Infrastructure and Security

timer Asked: Nov 19th, 2016

Question description

Project Deliverable 4: Infrastructure and Security

(Reference documents from past assignments included below)

This assignment consists of two (2) sections: an infrastructure document and a revised Gantt chart or project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment for which it is written. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.

The last section of the project plan will present the infrastructure in accordance with the parameters set forth at the outset of the project. The network solution that is chosen should support the conceived information system and allow for scalability. The network infrastructure will support organizational operations; therefore, a pictorial view of workstations, servers, routers, bridges, gateways, and access points should be used. In addition, access paths for Internet access should be depicted. A narrative should be included to explain all the nodes of the network and the rationale for the design. Lastly, using the Confidentiality, Integrity and Availability (CIA) Triangle, define the organizational security policy. CIA is a widely used benchmark for evaluation of information systems security.

Section 1: Infrastructure Document

1. Write a five to ten (5-10) page infrastructure document in which you:

a. Design a logical and physical topographical layout of the planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.

b. Illustrate the possible placement of servers including access paths to the Internet and firewalls. Note: Facility limitations, workstations, printers, routers, switches, bridges and access points should be considered in the illustration.

c. Explain the rationale for the logical and physical topographical layout of the planned network.

d. Create a comprehensive security policy for the company that will:

i. Protect the company infrastructure and assets by applying the principals of CIA. Note: CIA is a widely used benchmark for evaluation of information systems security, focusing on the three core goals of confidentiality, integrity and availability of information.

ii. Address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
  • Include charts or diagrams created in MS Visio or Dia as an appendix of the infrastructure document. All references to these diagrams must be included in the body of the infrastructure document.

Section 2: Revised Gantt Chart / Project Plan

Use Microsoft Project or an open source alternative, such as Open Project, to:

2. Update the Gantt chart or project plan (summary and detail) template, from Project Deliverable 3: Database and Programming Design, with all the project tasks.

Running Head: PROJECT DELIVEVRY THREE Project Delivery Three Name Course Tutor Date 1 PROJECT DELIVERY THREE 2 Introduction Organizations running businesses that are dependent on applications with databases need to ensure that the database is well-designed. This principle of having a proper design of the database is critical as it determines how the companies will meet their goals. Further, taking the time to come up with a good design allows flexibility because organizations can plan in advance on how changes can be accommodated in future. It is essential for organizations to consider certain fundamental principles in the database design framework. One of the principles is the reduction of redundant data because it wastes the amount of data allocated for databases. Also, the duplicated data at times may lead to inconsistencies and errors within the database. Ensuring that the data in the database is correct and complete is necessary as it determines the effectiveness of data that will be pulled from the database. This directly implies that having incorrect data will result into making flawed decisions which might affect the organization negatively. Additionally, in developing a good database, organizations ensure that their data is accurate and its integrity can be relied upon. The organizations’ reporting and data processing needs are also highly influenced by the kind of database that is designed. This design will be impacted by the kind of framework the developers decide to implement. Database Schema Database schemas in database management systems provide a logical view of what the database entails. It comprises of information on objects within a database, how they are arranged, and the associations that exist between them. It defines the checks that are applicable on the data. In most instances, the schema is used to describe the entities and how they relate to each other. PROJECT DELIVERY THREE 3 These entities include the indexes, views, tables, functions, and database links. Database developers design the schemas with the view of assisting the programmers to make the expected use of the database. The company will require a database that incorporates information of their employees, the products they sell, the suppliers they deal with and the order details made by their customers. Based on this information it will imply that the developers will design an OLTP database because the company will be using a transactional application. This is because this kind of application requires the creating, reading, updating and deleting of records by the end users. This approach takes the key first steps of the database design process which requires that developers establish what they intend to do with the database with the help of their users. Basically, this stage covers the requirements gathering process where information is gathered and refined for it meets the needs of the organization. See appendix 1. Tables Tables comprise of records and fields that contain information. They provide a snapshot of all the possible records available in a database. They are generated by the developers of a database schema after gathering information about an organization’s operations. The tables for this organization will include the following products, category, order details, orders, suppliers, employees, customers, and shippers. These entities will be captured in tables and their respective attributes listed. The tables used will be for a start as such it might not be exhaustive. Thus, the database is flexible as it will allow modifications that may result in changes to the organization’s operations. PROJECT DELIVERY THREE 4 In developing tables, relationships are modeled out of the data stored in those tables. It is therefore, expected that the relationship remains consistent to achieve referential integrity. This integrity is as a result of implementing entity integrity which requires that entities have unique keys. For the tables developed for this organizations, entities have unique keys as captured in the database schema diagram. Also, foreign keys have been used to ensure that relationships between tables synchronize whenever there are updates and deletes. See appendix 3. Entity-relationship diagrams Entity-relationship diagrams provide a mechanism for modeling entities captured in as system and the relationship that exists between them. Standard entity-relationship diagrams comprise of three main components, the entities which represent items or people, attributes which provide descriptions of the entities and the relationships which show the links that exist among different entities. These three components can be illustrated by using either conceptual, physical or the logical models. Different models represent unique complexities. It is advisable that designers consider starting with the conceptual model as they proceed to the physical model. It is imperative that designers of data storage applications consider the efficiency and future need that the organizations might require from the systems. The stability of the model should be dependable especially regarding instances in which business needs may change. Also, the model should be able to cater for all the data storage needs of an organization. In developing the ERD for this organization, some key considerations were made. For instance, the ERD is illustrated in a manner that it can be easily understood by the users and programmers. The model used matches with the database structure that is in place currently. The PROJECT DELIVERY THREE 5 ERD provides an effective solution with symbols and words that users can easily resonate with.See appendix 2. Data Flow Diagram A Data Flow Diagram (DFD) is a diagrammatic illustration used in object oriented analysis to depict how data flows within a system. Specifically, it captures details on how data moves into and out of the system, processes carried out on the data and where data resides. In modeling DFDs, processes, data stores, data flows are represented. The use of DFDs is common in software development where analysts need to show how information flows within the system they are developing or intend to develop. The rationale behind the design of the ERD for this organization’s system is to show the functions that the system performs. The DFD is designed with the view of allowing the programmers in understanding the internal operations of the system. It supports seamless communication in technical and nontechnical audiences since it is easier to understand. The data flow diagram is critical in the database design and programming especially in the early stages of design or when there is a desire to change the current system. The DFD is developed with the aim of helping programmers in developing the system in an organized and timely manner. Having the DFD will enable programmers in making decisions regarding the processes needed for the system to handle the information it is given. It will assist programmers in explaining what the system entails to normal users thus they save time that otherwise would be used if it didn’t exist. The DFD also will serve as a document for reference if there are any changes that need to be accommodated by the system. Additionally, the DFD will serve as a PROJECT DELIVERY THREE 6 reference point together with the help of debugging tools in detecting any errors within the system. See appendix 4. Queries Queries are used in a database environment to retrieve data from tables. Different queries are used to serve different purposes such as adding information by using the insert or append queries or removing information from tables with the use of the delete queries. Queries thus allow users to view data incorporated from several tables in a single sheet. Queries also allow the use of filters which enable users to limit the scope to some set of data they want to utilize. For this organization, the method of query by language will be used. It implies that requests will be made regarding some specified queries. This method is the most powerful in database management systems. Query 1 DROP TABLE IF EXISTS Employees_tbl; CREATE TABLE Employees_tbl ( Employee_IDint unsigned NOT NULL auto_increment, # Unique ID for the record FullNamevarchar(255) NOT NULL, # Full name of the employee LastNamevarchar(255) NOT NULL, # The last name of the employee Job_Idint(10) NOT NULL, Email # The job ID of the employee varchar(255) NOT NULL PROJECT DELIVERY THREE PRIMARY KEY 7 (Employee_ID) ); Query 2 USE diaperstore; INSERT INTO shippers ( Shipper_ID, Business_Name, Contact ) VALUES ( 3422, "Texas Shipping Limited", 00110011111 ), Interface Interfaces are objects through which users can interact with the system. The human design interface principles require that the designers of the interfaces understand their user’s skills and experience, what the users need and what the goals of their users are. In doing so, they are able to achieve the consistency that is expected of any interface. What does that imply? The users of the system will have the easy time working with the application that has been developed because it has components they are familiar with. Also, users will be able to complete their tasks faster because the design of the interface will be straight-forward. Designers of these interfaces will benefit as it will be easier for them to document the application. Providing support to users in case of issues in the systems will be easier and the time used in dealing with bugs will be lessened. See appendix 5. PROJECT DELIVERY THREE 8 References Doyle, M. (2011, August 25). MySQL for Absolute Beginners. Retrieved May 14, 2016, from Anderson, M. (2008, October 24). Marc D Anderson's Blog. Retrieved May 14, 2016, from Data Flow Diagrams. (n.d.). Retrieved May 14, 2016, from Introduction to database design. (n.d.). Retrieved May 14, 2016, from Koirala, S. (2014, February 25). 11 important database designing rules which I follow. Retrieved May 14, 2016, from What is an Entity Relationship Diagram (ERD)? (n.d.). Retrieved May 14, 2016, from PROJECT DELIVERY THREE Appendices Appendix 1 Database Schema 9 PROJECT DELIVERY THREE Appendix 2 Entity Relationship Diagram 10 PROJECT DELIVERY THREE 11 PROJECT DELIVERY THREE 12 Appendix 3 Tables Table Name Attribute Name Products_tbl Product_ID Product_Name Supplier_ID Category_ID Product_Price UnitsinStock UnitsOnOrder Table Name Attribute Name Category Category_ID,INT,PK Category_Name Table Name Attribute Name Suppliers Supplier_Id Business_Name Contact Address Email Phone Country PROJECT DELIVERY THREE 13 Table Name Attribute Name Orders_tbl Order_ID CustomerID Employee_ID Shipper_ID OrderDate RequireDate ShippedDate ShipAddress ShipCountry Table Name Attribute Name Customers_tbl Customer_Id Company_Name Address Country City State Zip PROJECT DELIVERY THREE 14 Table Name Attribute Name Employees_tbl Employee_ID FirstName LastName Job_id Email Table Name Attribute Name Shippers_tbl Shipper_ID Business_Name Contact Table Name Attribute Name Order_Details_tbl Order_ID Product_ID UnitPrice Quantity PROJECT DELIVERY THREE Appendix 4 Data Flow Diagram 15 PROJECT DELIVERY THREE 16 PROJECT DELIVERY THREE Appendix 5 Screen Layouts 17 PROJECT DELIVERY THREE 18
Outline Project Delivery Three  Introduction  Database Schema  Tables  Entity-relationship diagrams  Data Flow Diagram  Queries  Interface  References
Running Head: BUSINESS REQUIREMENTS Business Requirements Name Course Tutor Date 1 2 PROJECT DELIVARABLES Business Requirements Project quality is a Key area to consider for a project to be successful. This Paper will assess the quality of project management by putting into consideration practices such as Quality planning, assurance, and control. The practices will help maintain time, cost and scope constraints. Information Industries have the largest growth currently in most economies. It is due to the globalization of markets and technological change.Information systems refer to thegeneral systems of data, activities and people, both PC based and manual, that viably accumulate, process, store and disperse firms' data. Consistency, accuracy, and sensitive information are an essential when making decisions about a project. Requirements I did an analysis to determine the project’s requirement analysis. Below is the list of the prerequisite. 1. Details of data storage a. List Items i. Name ii. Region iii. Usage 3 PROJECT DELIVARABLES 1. Period of usage 2. Developments usage 3. Employees usage 4. Totals usage iv. Day of Order v. Expiration date vi. The price tag of item b. Projects names i. Resources needed ii. The Dates of when the project begins and when it ends iii. Manager 2. Details of production a. Add new item screen b. Remove item screen c. Check availability screen d. Check-out item screen 4 PROJECT DELIVARABLES g. Update item screen h. Place and place order screen j. Printing hard copy 3. Inventory Reports ii. Personnel Reports iii. Project Reports 4. Details of Information Processing a. Inventory item i. Usage details 1. Amount remaining 2. Time to expiry 3. Amount used by project 4. Amount utilized by Personnel 5. The sum used MTD (month to date) 6. Amount used YTD (year to date) 5 PROJECT DELIVARABLES 5. Cost details 1. Dollar amount used by project 2. Dollar amount used by personnel 3. Dollar amount of item used MTD 4. The dollar amount of item used YTD b. Employees usage i. The numberof objects used YTD ii. The numberof objects usedMTD iii. Objects used per project c. Development usage i. Items used YTD ii. Items used MTD 6. Software Requirements a. Linux OS b. MS Access c. MS C++ 6 PROJECT DELIVARABLES 7. Hardware Requirements 1. 500 Desktops and 350 laptops with the following specifications. a. Intel Core i7 (3.40 GHz, 4 Cores)-II 500 MHz b. 500 GB hard disk space c. 8 GB RAM d. Realtek RTL8171E standard Ethernet controller. e. Laser Printer 2. 80 servers 3. Switched hub with 64 ports 8. Security Prerequments a. Username and Password identification for all users b. Cryptography techniques c. Security Policies d. A secure room with fireproof ceilings, lockable and allocated 24/7 security staffs. 9. Survivability Requirements 7 PROJECT DELIVARABLES a. Monday to Friday availability b. 8:00am – 6:00pm availability on those days c. Data re-establishment within 24 hours of data loss d. Full-time back-ups of database 10. Interface Requirements a. Simple interface b. No comprehensive user manual required c. Short training session 11. Development Requirements a. Upgradable system b. Implementationtime < 7 months 12. Financial Requirements a. Approximately $50, 000 development cost i. Salaries ii. Software (Linux is open source) iii. Hardware 8 PROJECT DELIVARABLES iv. Installation 1. Hardware Requirements An Intel Core i7 3.40 GHz is ideal for the anticipated system.An Access database system with a maximum limit of a 1.5million items, hard disk space and with eachten areas, would take 500 Gigabytes. As far as RAM, around 8 gigabytes will guarantee quick inquiry times, and fast retrievals. Since this data framework is available through the system, a 10Base-T Network Interface Card is required. A printer will also be required to print out written version reports. The system server utilized at PRO as of now meets or surpasses these determinations. It has numerous different PCs that fundamentally fit this portrayal too. With a couple of minor updates, these PCs can undoubtedly fulfill these prerequisites. These additional machines can be set up as workstations around to organization to go about as get to focuses for the database. A laser printer in the workplace can be utilized for printing reports off the framework. 2. Security Requirements Access to the structure will be conceded through asection of a login name and PINsconfirmed by a Linux based Domain Controller. Clients will have a place with various gatherings given their login names, for example, the specialized staff. Linux has a Primary Domain Controller, which can validate passwords. This innovation is right now being used with Linux OS. 3. Survivability Requirements 9 PROJECT DELIVARABLES High unwavering quality is of fundamental significance, so a stable working framework and database is required. This system should be accessible no less than five days a week (Monday – Friday), somewhere around 8am and 6pm. It needs daily back-ups to monitor against incidental information misfortune. Information should be reestablished inside 24 hours to guarantee smooth operation of the organization. Master as of now has a commonknowledge reinforcement framework, so no new framework should be actualized. A bigger learning reinforcement media should be utilized tosupport the database, however, i.e. Zip Disk. 4. Interface Requirements. The workers at PRO are notsubstantially OK with PCs. They are all PC educated, yet would dismiss a complicatedinterface. Hence the interface should be primary (point and spontaneous), with heaps of illustrations instead of content. The utilization of the framework ought to be natural to nullify the need to peruse expansive client manuals. The representatives could just extra a couple of hours in a single day to be prepared on the framework. There is a little number of them, so a single preparing session is practical, however, the structure must be sufficiently straightforward for them to handle it in those couple of hours. The framework is being planned with extremely an exceptionally simple point and instant interface furthermore, will utilize screens that intently look like the paper records they use now. We are confident that any individual can be educated to use this framework in a base measure of time. 5. Lifecycle Requirements The system ought to be upgradeable regularly. It helps coordinate the necessities of the organization as it changes. Improvement time ought to likewise be shorter than six months as this 10 PROJECT DELIVARABLES is as far as possible the organization set for the venture. The programming dialects and stage chose for this experiment are sufficiently adaptable to permit simple moves up to be produced for the not so distant. Improvement time for this operation has been assessed at four months 6. Financial Requirements The rough approximation for this project isof $50,000. This figure must take care of the full expense of generation including designer pay rates, programming licenses, related equipment and theestablishment of the framework. This framework will cost $58, 700 in the prime year to create, introduce and keep up. The system will recompenseafter the eighteenth month and will turn a benefit of $38, 819 after just 36 months with total advantages to that point in anaccumulation of $100, 000. 7. Software Requirements Linux is the best operating system that works on servers and will be used in the throughout the projects in all systems. It is termed to be a secure OS in nature and most stable especially in new systems. Microsoft C++ will be used to create Graphical User Interface programs interfaced with thedatabase. Database design To begin with, we have a couple of redundancies to manage in our case. For instance, ventures keep a rundown of stock things they utilized, and capitalelements monitor their extend affiliations. A few redundancies have been expellednow. However, a couple remains. As a rule, these redundancies are bestleftinput i.e. their nearness will make the framework work speedier . 11 PROJECT DELIVARABLES The speculation relationship between the staff individuals was alsodistributed with. Since various sorts of staff people had different operations, it was difficult to consolidate then into a single element. Along these lines they are left as partitioned elements and everyone is envisioned with its possess set of staff part attributes. On the other hand, every element is extremely briefly portrayed, so no parcels are thought to be of importance. User Interface design The UI outline is completely considered since the achievement of this framework depends intensely on client acknowledgment. As said beforehand, most customers of this framework will be learners, and in this manner a simple and instinctive interface is obligatory. Thus, every screen ought to show the client with as little data and as a couple of decisions as would be prudent. The customers won't be immersed with information; they will necessarilybe givena little number of choices that they can choose from with a specific end goal to get the data they require. It satisfies the non-useful UI prerequisites. Our rundown of practical essentials indicates a review of information we are required to be ready to acknowledge from the client or show to the customer. Things showing up in boxes, written in standard print are screens that a client can explore to i.e. there will be a "Login" screen, furthermore, a 'Principle Options' screen. Things written in italics won't show up all singlescreen; rather they will be available through catches exhibit on the screen that focuses on them i.e. the 'expel thing' capacity will be open through a catch on the "stock" screen. The numbers after the screen or capacity demonstrate the practical necessity the data they contain will satisfy. The associations between boxes delineate the way a client would need to take 12 PROJECT DELIVARABLES through the framework keeping in mind the end objective is to attain that information or execute that far-reaching capacity rundown of every conceivable operation with the system. Networking Design The network is setup as a simple peer to peer. It is used for file sharing,the internet, and emails, The Ethernet cables are made of copper and can transmit up to 500mbps. The machines are channeled through the switched hub efficiently to create bandwidth for all the machines. Scope The project quality management will be defined by meeting the cost, time and scope that will lead to good performance of the organization. For the project to be successful, there are processes to be followed such as; Quality Planning, Assurance, and Control. This process leads to the accomplishment of good products. Planning involves deploying quality policies and standards in an organization. The components of quality planning include; Tools and techniques to be used Duties that are to be carried out to perfection: The output expected Assurance of the project is guaranteed by performing the duties stated in planning. Quality audit is an essential aspect in quality assurance. They help improve thefuture 13 PROJECT DELIVARABLES performance of projects.Audits are typicallyare performed by in-house auditors and third parties involved in the development. Quality control includes monitoring project performance to determine whether it complies with the standards and offer solutions to poor performance. The consistency of the system is the primary determinant in this level through the use of statistical sampling and inspection. Risk management There are a few measures to consider ensuring project risk is minimal  Assure that the project is well monitored, supervised and managed subsequently.  Begin projects after requirement project success.  Ensure the development is on the right path by external consultation.  Strengthen the management of the project. Assumptions One is the implementation of a web portal as a front end user that will link customers doing away with third parties. It will save traders transaction cost and allow small scale traders link to the portal. The public will also be able to access any information regarding the organization easily at their convenient time. Terms used in the Project 14 PROJECT DELIVARABLES Cryptography is a science that deals with logical and complex mathematics designs of data encryption. Hub is a networking device use to connect segments of Local Area Network. 15 PROJECT DELIVARABLES References Davis, B. (2009). 97 Things Every Project Manager Should Know. Sebastopol: O'Reilly Media, Inc. Kenan, K. (2006). Cryptography in the database. Upper Saddle River, NJ: Addison Wesley. Kendrick, T. How to manage complex programs. One System Integrated Project Team. (2012). Washington, D.C.
Running Head: PROJECT PLAN 1 Project plan Name Course Tutor Date PROJECT PLAN 2 Action Orientation Some activities are to be completed during the orientation session. During the introduction session, each associate had to introduce themselves, their educational background, their personal background and the areas of interest were shared with everyone present in the conference room. The company will provide free lunch to all the associates during the orientation day. After the completion of the lunch session ID cards and access cards to enter the business’s premises will be provided. The badges are mandatory, and they should be displayed all the time in the office. The next two days involve completing all the paperwork, submitting all the documents and filling all the company documents and going through company’s policies and procedures. The coordinator will conduct interviews and test on HTML, Java, and Database Management Systems and System maintenance. Based on the test result employees assessment will be done and assigned to project groups. After the assessment, the employees will train on SDLC concepts. The company follows the agile methodology for implementing the projects. All employees will be given an overview of how the agile methodology is used in the organization for software application development. The next step is learning SDLC concepts. Sessions will be conducted on general SDLC concepts, how SDLC will be useful for successful project implementations, the different phases of SDLC and the different methodologies and the models belonging to methodologies. Next, an in-depth training will be provided on Agile SDLC methodology and how the methodology will be implemented in the organization for projects development. PROJECT PLAN 3 After completing the SDLC training, the mentor will introduce employees to the different system administrators and developers available in the company. Every team will begiven aparticular task for example testing team, design team, service delivery team, project and portfolio team, Database administrator’s (Windows, Unix), infrastructure and help desk. The introductions with the teams provide an overview how operations are performed inside the company, and the steps followed implementing different projects. By the time the introductions have completed the results for the individual assessments of the employees will be ready. Based on the performance each employee is assigned to a particular project. Design: Phase 1 Phase 2 PROJECT PLAN 4 Observation The onboarding process is a very lengthy process, and there is a lot of paperwork that needs to be completed and a lot of document that needs to be submitted. In a corporate environment, each team is assigned with a particular task, and they are bounded to work only on that task. For a single project, there are multiple teams like design, development, testing and Database administrators. The coordination among the groups is crucial to the success of the project. All the employees were required to take tests on HTML, Java, DBMS and System maintenance. The company mostly works on the development related applications, so they want to understand employee’s knowledge on Java before assigning them to projects. The test is PROJECT PLAN 5 difficult, the Java knowledge gained from academics is not sufficient to work in real time projects. The algorithms mostly tested the thinking ability of the employees are not difficult when compared to the Java test. The company provided a document which has details of all the contact persons and the URL for all the websites that are needed during the quality management process. Agile methodology is the preferred SDLC methodology for most the projects. The methodology works in iterations, and each iteration is a combination of multiple SDLC phases. The agile is the most suitable in today’s ever-changing requirements environment. The agile methods can accommodate the change in requirements and produces partial results that are visible from the completion of the first iterations. Reflection The test Java, HTML, DBMS, and System Maintenance are a great way to help employees understand the skill levels and what levels of efforts are needed to survive in the real time job environment. Java is like an ocean and learning all different parts of Java is highly impossible. Gaining an understanding of the underlying concepts in Java and developing an indepth knowledge of the Java concepts that will be used in the process is the way forward. The orientation session is also very useful; there is a lot of difference working in educational projects and working in real time environments. The orientation sessions help us to understand and gain knowledge of the various procedures that need to be followed while working in corporate environments. PROJECT PLAN 6 All the processes will be followed by the system documentation which will be very helpful in the future. The company will provide a document with all the URL and contact details for new employees. Any information regarding anything can be easily obtained with the details present in the information document.

Tutor Answer

(Top Tutor) Studypool Tutor
School: Cornell University
Studypool has helped 1,244,100 students
flag Report DMCA
Similar Questions
Hot Questions
Related Tags
Study Guides

Brown University

1271 Tutors

California Institute of Technology

2131 Tutors

Carnegie Mellon University

982 Tutors

Columbia University

1256 Tutors

Dartmouth University

2113 Tutors

Emory University

2279 Tutors

Harvard University

599 Tutors

Massachusetts Institute of Technology

2319 Tutors

New York University

1645 Tutors

Notre Dam University

1911 Tutors

Oklahoma University

2122 Tutors

Pennsylvania State University

932 Tutors

Princeton University

1211 Tutors

Stanford University

983 Tutors

University of California

1282 Tutors

Oxford University

123 Tutors

Yale University

2325 Tutors