Mile2 Cybersecurity Certifications

Cybersecurity Certifications

Caleb Kiser

Forum Replies Created

Viewing 15 posts - 1 through 15 (of 26 total)
  • Author
    Posts
  • in reply to: OCU C)HT C Devotion 01 #106962
    Caleb Kiser
    Participant

    This devotion points out what Jesus offers in Matthew 11:28. It’s a good reminder that true rest isn’t something we find in achievements or the things this world chases after. Instead, it comes from going to Jesus, who gives us peace and comfort that goes way beyond what we can understand. That kind of rest frees us from all the pressure to be perfect or always do more. It’s about finding security in His presence and grace. The challenge to seek that stillness in Jesus is something we all need to hear, especially when life feels overwhelming. And if someone hasn’t found that rest yet, it’s comforting to know Jesus is always waiting, ready to give exactly what our souls need.

    in reply to: OCU C)HT C Discussion Lesson 02 #106961
    Caleb Kiser
    Participant

    Hi Isabelle,

    I enjoyed reading your post. You explained well how the motherboard connects key components like RAM and the CPU. I like your clear description of the CPU’s control and arithmetic units and how they process instructions. The CPU’s speed indeed affects overall performance, and without the motherboard’s connections, nothing would work. Your post shows nicely how these parts work together to keep a computer running smoothly.

    in reply to: OCU C)HT C Discussion Lesson 02 #106955
    Caleb Kiser
    Participant

    The motherboard and CPU are two of the most important components in a computer system. The motherboard acts as the main circuit board, connecting all hardware components, including the CPU, RAM, and storage, so they can communicate effectively. It provides power to these components and allows data to flow between them through buses and chipsets. The CPU, or central processing unit, is often called the “brain” of the computer. It carries out instructions from software by performing calculations, making decisions, and managing input and output operations. The CPU processes data at high speeds, allowing the computer to run applications and complete tasks efficiently. Together, the motherboard and CPU are responsible for making sure the entire system functions smoothly. Without them, no other component could operate. Their performance and compatibility are critical for the overall stability and speed of a computer.

    in reply to: OCU C)HT C Discussion Lesson 01 #106952
    Caleb Kiser
    Participant

    Hi Misty,

    I enjoyed reading your post! Great points. I agree that troubleshooting is essential for keeping systems running smoothly and saving both time and money. I like how you emphasized skill development and system security. Every issue we solve helps us grow technically and prevents future problems. It’s definitely a key part of being effective in any tech role.

    in reply to: OCU C)HT C Discussion Lesson 01 #106945
    Caleb Kiser
    Participant

    Troubleshooting is one of those skills that are absolutely crucial for any hardware technician. Troubleshooting allows for the identification and resolution of issues to be done quickly. It helps save time, money, and resources. Troubleshooting is defined as finding and fixing problems in any computer system, network, or software. And when you are regularly checking up on systems and running maintenance, you allow the systems to be more reliable and stable. I work in Graphic Design and Media at my church, so I use troubleshooting all the time. It’s been so helpful in keeping things running smoothly. But troubleshooting requires knowledge of the systems, computers, and networks that we use. So I must be constantly keeping up on the technology of everything that I use to make sure I can properly troubleshoot.

    in reply to: OCU C)OST C Devotion 05 #105953
    Caleb Kiser
    Participant

    The fear of the Lord truly is the beginning of wisdom, as Proverbs 9:10 teaches us. It’s not a fear rooted in terror, but in reverence and awe for the Creator who holds all things in His hands. When we understand God’s sovereignty, His holiness, and His power, we begin to grasp the weight of His wisdom and the foundation of true understanding.

    This kind of fear isn’t about being afraid of God in a way that drives us away, but rather recognizing His greatness and submitting to His will. It’s the realization that, apart from Him, we have no true wisdom, and only by seeking Him can we find clarity and direction. As we grow in this reverence for the Lord, He opens our eyes to a deeper understanding of life, purpose, and truth.

    The wisdom that comes from fearing the Lord is practical and eternal—guiding us in our decisions, relationships, and our walk with Him. It’s the foundation upon which everything else in life stands. Without it, all other knowledge falls short, but with it, we gain a perspective that leads to peace, understanding, and a life that reflects His character.

    in reply to: OCU C)OST C Discussion Lesson 11 #105952
    Caleb Kiser
    Participant

    Hi Cameron,

    You gave a clear and accurate breakdown of what SoHo routers do. These devices are essential in home and small office setups, combining multiple functions like routing, Wi-Fi, switching, and firewall protection into one unit. Each component plays a vital role in maintaining both connectivity and security. As you mentioned, having all these features working together ensures a stable and secure network for everyday use. Great explanation!

    in reply to: OCU C)OST C Discussion Lesson 10 #105951
    Caleb Kiser
    Participant

    Hi James,

    You’re absolutely right. Phishing, rogue Wi-Fi hotspots, and social engineering are real and growing threats in today’s world. As attackers get more bold and sophisticated, it’s important to stay ahead with tools like VPNs, encryption, multi-factor authentication, and strong firewalls, along with continuous user education to help recognize and avoid these evolving threats.

    in reply to: OCU C)OST C Discussion Lesson 11 #105875
    Caleb Kiser
    Participant

    SOHO routers, which stands for Small Office/Home Office, are basically the brain of your network at home or in a small business setup. One of the main features is NAT—Network Address Translation. It lets multiple devices connect to the internet using one public IP address while keeping your internal IPs hidden for security.

    Another key feature is DHCP. This automatically gives each device on the network an IP address so you don’t have to mess with manual setup every time something connects.

    Most SOHO routers also include built-in firewalls, wireless access, and sometimes even VPN support. That means you’re getting basic protection, wireless connectivity, and secure remote access all in one box.

    For smaller networks, these routers get the job done. They’re simple, reliable, and easy to manage. If set up right, they keep your network running smooth and help protect you from outside threats.

    in reply to: OCU C)OST C Discussion Lesson 10 #105874
    Caleb Kiser
    Participant

    Emerging vulnerabilities are on the rise, especially as mobile and physical devices become more connected. Here are three key threats and how to guard against them:

    1. Malicious mobile apps:
    Some apps on official stores are designed to steal data or spy on users.
    Countermeasure: Only download trusted apps, check reviews, limit permissions, and keep your phone updated.

    2. USB skimming (juice jacking):
    Public charging stations can be used to steal your data through USB connections.
    Countermeasure: Use a USB data blocker or carry your own charger and power bank.

    3. Smart device exploits:
    Smart home devices like cameras or locks can be hacked if left unsecured.
    Countermeasure: Change default passwords, enable two-factor authentication, and update firmware regularly.

    Staying alert and intentional can make all the difference. These practical steps help protect what matters—both physically and digitally.

    in reply to: OCU C)OST C Devotion 04 #105694
    Caleb Kiser
    Participant

    Matthew 9 is such a powerful display of both the compassion and authority of Jesus. In verse 2, a paralyzed man is brought to Him, and instead of addressing the physical issue first, Jesus goes straight to the heart: “Some people brought to him a paralytic, lying on a bed. And when Jesus saw their faith, he said to the paralytic, “Take heart, my son; your sins are forgiven.” That moment isn’t just kind—it’s divine. No religious leader in history has ever made that kind of claim and backed it up with power.

    Spiritual figures like Confucius, Buddha, Krishna, and Muhammad all had influence, no doubt. They emphasized morality, self-discipline, and religious practice. But at the end of the day, their teachings revolved around man trying to reach the divine through effort and works. None of them could forgive sin—because none of them were God.

    Jesus didn’t just teach good principles. He was the principle. He is the way. And He alone offers both pardon for sin and the power to be made whole.

    in reply to: OCU C)OST C Discussion Lesson 09 #105689
    Caleb Kiser
    Participant

    Hi Cameron,

    I’m completely on board with the idea that physical security plays a crucial role alongside digital protection. Badge systems like RFID add a solid layer of protection by limiting who can physically get in. Surveillance, like cameras or audio monitoring, helps deter threats and track incidents. And locking up server racks? Simple but super effective in preventing tampering or theft.

    in reply to: OCU C)OST C Discussion Lesson 08 #105688
    Caleb Kiser
    Participant

    Hi Cameron,

    I totally agree—user error is a huge vulnerability. It’s wild how quick people are to click on random links or download shady attachments. A friend of mine clicked on an email, and a hacker literally took over his computer. Education is key. Staying cautious with public Wi-Fi and being aware of phishing tactics can really go a long way.

    in reply to: OCU C)OST C Discussion Lesson 09 #105687
    Caleb Kiser
    Participant

    When we think about network security, it’s easy to focus only on the digital side of things, but physical security hardware plays a huge role too—especially in business environments where sensitive data and expensive equipment are involved. One key device is the surveillance camera system. These are essential not just for catching intruders but also for monitoring employee activity and protecting high-security areas. If something goes wrong, having video evidence can make a huge difference.

    Another important piece of hardware is a key card access system. Instead of using traditional keys, which can be easily copied or lost, these systems let businesses control who can enter specific areas and even log access times for accountability. Lastly, server cabinet locks are simple but extremely effective. They prevent unauthorized access to networking equipment and servers, which are often the core of a company’s operations.

    Together, these tools help make sure physical access is just as secure as digital.

    in reply to: OCU C)OST C Discussion Lesson 08 #105684
    Caleb Kiser
    Participant

    Networks are vulnerable in more ways than people often realize, and a lot of it comes down to small oversights that open the door for bigger issues. One major vulnerability is unpatched or outdated software—those ignored updates can leave systems exposed to known exploits. Another common issue is weak or reused passwords, which make it incredibly easy for attackers to gain unauthorized access. Then there’s the risk of insider threats, whether intentional or accidental, where someone with access compromises the network from within.

    To protect your network infrastructure, it’s important to take a layered approach. First, keep all systems updated** with regular patching to close security gaps. Second, segment your network—separating different areas limits how far an attack can spread if one part is compromised. Lastly, implement strong access controls, including multi-factor authentication and permission reviews, to make sure only the right people can access sensitive systems. It’s not just about defense—it’s about being prepared.

Viewing 15 posts - 1 through 15 (of 26 total)

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Certifications

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.