Hi, How Can We Help You?
  • Address: 1251 Lake Forest Drive New York
  • Email Address: assignmenthelpcentral@gmail.com

Category Archives: Blog

November 18, 2025
November 18, 2025
November 18, 2025
November 18, 2025

Governor Briefing Paper

Reaction Paper: Each student will be required to write a paper on a topic of the student’s choice. Here are the instructions for paper. You are the Special Assistant to the Governor of Texas. He has asked you to write a briefing` paper on a topic related to Texas or American Government. The topic can be taken from a newspaper article, journal article or other periodical. Your goal is to give him the information about the issue and to convince him of your position. When writing the paper, please introduce the topic in the first section of your paper. The body of the paper should contain the pertinent information that you want to convey – basically give me both sides of the issues. Summarize the major points of the paper and give your recommendation to POTUS. The final section of the paper should tell how the issue impacts you personally, your family and your community. There is no page limit to the paper. You should give POTUS enough information that covers the topic. It should be doubled spaced with regular spacing and margins. Use 10 pitch fonts. You are not required in the paper to footnote sources, however if you quote from a text, you must footnote the sources. If you use more than one source, please include a bibliography. The paper will be due on Friday, November 14, 2025. The paper will account for one-fourth of the grade. Each student will also be required to make an entry on a designated Discussion Board that summarizes your paper. The entry should be 1-2 paragraphs.

Governor Briefing Paper

  • What topic related to Texas or American government are you choosing for your briefing paper?,

  • How will you introduce the topic in the first section of the paper?,

  • What are the pertinent facts and both sides of the issue you will present in the body of the paper?,

  • What major points will you summarize and what recommendation will you give to the President of the United States?,

  • How does this issue personally impact you your family and your community?


Comprehensive General Answer (Reaction Paper Example)

(You may replace the topic with your own when you finalize your assignment.)

Briefing Paper on Texas Voting Access

Introduction

November 18, 2025
November 18, 2025

Multi-Topic Law & Politics

In the chapter 9 readings, you learned about criminal homicide. Please compare one state with fetal homicide laws with a state with partial fetal violence law recognition. I have included a link with states and a general overview of fetal laws. Please look up the most current laws for your selected states. An example is on page 9.1.3.  Information on Feticide page 9.1.1. Your response must be in APA format

StateHomicideLaws.pdf

Criminal Law exercise #4 (300 words) (Adr)

Discussion-Mill-Rawls

Answer two of the questions below and also comment on at least one of your classmates’ answers. Clearly number each response (e.g., “1.” and “2.”) so it’s obvious which question you are addressing. Do not combine your responses; if they are not separated, they will be counted as only one answer.

Multi-Topic Law & Politics

Please, do not submit AI-generated answers. Such submissions will be detected and may result in embarrassment.

1) J.S. Mill argues that liberty should only be limited to prevent harm to others. In today’s world of social media, misinformation can cause real harm—yet restrictions can also limit free expression.  Should platforms limit harmful or false posts, or would that violate free speech? How should Mill’s “harm principle” guide our approach to regulating speech on social media platforms today? Support your answer with compelling evidence or examples.

************************************************************************************

2)  John Rawls believed that a fair society should only allow inequality if it helps those who have the least. Looking at issues like wealth, healthcare, or education, do you think our society is fair by Rawls’s standards? Why or why not?

*******************************************************************************

3) During crises like pandemics, governments sometimes restrict personal freedoms for public safety. Do you think it’s ever right to limit personal freedom to protect the community? How might Mill or Rawls see this issue? In your opinion, is it ever morally justified to limit individual liberty for the sake of collective well-being?

________________________________________________________________________

1. Please make your initial post substantive (10 or more sentences).

Tab Government

The Discussion Board assignments will be used to enhance your peer interactions and learn about different viewpoints on events in politics. Please respect each other’s opinions and communicate accordingly.

Appropriate responses will be detaileddirectly answer the posting, and provide evidence (primarily from the readings and lectures) that contain sources of statistics or quotes that are cited.

Your initial response should be 200-450 words, cited in APA or MLA formatting. Posting will take the form of responding to two (2) of your classmates in the thread question with 75-100 words with a maximum number of 3-5 sentences.

The second Discussion Board Assignment will discuss why you believe more young people are moving to identify as an “Independent” in recent public opinion polls. Based upon what has been presented in class about how parties work and how people come to their own political understanding, create a reasoned argument explaining how the two-party system has disappointed young voters? Please support your responses from your textbook readings. 

  • • Please compare one state with fetal homicide laws with a state with partial fetal violence law recognition,

  • • Should platforms limit harmful or false posts or would that violate free speech?,

  • • do you think our society is fair by Rawls’s standards?,

  • • Do you think it’s ever right to limit personal freedom to protect the community?,

  • • why you believe more young people are moving to identify as an “Independent” in recent public opinion polls?

November 18, 2025
November 18, 2025

Cardiovascular Informatics Safety
You will explore the pivotal role of healthcare informatics in ensuring patient safety within the
context of a specific cardiovascular drug class. Cardiovascular medications encompass a broad
range of drug classifications designed to manage various cardiovascular conditions. You will
begin by selecting a specific cardiovascular drug classification (Antihypertensives,
Antiarrhythmics, Antianginals, Anticoagulant/Antiplatelet, Vasodilators, or Antilipemic).
You will provide a comprehensive overview of your chosen drug class, including common
medications, mechanisms of action, therapeutic uses, and potential risks. The assignment should
identify and describe key safety considerations related to dosage adjustments, drug interactions,
and the importance of regular monitoring. Additionally, you will analyze the role of Electronic
Health Records (EHRs) in supporting safe prescribing, administration, and monitoring of these
medications. The assignment concludes with a summary of key findings related to patient safety
in the context of healthcare informatics and actionable recommendations for informatics
professionals, healthcare providers, and organizations to enhance patient safety in the
administration of cardiovascular medications.

Cardiovascular Informatics Safety
INSTRUCTIONS
You will create a recorded slideshow presentation addressing the chosen cardiovascular drug
classification:
• Create a professional, recorded presentation using a platform of your choice (e.g.,
PowerPoint, Google Slides, or video recording tools).
• Presentation should have 8-15 slides including an introduction slide and a reference slide.
• The recorded presentation should be 10-15 minutes in length.
• Ensure that your presentation is clear, well-structured, and visually appealing.
• Provide APA citations for any sources you reference during your presentation.
• The presentation must include at least 5 references (scholarly articles published within
the last five years) in addition to the course textbook and the Bible. Each reference must
have at least one citation in APA format.
For instructions on how to submit your video to this assignment for grading, please refer to the
How to Submit a Video Presentation document provided as an assignment resource within the
assignment page in Canvas.
ASSIGNMENT MULTIMEDIA FORMAT OPTIONS
You have the option to choose between different multimedia formats to complete your
presentation. Below are the recommended options:
1. Slideshow Presentation: Utilize PowerPoint or Google Slides to create a visually
engaging presentation. Ensure your slides effectively communicate the required content
and adhere to any specified guidelines.
2. Video Recording: You can create a video presentation using any preferred video
recording resources. Examples include PowerPoint, Windows Voice Recorder (Windows
users), QuickTime (Mac users), Screencastify, ScreenPal, Kaltura, or other recording
software of your choice. Refer to the links provided as assignment resources in the
assignment page in Canvas for tutorials on how to use many of these recommended
recording resources. Ensure your video effectively communicates the required content
and follows any specified guidelines.
Whichever formats you choose to create your presentation, please ensure that your submission meets all

  • • You will begin by selecting a specific cardiovascular drug classification (Antihypertensives, Antiarrhythmics, Antianginals, Anticoagulant/Antiplatelet, Vasodilators, or Antilipemic),

  • • You will provide a comprehensive overview of your chosen drug class, including common medications, mechanisms of action, therapeutic uses, and potential risks,

  • • The assignment should identify and describe key safety considerations related to dosage adjustments, drug interactions, and the importance of regular monitoring,

  • • Additionally, you will analyze the role of Electronic Health Records (EHRs) in supporting safe prescribing, administration, and monitoring of these medications,

  • • The assignment concludes with a summary of key findings related to patient safety in the context of healthcare informatics and actionable recommendations for informatics professionals, healthcare providers, and organizations to enhance patient safety in the administration of cardiovascular medications

November 18, 2025
November 18, 2025

Evidence-Based Practice

What are the three components of evidence-based practice (EBP)?  Why is each component important from a health promotion standpoint?  Do you feel any components should be weighted more heavily than others?  Why or why not?

Have you ever witnessed a time when EBP was not used and should have been?  What could have been done differently?

Evidence-Based Practice
  • • What are the three components of evidence-based practice (EBP)?,

  • • Why is each component important from a health promotion standpoint?,

  • • Do you feel any components should be weighted more heavily than others?,

  • • Why or why not?,

  • • Have you ever witnessed a time when EBP was not used and should have been? What could have been done differently?


Comprehensive General Response

Evidence-based practice (EBP) is a foundational approach in modern nursing, integrating multiple forms of knowledge to guide high-quality clinical decision-making. EBP consists of three essential components: best current evidence, clinical expertise, and patient preferences and values. Together, these elements promote safe, effective, and holistic care that supports health promotion across diverse settings.

The **first component—best current evidence—**is derived from research, scientific literature, quality improvement data, and practice guidelines. From a health promotion standpoint, this ensures that interventions are grounded in proven outcomes rather than tradition or habit. Evidence-based interventions are more likely to improve population health, reduce preventable disease, and address emerging public health risks by relying on current data rather than outdated assumptions.

The **second component—clinical expertise—**reflects the provider’s accumulated knowledge, skills, and judgment. While evidence provides direction, clinical expertise determines how to apply that evidence to the unique needs of each patient. In health promotion, clinical expertise is critical for tailoring screening strategies, identifying early signs of health decline, and applying motivational techniques that align with the patient’s readiness for change. Expertise helps translate general evidence into personalized, actionable care.

The **third component—patient preferences and values—**ensures care remains person-centered. Health promotion depends on patient engagement, shared decision-making, and respect for cultural, spiritual, and personal beliefs. Even the most evidence-based intervention will fail if it does not align with what patients find acceptable, meaningful, or feasible. Including patient values increases adherence, strengthens trust, and promotes autonomy in managing one’s own health.

Whether any component should be weighted more heavily is often debated. In general, all three components should be balanced because each plays a distinct and essential role in promoting optimal outcomes. Evidence alone cannot replace clinical judgment, and neither can override the patient’s right to participate in care decisions. However, certain situations may require a temporary shift in emphasis. For instance, during a public health emergency, such as an emerging infectious disease outbreak, best current evidence may take precedence as rapid, standardized responses are needed. Conversely, in chronic disease management, patient preferences may carry greater weight because long-term adherence depends heavily on motivation and lifestyle compatibility. Despite these situational differences, maintaining balance across all elements strengthens the integrity and effectiveness of the EBP model.

A time when EBP was not used, and should have been, involved a situation where outdated wound care practices were continued despite newer guidelines recommending evidence-based alternatives. Traditional wet-to-dry dressings were being applied routinely, even though research had shown that they can damage healthy tissue and delay healing. An evidence-based approach would have involved transitioning to moisture-retentive dressings supported by current research. What could have been done differently included reviewing updated clinical guidelines, providing staff education on evidence-supported wound care modalities, and implementing a policy change to ensure consistent use of best practices. Integrating EBP would likely have improved healing time, reduced patient discomfort, and prevented complications associated with suboptimal wound management.

November 18, 2025
November 18, 2025

Nursing Practice Philosophy

explanation of your philosophy of nursing practice. Include your nursing experience and expertise.  Kindly explain the underlying tenets that support your philosophy of nursing practice and your goals for expanding your experience and practice as a DNP (e.g., embracing diversity, global health issues, and collaboration). Include how these dynamics are linked to the DNP’s role as a social change agent.  Include a recommendation for at least one way to advocate for positive social change as a Walden DNP. Be specific and provide examples, with all citations in APA 7 style.  This work must be well supported with professional references from the course and peer-reviewed journals. Outside articles are to be published no earlier than 2019. Your main post needs to be submitted by Wednesday Nursing Practice Philosophy

Nursing Practice Philosophy

  • • explanation of your philosophy of nursing practice, Include your nursing experience and expertise, Kindly explain the underlying tenets that support your philosophy of nursing practice and your goals for expanding your experience and practice as a DNP (e.g. embracing diversity global health issues and collaboration), Include how these dynamics are linked to the DNP’s role as a social change agent, Include a recommendation for at least one way to advocate for positive social change as a Walden DNP


Comprehensive General Response

Philosophy of Nursing Practice

My philosophy of nursing practice centers on holistic, patient-centered care that values dignity, equity, and evidence-based decision-making. I view nursing as a moral, relational, and scientific discipline grounded in compassion, ethical judgment, and the responsibility to advocate for individuals, families, and communities. At its core, my philosophy reflects a belief that every person deserves high-quality care shaped by cultural humility, mutual respect, and the pursuit of optimal health outcomes.

Nursing Experience and Expertise

My experience spans direct clinical care, interdisciplinary collaboration, and leadership in quality improvement. Through these roles, I have developed expertise in patient assessment, care coordination, and the application of best-practice standards. Each clinical interaction has reinforced the importance of empathy, communication, and accountability as foundational elements of the nursing profession.

Underlying Tenets Supporting My Philosophy

Several key principles guide my philosophy of practice:

  1. Humanistic and holistic care – Nursing involves treating the whole person rather than isolated symptoms, acknowledging social, emotional, and cultural influences on health (Watson, 2021).

  2. Commitment to evidence-based practice – Strong clinical decision-making draws upon research, clinical expertise, and patient values.

  3. Cultural humility and diversity – Recognizing and embracing diverse perspectives enhances therapeutic relationships and improves outcomes, especially in marginalized populations (Foronda et al., 2020).

  4. Global health awareness – Health inequities extend beyond borders; understanding global determinants of health strengthens local practice and broadens social accountability.

  5. Collaborative practice – Effective care requires interdisciplinary partnerships that leverage multiple perspectives to achieve shared goals (Reeves et al., 2020).

Goals for Expanding Experience and Practice as a DNP

As a Doctor of Nursing Practice (DNP) student, my goals include:

  • Enhancing leadership skills to guide clinical practice change and improve system-level outcomes.

  • Developing a deeper understanding of global health challenges affecting vulnerable populations.

  • Strengthening interprofessional collaboration to advance coordinated, patient-centered care.

  • Promoting equity and diversity at organizational and policy levels to address disparities in access and outcomes.

November 14, 2025
November 14, 2025

Qualitative Study Plan

In completing this assignment, you will design a general plan for a qualitative research study. Think of a topic that interests you and consider how you might study the topic with one of the qualitative research approaches about which you learned this week. Download the template and submit the completed form for this assignment. 

The form includes the following sections:  

  • Topic: In three to five sentences, identify and explain the study’s topic. This information should be clear and concise and written in a way that allows readers to understand the general topic of the study.
  • Purpose Statement: Write a purpose statement appropriate for a qualitative study. In completing this item, choose a qualitative research approach, consider who your participants will be, and identify what you want to know about them. Your purpose statement should be a single sentence and follow the Creswell and Creswell (2023) model presented below.
    • “The purpose (or study aim) of this ___________ (qualitative study or more specifically a qualitative approach, such as ethnography, case study, or other type) study is (was? will be?) to ___________ (understand? explore? develop? generate? discover?) the ___________ (central phenomenon being studied) for
      ___________ (the participants, such as the individual, groups, or organizations) at ___________ (research site)” (Creswell & Creswell, 2023, p. 127).
  • Research Questions: Write two research questions for the qualitative study you are designing. Remember the purpose of qualitative research is not to test hypotheses, but to explore phenomena and the lived experiences of participants. In writing your research questions, be sure to use open-ended questions that can be explored through the analysis of qualitative data. Below are some examples of qualitative research questions.
    • In what ways do peer mentors influence persistence in first-generation college students from Appalachia?
    • How do servant leadership behaviors in supervisors influence employee job satisfaction in nurses working in rural hospitals?
    • In what ways do gaming technology and incentives influence safe driving practices in teen drivers?
    • How does principal leadership impact teacher retention in low-income rural schools?
  • Qualitative Research Methodology: In three to five sentences, identify and describe the qualitative research method best suited to answer your research questions. Cite from the course text to justify your methodological selection. Examples include case study, phenomenology, narrative analysis, grounded theory, etc.
  • Participant Inclusion Criteria: List the inclusion criteria for participants from whom it would be appropriate to collect data for the study. Think about the characteristics participants need to possess to provide the qualitative data needed to answer the research questions. An example is provided below.
    • The study will include participants who meet the following inclusion criteria:
      • Currently employed as a nurse in a hospital located in a rural community in the United States;
      • Have worked for the same supervisor for at least one year; and
      • Not employed in a supervisory role.
  • Sources of Data and Data Collection Methods: In three to five sentences, identify and discuss the source(s) of data that would be needed to answer the research questions and how you might approach collecting the data. Your data must be qualitative and appropriate for the planned methodology. For example, if you are studying patient experiences with pain management care using a phenomenological approach, you might use semi-structured interviews with individual patients. If you are studying the impact of a support group for patients struggling with addiction using a case study approach, you might use semi-structured interviews with individual patients, observations during support group meetings, and patient medical data.

Qualitative Study Plan

Note:

plagiarism check required, APA7 format, include References, within 8hrs

– The submission demonstrates doctoral-level proficiency in organization, grammar, punctation, and style. The submission is well-written, and ideas are well-developed and explained with an appropriate level of detail.

– While this assignment is on a less formal and smaller scale, the use of a template for this assignment is intended to prepare you for the future tasks of completing a topic approval request and preparing an IRB application. Please do not alter the form or delete instructions; please submit the original form with your responses added as noted. If you use outside sources for this assignment, be sure to appropriately cite your sources and include them on the References page. The course text is already included as a reference and should be cited in the Qualitative Research Methodology section.

  • Topic: In three to five sentences, identify and explain the study’s topic.,

  • Purpose Statement: Write a purpose statement appropriate for a qualitative study.,

  • Research Questions: Write two research questions for the qualitative study you are designing.,

  • Qualitative Research Methodology: In three to five sentences, identify and describe the qualitative research method best suited to answer your research questions.,

  • Participant Inclusion Criteria: List the inclusion criteria for participants from whom it would be appropriate to collect data for the study.

November 14, 2025
November 14, 2025

Firewall Best Practices

There are many recommendations, guidelines, and best practices for firewall management. Some argue that an operating system’s host firewall software may offer sufficient security. Therefore, they suggest, all options should be evaluated before discounting the operating system’s host firewall software.

  • List and explain five typical firewall guidelines or best practices. Select two of the best practices that you feel are more important than the others.
  • Evaluate the Windows 7 or Windows 10 host firewall and one other operating system’s host firewall. Select the host firewall that you feel is superior and provide the rationale for your selection.
  • Discuss the inherent risk associated with relying solely on the host firewall for security and provide the rationale for your position.
    Firewall Best Practices
    • List and explain five typical firewall guidelines or best practices.,

    • Select two of the best practices that you feel are more important than the others.,

    • Evaluate the Windows 7 or Windows 10 host firewall and one other operating system’s host firewall.,

    • Select the host firewall that you feel is superior and provide the rationale for your selection.,

    • Discuss the inherent risk associated with relying solely on the host firewall for security and provide the rationale for your position.


    Comprehensive General Answer

    Firewalls are a critical component of network and host security, providing the first line of defense against unauthorized access and malicious activity. Adhering to firewall guidelines and best practices ensures that firewalls effectively protect organizational assets while minimizing performance impacts.

    Five Typical Firewall Guidelines or Best Practices

    1. Default Deny Rule – Configure the firewall to block all inbound traffic by default and allow only explicitly authorized traffic. This minimizes exposure to unknown threats.

    2. Regular Updates and Patching – Keep firewall software and firmware updated to protect against vulnerabilities and exploits discovered over time.

    3. Segmentation and Layering – Use multiple firewalls to create security zones, isolating critical systems from less secure networks.

    4. Monitoring and Logging – Enable logging for all traffic and review logs regularly to detect suspicious activity or policy violations.

    5. Strong Access Control Policies – Implement rules that restrict access based on IP addresses, ports, protocols, and user roles, ensuring only legitimate traffic reaches protected systems.

    Two Most Important Best Practices

    The Default Deny Rule and Regular Updates and Patching are particularly critical. Denying all traffic by default reduces the attack surface immediately, and keeping firewalls updated ensures defenses remain effective against evolving threats. Both practices directly impact the firewall’s ability to prevent breaches.

    Host Firewall Evaluation

    The Windows 10 host firewall provides robust inbound and outbound filtering, integrates with Windows Defender, and supports advanced security features such as rule grouping, app-based filtering, and logging with the Event Viewer. Compared to macOS’s PF (Packet Filter) firewall, Windows 10 offers more granular control for enterprise use, user-friendly GUI management, and better integration with other Windows security tools. Therefore, Windows 10 host firewall is superior in terms of configurability, usability, and integration with broader enterprise security policies.

    Risks of Relying Solely on a Host Firewall

    Relying only on a host firewall exposes inherent risks because it protects only the local system and does not filter traffic at the network level. It cannot control or monitor traffic passing between other devices on the network, leaving endpoints vulnerable to lateral movement from compromised devices. Additionally, host firewalls depend on proper configuration by users, and misconfigurations can create security gaps. A layered security approach that combines host firewalls with network firewalls, intrusion detection/prevention systems, and other security controls provides a far stronger defense.

November 14, 2025
November 14, 2025

Healthcare Fraud Analysis

Compliance is a comprehensive program that helps institutions, and their employees conduct operations and activities ethically; with the highest level of integrity, and in compliance with legal and regulatory requirements. To have an effective compliance program, an organization must establish and maintain an organizational culture that “encourages ethical conduct and a commitment to compliance with the law.”

Using the Office of Inspector General website ( https://oig.hhs.gov/) or the Federal Bureau of Investigations Health Care Fraud website ( https://www.fbi.gov/investigate/white-collar-crime/health-care-fraud), select a recent healthcare fraud case to review and share with your peers. Develop an 8 – 10 page white paper that provides a succinct overview of the healthcare finance fraud committed, including the details specified below.

In your review, please consider and include the following:

· The name of the organization

· Identify the parties involved

· Discuss the events that occurred

Healthcare Fraud Analysis

· Identify if the events that occurred is a violation of one federal laws discussed in this week’s content.

· What penalties were levied and enforced

· Provide a summary of lessons learned and measures that you believe could have been put in place to avoid this outcome.

Note: the paper should include references and be in a format suitable for professional delivery to an executive audience. The Finance Fraud Case White Paper is due no later than NLT 11:59 on Day 7.

Once you have completed your paper, upload it here, but also post it into the discussion forum for review by your peers. Peer review comments are not required this week, but you are encouraged to review your peers’ work for educational purposes.

  • The name of the organization,

  • Identify the parties involved,

  • Discuss the events that occurred,

  • Identify if the events that occurred is a violation of one federal laws discussed in this week’s content,

  • What penalties were levied and enforced

November 14, 2025
November 14, 2025

Secure Network Design

In this three-part assignment, you will design a secure network infrastructure.

The specific course learning outcome associated with this assignment is:

  • Plan a deployment of software and/or hardware, including implementation and testing considerations.

Instructions

Part 1

Use Microsoft Visio or an open-source alternative to:

  • Create a network infrastructure diagram, incorporating the following devices needed for a secure corporate network, placed where they will work, and citing specific, credible sources that support the design. Note: A web search will provide multiple examples of network infrastructure diagrams.
    • Web server.
    • FTP server.
    • VPN server.
    • Authentication server.
    • Anti-virus server (client-based and server-based).
    • Edge firewall.
    • Firewall.
    • Vulnerability scanner.
    • Intrusion detection system (IDS).
    • Web proxy.
    • Edge router.
    • Core router.
    • Switch.
    • Distribution router.

Note: All client-and server-based devices work where a client is installed on a workstation, which has bi-directional communication with a corresponding server.

Secure Network Design

Write a 6-10 page paper in which you:

  • Determine the specific devices you will use in the network, including the following information for each device:
    • Make or vendor’s name (for example, Microsoft, Redhat, Cisco, Juniper, Netgear, 3Com).
    • Model (for example, Windows 7, ASA 5500, Cisco 3500, Squid).
    • IP address assigned to all devices.
  • Determine the basic configuration of each network device, citing specific, credible sources that support the configuration.
    • Research each of the devices you chose and provide a basic configuration you would use in your network.
    • Use IP addresses to describe your configuration.
    • Identify the operating system.
    • Highlight at least five security features and the administrative controls incorporated into each device, including devices in the network diagram.
    • Explain the impact that each of your configurations has on the security of the entire network.
  • Explain the elements that must be addressed for planning and testing a network, citing specific, credible sources that support your assertions and conclusions.
    • Organizational requirements and expectations.
    • Budget.
    • Modularity for security and testing.
    • Naming conventions that facilitate layering and growth.
    • Determination of required network speed and data capacity.
    • Vendor support.
    • Determination of risk and redundancy.
    • Uptime requirements.
    • Continuous data monitoring for fault, failure, or security-induced changes.
    • Load balancing.
    • Testing for latency.
    • Bandwidth.
    • Throughput.
    • Specific software and tools.
  • Support your main points, assertions, arguments, or conclusions with at least four specific and credible academic sources synthesized into a coherent analysis of the evidence.
    • Cite each source listed on your source page at least one time within your assignment.
    • For help with research, writing, and citation, access the library or review library guides.

This course requires the use of Strayer Writing Standards (SWS). The library is your home for SWS assistance, including citations and formatting. Please refer to the Library site for all supports. Check with your professor for any additional instructions.

Part 3

Use Microsoft Visio or an open-source alternative to:

  • Update your initial diagram to create a final network diagram, incorporating at least four-fifths of the devices needed for a secure corporate network and citing specific, credible sources that support the design. Be sure to include vendor information, model information, and IP addresses. In addition, ensure that:
    • VPN sessions (from a laptop) are only allowed to access the desktops in the IT department by IT department employees.
    • All VPN connections from the Internet cloud into the corporate network terminate at the VPN server.
    • Users from Engineering and Finance and Accounting cannot communicate.
    • Vulnerability scans occur daily, with all desktops scanned at least once per day.
  • Create a network infrastructure diagram incorporating the following devices needed for a secure corporate network placed where they will work and citing specific, credible sources that support the design.,

  • Determine the specific devices you will use in the network including the following information for each device: Make or vendor’s name Model IP address assigned to all devices.,

  • Determine the basic configuration of each network device, citing specific credible sources that support the configuration.,

  • Explain the elements that must be addressed for planning and testing a network citing specific credible sources that support your assertions and conclusions.,

  • Update your initial diagram to create a final network diagram, incorporating at least four-fifths of the devices needed for a secure corporate network and citing specific, credible sources that support the design.