Mile2 Cybersecurity Certifications

Cybersecurity Certifications

Carlos Martes

Forum Replies Created

Viewing 13 posts - 31 through 43 (of 43 total)
  • Author
    Posts
  • in reply to: OCU C)OST C Devotion 03 #105595
    Carlos Martes
    Participant

    This passage of Matthew is really interesting. Some of the key insights into this act of faith is the Humility and recognition. The centurion acknowledges his own unworthiness to have Jesus enter his home, which demonstrates the humility and respect for Jesus’ holiness. The authority and faith of the centurion understands understands that he knows Jesus authority and that it extends beyond physical presence and that His spoken word holds power. This reflects his faith in Jesus’ divine authority. I believe that the centurions faith is a reminder to all believers that true faith involves trust in Jesus word and authority. It’s a call to believe that He can accomplish His will in our lives, often in ways that transcend human understanding. May this faith inspire you in your own journey, trusting in the power and authority of Jesus, the One who holds all things together!

    in reply to: OCU C)OST C Discussion Lesson 06 #105554
    Carlos Martes
    Participant

    Two common types of windows troubleshooting methods are Safe Mode Boot and Event Viewer Analysis. I am quiet familiar with Safe Mode Boot as i have recently came upon issues with my PC and had to configure and troubleshoot it on my own which is quiet a surprise!

    Safe Mode Boot: Starts windows in Safe Mode, in which loads only the essential drivers and services. You should only use this options either when the system is crashing, freezing or misbehaving abnormally. IT also helps determine if third party software or drivers are causing issues. It is useful for removing malware or problematic applications.

    Event Viewer Analysis: To check logs for system, application and security errors. Using this option is required when you need to investigate system errors or performance issues. It is basically ideal for diagnosing recurring problems like failed startups or app crashes. It also helps identify the source of critical or warning level systems events.

    in reply to: OCU C)OST C Discussion Lesson 04 #105535
    Carlos Martes
    Participant

    Hello James!

    Good post in regards to distinguishing the TCP and Ip and the fact that you were able to highlight the functionality between the two. I’ve been keen into learning Linux and just as i thought, both TCP/IP are native in the kernel. Also, they are heavily used in servers, cloud infrastructure, routers an even firewalls. In essence, any device that connects to a network today uses them and its practically supported by every OS. Also, great reference provided as it was an interesting topic to read.

    in reply to: OCU C)OST C Discussion Lesson 05 #105498
    Carlos Martes
    Participant

    Hello Cameron! AES is also an encryption in which i find quite interesting because it is indeed one of the most widely used encryption algorithms today. Another fun fact i learned about AES is that there are no known practical vulnerabilities that allow attackers to decrypt AES without the key. i can see how there could be some theoretical side channel attacks that can happen, but those initially require physical access to the device and very specific conditions. Good input altogether!

    in reply to: OCU C)OST C Discussion Lesson 05 #104695
    Carlos Martes
    Participant

    So there are several types of encryption used to protect data, each suited to different scenarios. One is Advanced Encryption Standard (AES) which is a symmetric encryption method meaning the same key is used to both encrypt and decrypt data. It’s ideal for securing data to rest, such as files stored on a hard drive or customer information in a database. Next is Rivest Shamir-Adleman (RSA) which is a asymmetric encryption method that uses a public key for encryption and a private key for decryption. This makes it well suited to securely transmitting data over the internet, like encrypting emails or setting up secure website connections through HTTPS. Last is Elliptic Curve Cryptography. It is another asymmetric encryption technique that provides strong security with smaller key sizes, making it highly efficient. ECC is especially appropriate for use in mobile devices, IoT systems, and cryptocurrency applications where computing power and battery life are limited. Each encryption method has it’s strength and is chosen based on specific needs of the situation.

    in reply to: OCU C)OST C Discussion Lesson 04 #104665
    Carlos Martes
    Participant

    Hello everyone!

    TCP/IP stands for Transmission Control Protocol/Internet Protocol, which is the fundamental communication protocol suit used for transmitting data over networks, including the internet. It basically defines how data should be packaged, addressed, transmitted, routed, and received between computers. TCP ensures reliable and ordered delivery of data by breaking it into smaller packets, checking errors and reassembling it at the destination. The IP on the other hand handles the addressing and routing of these packets to ensure they reach the correct device. Together, it enables different types of computers and networks to communicate effectively, forming the backbone of modern internet communication. Fun fact: its simple and open design has helped make the internet a global network where many different systems can work together with little to no flaw.

    in reply to: OCU C)OST C Discussion Lesson 03 #104634
    Carlos Martes
    Participant

    Thanks Teisha! I do game every now and then but as far as LAN, it was something i was most familiar with. Thank you for sharing your info in regards to your workplace. It is very intriguing to see that many of the folks here already have some sort of IT knowledge or already are working in the field, and yours’s is very interesting. Are you a network technician by any chance? Thanks for sharing once again.

    in reply to: OCU C)OST C Discussion Lesson 02 #104633
    Carlos Martes
    Participant

    Great post Tiesha. i do love the fact that you were able to explain how the command line interface in detail and how it works. Although i am still learning much about the CLI, it still amazes me how it severs a magnitude of purposes in regards to being in an IT field. It is essential for anyone pursuing this career to be able to be familiar with this. Again, great post!

    in reply to: OCU C)OST C Discussion Lesson 01 #104631
    Carlos Martes
    Participant

    Thank you for sharing Caleb. I also appreciate you putting in your line of work and what operating systems you use. Its great to see what OS others utilize depending on their career as it bring in more detail and in to light what others may not know. DaVinci Resolve is a new one for me as i did not know it was used mainly for software editing. Thanks for sharing!

    in reply to: OCU C)OST C Devotion 01 #104589
    Carlos Martes
    Participant

    This devotion truly defines the word “forgiveness” as the bible to me teaches you to forgive. I strongly think that forgiving someone that had deeply hurt you in the past can help ease the pain that you have been going through. There have been several people in my life who I’ve resented because of their actions, and when i first came tor Christ, forgiveness was something that came easily to me, although it was a tough pill to swallow, but i told myself, if this is what Jesus preached to his disciples, then it is a task that i need to accomplish as it not only will benefit me, but will open THIER eyes as well coming to repentance. I pray that for others, who are truly hanging on to the pain that has been caused to you, to forgive, because our Father loves us and would want us all to be at peace. Even if the other person holds resent to you despite the forgiveness, it is the right thing to do, and to help others go through the same process. May you all find peace in Him.

    in reply to: OCU C)OST C Discussion Lesson 03 #104586
    Carlos Martes
    Participant

    Networks are classified based on their size and the area they cover. For example, a personal area network connects devices like phones and headphones within a very short range, usually for personal use. A local area network (LAN) links computers in a small area like a home, office or school to share files, printers or even internet access. We can all agree that many of us are familiar with this type of classifications as it applies mostly to gamers. Metropolitan area networks another classification in which covers a large area such as a city or a campus in which connects multiple LANS together. Lastly, a wide area network (WAN) spans huge distances, connecting computers and smaller networks across cities, or even countries, the internet being the most common example. Each type serves the purpose of enabling communication and resources sharing, suited to it’s scale. Understanding these are important because they help us understand how to best connect and manage devices based on distance, scale and purpose. Classifying networks helps us design systems that are both practical and efficient.

    in reply to: OCU C)OST C Discussion Lesson 02 #104584
    Carlos Martes
    Participant

    When it comes to utilizing command lines, it is a text based interface that allows users to interact directly with the computers operating system by typing commands. It has a few purposes that are worth mentioning such as:

    System Control: Perform advanced tasks that might not be available or are more efficient than using a graphical interface.

    Automation: Run scripts and automate repetitive tasks.

    Access to System Tools: Many powerful tools and settings are only accessible through the CLI.

    Resource Efficiency: Uses fewer system resources than a graphical interface.

    Some of the basic common functions and specific commands in both Windows Command Prompt and Unix/Linux Terminal you can use are:

    cd (change directory when it comes to file management.
    systeminfo (Windows)for System Info
    ping, ipconfig (Windows), ipconfig (Linux/macOS) for Network Tools
    net user (Windows), adduser (Linux). for User Management
    apt install, apt update (Linux) for Software Management

    In summary, it gives users powerful, direct control over their computer system. Tasks can be completed efficiently, it provides advance controls, the automation i which you can create scripts to automate tasks like backups, updates or even system checks. I believe that it is essential for users to be familiar with tools like this when it comes to It professionals or having a career in IT.

    in reply to: OCU C)OST C Discussion Lesson 01 #104582
    Carlos Martes
    Participant

    Hello! When it comes to operating system applications, there are several which are known as system utilities or system programs.

    One of them is File explorer, in which its purpose is for file management. They serve as the main interface for interacting with the computers storage system, allowing users to access documents, media and installed programs.

    Task Manager- for system performance monitoring and process management. they provide detailed information about CPU, memory, disk and network usage.

    Another is Control Panel. It’s purpose is for system configuration and settings ,management. These tools allows users to change system settings such as network setup, display resolution, user account controls and privacy settings.

    These are some of the basic operating application systems that i typically encounter and use as i have been going in depth into computers, and it is no surprise that many people use them on the daily. I hope this helps!

Viewing 13 posts - 31 through 43 (of 43 total)

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Certifications

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.