https://youtu.be/g1oVZbbvKy0 https://youtu.be/GafHfe12reE...

1 answer below »
there are seven video seminars , we should prepare a written note of 800 words for every video. I am sending the video links along with the sample work done by me. Thank you.


https://youtu.be/g1oVZbbvKy0 https://youtu.be/GafHfe12reE https://event.on24.com/eventRegistration/console/EventConsoleApollo.jsp?&eventid=2507084&sessionid=1&username=&partnerref=&format=fhvideo1&mobile=&flashsupportedmobiledevice=&helpcenter=&key=3C8ECF6F37371E52DA61F315B096AE48&newConsole=true&nxChe=true&newTabCon=true&consoleEarEventConsole=false&text_language_id=en&playerwidth=748&playerheight=526&eventuserid=441678995&contenttype=A&mediametricsessionid=380059488&mediametricid=3531307&usercd=441678995&mode=launch https://thedisruptionofwork.splashthat.com https://content.carbonblack.com/c/gioy1dctkh1rjxmskcfp?x=PEXOF9&mkt_tok=NzU2LURBVi0zMDcAAAF7fdN7Vns5VJn_B95Z3SmSDMQQVLMGGC1bSH3sZoMHJ59M_DuhzZ-DMlZJz24GOAVNIBfzEbbBrA6Tthe0RFMgmDxzbt7-xReEootr0i6Vhqly https://youtu.be/Zunq-bqogYs https://youtu.be/VhQODzQ3cq4 AMD in the public Cloud Documents for 3000/7000 for AMD in the public Cloud  INTRODUCTION It was the online event on Thursday,02 July 2020. The name of the topic is AMD in the public Cloud. It is Cloud based seminars and explain the whole seminar with help of one presentation. There were two speakers in this who presented this presentation. The sum of sub-topics are explain in this activity are optimize your cloud with AMD, changes the economics of the virtualized datacentre, leverage AMD EPYCtm: designed for cloud computing, leverage OPEX savings and performance to accelerate growth, Ease of migration, efficient of solutions for modern workloads, amazon EC2 and AMD, migrate to amazon EC2, amazon EC2 core platforms powered by AMD epyctm, customers save big with amazon EC2 powered by AMD epyctm, Microsoft azure and AMD, google cloud platform and AMD, oracle cloud and AMD, always free : whats included, IBM cloud and AMD and others.  SFIA Skills Related to engagement activity. There are number of SFIA skills in this presentation. Firstly, leverage AMD epyctm designed for cloud computing refers to the performance leadership, also has memory bandwidth, moreover give preference to the security features.it has more savings and increasing growth day by day. Beside of this numbers of application can be used in this stage. The output become like efficient solution in every fields. And explore why problems occur and how they can tackle these problems. Architecture tools: The worldwide availability in this cloud. The main role of the the more application such as aws, Microsoft azure, google cloud, IBM cloud and oracle. The tools which are helpful in the workloads field are M4, T2, R4, C4 these are used in older generation EC2 instance. The current generation used are M5, T3, R5, C5. With help of these migrate today to AMD EPYCtm processor powered amazon EC2 instances and save more than 10 percent to 45 percent. Moreover, big data analytics have tools are Hadoop, NoSQL, log analytics. And IT infrastructure, middleware apps has web, client, and more java application. If we talk about database which is very beneficial in the cloud has RDBMS which open source and proprietary database. For instance: My SQL server, Redis, oracle and SAP. SAP is more beneficial in the enterprise business filed. The one important thing is that Microsoft azure up to 24 percent HB instances faster than a leading bare-metal solution. Also, this has optimized cost and performance, performance and scale, balanced value, and high performance. This is cost efficient cloud solutions and leadership ecosystem readiness and solutions availability. Project management level 5: It is at level of 5. The reason behind this Helps power was global infrastructure. It has 39 different epyc CPU based instances sizes across 4 instances families, available globally most major regions. 18/24 geographic regions mean a physical location in the world where was has multiple availability zones. 57/76 availability zones mean distinct locations that are engineered to be insulated from failures in other availability zones. Moreover, its compute-optimize, general purpose and memory optimized which is leading x86 price performance and balance of CPU, memory and network, also fast performance for workloads that process large data sets in memory. Beside of this CPU powered amazon EC2 instances has all 10 to 45 percent priced than comparable and more advantages such as pick exactly, more specification, all sizes are available and manage the workloads. Moreover, clients save the data in large amount and increase the productivity.  Connection to ACS CBoK Knowledge Some knowledge gain from the already choose AMD to drive business growth such as experienced industry leader: CPU technology, GPU technology, 50-year-old innovator. Multigenerational server roadmap: launched in 2017, recently introduced 2nd GEN AMD EPYCtm. Easy migration to AMD instances: application compatibility, instance size compatibility. To reach these successes a lot of questions arises such as Why AMD EPYCtm for amazon EC2, Why AMD EPYCtm for AZURE, Why AMD EPYCtm for google cloud platform, Why AMD EPYCtm for IBM BARE METEL SERVICES. TCO advantages and edge opportunity can be passed on the purchaser for lower month to month bills, productive arrangements and empowers accessible for board scope of current remaining tasks at hand and child on, AMD troublesome estimating empowers lower cost per VM to Azure, wide environment backing and accessibility in numerous locales. Decisions are practically identical, Cost-effective arrangements, authority biological system status and arrangements, and simplicity of movement, Customizable, devoted IBM cloud uncovered metal workers and turn IBM cloud exposed metal workers on request. Additionally, all IBM uncovered metal workers work on the private, worldwide IBM cloud organize. Some of the disadvantage and attributors are the information contained herein is for informational purpose only and is subject to change without notice. Timelines, roadmaps and product release time dates such as plans can be changed and some time product names  Reflection This was the good presentation which provide us great knowledge about the clouds related AMD. This is very beneficial for all over the world today and in future as well. Moreover, helpful in these advance areas to modernize and save are move workloads, deployed on legacy for example AMD EPYCtm CPU powered instances and leverage your OpEx savings. Also, migrate and save such as move workloads, deployed on current instances to new AMD EPYCtm CPU powered instances and leverage your Opex saving. This is more flexible and highly beneficial. More savings and highly productivity in this. And beneficial for IT students this knowledge in future.  Evidence of Attendance http://piccccccccccccc.jpg Comments
Answered 16 days AfterMay 20, 2021

Answer To: https://youtu.be/g1oVZbbvKy0 https://youtu.be/GafHfe12reE...

Tanmoy answered on May 21 2021
142 Votes
Seven video seminars
Topic 1: Webinar - Artificial Intelligence and Machine Learning in Unity
Introduction
The discussion was based on three topics which are AI Planner, ML-Agents and Barracuda. All these topics have been presented through webinar which will be hosted by Marek Marchelwicz on YouTube. AI planner is used to determine AI behaviour by using cleaning robots. Next it will be ML or Machine learning agents which is an open source project implemented by Unity. Through Barracuda the presented tries to procedure to make models in the machine learning Unity. This is done only through a package known as Barracuda. Through these Artificial Intelligence and Machine Learning tools we are able to make various images, pictures as per our desires. These topics are diverse and are of great significant in the AI and ML process. The session of the webinar is of one hour twenty minutes where the presenter explained all the things in details.
SFIA Skills Related to engagement activity
This AI activity is interrelated to various factors of the SFIA skills related framework, like virtual Chatbot, autonomous flying, sports analytics and activities; security and sur
veillances. Along with this the AI skills can be used in the field of agriculture and farming, retail, shopping and fashion technology, production and manufacturing, self driven cars and automated vehicles, healthcare and medical imagining evaluation and in warehouse, logistics and supply chain management.
Methods and Tools: Level 7 – we observed that the AI narrow intelligence is used for performing narrow tasks like recognition of the human speech and convert it into machine level language using natural and personalized ways. Examples are Google Assistant, Cortana or Alexa. We also observed that AI general intelligence illustrates the universal cognitive abilities of the human beings like intensive calculations and processing the data at incredible speed. AlphaGo is a computer program for playing board game GO. As per our observation AI super intelligence is a feature which surpasses human intelligence and is a thing of the future. It will be used for decision making, creating emotional relationship and making arts and diagrams.
Project Management: Level 7 – We discussed with the AI project management team it was discovered that the AI activities are implemented on a large scale. Hence I would classify AI being related to level 7 of SFIA skills.
This activity linked to Machine Learning are related to various factors of the SFIA skills framework which are used in the fields of forecasting, web related services, online tutorials and Automated machine learning.
Methods and Tools: Level 6: we observed that the methodologies and tools used at this level in ML are used for identification like trend analysis and auto tagging. We observed that it is used in multiple classifications and making them connected with each other; used for activities like ranking and prioritization.
Project management: Level 7: We further observed that Recommendation and Prediction are the two other level of ML which is used in the field of weather prediction and assisting the farmers during agriculture through satellite images. Thus after observing these projects implemented by the ML teams it was decided by me that they are handling small sized project restricted to specific regions and hence they are classified as being within Level 7 of SFIA skills.
This activity is linked to Barracuda are related to various factors of the SFIA skills framework which are used in the fields of security, networking, cloud services and storage of network based applications.
Method and Tools: Level 5 – Barracuda launched the spam and virus firewall which was found to be used by large enterprises and Internet Service Providers.
Project Management: Level 5: we also had an opportunity to discuss with the project management team of Barracuda and found that their project are of medium sized and hence I classified this as being related to Level 5 within SFIA
Connection to Webinar - Artificial Intelligence and Machine Learning in Unity CBoK Knowledge
This activity covered various aspects of the CBoK. We discussed with the project leads responsible for the management of projects related to AI, ML and Barracuda. We found that these managers have years of experience in the automation industry.
We also observed and based on this evaluated that the employees working on AI, ML and Barracuda are based on their skills and efficiency acquired over a period of time in automation, security management, trend analysis and classification like that of AI in making playing game board ‘Go’, it can be stated that most of the employees had AQF level 7 training.
Reflection
All these models act as a package which helps in the creating games and three dimensional robots. Through this the developers are able to alter and implement the AI and ML agents as per their requirements. Barracuda is a tool which helps the Machine learning (ML) to work effectively without any errors. Thus the tools used for ML helps in creating agents which assists to generate and execute plans. The presenter Marek Marchelwicz was able to show the basic process of the three tools effectively through this webinar. Therefore, this enabled us to know and understand what machine learning and Artificial intelligence is all about.
Evidence of Attendance
Topic 2: Webinar: Cyber Security - Is a secure future possible?
Introduction
This is a webinar on cyber security which is presented by John Williams. This was a webinar which was participated by 200 attendees from different locations in Australia and globally. The webinar was conducted in the most synchronised manned by delivering due respect to all the custodians and owner of the land from where the webinar was held; the elders, the aboriginal and Torres islander people of the country and the entire community. The main purpose of this webinar is to discuss on the importance of cyber security and its future developmental plans. As per a research conducted by side desert security ventures, the global cyber crime costs is expected to grow to more than 15% over the next five years which will make the costs to $10.5 trillion by 2025 from $3 trillion in 2015. Also, by 2026 there is expectation that there will be more than 18000 cyber security professionals. There will be number of cyber security course which will be delivered in Australian Universities like cyber defense, cyber criminology and criminology cryptography. There are number of participants who are found to have delivered their viewpoint on the future of cyber security. The same will be discussed and analysed in details.
SFIA Skills Related to engagement activity
This activity is related to several aspects of SFIA skills framework which is specific to the government agencies and private organizations facing issues related to hacking and cyber threats.
Methods and Tools: Level 9: As we observed that the methodologies required acquiring the skills requires a master degree. The graduates’ who will learn of the various cyber security threats and management, needs to have foundational, cognitive, technical and good communication skills. They also need to undertake routine activities and identify as well as report on simple issues and problems for becoming experts. Further, we also discussed on the various cyber security tools used to protect the organizational system from cyber threats. These tools are firewalls, public key infrastructure, outsourced cyber security services through MDR or managed detection and response; antivirus software, penetration testing and highly sophisticated training to the employees of the organizations.
Project Management: Level – 9: we had an opportunity to discuss this issue with the project management team during the webinar where we found that the cyber security threats are an important issue and a matter of concern especially for the government organization which consists of huge database of people. Hence, management and securing these is a matter of concern and requires huge skills and efficiency. The projects that are being management by the team are mostly government and large private sectors and hence I would classify this as relating to level 9 within SFIA skills.
Penetration Testers: Level 8 – we observed that the employees are generally ethical hackers who are responsible for testing the networks, system and the applications and look for the vulnerabilities which can restrict the malicious attacks.
Connection to Webinar: Cyber Security - Is a secure future possible? CBoK Knowledge
The Cybersecurity activities covered varied aspects of CBoK knowledge. We had a discussion with the project team and their leads responsible for managing various aspects of the cyber security projects. These projects were mostly in government organizations and large private companies where there are threats of the information being hacked, malware or ransomware. The project managers were chief security office and chief information security officer who are responsible for implementation of the security physically throughout the organization and monitoring of the IT security of all the departments of the organization.
We also discovered that the employees’ works in a range of specific areas like penetration testers, security architects, security engineers and analysts who are mainly responsible for identification, controlling, planning, analysing, quality control of the organizational system and most of these employees had already cleared AQF level 8 & 9 training.
Reflection
The above discussion was really a fantastic topic where the discussion was to protect the public health system and data during the covid-19 pandemic situation from the hackers. The presentation was focused on hackers, but the main spotlight will be on vulnerabilities which are the first place of the problem. Also, the software installed to protect the hacking and its accountability if hacking occurs needs to be reviewed by the project teams. The ultimate aim of the cyber security by the project team will be to protect against any kind of unauthorised exploration by hackers in the organizational system and in their networks. This is because if the cyber hackers are able to penetrate the organizational system then it can have devastating impacts resulting in damage, unauthorised access of data and customer records which can be of financial nature i.e. bank information, passwords, balance etc. Therefore, it is essential to develop updated Cybersecurity tools and advanced methodologies which can help to detect as well as protect from cyber threats.
Evidence of Attendance
Topic 3: ICSL MRE 2021 Cybersecurity Webinar & ICSL Malware and Reverse Engineering Webinar -Threat Intelligence
Introduction
In this webinar we will try to discuss on the MRE 2021 Cybersecurity topics which uses analytical techniques in order to fight cybercrime and for internet security. Through this discussion we will try to evaluate various topics like threat intelligence, banking malware and ransomware, fraud detection, blockchain, IoT security, privacy and text mining, Phishing attack analysis and prevention, cyber capability analysis and forensics. We will also learn about reverse engineering (MRE) which bridges between industries, law enforcement and academia with a strong emphasize on malware related results. The various types of malwares that are threat to intelligence are banking malware, RATs, ransomware. On the other hand we will also discuss on the ICSL malware and reverse engineering agenda which is called threat intelligence. Through this we will try to learn on what are YaraNG; the various issues in this process...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here