Letter of Intent as an Educator

Letter of Intent as an Educator 

Write a 250-500 word letter of intent as an educator that includes   the following:

  • A brief description of specific curricular and professional     progression requirements and how they will be fulfilled.
  • A     brief description of the licensure and certification requirements in     your state and how they will be maintained.
  • How you will     maintain your dispositions in the classroom, through demonstrating     ethical behavior in instruction and assessment.
  • Goals for     professional development and areas for continued learning.

APA format is not required, but solid academic writing is expected.

This assignment uses a rubric. Review the rubric prior to beginning   the assignment to become familiar with the expectations for successful completion.

You are required to submit this assignment to LopesWrite.

Second Draft

Report Issue

It’s Fine to Be a Misfit

Lidia describes misfit as a person who cannot fit in with the rest of the people. In other words, a person who fits in badly. Lidia is a writer one of the books that she has written is the chronology of water. In the book, she describes her life as a swimmer, (Yuknavitch, 2016). She grew up in a very abusive household. She was in a staycation jail her two marriages had failed and she had failed in college twice. One of her tough moments was when her daughter died the day that she was born. She says that she has not overcome the story of her daughter’s death.

Lidia encourages people who have experienced failure or loss that they are beautiful and that they should not be afraid to share their experience with others.

She began a memoir a decade ago and she published it in 2011. Her story won the literary award, (Glazier, 2017). She went to New York and had the privilege to stay in one of the luxurious hotels.  She ate in the restaurant and the cost of the meals was higher than her monthly rent. While on the trip she was privileged to meet three of her favourite women who were writers. She felt like an impostor. Even after meeting the three women she did not make any book deals. She went home with napkins that proved that she was from New York.

She further says that misfit does not know how to say yes or to say what they really want even though it is in front of them. It becomes a sham felling or wanting something that is good. Lidia has written two books and is now a teacher as well as a mother, (Gall, 2017). She speaks to some of her fellow misfit who was in the room and tells them that most cultures use the myth to follow your dreams. In her speech, she says that it is called a hero’s journey. Although she preferred the misfit’s myth.

Everyone has the ability to reinvent themselves and that is everyone’s beauty. You can be a survivor of abuse, a drunk addict, an ex-con, or a homeless person. You can lose a husband or loss money and worst of all lose a child which can be painful, (Hollis, 2017). You can also lose marbles. You can be a failure or standing at the dead center but you are still beautiful and your story needs to be heard by others. You are a phenomenal and rare misfit. In the speech, she is encouraging the people who have failed or gone through a more terrible experience. In addition, it is also important to know that everyone’s story is different, (Yuknavitch, 2017).


Hollis, C. W. (2017). Thinking Back through Virginia Woolf: Woolf as Portal in Lidia Yuknavitch’s The Small Backs of Children. Virginia Woolf and Heritage, 251.

Gall, A. (2017). The other side of burning. Poets & Writers Magazine, 45(3), 30-37.

Glazier, S. (2017). The Water Will Hold You: On Lidia Yuknavitch’s The Chronology of Water. In Reading and Writing Experimental Texts (pp. 167-187). Palgrave Macmillan, Cham.

Yuknavitch, L. (2016). Lidia Yuknavitch: The beauty of being a misfit .

Yuknavitch, L. (2017). The Misfit’s Manifesto (Vol. 2). Simon and Schuster.

the link of the ted talk:

the requirement and the first draft are uploaded. I need more words. analysis the ted talk from her purpose, her emotions, the words she uses, and also the body language

Conflicts In The Aeneid

What are the major conflicts in The Aeneid? Go beyond just Dido and Aeneas, Greeks and Trojans, to consider other less obvious ones. What types of conflicts (physical, moral, intellectual, or internal) can you detect? Describe the conflict(s), and resolution if there is one, in detail with multiple references to the text in your response.

Continuous Improvement

onduct 1-2 “5 Whys” on a real problem at your work.  Document the findings and be prepared to discuss.  Conduct at least one gemba walk at work and write a 750-1000 work subsection in your paper on the approach, execution and findings of the gemba.  Develop a plan to remediate gemba findings. 


Respond to the following in a minimum of 200 words:   

Research and use one or more peer reviewed journal articles to support this response. Properly cite your reference in APA format. DO NOT use the text book as your reference.

Read the following case study, and reply to one of the prompts:

Infinity Computers Inc. produces notebook computers, which it sells through direct mail catalog companies under the Infinity name and in some retail computer stores under their private brand names. Infinity’s products are not significantly different from competitors’, nor do they have extra product-enhancing features, although they are very price competitive. The strength of the company has been its CEO and president, George Anderson, and a highly motivated, loyal workforce. The firm’s weakness is having too many employees and too great a reliance on one product. The firm switched to computers with the Intel Core i7 processors after it saw a decline in its netbook computer sales.

Recognizing that the strategies that initially made the firm successful are no longer working effectively, Anderson wants to reorganize the company to make it more responsive and competitive and to cut costs. The threat of new technological developments and current competitive conditions could eliminate Infinity.

  • Evaluate Infinity’s current situation and analyze its strengths and weaknesses.
  • Evaluate the opportunities for Infinity, including using its current strategy, and propose alternative strategies.
  • Suggest a plan for Infinity to compete successfully over the next 10 years.

Decision Making In The Simulation

Reflecting on your learning in the MBA program, section 4.2 of the CapSim Team Member   Guide, and Pettus, Chapters 5 and 6, identify and explain the value of a marketing strategy that could lead to market dominance for your product and/or company.  What decisions are you considering in Practice Round 1 to maximize your market share? Discuss your approach in terms of the marketing mix variables.

Include in your assessment:

Your approach to each of the marketing mix variables (product (R&D), price, place, and promotion)  Approach to growth in terms of market penetration, development and product development as discussed by Pettus in Chapter 6.   How your strategy can be achieved through CapSim decisions

Discussion Question

Discussion 1

Your initial post should be at least 250 words in length, which should include a thorough response to each prompt. You are required to provide in-text citations of applicable required reading materials and/or any other outside sources you use to support your claims. Provide full reference entries of all sources cited at the end of your response. Please use correct APA format when writing in-text citations  

  1. Explain the implications of globalization 
  2. Identify at least two ethical issues that go along with the global societal topic (poverty and income inequality) you have chosen for your final essay.
  3. Explain how globalization contributes to or affects these ethical dilemmas.
  4. Propose solutions to these ethical dilemmas that are feasible financially, socially, and culturally.

Cyber Security Network Design-

Assignment Description Tasks: There are two parts to this assignment, i.e. part A and part B. A. Write a review article for the topic described below. Note that final mark of part A would be affected by the presentation result of part B. This is to assure that students understand the work presented in part A. overall mark of part A could be deducted by 50% for poor presentation 90 marks B. Presentation (to present a maximum of 8 slides in 8 minutes) 10 marks Part A description: Topic – infrastructure can be limited to one location or, widely distributed, including branch locations and home offices. Access to the infrastructure enables the use of its resources. Infrastructure access controls include physical and logical network design, border devices, communication mechanisms, and host security settings. Because no system is perfect, access must be continually monitored; if suspicious activity is detected, a response must be initiated. Figure 1 shows the topology of a network that has not been properly segmented. The network topology consists of a Call center, a Branch, a Warehouse, and a Data center. BN223 Cyber Security Principles Page 3 of total pages Prepared by: Dr. Ghassan Kbar Moderated by: Dr Sihui (Sue) Zhou May, 2019  The Call center shows two file servers, one application server, and a database server that is connected together directly and diagonally. The file server on the left is connected to two laptops and the file server on the right is connected to a telephone. The application server is connected to two servers on the right and left and to a switch.  The Branch consists of a file server that is connected to a laptop, telephone, and to a switch that is further connected to a credit card reader at the top and to a server on the right and to a database server at the bottom.  The Warehouse consists of a file server that is connected to a laptop and a telephone at the top, an application server at the bottom that is further connected to a database server at the bottom. The database server of the call center, branch, and the warehouse are connected to the two database servers of the data center.  The data centers are connected to two application servers directly and diagonally. The application servers are connected to two database servers at the bottom and to a firewall on the right that is further connected to a switch. The application servers are connected to the “POS Application” consisting of a set of two servers that are connected to each of the application servers. Each server is again connected to the “Identity and Authentication System” consisting of two application servers on the right and two servers on the left. The two application serves on the left and right are connected to two servers. The switch at the top is connected to a service provider that is further connected to acquiring banks. You need to cover the following topics Why Segment a Network? Working from the inside out, network segments include the following types:  Enclave network: A segment of an internal network that requires a higher degree of protection.  Trusted network (wired or wireless): The internal network that is accessible to authorized users.  Semi-trusted network, perimeter network, or DMZ: A network that is designed to be Internet accessible. Hosts such as web servers and email gateways are generally located in the DMZ.  Guest network (wired or wireless): A network that is specifically designed for use by visitors to connect to the Internet.  Untrusted network: A network outside your security controls. The Internet is an untrusted network. 1. Security Consideration when segmenting a network: a. Apply security measures to secure the access of internal network. BN223 Cyber Security Principles Page 4 of total pages Prepared by: Dr. Ghassan Kbar Moderated by: Dr Sihui (Sue) Zhou May, 2019 b. Apply security measures to secure the access of external network. c. Apply security measures to secure the access of perimeter network. d. Apply security measures to secure the access of guest network. e. Apply security measures to secure the access of data sent over public network. Securing the Network Topology: The network topology in Figure 1 shows an enterprise that has a call center, a branch office, a warehouse, and a data center. The branch is a retail office where customers purchase their goods and the enterprise accepts credit cards. Users in the call center and the warehouse have access to the resources in the Branch office and vice versa. They also have access to resources in the data center. If any device is compromised, an attacker can pivot (or move laterally) in the network. 2. List all assets at the branch and call centre, and assess the vulnerability associated with these assets assuming that database server is based on SQL, and file servers and application servers are running at Window server platform. 3. You need to redesign this network by adding relevant Firewalls to allow the traffic from the credit card readers to communicate only with specific servers in the data center. Draw a diagram to show the location of the proposed firewalls and explain their roles. (Note you need to consider securing the access at different levels as described in network segmentation above) a. Firewall can be based on content filtering or other techniques. Explain the role of Content Filtering and Whitelisting/Blacklisting. Comment on which section (call centre, branch, and warehouse) this content firewall would be helpful. 4. Explain the role of Border Device Administration and Management that can be used to enhance the network security. 5. Different role of security team such as Blue, Red, and Purple can have impact of the network security. Creating a Request for RFP for Penetration Testing You have been asked to send out a red team penetration testing Request for Proposal (RFP) document. a) Explain what is often referred to as a “red team.” b) Explain the difference between a red team and a blue team. c) Find three companies to send the RFP to. Explain why you chose them. d) The selected vendor will potentially have access to your network. Describe the due diligence criteria that should be included in the vendor selection process. Select one of the companies from the previous step and find out as much as you can about them (for example, reputation, history, credentials). 6. Access Control: a. Explain the role of Border Device Security Access Control Policy b. Explain the remote access security policy. c. Develop a relevant User Access Control and Authorization Policy d. The following example Role-based access controls (RBACs) (also called “nondiscretionary controls”) are access permissions based on a specific role or function. Administrators grant access rights and permissions to roles. Users are then associated with a single role. There is no provision for assigning rights to a user or group account. Let’s take a look at the example illustrated in Figure 2 BN223 Cyber Security Principles Page 5 of total pages Prepared by: Dr. Ghassan Kbar Moderated by: Dr Sihui (Sue) Zhou May, 2019 In the sample “Omar (Engineer)” is shown at the top right and “Jeannette (Sales)” is shown at the bottom right. The Access is granted to three Engineering Servers and Applications at the top left from the Omar. From Jeannette, the Access is granted to the Sales Applications at the bottom left and the Access is denied to the Engineering Servers and Applications. i. Explain why Omar can access the Engineering servers and applications but not Jeannette. ii. Give examples on how to implement Role-based access controls in Windows and Linux 7. Explain a relevant Monitoring System Access and Use Policy Reviewing user access permissions can be a time-consuming and resource-intensive process and is generally reserved for applications or systems that have information classified as “protected” or “confidential.” a) Comment if student portal at your school would be subject to an annual user access permission audit or not and why. b) Automating review processes contributes to efficiency and accuracy. Research options for automating the user access review process and make a recommendation. 8. Researching a DDoS Attack: a. Find a recent news article about DDoS attacks. b. Explain who were the attackers and what was their motivation. c. Describe the impact of the attack, and what should the victim organization do to mitigate future damage. 9. Analyze the network availability at the Datacenter and develop a Business Continuity plan to handle a possible crisis associated with flood or earthquake. Reference: Sari Greene, Omar Santos, “Developing Cybersecurity Programs and Policies, Third Edition”, Pearson IT Certification, July 2018. Instructions: Prepare your article as below BN223 Cyber Security Principles Page 6 of total pages Prepared by: Dr. Ghassan Kbar Moderated by: Dr Sihui (Sue) Zhou May, 2019 1. Go to the IEEE website and download the WORD template for the format. https://www.ieee.org/publications_standards/publications/authors/author_templates.html 2. Another link for the template: https://www.ieee.org/publications_standards/publications/journmag/ieee_tj_template_17.pdf 3. Read and familiarize yourself with the instructions carefully. 4. Prepare a paper using the IEEE format and the example attached. Follow the template if there are any confusions. Also, refer to the link below to have ideas how to start (see section 6). (https://www.ieee.org/publications_standards/publications/authors/author_guide_interactive.pdf) 5. Complete the assignment (minimum 5 and maximum 8 pages) including all the sections below. The number of words will be counted thoroughly and you must keep the minimum number of words to avoid any penalties.  Title (maximum 15 words)  Abstract (200 – 250 words)  Introduction (500 – 1000 words)  Literature Review (500 – 1000 words)  Main body (1000 – 1500 words)  Conclusion (200 – 300 words)  References (minimum 10 references) 6. The article must be a ‘Review’1 article including at least 10 references and not more than 25. 7. Strictly follow the IEEE reference format for in-body citations and the references section. 8. See the files listed in 4 for guidance on how to prepare a review paper. You can also find thorough instructions from IEEE and the Internet. 9. Contents must include:  History and background of the topic  What are the challenges and drawbacks, what solutions and workouts they found  Possible options (solutions) and future research areas proposed  Scopes of topic, progress of developments such as requirements, benchmarking, purposes & objectives, stakeholders, owners, roles and responsibilities where applicable.  Flowchart  Include a minimum of two (2) figures to show the overall concept and summarized overview of the topic from the review of minimum 10 – 15 (but not limited to) papers.  Include some tables to summarize the result of findings 1 See http://www.editage.com/insights/6-article-types-that-journals-publish-a-guide-for-early-career-researchers BN223 Cyber Security Principles Page 7 of total pages Prepared by: Dr. Ghassan Kbar Moderated by: Dr Sihui (Sue) Zhou May, 2019  How each organization approaches, initiates, develops procedures and ownerships, and what results they got, and how it affected their businesses.  What you conclude in terms of the topic/solutions to implement in an organization. Consider other aspects to include for a good review paper. 10. Remember to strictly follow the template and the instructions above to avoid penalties. Part B description: Prepare 5 slides for

Assignment – Threat Modeling Project

Subject: Security Architecture & Design

Assignment Question:  

STRIDE is a model-based threat modeling technique developed by Microsoft. The methodology guides the security analyst through several activities that must be conducted in order for the process to be effective.

For this assignment explain what are the steps for addressing a threat modeling project. Please provide explanations for each step stated.  Please state your answer in a 2 page paper in APA format.  Include citations and sources in APA style.

“No plagiarism”

Learning Materials and References (Prof posted in course syllabus)

Required Resources

Shostack, Adam. Threat Modeling: Designing for Security, Indianapolis, IN: Wiley, 2014

Recommended Resources

Please use the following author’s names, book/article titles, Web sites, and/or keywords to search for supplementary information to augment your learning in this subject.

Tony UcedaVelez and Marco M. Morana

Rick Centric Threat Modeling: Process for Attack Simulation and Threat Analysis

Grading Criteria Assignments                                             Maximum Points

  1. Meets or exceeds established assignment criteria                                                                                 40
  2. Demonstrates an understanding of lesson concepts                                                                              20
  3. Clearly presents well-reasoned ideas and concepts                                                                               30
  4. Uses proper mechanics, punctuation, sentence structure, spelling and APA structure                          10