The presentation must meet the following requirements: 11 to 15 slides of easy-t

The presentation must meet the following requirements:
11 to 15 slides of easy-to-understand content (text and visuals).
Remember, your audience is the IT team within an accounting firm.
voice annotation for every slide (excluding the reference slide)
at least two references
Content should include work that needs to go into making the upgrade
successful, how to improve security using two or three of the Windows 10
built-in features, and how-to backup and restore Windows 10 data using
some of the tools available in Windows 10.
The presentation should address your recommendations for the following |
items:
Version Summary
Recommended version of Windows 10 (e.g., Windows 10 Pro,
Enterprise, Pro Workstation) and specific reasons for your choice (e.g., security features, technical and business requirements).
Installation Methods
Explain Windows 10 deployment methods. Which method or methods you think will be appropriate for the upgrade? Consider the hardware specifications outlined in the project scenario.
Security Features
Windows Security, BitLocker, Defender, Local Security Policy
Backup and Recovery Overview
Discuss the importance of backing up and recovery of Windows 10.
This can include explaining what types of files and data that can backed up and restored. This should address:
the problems encountered when Tetra Shillings Accounting fell
victim to a ransomware attack that resulted in the loss of critical data.
the concerns that Tetra Shillings Accounting has concerning
recovering data that is lost due to deletion, corruption, or media
failure.
the ability to restore system files and settings without affecting
the user’s personal files and data.
the concerns that the client has about recovering systems that
are negatively impacted by an operating system update.
Backup and Recovery Tools
You will need to explain how to use Windows 10 backup and recovery tools to meet these objectives. Provide a brief overview of each tool
and how it can be used to address the company’s concerns.
Use screenshots to demo how to configure backups that address the firm’s need to recover from a ransomware attack and restore the system to a state before a Windows update, driver, or application was installed. ****I, Robin Dubrier, will input these myself*****
Backup to Recover from Ransomware Attack
Describe how to back up and restore individual files using the utilities available in Windows 10. This should provide the client the ability to restore files lost due to ransomware attacks or other potential risks.
Backup and Recover a Restore Point
Research how to protect backup data that is stored on the network.
Based on your research, you need to present a strategy to protect
backup data that is compromised during a ransomware attack. This will most likely require a strategy to store, copy, or move backups to
an offsite location. In this slide, you will need to explain the risks of
only having only having a single copy of a backup stored on the
network. Think about if the client suffers another ransomware attack and the corrupted data cannot be restored because the backups
were also compromised during the attack.
PLEASE NOTE THE BELOW GRADING:
How Will My Work Be Evaluated?
In this assignment you are being called upon to present a high-level |technical presentation to your client’s IT Team.
But the challenge you face is in expressing a technical solution
without getting bogged down in too much detail. You simply want to
introduce or refresh the audience on the key points of Windows 10
benefits, including security and backup methods.
Find a way to relay your solution (and challenges) in language that
your audience will find easily relatable.
The following evaluation criteria aligned to the competencies will be used to grade your assignment:
1.1.2: Support the main idea and purpose of a communication.
1.3.3: Integrate appropriate credible sources to illustrate and validate ideas.
2.3.5: Articulate the implications, consequences, and potential limitations of proposed conclusions and solutions.
10.1.1: Identify the problem to be solved.
11.1.1: Explain appropriate preparation procedures.
1.2.1: Configure technology according to stakeholder specifications and requirements.
12.6.1: Identify the controls needed for confidentiality.