: (a) This facility does not have advanced cardiac life support capability (ACLS), (b) no surgical capability, (c) no ability to conduct telemetry, (d) no oral surgery beyond simple extractions, (e) no obstetrical capability beyond out-patient clinics, (f) MRI, (g) level 2 ultrasound, and the list goes on.
Those inmates who have medical needs that cannot be addressed by the health services staff at the correctional facility will need appointments with external health care providers who have a business relationship with the prisons in this area. On any given month, there will be approximately 300 offenders who will go to outside medical appointments, and making certain that these appointments take place is where the challenge lies. Similar to many health care operations, the prison Utilization Review / Case Management Department facilitates all external appointments and form the lynchpin between the correctional facility health care providers who refer offenders for specialty appointments, and the outside organization providing that appointment.
Your assignment: You are the Case Coordinator. You have 300 patients that need to be scheduled for outside specialty appointments every month. You are tasked by the Administrator to develop a strategic plan organizing the out-of-the-facility appointments without impairing internal services.
***Note: additional personal or financial resources are not available fortis case strategic plan. However, the question of the additional personnel or resources can be discussed in an Addendum. Specific justification must be presented and supported by evidence.
As the first step, develop a Memorandum addressing:
Provide an overview of Estelle v. Gamble and how that 1976 Supreme Court ruling pertains to the provision of inmate health care.
Examine the challenges of providing health care in a correctional environment.
What are the challenges of providing health care to a female offender population that may not exist in a male prison?
What framework would you apply to strategic planning? Why? (Strategic planning frameworks)
New Case Study
Relate strategic management principles and decision logic to current complex health care management challenges and formulate effective solutions.
Review: Evidence-based Decision Making in Healthcare PPT
Complete Step 3, 4, and 5. PP.# 27-38 from the eBook – Good Organizational Decisions: Ethical Decion0Mkaing Toolkit for Leaders and Policy Makers
Fill in the worksheet on p. 29
Fill in the worksheet on p. 33 ***Make sure to list all types of evidence relevant to this strategic planning process.
Fill in the worksheet on p. 37

Thoroughly identify possible network infrastructure vulnerabilities. Thoroughly address network vulnerabilities with the appropriate security measures. Thoroughly ensure that consideration is given to virtualization and cloud technology.

Project Deliverable 5: Network Infrastructure and Security
Due Week 8 and worth 120 points
This assignment consists of two (2) sections: an infrastructure document and a revised project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.
 
With the parameters set forth at the onset of the project, present the infrastructure and security policy that will support the expected development and growth of the organization. The network solution that is chosen should support the conceived information system and allow for scalability. The network infrastructure will support organizational operations; therefore, a pictorial view of workstations, servers, routers, bridges, gateways, and access points should be used. Since the company will be merging with a multinational company, virtualization and cloud technology should be taken into consideration. In addition, access paths for Internet access should be depicted. A narrative should be included to explain all the nodes of the network and the rationale for the design. Lastly, using the Confidentiality, Integrity and Availability (CIA) Triangle, define the organizational security policy.
 
Section 1: Infrastructure Document
1. Write a five to ten (5-10) page infrastructure document in which you:
 
a. Thoroughly identify possible network infrastructure vulnerabilities. Thoroughly address network vulnerabilities with the appropriate security measures. Thoroughly ensure that consideration is given to virtualization and cloud technology.
 
b. Thoroughly design a logical and physical topographical layout of the planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Thoroughly explain the rationale for the logical and physical topographical layout of the planned network.
 
c. Thoroughly illustrate the possible placement of servers, including access paths to the Internet and firewalls. Illustrate the possible placement of servers, including access paths to the Internet and firewalls. Note: facility limitations, workstations, printers, routers, switches, bridges, and access points should be considered in the illustration.
 
d. Thoroughly create and describe a comprehensive security policy for the company that will:
 
i.                     Protect the company infrastructure and assets by applying the principals of CIA. Note: CIA is a widely used benchmark for evaluation of information systems security, focusing on the three (3) core goals of confidentiality, integrity, and availability of information.
ii.                   Address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information.
 
See below for details to include.
 
You are currently the Chief Information Officer (CIO) for an innovative Internet-based company with gross revenues of more than $35 million dollars per year. During an executive leadership meeting, you were told that your company will be merging with a multinational company of equal size and you will be responsible for developing a project plan to strategically integrate all systems, including databases and infrastructure. The Chief Executive Officer has given you sixty (60) days to deliver an information technology project plan in anticipation of the company merger. Your company will be expanding from one (1) floor to three (3) floors within six (6) months. Since this merger will be bringing two (2) fairly equal-sized companies together under one roof, the infrastructure must be redesigned to accommodate the increased needs. Your company currently uses operational systems and relational databases but desires to expand into data warehousing. All information technology (hardware and software) must be redesigned to meet organizational needs. The solution should be implemented in either a hosted solution, on-site solution, or a hybrid model. The CEO is expecting you to integrate different technologies from different solution providers and incorporate industry best practices in connection with the development of technological systems. In addition, the CEO is extremely interested in cloud technologies and virtualization but is leery of security issues; however, the CEO is sure that you will implement proper security protocols. The company currently consists of twenty five (25) employees but is expected to increase to sixty five (65) employees when the merger is complete.
 
 
A relevant piece of this paper that I used in a previous paper
Network Infrastructure and Security
 
For the Mortgage Builder Software, the networking hardware and services are handled by Verizon Enterprise Solutions. They have the fastest connection speed in the Washington, DC metro area. C3CS lets Comcast Business Internet handle their networking hardware and services. They have the most reputable company with a footprint in Southfield, MI. Both companies were using a company that I did not have much knowledge of – AtomOS. They have a product called Kwick Key. It is a highly integrated multi-functional solution that can support all of your Network and Communications needs. It has a complete security solution that is very comprehensive.
 
AtomOS
 
http://www.atomampd.com/kwick-key

Explain how your overall design protects the organization from both inside and outside attacks. Give examples.  Explain how your layered design compensates for possible device failures or breaches in network security.

This term paper involves putting together the various concepts learned throughout this course. You are tasked with designing the most secure network possible, keeping in mind your goal of supporting three (3) IT services: email, file transfer (centralized), and VPN. Your first step is to design a single network capable of supporting there three (3) different services. Once you have fully designed your network, you will need to provide three (3) workflow diagrams explaining how your designed network handles the three (3) different transactions. The first is an internal user sending an email using his / her corporate email address to a user on the Yahoo domain with an arbitrary address of [email protected]. The second workflow diagram should show a user initiating an FTP session from inside your network to the arbitrary site of ftp.netneering.com. The third workflow is an externally located employee initiating a VPN session to corporate in order to access files on the Windows desktop computer, DT-Corp534-HellenS, at work. 
Write a ten to fifteen (10-15) page paper in which you complete the following three (3) Parts. Note: Please use the following page breakdown to complete your assignment:

Overall network diagram: One (1) page
Datapath diagrams: Three (3) pages (one for each diagram)
Write-up: six to ten (6-10) pages

Part 1

Using Microsoft Visio or its open source alternative, create a diagram showing the overall network you’ve designed from the user or endpoint device to the Internet cloud, and everything in between, in which you:

Follow the access, core, distribution layer model.
Include at a minimum:

Authentication server (i.e. Microsoft Active Directory)
Routers
Switches (and / or hubs)
Local users
Remote users
Workstations
Files share (i.e. CIFS)
Mail server
Web servers (both internal and external)
Firewalls
Internet cloud
Web proxy
Email proxy
FTP server (for internal-to-external transport)

Explain each network device’s function and your specific configuration of each networking device.
Design and label the bandwidth availability or capacity for each wired connection.

Part 2

Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:

Local user sends email to a Yahoo recipient. Local (corporate) user having email address [email protected] sends an email to [email protected].

Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination. 
Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow. 
Show user authentication when necessary.

Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:

Local user, Jonny Hill, transfers file using ftp through the Internet to another company’s site (ftp.netneering.com). He has to access the secure shell using his active directory credentials to authenticate to the ftp server (linux running Redhat) on the DMZ. He needs to transfer files from his desktop across the Internet to ftp.netneering.com.

Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination. 
Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow. 
Show user authentication when necessary.

Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:

Remote user, Hellen Stover, connects via VPN from home through the Internet to her corporate desktop, DT-Corp534-HellenS. Hellen uses a browser to initiate her VPN connection. By browsing tohttps://VPNaccess.corp534.com, she arrives at a login page where she needs to authenticate using her Active Directory credentials before the VPN tunnel is built.

Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination. 
Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow. 
Show user authentication when necessary.
Explain how your overall design protects the organization from both inside and outside attacks. Give examples. 
Explain how your layered design compensates for possible device failures or breaches in network security.
Determine whether any possible bottlenecks exist in your design.
Explain how to make the file transfer process more secure.

Part 3 

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
Include charts or diagrams created in Visio or an equivalent such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

What are the potential impacts of the condition on function (occupational performance)?

 
Objective: The purpose of this activity is to utilized Bloom’s Taxonomy level IV & V to assist students refining their clinical reasoning skills by linking scientific knowledge to assessment and intervention planning. This project assists the students to assimilate textbook content and apply scientific information and reason through complex client centered situations. Instructions: Each student is expected to complete on their own! Step #1 – Scientific knowledge forms the backdrop for clinical reasoning! Find out ALL you can about the condition. Students may use textbooks, scholarly websites, and articles etc. to discover scientific information about the diagnosis. Step #2 – Knowing what you know about the condition now – find out what occupational therapy assessments and interventions would be appropriate for a person with this condition. Additionally, identify the intervention approaches that can be utilized for the condition (health promotion, compensation, adaptation, prevention, restoration, and maintenance from the OTPF. Students should begin to integrate the information, and defend their choices of each assessment/intervention to foster critical thinking about how contexts, personal factors, and activity might affect their choices of assessments and interventions. Step #3- Students will identify relevant frames of references to use with the diagnosis and justify their choices. Step #4 – Student will identify occupational problem areas the diagnosis may impact along with associated limitations/barriers. Each occupational problem area should link to a limitation/barrier. Step #5 – Students will utilize the provided case study that includes various contexts, personal factors, and activities select relevant and appropriate occupational therapy assessments for the case study. Additionally, students will design a relevant and meaningful interventions for the case study. The student should develop their interventions considering the client’s contextual issues, interests, activities, personal factors, and practice setting. This step in the diagnosis book assists the student to make substantial and personalized intervention planning.
 
Step #1: What did you find out about this condition? List all that you researched (signs & symptoms, definition, causes, types, precautions, mediations etc.) A simple, concise definition is provided and accurate (1 pts) Causes of the condition are listed and are accurate (1 pts) A thorough list of signs/symptoms has been outlined (1 pts) Various types of the condition have been explored and explained (1 pts) Associated problems (secondary) with the diagnosis (1 pts) Precautions are identified (1 pts) Medications listed that may be involved with the condition (1 pts) Sources are identified, are scholarly sources properly cited per APA (1 pts) 8 points Step #2: What occupational therapy assessments and interventions are appropriate for this condition and why? What are the approaches to intervention? Evaluations/assessment listed (at least 3) Each evaluation/assessment is briefly described and justified for its use with the condition (at least 3) Intervention strategies for the condition are listed (at least 3) Intervention strategies are appropriate for the condition and justified At least one intervention strategy is documented as being evidenced based and source of information is provided Approaches to interventions are outline per intervention listed and are appropriate 6 pts Step #3: What occupational therapy frames of reference/s would be the MOST appropriate with this condition and why? No more than 2 frames of references! Occupational frame/s of reference is identified (2pts) Frame of reference is briefly described (2 pts) Frame of reference is justified as to its application to the condition researched (2 pts) Interventions in Step #4 are in line with at least one of the frames of reference (2 pts) 8 points
 
Step #4: What are the potential impacts of the condition on function (occupational performance)? Limitations/barriers are identified through client factors, performance skills, performance patterns, and context/environment 1. 2. 3. 5. Problem Areas are identified through occupational performance area/s 1. 2. 3. 4. 5. For example: Arthritis Limitations/barriers: weak intrinsic hand muscles, decreased ROM, Decreased endurance Occupational Performance impact: weak intrinsic hand muscles and decreased ROM leads to decreased ability to hold utensils for eating and cooking tasks, decreased ability for dressing with fasteners OR difficulty with clothing management. Decreased endurance leads to inability to work a full 8 hour shift Total: 10 Step #5: Based on the provided case study identify assessment/s that are appropriate and design an intervention plan that is tailored to meet the needs of the client (consider personal factors, activities, and contextual variables when designing the intervention plan). Defend your choice of assessment/s and interventions for the client by explaining why these assessment/s and interventions were selected. Appropriate assessments identified; justification for the selection of the assessment/s is present. (at least 3) Intervention plan is comprehensive in that it addresses at least 3 problem areas for the case study Intervention plan addresses the following variables: 1. Personal factors of the client 2. Activities 3. Contextual concerns A rationale is provided for why each intervention was selected Total: 6 38 total points

Case Study

IngridTBIRanchoV.pdf

Using a digital software program such as Microsoft Publisher or Lucidpress.com, create a single-page, 3-panel, front-to back brochure that informs the public about the realities of child maltreatment in the United States and a specific state of your choosing. The brochure should be designed to appeal to audiences in a variety of settings, such as offices of school counselors or nurses, community centers and outreach facilities, public health facilities, and social services departments.

 
Child Maltreatment Policies Brochure
 
This assignment focuses on analyzing policies about child maltreatment in the United States where, as noted in the Week Three Instructor Guidance and the Rubin (2012) recommended readings for Week Three, it is a growing national issue. This assignment is another opportunity to further apply 21st century technology skills as you create an informational brochure meant to inform the public in a variety of potential environments about child maltreatment in the United States and in a specific state of your choosing. Your finished brochure will be included in your website as part of the Week Six Final Project. Beyond reading the Week Three Instructor Guidance and the recommended chapters from Rubin (2012), review the State of California (2014) website resources for services related to children’s and youth health, the CDCP (2014) website about preventing child maltreatment, the Child Help (2014) website programs page, and the CAPA (2014) webpage about their programs and services to learn about child maltreatment and policies related thereto. 
 
Create your assignment using the content and written communication instructions below. Use the Grading Rubric to review your assignment before submission to ensure you have met the distinguished performance for each of the components described below. For additional assistance, review the Week Three Instructor Guidance and, if needed, contact the instructor for further clarifications using the Ask Your Instructor discussion. Additionally, add the flyer as a link or attachment to the page on your website titled Child Protection Services & Child Maltreatment. 
 
Content Instructions
 
Using a digital software program such as Microsoft Publisher or Lucidpress.com, create a single-page, 3-panel, front-to back brochure that informs the public about the realities of child maltreatment in the United States and a specific state of your choosing. The brochure should be designed to appeal to audiences in a variety of settings, such as offices of school counselors or nurses, community centers and outreach facilities, public health facilities, and social services departments. Use the “Save As” option to save your brochure as a PDF. Submit the PDF version as your assignment for evaluation and include the attachment or link if constructed from an online source such as Lucidpress to your website. 
Title (1 point): Include an engaging title for the brochure.
Maltreatment Information (2 points): Include a description of what constitutes child maltreatment, abuse, or neglect; tips for prevention, tips for parents or caregivers, and reporting abuse. Include at least two supporting resources cited in-text and in a References section.
Statistical Data (1 point): Include at least three items of statistical data, audience-appropriate graphics, and two-to-three points about child maltreatment in the United States and your selected state. Include at least two supporting resources cited in-text and in a References section.
Policy or Program Resource (3 points): Describe at least two policies, programs, models, or other source of support for parents, caregivers, schools, or others. Include at least two supporting resources cited in-text and in a References section.
References: (1 point): Include a references section with at least four scholarly sources in addition to the Rubin (2012) textbook for any summarized, paraphrased, or quoted material in your brochure, including images and graphics. All sources in the references section should be used and cited correctly within the body of the assignment.
Formatting (1 points): Brochure is a PDF, 8.5×11 inches in size, single-page, 3-panel, front-to-back design that uses graphics, and has a consistent theme/format to augment the readability of the brochure.
 
Written Communication Instructions
Syntax and Mechanics (1 point): Display meticulous comprehension and organization of syntax and mechanics, such as spelling and grammar. Written work contains no errors and is very easy to understand.