Mile2 Cybersecurity Certifications

Erin Kesterson

Forum Replies Created

Viewing 15 posts - 1 through 15 (of 65 total)
  • Author
    Posts
  • in reply to: OCU C)NP C Week 05 Devotion #105878
    Erin Kesterson
    Participant

    I know that I have lost God and I have found my way back to him. Was I created for Gods purpose I would want to believe He has a plan for all of us. I believe he created us for our own purpose of learning and following his path he set before us to praise his glory and his word. I believe he has put struggles ahead of me to lose my faith and then find my way home. I have struggled with addiction and had to fall and let my God take the wheel of my life to learn I am at his mercy and will and I love my God and without him in it and his word and glory I would still be lost. God gave me strength when I fell it was him that picked me up. I spread the word of addiction and I am a peer to peer support counselor thru a local service that I listen and take and support other recovering addicts to know my story and thru my recovery let them know at least they have one person who believes in their recovery and I believe that is Gods purpose for me and the path he set before me today.

    in reply to: OCU C)NP C Week 05 Lesson 10 Discussion #105844
    Erin Kesterson
    Participant

    Three Network Polices would be:

    1. Standardizing hardware and software Ip addresses to be able to manage or do troubleshooting better and make it easy and simple to do/

    2. Security Policy to keep your data and information at a level of protection against hackers and others being able to use it for fradulent reasons and virus that can infect your device or systems/

    3. Reliability and Availiblity of the network and how well it can send and recieve data and information that is being tranmitted through the cables and waves to other companys and devices.

    in reply to: OCU C)NP C Week 05 Lesson 09 Discussion #105843
    Erin Kesterson
    Participant

    The two impressions I have took from chapter 9 is that it is a timely thing with learning all the differences in what a network is and what it all contains. Like the differant proxy’s and Protocols. Systems logs and ect that makes up the day to day networks.
    The next impression I gotten from this chapter was that it builds a relationship over time with the server and clients to build this trust will help with the day to day networking and be able to build future clients.

    in reply to: OCU C)NP C Week 04 Lesson 08 Discussion #105718
    Erin Kesterson
    Participant

    You have made very good points and explained them very well and easy to understand. I really enjoyed reading your post.

    in reply to: OCU C)NP C Week 04 Lesson 08 Discussion #105717
    Erin Kesterson
    Participant

    Trae you have very good points on the differences of the two. I really like the way you have explained how each is different. The cloud cant exist without the virtual where the virtual can exist without the cloud. It surprises me that the two are different all of the points you have made plus some. You would think with the technology today they could figure a way that the two could run without one another Just my own thoughts on that. There are many different clouds today that all of them could possibly work alone at some point in the future dont you think?

    in reply to: OCU C)NP C Week 04 Lesson 08 Discussion #105669
    Erin Kesterson
    Participant

    Three differences between a virtual and a coloud environment is:

    1. Virtual is a software that separates physicl infrastructures to creae various resources.
    Virtual is the foundation for the cloud.

    2. Cloud delievers a shared computing resources software or data . Virtual is simple with
    the process of software used and hardware it exist without the cloud but the cloud can not exist without the vistual.

    3. Vistual manipulates hardwardware where cloud is the outcome of the manipulations.
    Cloud is a service or a ondamand through the internet.

    in reply to: OCU C)NP C Week 04 Lesson 07 Discussion #105667
    Erin Kesterson
    Participant

    Two controls or methods that help harden a server or network.

    One would be the firewall it makes a foundation to secure a policy that will denie all traffic unless explicitly permitted. It looks and updates the rules and changes in a network and requirements, closing any unused or unnecessary network ports to reduce the attacks.

    The second one would be Zero Trust Network Access (ZTNA) This is just as it is said it allows no access in a connections security and it will need to be reautherized for every action taken. This help keep the data and network secure and hard to override, Even with familiar and trusted networks trying to access it it gets blocked till its autherized. Organizations can define the securitypolicies for each deviced connected to the network.

    in reply to: OCU C)NP C Week 04 Devotion #105660
    Erin Kesterson
    Participant

    I believe I am a good person I have made a lot of wrong doings threrefor I dont believe I am good enough for god to allow me into his kingdom. My wrongs cant be made right I can learn from them and move on but The truth be told I am not good enough to even questions my past or ask to be let into a kingdomthat I was fit for before I could walk. Then to take a path that wasnt meant for me and listen to the devil instead of my creator. I have asked for forgiveness and I am good enough for Gods forgiveness that is all I need to keep faith and follow my lord and savor.

    in reply to: OCU C)NP C Week 03 Lesson 06 Discussion #105580
    Erin Kesterson
    Participant

    Cybersecurity is among one of the major threats in todays businesses to keep thriving in small and medium sized offices. The cyber threats jeopardizes the impact of not only the business but the customers being able to connect to the services. The goal of this is to tackel the breach with real time solutions and to mitigate the risk. Third parties can unlawfully misuse tge oitebtuak if 5G and it is a challenge the risk is emotional or fhysical attacks on the techonogy and allow them to exploit the data colled or stored thy are capitalixwd on the complex of 5 g networks to carry out the malicious activities. The goal would be to increase the rate of malware attackes on existing moble phones and various packages as tousanticovid,apk are hidden in banking apps abd are downloaded from malicious websites or hyperlinks.

    in reply to: OCU C)NP C Week 03 Lesson 05 Discussion #105579
    Erin Kesterson
    Participant

    Standard LAN would be IEEE 802.11 ac and 802.11ax. 802.11 ac is mostly used in homes and office networking to allow laptops and printers and other devices to communicate accross the devices. to access the internet without connecting wires the IEEE 802.11 is basis for vehicles-base communication to. This is also for 5GHz.
    802.11n is a wireless networking that uses multiple antenna to increase the rates of data. Startard support for multipal input and output frame aggregation and improved security with other features and also can be used on 2.4 GHz and 5 GHz.

    in reply to: OCU C)NP C Week 03 Devotion #105578
    Erin Kesterson
    Participant

    A few years back I was under the control of addiction and I was letting it destoy every part of me and my life. It took alot to overcome where and who I can trust in my life. I lost faith I lost family and friends and believed the only thing that loved and wanted me in life was drugs. It took alot for me to get clean and sober and been sober and clean for 4 years and 3 months. I have a home bought with my own money 2 cars and a truck paid for. I gotten custody of my daughter back and she is home living with me. I am college presueing my dream job. I have met a man whom I believe is my person in life. I have my faith in God back and hand all my problems and struggles over to him. For I know he is here for me and I dont live a life without him to help carry me when I am weak.
    I have struggled and lost from freedom to death all for something God spoke to me and told me to listen and at that time I didnt listen to the words I though I was imagining voice and when I found out I had cancer The voice came again and told me to listen. I was told I am not alone and always remeber I am loved and he will be here to carry my worrys just keep faith and believe in him. I am and will continue to do that. God is a mighty god and he will always be beside us even when we dont hear or know hes there he truly is always with each and everyone of his children.

    in reply to: OCU C)NP C Week 02 Lesson 03 Discussion #104699
    Erin Kesterson
    Participant

    Three Main Protocol would be TCP (Transfer Control Protocol). It allows data to be broken down and sent in the order it is ment to be in.

    2. The next would be IP (Internet Protocol) This allows the data to be sent to another device within the same network.

    3. Is the DNS (Donain Network Protocol) The DNS also uses a IP address to send data with this it makes sure it is going to the right address and device and will have some websites and businees hold the site for the data to arrive correct and in the right place.

    in reply to: OCU C)NP C Week 02 Lesson 04 Discussion #104698
    Erin Kesterson
    Participant

    The difference between a router and a switch is how the data and information is sent. A switch will look for the most effcient way to send the data and a router will send the data throught the network that is local area data within the same MAC address. The Switch sends data through a IP address that allows you to be able to send data to anyone or device.

    in reply to: OCU C)NP C Week 02 Devotion #104685
    Erin Kesterson
    Participant

    With all the media and social media that is in the world today. It makes it easy to stray away from our lord and savior. I have seen may people doubt what is in our paths that God has set for us by following others and not following our belief and heart and knowledge. To keep believing the word of God we need to remind ourself who our creature is and what paths he has for us. To pray and spread his word and wisdom. To limit our time on voices from the media and know that he shall be the one to judge us in the end of every decision we have made through out our life time.

    in reply to: OCU C)NP C Week 01 Lesson 02 Discussion #104595
    Erin Kesterson
    Participant

    Three different types of Network Devices would be

    1. A Hub. A hubs is essential multiport device that coneects multiple Ethernet devices into a single broadcast network. which makes them prone to traffic congestions. There are three types of Hub. Passive, Active, intelligent.

    2.The Bridge is different then the Hub because the Hub connects multiple devices where the Brigde connects two or more network and filters the traffic between them the role is to isolate local segment traffic adn reduce traffic congestion for better network performanve.

    3. The Router its main job is to direct traffic to thier destinations and chart the path through interconnected network devices that store information about their coneectd networks

Viewing 15 posts - 1 through 15 (of 65 total)

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Certifications

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.