WE WRITE CUSTOM ACADEMIC PAPERS

100% Original, Plagiarism Free, Tailored to your instructions

Order Now!

NTC/411 Global Network/Management, Support and Security

SYLLABUS
Course Description
This course broadens the concept of network design and analysis to include global considerations for an enterprise
network configuration. This course introduces the topic of overall end-to-end network management, the concepts, and the
available tools to the network designer. The development and management of the relationships between the enterprise and
the Wide Area Network (WAN) providers is discussed. Network security, disaster recovery, and business continuity
planning is also addressed in this course.
Course Dates
Aug 16, 2016 – Sep 19, 2016
Faculty Information
? Academic Policies
? Instructor Policies
University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be
slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the
policies governing your current class modality.
Academic Resources
? Course Software
Instructions
Click the link for additional course software requirements.
Note: We do not recommend trial software versions because they expire.
SupportingMaterial
Course Software
? College of IS&T Resources
Instructions
Click the link to review the College of IS&T Resources.
SupportingMaterial
College of IS&T Resources
? College of IS&T Website
Instructions
Click the link to access the College of IS&T Website.
SupportingMaterial
College of IS&T Website
Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the
following two documents (both located on your student website):
Policies
Name : Denis Brooker (PRIMARY)
Email Address : debrooker@email.phoenix.edu
Phone Number : See Policies
Get Ready for Class
? Familiarize yourself with the textbooks used in this course.
Instructions
Haag, S. & Cummings, M. (2013). Management information systems for the information age (9th Ed.). New York, NY:
McGraw-Hill/Irwin.
Turban, E. & Volonino, L. (2015). Information technology for management: Digital strategies for insight, action, and
sustainable performance (10th Ed.). Hoboken, NJ: John Wiley & Sons.
Whitman, M. E. & Mattord, H. J. (2015). Principles of information security (5th Ed.). Boston, MA: Course
Technology/Cengage Learning.
Course Materials
All electronic materials are available on your student website.
Week1 Aug, 16 – Aug, 22
Network Management
1.1 Analyze the importance of network configuration documentation and best practices.
1.2 Develop network configuration documentation to assure efficiency in network services.
1.3 Explain the levels of network bandwidth capacity requirements.
1.4 Illustrate a network bandwidth capacity requirement.
1.5 Identify industry standard network Service Level Agreements.
Objectives/Competencies
Required Learning Activities
? Ch. 1, Information Technology for Management
Read Ch. 1, “Doing Business in Digital Times,” in Information Technology for Management: Digital Strategies for
Insight, Action, and Sustainable Performance.
Instructions
? Extended Learning Module E, Management Information Systems for the Information Age
Read “Extended Learning Module E: Network Basics” of Management Information Systems for the Information Age.
Instructions
? Network Configuration Visio? Documents
Review the Network Configuration Visio? documents (5 diagrams in Visio?) and the written description of the network.
Network Configuration Visio? .zip Files
Support Material
Instructions
? Week One Electronic Reserve Readings
Read this week’s Electronic Reserve Readings:
? “MPLS Technology in Wireless Networks” in Wireless Networks.
? “Designing Service Level Agreements for Inventory Management” in Production & Operations Management.
Week One Electronic Reserve Readings
Support Material
Instructions
? Lynda.com?: Network Diagrams
Watch Lesson 18, “Network Diagrams,” of the Lynda.com? course “Visio 2007 Essential Training,” with David Rivers.
Lynda.com Video Access
Support Material
Instructions
? Lynda.com?: The Open Systems Interconnection (OSI) Model
Watch “The Open Systems Interconnection (OSI) Model” from Lesson 1, “Networking,” of the Lynda.com? course
“Windows 8 Networking and Security” with Steve Fullmer.
Lynda.com Video Access
Support Material
Instructions
? Supporting Activity: SLAs, Best Practices, and Bandwidth
Review the Electronic Reserve Reading, “Designing Service Level Agreements for Inventory Management.”
Discuss the following:
? What are the current standards for Service Level Agreements?
? What are the levels of network bandwidth capacity requirements?
? Why will we build a business continuity plan during this course?
Week One Electronic Reserve Readings
Support Material
Instructions
Assignments
See the student website for additional recommended learning activities that may help you learn this week’s concepts.
Title Type Due Points
Week One Participation
Instructions:
Participate in class discussion by posting a minimum of 8 substantive
posts over a minimum of 3 days of the week. DQ responses,
assignment posts, and any post that is on topic with the objectives of
the course and contributes toward the discussin in a substantive way
counts. Each substantive post counts for .5 (1/2) points. Posting over
3 days of the week is required. Posting for only two days of the week
will result in a deduction of 1/3 of the points calculated by the number of
posts. Posting for only one day of the week will result in a deduction of
2/3 of the points calculated by the number of posts.
Individual Aug 22, 2016 11:59 PM 4
Individual: Network Design Assessment Chart
Instructions:
Resource: Network Configuration Visio? documents for International
Plastics, Inc. See zip file: InternationalPlasticsIncNetwork.zip
Scenario: As an IT administrator for your organization, your supervisor
has given you an assignment to review and evaluate ways for
improving the network for International Plastics. Your task, as detailed
below, includes reviewing the existing network services and
configuration documents to seek ways to improve the network and to
add greater seamless efficiency to the network serving the enterprise.
Create a 2-page Excel? spreadsheet that identifies areas of concern
based on your review of the network along with a proposed solution
(see example below).
Area of concern
Proposed solution
Bandwidth of WAN
Increase bandwidth
Areas that should be considered per location:
? Existing documentation
? Network bandwidth capacity requirements
? Industry Standard Service Level Agreements
? Use of best practices in network configuration
Submit your assignment using the Assignment Files tab.
SupportingMaterial:Network Configuration Visio? DocumentsToolwire?
Personal Student Desktop Access
Individual Aug 22, 2016 11:59 PM 10
Week2 Aug, 23 – Aug, 29
Network Management Protocols and Tools
2.1 Compare network management protocols.
2.2 Choose an appropriate network management protocol and software.
2.3 Determine the usefulness of enterprise systems in today?s business environment.
2.4 Describe the value of Business Intelligence and Decision Support Systems.
Objectives/Competencies
Required Learning Activities
? Ch. 1, Management Information Systems for the Information Age
Read Ch. 1, “The Information Age in Which You Live,” of Management Information Systems for the Information Age.
Instructions
? Ch. 2, Management Information Systems for the Information Age
Read Ch. 2, “Major Business Initiatives,” of Management Information Systems for the Information Age.
Instructions
? Section 3.4, Information Technology for Management
Read Section 3.4, “Business Intelligence,” of Information Technology for Management: Digital Strategies for Insight,
Action, and Sustainable Performance.
Instructions
? Ch. 10, Information Technology for Management
Read Ch. 10, “Strategic Technology and Enterprise Systems,” of Information Technology for Management: Digital
Strategies for Insight, Action, and Sustainable Performance.
Instructions
? Lynda.com?: Internet Protocols
Watch “Internet Protocols” of Lesson 1, “Introduction to the Web,” of the Lynda.com? course “Web Technology
Fundamentals” with James Williamson.
Lynda.com Video Access
Support Material
Instructions
? Week Two Electronic Reserve Reading
Read this week’s Electronic Reserve Reading:
? “Secure and Efficient Control Transfer for IoT Devices” in International Journal Of Distributed Sensor Networks.
Week Two Electronic Reserve Reading
Support Material
Instructions
? Supporting Activity: Internet Protocols
Based on the Lynda.com? video on internet protocols, discuss how internet protocols are used on the web. How would
you choose an appropriate network management protocol?
Instructions
Assignments
See the student website for additional recommended learning activities that may help you learn this week’s concepts.
Title Type Due Points
Week Two Participation
Instructions:
Participate in class discussion by posting a minimum of 8 substantive
posts over a minimum of 3 days of the week. DQ responses,
assignment posts, and any post that is on topic with the objectives of
the course and contributes toward the discussin in a substantive way
counts. Each substantive post counts for .5 (1/2) points. Posting over
3 days of the week is required. Posting for only two days of the week
will result in a deduction of 1/3 of the points calculated by the number of
posts. Posting for only one day of the week will result in a deduction of
2/3 of the points calculated by the number of posts.
Individual Aug 29, 2016 11:59 PM 4
Learning Team: Network Drawing
Instructions:
Draw a 1-page network diagram using Visio?, or any other freeware
drawing software you wish to use, that provides a solution to one of the
weaknesses identified in the International Plastics, Inc network.
Include a 1/4-page narrative or explanation using Microsoft? Word on
how the weakness is minimized by your solution and what network
protocol is in play.
Submit the assignment using the Assignment Files tab.
SupportingMaterial:Network Configuration Visio? DocumentsToolwire?
Personal Student Desktop AccessLearning Team Instructions:
Business Continuity Plan Presentation
Learning
team Aug 29, 2016 11:59 PM 6
Individual: Network Management Team Job Aid
Instructions:
Scenario: The IT organization has determined that the network
management architecture needs improvement. As part of the IT team,
you have been tasked to determine if in-band or out-of-band network
management is needed for improving the security and reliability of the
network or both, if needed. Additionally, you need to demonstrate how
network management can enhance and support the enterprise systems
used by the organization. You will need to prepare documentation, as
described below, for the team to use in the decision-making process for
improving network services.
Write a 350- to 700-word Team Job Aid in Microsoft? Word describing
the decision-making considerations for improving network services.
Include the following in your paper:
? Guidance on how to choose network management protocols
? Guidance on in-band and out-of-band network management
? Provide examples of protocols or software to perform both out-ofband
and in-band network management, and determine their effect on
network traffic
? Describe how to apply the principles of network management
strategies. Include how your decision will effect enterprise systems and
how they may relate to, influence, or are influenced by existing
business intelligence and decision support systems.
? Describe the value and importance of business intelligence (BI) and
decision support systems (DSS) on business success
Submit your assignment using the Assignment Files tab.
Individual Aug 29, 2016 11:59 PM 10
Week3 Aug, 30 – Sep, 05
Enterprise Network Support
3.1 Describe the principles and application of cloud computing.
3.2 Explain the relationship of cloud computing and virtualization applications.
3.3 Apply cloud computing as a solution to a business need.
3.4 Compare outsourcing, offshoring, and in-house sourcing as a business solution to improve efficiency and reduce costs.
Objectives/Competencies
Required Learning Activities
? Ch. 6, Management Information Systems for the Information Age
Read Ch. 6, “Systems Development,” of Management Information Systems for the Information Age.
Instructions
? Ch. 7, Management Information Systems for the Information Age
Read Ch. 7, “Enterprise Infrastructure, Metrics, and Business Continuity Planning,” of Management Information
Systems for the Information Age.
Instructions
? Ch. 2, Information Technology for Management
Read the following sections of Ch. 2, “Data Governance and IT Architecture Support Long-Term Performance,” of
Information Technology for Management: Digital Strategies for Insight, Action, and Sustainable Performance:
? Section 2.4, “Data Centers, Cloud Computing, and Virtualization”
? Section 2.5, “Cloud Services Add Agility”
Instructions
? Ch. 12, Information Technology for Management
Read Section 12.4 in Ch. 12, “IT Strategy and Cloud Strategy,” of Information Technology for Management: Digital
Strategies for Insight, Action, and Sustainable Performance.
Instructions
? Lynda.com?: Virtualization Essential Training
Watch the following lessons of the Lynda.com? course “Virtualization Essential Training” with Martin Guidry:
? Lesson 1, “Introduction to Virtualization”
? Lesson 2, “Virtualization Advantages”
? Lesson 3, “Virtualization Disadvantages”
Lynda.com Video Access
Support Material
Instructions
? Week Three Electronic Reserve Reading
Read this week’s Electronic Reserve Reading:
? “Toward a Zero-Carbon Network Converging Cloud Computing and Network Virtualization”
Week Three Electronic Reserve Reading
Support Material
Instructions
? Supporting Activity: Virtualization
Based on the Lynda.com? video on virtualization, discuss how virtualization is used in a business.
Lynda.com?: Virtualization Essential Training
Support Material
Instructions
? Supporting Activity: Outsourcing and Off-Shoring
Resource: Network Configuration Visio? documents for International Plastics, Inc. See zip file:
InternationalPlasticsIncNetwork.zip
Discuss the following:
? How might an organization described in the International Plastics’ Network Configuration documents assess the
business value delivered by an outsourcing relationship?
? How might an outsourcing solution compare to an off-shoring solution?
Network Configuration Visio? Documents
Support Material
Instructions
Assignments
See the student website for additional recommended learning activities that may help you learn this week’s concepts.
Title Type Due Points
Week Three Participation
Instructions:
Participate in class discussion by posting a minimum of 8 substantive
posts over a minimum of 3 days of the week. DQ responses,
assignment posts, and any post that is on topic with the objectives of
the course and contributes toward the discussin in a substantive way
counts. Each substantive post counts for .5 (1/2) points. Posting over
3 days of the week is required. Posting for only two days of the week
will result in a deduction of 1/3 of the points calculated by the number of
posts. Posting for only one day of the week will result in a deduction of
2/3 of the points calculated by the number of posts.
Individual Sep 05, 2016 11:59 PM 4
Learning Team: Cloud Based Solution
Instructions:
Draw a 1-page network diagram using Visio?, or any other freeware
drawing software you wish to use, that provides a cloud-based solution
to one of the weaknesses identified in the International Plastics, Inc
network.
Include a 1/4-page narrative or explanation using Microsoft? Word on
how the cloud-based solution addresses a business need.
Submit the assignment using the Assignment Files tab.
SupportingMaterial:Network Configuration Visio? DocumentsToolwire?
Personal Student Desktop Access
Learning
team Sep 05, 2016 11:59 PM 6
Individual: Assessing the Business Value of Outsourcing Business
Case
Instructions:
Resources: Ch. 2 and Ch. 7 of Management Information Systems for
the Information Age
Scenario: The IT leadership team has determined that the organization
needs to modernize its existing network by moving to a cloud-based
architecture. To execute on this decision a feasibility study for the
business case needs to be completed and assembled for corporate
leadership and finance to review in order to approve the business case.
Your role is to research the existing cloud-based architecture used by
Denver Health and determine if this structure is viable for your
organization. This will become part of the business case that will move
through the organization for consideration. Per the directions below,
you will need to consider:
Write a 700- to 1,050-word Business Case using Microsoft? Word that
addresses the following:
? What needs prompted Denver Health to adopt a Private Cloud/Thin
Client solution and virtual applications?
? What are the advantages in adopting this cloud structure compared
to the existing structure and another optional structure?
? Would this cloud structure work for other enterprises in other
industries?
? What security risks and issues might Denver Health face with this
Private Cloud/Thin Client and virtual application solution?
Cite and list at least three different sources for this assignment.
Format your document consistent with APA guidelines. Include title
page, conclusion, and cite any references within the text, and include a
cited reference list.
Submit your assignment using the Assignment Files tab.
SupportingMaterial:Ch. 2, Management Information Systems for the
Information AgeCh. 7, Management Information Systems for the
Information Age
Individual Sep 05, 2016 11:59 PM 13
Week4 Sep, 06 – Sep, 12
Network Security Application
4.1 Analyze enterprise level security threats and the risks to business.
4.2 Illustrate an enterprise level security and protection policy and plan.
4.3 Outline a security plan appropriate for an at-risk organization, including new and emerging security threats and the
strategies needed to prevent an attack.
Objectives/Competencies
Required Learning Activities
? Ch. 2, Principles of Information Security
Read Ch. 2, “The Need for Security,” of Principles of Information Security.
Instructions
? Ch. 9, Principles of Information Security
Read Ch. 9, “Physical Security,” of Principles of Information Security.
Instructions
? Ch. 1, Principles of Information Security
Read Ch. 1, “Introduction to information Security,” of Principles of Information Security.
Instructions
? Ch. 10, Principles of Information Security
Read Ch. 10, “Implementing Information Security,” of Principles of Information Security.
Instructions
? Week Four Electronic Reserve Reading
Read this week’s Electronic Reserve Reading:
? “Wave of New Threats and Growing Sophistication of Cyber Crime Techniques Drive the Endpoint Security
Markets Worldwide”
Week Four Electronic Reserve Reading
Support Material
Instructions
? Supporting Activity: Remote and Wireless Computing Security
Remote site computing requires specific attention to security, including a secure extension of an organization’s internal
network. Mobile computing devices such as laptops, PDAs, and other handhelds increase an organization’s security
needs.
Describe specific concerns related to remote site computing and mobile computing.Include suggestions of how to
overcome these weaknesses in a global enterprise.
Instructions
Assignments
See the student website for additional recommended learning activities that may help you learn this week’s concepts.
Title Type Due Points
Week Four Participation
Instructions:
Participate in class discussion by posting a minimum of 8 substantive
posts over a minimum of 3 days of the week. DQ responses,
assignment posts, and any post that is on topic with the objectives of
the course and contributes toward the discussin in a substantive way
counts. Each substantive post counts for .5 (1/2) points. Posting over
3 days of the week is required. Posting for only two days of the week
will result in a deduction of 1/3 of the points calculated by the number of
posts. Posting for only one day of the week will result in a deduction of
2/3 of the points calculated by the number of posts.
Individual Sep 12, 2016 11:59 PM 4
Learning Team: Security Plan
Instructions:
Prepare a 175- to 260-word outline using Microsoft? Word focused on
how to prepare a security plan that would be contained within a
Business Continuity Plan.
Submit the assignment using the Assignment Files tab.
SupportingMaterial:Network Configuration Visio? DocumentsToolwire?
Personal Student Desktop Access
Learning
team Sep 12, 2016 11:59 PM 6
Individual: Security Breach Executive Brief
Instructions:
Scenario: Your management team is preparing an executive brief for
senior management regarding several cases of intrusion and
compromises of the organization’s network. The team needs to know
what types of attacks the organization is facing and the risks involved.
You are asked to prepare an executive brief based on your research of
an external breach of another organization and make recommendations
on protecting and securing the network.
Research news reports of a major security breach that occurred on a
wireless or wireline network within the last two years. Select an incident
where the attack resulted in economic or political damage to the
targeted organization.
Write a 525- to 700-word executive brief or summary using Microsoft?
Word that answers the following questions:
? What happened during the breach?
? How did the breach occur?
? What were the economic or political consequences?
? How was the situation handled?
? How could enterprise-level network security planning and policies
have helped to prevent this incident? Provide at least two specific
examples.
? If a similar incident did occur with enterprise-level network security
planning and policies in place, how would the response have been
different?
Cite and list at least three outside references for this assignment.
Format your document consistent with APA guidelines. Include title
page, conclusion, and cite any references within the text, and include a
cited reference list.
Submit your executive brief using the Assignment Files tab.
Individual Sep 12, 2016 11:59 PM 9
Week5 Sep, 13 – Sep, 19
Developing Disaster Recovery and Business Continuity Plans
5.1 Analyze the requirements for an effective disaster recovery plan.
5.2 Build a disaster recovery plan for an enterprise.
5.3 Recognize the signs of an intrusion incident and the appropriate action to prevent disaster.
5.4 Determine the appropriate technologies to implement for enterprise network security.
5.5 Compile a Business Continuity Plan.
Objectives/Competencies
Required Learning Activities
? Ch. 5, Information Technology for Management
Read Ch. 5, “Cyber Security and Risk Management,” of Information Technology for Management: Digital Strategies for
Insight, Action, and Sustainable Performance.
Instructions
? Ch. 4, Principles of Information Security
Read Ch. 4, “Planning for Security,” of Principles of Information Security.
Instructions
? Ch. 7, Principles of Information Security
Read Ch. 7, “Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools,” of
Principles of Information Security.
Instructions
? Lynda.com?: Securing Networks
Watch “Securing Networks” from Lesson 5, “Security,” of the Lynda.com? course “CompTIA A+ Exam Prep (220-802)”
with Steve Fullmer.
Lynda.com Video Access
Support Material
Instructions
? Lynda.com?: Networking
Watch the following sections of Lesson 6, “Networking,” of the Lynda.com? course, “CompTIA A+ Exam Prep (220-
801)” with Steve Fullmer:
? “Basic Networking Concepts”
? “Wireless Security”
? “Firewall”
Lynda.com Video Access
Support Material
Instructions
? Lynda.com?: Business Continuity Planning
Watch “Business Continuity Planning” from Section 8, “Business Continuity and Disaster Recovery,” of the
Lynda.com? course “CompTIA Security+ Exam Prep (SY0-401): Compliance and Operational Security” with Mike
Lynda.com? Video Access
Support Material
Instructions
? Week Five Electronic Reserve Reading
Read this week’s Electronic Reserve Reading:
? “A Proposed Model for IT Disaster Recovery Plan”
Week Five Electronic Reserve Reading
Support Material
Instructions
Assignments
See the student website for additional recommended learning activities that may help you learn this week’s concepts.
Title Type Due Points
Week Five Participation
Instructions:
Participate in class discussion by posting a minimum of 8 substantive
posts over a minimum of 3 days of the week. DQ responses,
assignment posts, and any post that is on topic with the objectives of
the course and contributes toward the discussin in a substantive way
counts. Each substantive post counts for .5 (1/2) points. Posting over
3 days of the week is required. Posting for only two days of the week
will result in a deduction of 1/3 of the points calculated by the number of
posts. Posting for only one day of the week will result in a deduction of
2/3 of the points calculated by the number of posts.
Individual Sep 19, 2016 11:59 PM 4
Learning Team: Business Continuity Plan Presentation
Instructions:
Resource: Network Configuration Visio? documents for International
Plastics, Inc. See zip file: InternationalPlasticsIncNetwork.zip
Throughout the course key concepts and activities have underscored
the value of effective and efficient enterprise network management. An
enterprise requires a Business Continuity Plan in order to restore and
maintain essential corporate networking services and information
protection during a crisis that can originate from a natural disaster to the
compromise of network resources and information sources by an
external or internal attack. The Learning Team assignments provide the
opportunity for each student in a team context to use the acquired
knowledge and experience to integrate these concepts into a Business
Continuity Plan.
Scenario: Your Learning Team is a group of IT professionals who are
hired to develop and present a Business Continuity Plan (BCP) to
senior management for approval and funding. Your team must prepare
a PowerPoint? presentation to educate senior management about the
need for the BCP and describe the technical details of your proposal.
Use the International Plastics, Inc. documentation, resources used in
the course, and additional outside sources to create the Business
Continuity Plan (referred to as BCP).
Compile your outline, drawings, and explanation from prior Learning
Team submissions. These are to be used in your presentation to senior
management as handouts to support your plan.
Create a 5- to 6-slide Microsoft? PowerPoint? presentation with speaker
notes that address the following:
? Provide a concise view of the business continuity plan
? Provide insights on how your plan will address vulnerabilities
? Persuade senior leadership to approve and fund the proposed BCP
? The presentation should be engaging; use relevant figures and
diagrams
? Citations must be included in each slide as a note and follow APA
guidelines
Submit the Business Continuity Plan presentation for International
Plastics using the Assignment Files tab.
SupportingMaterial:Network Configuration Visio? DocumentsLearning
Team: Network DrawingLearning Team: Cloud Based SolutionLearning
Team: Security Plan
Learning
team Sep 19, 2016 11:59 PM 10
Individual: Security Solutions Business Report
Instructions:
Scenario: Due to recent intrusion, hacks, and network compromises of
other organizations in the news, your supervisor wants to know how to
detect an intrusion into or an attack on the ecommerce network of your
organization. Your supervisor also wants to know what hardware or
software should be procured for intrusion detection. The information
that you gather and provide will become part of the justification material
for a business case to enhance security and update your organization’s
network.
Write a 525- to 700-word business report in Microsoft? Word describing
the hardware and/or software you believe should be considered for
implementation. Include your reasoning for why the described hardware
and/or software should be procured and implemented. Address the
following questions raised by your boss:
? Describe an ecommerce network and its application
? Does a properly installed and maintained firewall provide adequate
defense against intrusion?
? Define IDPS; do we need one in an ecommerce network?
? Do we need a group of network personnel to monitor the ecommerce
network for intrusions 24/7?
? Will any of this hardware or software facilitate a real-time response to
an intrusion?
Cite and list at least two outside references for this assignment.
Format your document consistent with APA guidelines. Include title
page, conclusion, and cite any references within the text, and include a
cited reference list.
Submit your business report using the Assignment Files tab.
Individual Sep 19, 2016 11:59 PM 10
All trademarks are property of their respective owners.
University of Phoenix? is a registered trademark of Apollo Group, Inc. in the United States and/or other countries.
Microsoft?, Windows?, and PowerPoint? are registered trademarks of Microsoft Corporation in the United States and/or
other countries. All other company and product names are trademarks or registered trademarks of their respective
companies. Use of these marks is not intended to imply endorsement, sponsorship, or affiliation.
Trademark

Our Service Charter

  1. Excellent Quality / 100% Plagiarism-Free

    We employ a number of measures to ensure top quality essays. The papers go through a system of quality control prior to delivery. We run plagiarism checks on each paper to ensure that they will be 100% plagiarism-free. So, only clean copies hit customers’ emails. We also never resell the papers completed by our writers. So, once it is checked using a plagiarism checker, the paper will be unique. Speaking of the academic writing standards, we will stick to the assignment brief given by the customer and assign the perfect writer. By saying “the perfect writer” we mean the one having an academic degree in the customer’s study field and positive feedback from other customers.
  2. Free Revisions

    We keep the quality bar of all papers high. But in case you need some extra brilliance to the paper, here’s what to do. First of all, you can choose a top writer. It means that we will assign an expert with a degree in your subject. And secondly, you can rely on our editing services. Our editors will revise your papers, checking whether or not they comply with high standards of academic writing. In addition, editing entails adjusting content if it’s off the topic, adding more sources, refining the language style, and making sure the referencing style is followed.
  3. Confidentiality / 100% No Disclosure

    We make sure that clients’ personal data remains confidential and is not exploited for any purposes beyond those related to our services. We only ask you to provide us with the information that is required to produce the paper according to your writing needs. Please note that the payment info is protected as well. Feel free to refer to the support team for more information about our payment methods. The fact that you used our service is kept secret due to the advanced security standards. So, you can be sure that no one will find out that you got a paper from our writing service.
  4. Money Back Guarantee

    If the writer doesn’t address all the questions on your assignment brief or the delivered paper appears to be off the topic, you can ask for a refund. Or, if it is applicable, you can opt in for free revision within 14-30 days, depending on your paper’s length. The revision or refund request should be sent within 14 days after delivery. The customer gets 100% money-back in case they haven't downloaded the paper. All approved refunds will be returned to the customer’s credit card or Bonus Balance in a form of store credit. Take a note that we will send an extra compensation if the customers goes with a store credit.
  5. 24/7 Customer Support

    We have a support team working 24/7 ready to give your issue concerning the order their immediate attention. If you have any questions about the ordering process, communication with the writer, payment options, feel free to join live chat. Be sure to get a fast response. They can also give you the exact price quote, taking into account the timing, desired academic level of the paper, and the number of pages.

Excellent Quality
Zero Plagiarism
Expert Writers

Instant Quote

Subject:
Type:
Pages/Words:
Single spaced
approx 275 words per page
Urgency (Less urgent, less costly):
Level:
Currency:
Total Cost: NaN

Get 10% Off on your 1st order!