Mile2 Cybersecurity Certifications

Caleb Kiser

Forum Replies Created

Viewing 15 posts - 46 through 60 (of 63 total)
  • Author
    Posts
  • in reply to: OCU C)OST C Discussion Lesson 11 #105875
    Caleb Kiser
    Participant

    SOHO routers, which stands for Small Office/Home Office, are basically the brain of your network at home or in a small business setup. One of the main features is NAT—Network Address Translation. It lets multiple devices connect to the internet using one public IP address while keeping your internal IPs hidden for security.

    Another key feature is DHCP. This automatically gives each device on the network an IP address so you don’t have to mess with manual setup every time something connects.

    Most SOHO routers also include built-in firewalls, wireless access, and sometimes even VPN support. That means you’re getting basic protection, wireless connectivity, and secure remote access all in one box.

    For smaller networks, these routers get the job done. They’re simple, reliable, and easy to manage. If set up right, they keep your network running smooth and help protect you from outside threats.

    in reply to: OCU C)OST C Discussion Lesson 10 #105874
    Caleb Kiser
    Participant

    Emerging vulnerabilities are on the rise, especially as mobile and physical devices become more connected. Here are three key threats and how to guard against them:

    1. Malicious mobile apps:
    Some apps on official stores are designed to steal data or spy on users.
    Countermeasure: Only download trusted apps, check reviews, limit permissions, and keep your phone updated.

    2. USB skimming (juice jacking):
    Public charging stations can be used to steal your data through USB connections.
    Countermeasure: Use a USB data blocker or carry your own charger and power bank.

    3. Smart device exploits:
    Smart home devices like cameras or locks can be hacked if left unsecured.
    Countermeasure: Change default passwords, enable two-factor authentication, and update firmware regularly.

    Staying alert and intentional can make all the difference. These practical steps help protect what matters—both physically and digitally.

    in reply to: OCU C)OST C Devotion 04 #105694
    Caleb Kiser
    Participant

    Matthew 9 is such a powerful display of both the compassion and authority of Jesus. In verse 2, a paralyzed man is brought to Him, and instead of addressing the physical issue first, Jesus goes straight to the heart: “Some people brought to him a paralytic, lying on a bed. And when Jesus saw their faith, he said to the paralytic, “Take heart, my son; your sins are forgiven.” That moment isn’t just kind—it’s divine. No religious leader in history has ever made that kind of claim and backed it up with power.

    Spiritual figures like Confucius, Buddha, Krishna, and Muhammad all had influence, no doubt. They emphasized morality, self-discipline, and religious practice. But at the end of the day, their teachings revolved around man trying to reach the divine through effort and works. None of them could forgive sin—because none of them were God.

    Jesus didn’t just teach good principles. He was the principle. He is the way. And He alone offers both pardon for sin and the power to be made whole.

    in reply to: OCU C)OST C Discussion Lesson 09 #105689
    Caleb Kiser
    Participant

    Hi Cameron,

    I’m completely on board with the idea that physical security plays a crucial role alongside digital protection. Badge systems like RFID add a solid layer of protection by limiting who can physically get in. Surveillance, like cameras or audio monitoring, helps deter threats and track incidents. And locking up server racks? Simple but super effective in preventing tampering or theft.

    in reply to: OCU C)OST C Discussion Lesson 08 #105688
    Caleb Kiser
    Participant

    Hi Cameron,

    I totally agree—user error is a huge vulnerability. It’s wild how quick people are to click on random links or download shady attachments. A friend of mine clicked on an email, and a hacker literally took over his computer. Education is key. Staying cautious with public Wi-Fi and being aware of phishing tactics can really go a long way.

    in reply to: OCU C)OST C Discussion Lesson 09 #105687
    Caleb Kiser
    Participant

    When we think about network security, it’s easy to focus only on the digital side of things, but physical security hardware plays a huge role too—especially in business environments where sensitive data and expensive equipment are involved. One key device is the surveillance camera system. These are essential not just for catching intruders but also for monitoring employee activity and protecting high-security areas. If something goes wrong, having video evidence can make a huge difference.

    Another important piece of hardware is a key card access system. Instead of using traditional keys, which can be easily copied or lost, these systems let businesses control who can enter specific areas and even log access times for accountability. Lastly, server cabinet locks are simple but extremely effective. They prevent unauthorized access to networking equipment and servers, which are often the core of a company’s operations.

    Together, these tools help make sure physical access is just as secure as digital.

    in reply to: OCU C)OST C Discussion Lesson 08 #105684
    Caleb Kiser
    Participant

    Networks are vulnerable in more ways than people often realize, and a lot of it comes down to small oversights that open the door for bigger issues. One major vulnerability is unpatched or outdated software—those ignored updates can leave systems exposed to known exploits. Another common issue is weak or reused passwords, which make it incredibly easy for attackers to gain unauthorized access. Then there’s the risk of insider threats, whether intentional or accidental, where someone with access compromises the network from within.

    To protect your network infrastructure, it’s important to take a layered approach. First, keep all systems updated** with regular patching to close security gaps. Second, segment your network—separating different areas limits how far an attack can spread if one part is compromised. Lastly, implement strong access controls, including multi-factor authentication and permission reviews, to make sure only the right people can access sensitive systems. It’s not just about defense—it’s about being prepared.

    in reply to: OCU C)OST C Devotion 03 #105622
    Caleb Kiser
    Participant

    This is such a powerful reminder! The story of the centurion in Matthew 8 shows what real faith looks like. The fact that even Jesus marveled, a word that Jesus didn’t use very often, at the faith this roman centurion. The centurion understood that Jesus didn’t even have to be physically present to heal his servant. He trusted completely in Jesus’ authority and power. And what makes this even crazier is that this man wasn’t even a Jew, he was a Roman soldier!

    You made a great point: real faith means trusting God even when life doesn’t make sense. It’s easy to say we believe when things are good, but true faith shows up when times are hard. Like the centurion, we are called to trust Jesus fully, knowing He sees our needs and has a plan for us.

    Instead of holding onto fear and doubt, we are invited to lay our worries at His feet and trust Him. May we have faith that moves the heart of God, just like the centurion did!

    in reply to: OCU C)OST C Discussion Lesson 06 #105619
    Caleb Kiser
    Participant

    Hi Cameron,

    I enjoyed reading your post. I also talked about Safe Mode in mine, so it was cool to see how you use it too. I liked how you explained using Safe Mode when you’re out of options—it really is a lifesaver for tracking down stubborn issues. I also thought it was smart that you brought up System File Check. I didn’t mention that one, but it’s a really good tool, especially after updates mess with your audio or streaming setup. I can definitely see how important that would be for a streamer. You did a great job keeping it clear and easy to follow!

    in reply to: OCU C)OST C Discussion Lesson 07 #105617
    Caleb Kiser
    Participant

    Hi Cameron,

    I enjoyed reading your post. I also chose to talk about desktop virtualization. I liked your example with the video game project—it really showed how helpful offloading heavy programs can be for lower-end PCs. You made a good point about the challenge of needing the right resources to set it up too. A lot of people forget about that part. I also thought it was smart to mention storage virtualization. It’s a great way to keep everyone’s work in one place, even if security can be a risk. Overall, you explained everything really well!

    in reply to: OCU C)OST C Discussion Lesson 07 #105616
    Caleb Kiser
    Participant

    Two common types of virtualization are application virtualization and desktop virtualization, and each has its own unique uses, pros, and cons. Application virtualization allows you to run a program without actually installing it on your device. Instead, the app operates in its own virtual space, separate from the rest of your system. This is helpful because it prevents software conflicts, makes updates easier, and keeps your system cleaner. For example, if an app gets updated on the virtual platform, everyone using it gets the latest version automatically. However, it doesn’t work well for every type of app—especially those that are complex or require deep access to system files. You also need extra software to manage it all.

    Desktop virtualization, on the other hand, lets you access an entire computer desktop remotely. It’s like logging into a computer that lives somewhere else. This is especially useful if you need to work from multiple locations or devices. All your files, apps, and settings are in one place, no matter where you log in. It also makes things easier for IT teams, since they can manage all desktops from one central location. The downsides? You’ll need a strong internet connection to avoid lag, and it might not run as fast as a computer sitting right in front of you. Still, for remote work or shared environments, desktop virtualization is a solid option.

    in reply to: OCU C)OST C Discussion Lesson 06 #105587
    Caleb Kiser
    Participant

    When troubleshooting Microsoft Windows, two effective methods are Safe Mode and using Event Viewer with Reliability Monitor. Safe Mode is ideal when the system is crashing, freezing, or failing to start correctly. It loads only the essential drivers and services, helping to isolate the problem. If the issue doesn’t occur in Safe Mode, it’s likely caused by a third-party application or driver, making it easier to identify and remove the culprit. On the other hand, Event Viewer and Reliability Monitor are useful when the issue is less obvious, such as random crashes or failed updates. Event Viewer provides detailed logs of system and application errors, while Reliability Monitor offers a user-friendly timeline of problems, including hardware and software failures. These tools help pinpoint the exact cause of system instability. By choosing the right method based on the nature of the issue—visible behavior versus hidden system errors—you can troubleshoot Windows more effectively.

    in reply to: OCU C)OST C Devotion 02 #105501
    Caleb Kiser
    Participant

    I think we can all, in some way, have our problems with this. We all sometimes are triggered by something that causes us to get angry. And, it may not be the same for another person. They may become angry at something that we can handle peacefully. This is why Matthew 7:3-4 is so important to keep in mind. We may thing we can handle it, but what about the other person.

    As for me, I think I have a combination of both. There are things that I can deal with patiently and there are other things, though few, that I tend to have less patience in dealing with that thing. I do my best to own up to the times that I do overreact, and I also ask God for help. It usually takes me getting worked up or a gradual series of events that causes me to become angry.

    With that being said, Paul tells us to ‘work out our salvation with fear and trembling’, meaning that we must continually work on ourselves and how we react to other people. When we look out for others and help them, especially in their faults, we are building the body of Christ.

    in reply to: OCU C)OST C Discussion Lesson 02 #105244
    Caleb Kiser
    Participant

    Hi Isabelle,

    You make a great point about how command lines provide quick access to powerful functions. The ability to show, edit, and test system information with just a few simple commands makes them incredibly efficient, especially in troubleshooting or managing systems. Tools like “ls”, “rm”, and “ping” are essential for IT pros.

    in reply to: OCU C)OST C Discussion Lesson 02 #104694
    Caleb Kiser
    Participant

    The command line is a text-based interface that allows users to interact directly with a computer’s operating system by typing commands. While graphical interfaces are more common, the command line offers faster and more precise control, especially for tasks like file management, system configuration, and automation.

    Basic commands include “cd” to change directories, “mkdir” to create folders, and “del” or “rm” to delete files. You can also use “ping” to test network connectivity, “ipconfig” to view network settings, and “tasklist” to see running processes. To read file contents, commands like “type” or “cat” are useful, and “find” or “findstr” help locate specific data within files.

    Disk tools like “chkdsk” and “diskpart” allow users to manage drives and partitions. One of the biggest advantages of the command line is the ability to automate tasks through scripts, making it ideal for repetitive actions. PowerShell, available in Windows, extends these capabilities with more advanced scripting and system control.

    Although it can seem intimidating at first, learning to use the command line gives users more control, efficiency, and flexibility when working with their computer.

Viewing 15 posts - 46 through 60 (of 63 total)

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Certifications

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.