Mile2 Cybersecurity Certifications

Cybersecurity Certifications

Reply To: OCU C)ISSO D Discussion Lesson 09

Kelly Crooks

Marcena, great choice on your topologies. I do remember a couple of these from an earlier class. It was interesting to me to understand a little bit more about each one and how they work. I didn’t realize there were so many of them. I agree with what you said about a security officer using network segmentation to mitigate loss. Having those protocols and policies in place helps to make sure that if there is data loss it can be easily restored and the amount of data lost or stolen is very minimal.


Please Note:

The support ticket system is for technical questions and post-sale issues.


If you have pre-sale questions please use our chat feature or email .