Seminar Poster Board presentation

Description

Seminar: Symposium poster

You need use all your homework’s to create symposium poster.

My advice is to have large, easy-to-read and numbered sections that cover the main pillars of the story, which typically are:

Sections:

1 – Background

2 – Questions / knowledge gap

3 – Methods (keep this to the bare minimum or skip it if you can)

4 – Results

5 – Conclusions

6 – References and acknowledgements (smaller at the bottom)

Here is URL for sample poster:


https://www.animateyour.science/post/how-to-design-an-award-winning-conference-poster


https://hsp.berkeley.edu/sites/default/files/ScientificPosters.pdf


https://ugs.utexas.edu/our/poster/samples

Requirement

You must complete all 6 sections of this Seminar poster. I uploaded an example below.

Homework 6
This is an image below of me about to check the storage on my hard drive and
partition enough space.
Below is an image of me partitioning space on my hard drive
Below is an image of me shrinking some of the space of the hard drive.
Homework 6
This is an image below of me about to check the storage on my hard drive and
partition enough space.
Below is an image of me partitioning space on my hard drive
Below is an image of me shrinking some of the space of the hard drive.
Homework # 5

Nano Server refers to a remotely administered server similar to windows
server although it is smaller as it occupies less disk space and only supports
64-bit tools and applications. The Nano Server is optimized for data centers
and private clouds and it focuses on reducing resources consumption,
provide greater speeds, have more stability and also security.

Containers in Microsoft are used to refer to ways supported by Windows
Server 2016 operating system and are used to wrapping up an application
into its own isolated box. Containers are managed by tools such as Docker
and PowerShell.

Rolling updates or commonly termed as cluster rolling is a type of OS
updates that allows upgrade of the operating system from an administrator
without stopping the Hyper-V or the Scale-Out File Server workloads.
Doing a rolling upgrade for a Hyper-V Cluster with a shared storage like a
SAN means that the administrators can only upgrade the number of nodes
that they have resiliency on.

Nested Virtualization in Windows Server 2016 refers to a function that
allows an administrator to run Hyper-V inside a Hyper-V virtual machine. It
allows an administrator to build labs that contain virtualized infrastructure
within a single computer.

Docker refers to a computer program that allows for virtualization of
operating system level. Docker support in Windows Server 2016 is used
natively on Windows 10 together with Hyper-V container with the aim of
building, shipping and running containers that are utilizing the Windows
Server 2016.
References
Brooks, R. (2018). Windows Server 2016 Containers. Net Wrix.
Microsoft. (2017). Windows Server 2016. Microsoft.
Stroud, F. (2016). Nano Server. WebOpedia.
Torep, J. (2018). Storage Spaces Direct Rolling Cluster Upgrade to Windows
Server 2019. jtpedersen.com IT made simple.
HW1
This is an image of me trying to format the disk space so I can create more space in the hard
drive.
This is a picture below and its asking me for an IP address
Homework Number
This is an image of me downloading shellexview, and I have installed and launged
the application.
This is an image when I have hidden all third party extensions.
Software and Operating System Security
– Run SFC and Chkdsk scans to check if the hard drive
has any file error.
– SFC/scan now looks for missing or corrupt Windows
files
Background
• This Subject encompasses 11 in class
assignments and 11 practical Homework
• Installation of windows 10 and windows
server
• Securing computer system against
malwares
• Creating Share drives
• Assign permissions and special privilege
• Key components of server: Nano server,
containers, Containers, Hyper-V, and nested
virtualization.
• Operating system security flaws and how
to disable them.
Methods
• We used Windows 10, Windows Server 2016, Windows XP, Linux
(Ubuntu and Kali), Windows server 2003, Mac OS X, and Netware
to accomplish assigned works.
Results
– Creating multiple user accounts and admin accounts on Windows
Server 2016, change privileges from user to administrator and vice
versal
• How you prevent attacks targeted on operating
system?
• How to create share drives in Window server 2016?
• What tools are used to secure the web browsers?
• What tools are available to tackle malwares?
• How to secure email?
• How Kali Linux performs penetration test?
Server Manager is used to manage all
local and remote services. I used Server
Manager to install active directory domain
service and VPN. Some roles and features
available in server 2016 include; Hyper-V,
file and storage service, DNS, DHCP, web
server, RS, and so forth.
Fake Virus,
Merabheja is
spreading after
a single click
Source Code of fake virus
Learned Skills




The main function of operating system
Attacks on computer system( Network and OS)
Common ports related with cyber threats
Essential techniques to protect OS from malicious software
Encryption methods: IP security, Stream and block cipher, public and
private key, RSA, DES, Hashing
Authentication methods: Digital certificate, Kerberos, EAP, SSL, SSH,
TLS, and Security Token.
The use of SMTP in e-mail and attacks on SMTP
hardware redundancy and apply fault-tolerance options (UPS, RAID)
Intrusion detection methods and hardening system
Creating Share drive, assign share permissions to
groups: Every one, Administrator, and other group
Permissions: Full, Change, and Read
• Configuring network connection in
Windows XP in a virtual machine
• Configured Internet Explores advanced
security features
• We broke into Windows XP using
command line utility in Kali Linux.
• Secure the web browsing by using secure tools such as HTPP
everywhere, Trojan Remover,
Questions / knowledge gap





– Configuring event viewer,
used to troubleshoot windows
and applications error.
– Displays detailed information
about computer
• Configuring account policy and logon security techniques,
global access privilege.
• Implement directory, folder, and file security
• Understand how TCP, UDP, and IP work, and the security
vulnerabilities of these protocols
• Configure the firewall capabilities in operating systems
• physical security methods for workstations, servers, and
network devices
• Wireless networking security (IEEE 802.11): radio wave,
infrared, and Bluetooth.
• Configuring internet, web browser, RAS, VPN security
Conclusions
▪ This course was quite informative and practically efficient.
It not limited to windows operating system.
▪ We have done three projects that focused on real world
and current problems: How to secure small business
against cyber threat, data security, system security, and
physical security.
▪ Each chapter contains in-class assignment and hands on
project to implement theoretical knowledge into practice.
▪ The course focuses on identifying the vulnerabilities of the
OS, configuring the built-in security features, and
preventing computer system against cyber attacks.
References and acknowledgements

I would like to thank you Dr. Haydar Teymourlouei for
being an excellent instructor and guide of this course. I
am also thankful to all my classmates who have been
helpful through out the course.

Purchase answer to see full
attachment

We offer the bestcustom writing paper services. We have done this question before, we can also do it for you.

Why Choose Us

  • 100% non-plagiarized Papers
  • 24/7 /365 Service Available
  • Affordable Prices
  • Any Paper, Urgency, and Subject
  • Will complete your papers in 6 hours
  • On-time Delivery
  • Money-back and Privacy guarantees
  • Unlimited Amendments upon request
  • Satisfaction guarantee

How it Works

  • Click on the “Place Order” tab at the top menu or “Order Now” icon at the bottom and a new page will appear with an order form to be filled.
  • Fill in your paper’s requirements in the "PAPER DETAILS" section.
  • Fill in your paper’s academic level, deadline, and the required number of pages from the drop-down menus.
  • Click “CREATE ACCOUNT & SIGN IN” to enter your registration details and get an account with us for record-keeping and then, click on “PROCEED TO CHECKOUT” at the bottom of the page.
  • From there, the payment sections will show, follow the guided payment process and your order will be available for our writing team to work on it.