Mile2 Cybersecurity Certifications

Cybersecurity Certifications

Carlos Martes

Forum Replies Created

Viewing 15 posts - 1 through 15 (of 68 total)
  • Author
    Posts
  • in reply to: OCU C)NP D Week 04 Devotion #108355
    Carlos Martes
    Participant

    This topic is very deep, only because I fall victim in thinking that I need to be able to do good things, only to remind myself that no matter what I do or anyone does, we can never be perfect. We have to accept that and strive to actively rely, love and share our walk with Christ towards everyone. I honestly do not consider myself a good person, only because of things I have done in the past, but it doesn’t not hinder my belief and love for Him. Jesus stated that we must pick up our cross daily, meaning that everyday is an ongoing battle, a spiritual warfare that everyone endures once they have accepted Jesus as their Lord and Savior. It is NOT an easy route, but a route worth enduring just to be with our Father eternally.

    in reply to: OCU C)NP D Week 04 Lesson 08 Discussion #108354
    Carlos Martes
    Participant

    A virtual environment an a loud environment share similarities, but they are different in key ways. First, a virtual environment runs on a local server or computer where multiple virtual machines share the same physical hardware. A cloud environment, on the other hand, delivers these resources over the internet from remote data centers. Second, virtual environments usually require the organization to buy, manage and maintain its own hardware, while cloud environments reduce that burden by letting third party provider handle infrastructures. Third, scalability differs in which virtual environments have limited capacity based on existing hardware, while cloud environments allow quick scaling up or down on demand making them more flexible and cost efficient. In short, virtualization focuses on creating multiple systems on one machine, while cloud computing delivers shared on demand resources remotely, combining virtualization with network access, storage and managed services.

    in reply to: OCU C)NP D Week 04 Lesson 07 Discussion #108353
    Carlos Martes
    Participant

    What is the discussion question if i may ask?
    Thanks!

    in reply to: OCU C)NP D Week 03 Lesson 06 Discussion #108123
    Carlos Martes
    Participant

    Afternoon Isabelle,

    Security and consistency are vital for organizations in this day of age. Security ensures protection from hackers, viruses and accidents through tools, policies, and of course education. Consistency means resources are reliable and properly configured, ensuring smooth operation. Trusted sources for equipment and correct setups reduce risks, keeping both data and operations safe for long term stability and success.

    in reply to: OCU C)NP D Week 03 Lesson 05 Discussion #107916
    Carlos Martes
    Participant

    Great Summary! WIFI has really advanced. 802.11ac gave us faster speeds using 5 GHz and better antenna use with MIMO. Then 802.11ax improved things even more, letting networks handle more devices and work better in crowded areas. Both standards show how wireless keeps evolving to meet our needs. Nonetheless, great post Isabelle.

    in reply to: OCU C)NP D Week 03 Devotion #107870
    Carlos Martes
    Participant

    I used to be under several addictions such as nicotine. It was the worst and i thought id never take full control until i had let God handle the situation. Overtime, id fall back and forth and eventually without hesitation, i quit full turkey. Sometimes it’s easy to get a little bit overwhelmed of quitting because of self doubt, but we have to understand that we are not alone in this process, as God is always with you to help you through anything. It was when i had stopped rather depending on myself to let Him be in control in which everything had worked out for the better. We all struggle with this, but focusing on Jesus more and more will allow you to veer away from these addictions with easy because HE is always working with you, never to be alone.

    in reply to: OCU C)NP D Week 02 Lesson 03 Discussion #107867
    Carlos Martes
    Participant

    Good input Isabelle. TCP ensures reliable data transfer through flow control, verification, and the three way handshake process. It maintains ordered segments using sliding window protocol. HTTP, running on port 80 transfers data between browsers and servers, while HTTPS on port 443 provides secure communication by encrypting traffic, offering greater safety than standard HTTP.

    in reply to: OCU C)NP D Week 03 Lesson 06 Discussion #107837
    Carlos Martes
    Participant

    Organization today operates with clear goals while also navigating serious threats. Two major goals include growth and competitiveness and customer satisfaction. Growth often involves expanding market share, adopting innovative techs, and improving efficiency to stay ahead in rapidly changing industries. Customer satisfaction remains central, with businesses striving to deliver high quality products and services, build trust, and retain loyal clients. Another common goal is achieving sustainability and compliance, ensuring that operations align with environmental standards and regulatory requirements, which can also strengthen reputation. On the other hand, organizations face major threats that can disrupt progress. One significant threat is cybersecurity risks. With increasing digital dependence, companies are vulnerable to data breaches, ransomware and identity theft, which can cause financial losses and harm credibility. Another key threat economic instability, including inflation, supply chain disruptions, and market volatility. These can reduce profits, and weaken organizational resilience, forcing companies to adapt quickly to survive.

    in reply to: OCU C)NP D Week 03 Lesson 05 Discussion #107836
    Carlos Martes
    Participant

    Ethernet is the most widely used LAN standard. It basically defines how devices in a local network communicate over cables, typically twisted pair or fiber optic. Ethernet uses packet switching to send data in frames and supports speeds from 10 Mbps up to several hundred Gbps in modern data centers. It also employs CSMA/CD which is Carrier Sense Multiple Access with Collision Detection, to manage network traffic in half-duplex mode, though modern Ethernet generally operates in full duplex, eliminating collisions. Ethernet is reliable, scalable, and forms the backbone of most wired networks worldwide. Wi-Fi is a wireless LAN standard that allows devices to connect without physical cabling. It operates primarily in the 2.4 GHz and 5GHz bands (with newer standards range from 802.11b to the modern Wi-Fi 6. This offers gigabit speeds, lower latency, and better performance overall especially in crowded environment’s. Wi-Fi is crucial for mobility and convenience in both terms of homes and enterprises. Question’s or concerns, please feel free to ask!

    in reply to: OCU C)NP D Week 02 Lesson 04 Discussion #107813
    Carlos Martes
    Participant

    Switching and routing are both essential networking functions but serve different purposes. Switching operates mainly at the data link layer of the OSI model. It is used within a local area network to connect devices like computers, printers and servers. Switches forward data based on MAC addresses, ensuring packets are sent only to the intended device. They are fast, efficient and reduce clusters of traffic by creating direct communication paths. Routing on the other hand, works at the network layer. Routers connect multiple networks together, such as linking a home LAN to the internet. Routing decisions are made based on IP addresses, determining the best path for data to travel across networks. Unlike switches, routers can manage complex paths, prioritize traffic, and connect different types of networks. In short, switching is about efficient delivery within a network, while routing is about directing traffic between networks. Hope this helps!

    in reply to: OCU C)NP D Week 02 Devotion #107811
    Carlos Martes
    Participant

    Hello everyone. I think that this passage hits deep for all of us. As i go on about our day, there are times where i find my thoughts wondering about many things that i should not be worrying about. Some of those occurrences can be either financial, work related or even convictions are felt. The Holy Spirit is our guide and should be the voice in which we actively seek. It is difficult at times because we are constantly exposed to social media, and other worldly things that will easily distract us. As long as we actively seek the Lord, God will speak to you and will provide you guidance and comfort.

    in reply to: OCU C)NP D Week 02 Lesson 03 Discussion #107809
    Carlos Martes
    Participant

    Core protocols are the foundation of digital communication, ensuring devices interact efficiently across networks. Transmission Control Protocol provides reliable data transfer by creating a connection, sequencing packets, and checking for errors, making it vital for services like email, file sharing and web browsing. Internet Protocol manages addressing and routing, ensuring data travels across interconnected networks and reaches to the correct destination services. It acts like a digital postal system, directing packets to their proper location. Hypertext Transfer Protocol governs communication between web browsers and servers, defining how requests are made and responses are delivered so users can access websites and online resources. Together, these protocols work in harmony, ensures reliable delivery, IP directs the path, and HTTP makes web interactions possible. Without them, the internet today would not function as they provide structure, order and accessibility to global and digital communications.

    in reply to: OCU C)NP D Week 01 Lesson 02 Discussion #107788
    Carlos Martes
    Participant

    Hello Isabelle,
    Great explanation of repeaters, gateways and bridges. You highlighted their specific roles well which are the signal extensions, inter network communication and LAN segmentation. Id also add that bridges and switches help reduce network congestion by dividing traffic. Understanding when to deploy each ensures efficiency, scalability and reliability in modern network infrastructures across different environments.

    in reply to: OCU C)NP D Week 01 Lesson 01 Discussion #107760
    Carlos Martes
    Participant

    Hello Isabelle!
    Great framework, clear questions, testing and documentation are spot on! Id add prioritizing impact and reproducibility up front , checking logs and recent changes, and confirming environment factors such as network, permissions and or updates. After the fix, perform a brief root cause review and preventative measure checklist to avoid recurrences and share lessons with the team of course! Overall, great input!

    in reply to: OCU C)NP D Week 01 Lesson 02 Discussion #107706
    Carlos Martes
    Participant

    Good afternoon!
    In Networking, several key devices play essential roles ensuring communication between systems. A router is one of the most important, as it connects different networks together such as a home or a business network to the internet. Routers determine the best path for data packets and often provide additional services like assigning IP addresses through DHCP and basic security through firewall functions. A switch operates mainly within a local aera network which is LAN. It forwards data directly to the intended device using MAC addresses, which reduces unnecessary network traffic and increase efficiency. Switches are crucial for allowing multiple devices, such as computers and printers, to communicate seamlessly on the same network. An access point extends the wired network into a wireless environment, allowing mobile devices like phones and laptops to connect without cables. Access points also improve coverage in larger areas, ensuring reliable communication across the network.

Viewing 15 posts - 1 through 15 (of 68 total)

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Certifications

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.