Mile2 Cybersecurity Certifications

Eugene Estes

Forum Replies Created

Viewing 15 posts - 1 through 15 (of 17 total)
  • Author
    Posts
  • in reply to: OCU C)OST A Discussion Lesson 06 #111538
    Eugene Estes
    Participant

    The techniques and tools used to store, arrange, and handle digital information are referred to as data storage. There are a variety of storage options available to satisfy different demands regarding speed, capacity, affordability, and accessibility (Zhu, 2024). Hard disk drives (HDDs) are among the most popular storage alternatives. These devices, which are popular because they offer a big storage capacity at a relatively low cost, store data on spinning magnetic disks. HDDs are appropriate for backups, bulk storage, ordinary computer use, and settings where a very fast speed is not a critical need.
    Solid-State Drives (SSDs) are another popular storage solution. SSDs rely on flash memory and don’t have any moving parts as HDDs do (Kumar, 2021). They provide shorter system boot times, increased durability, and faster read and write speeds. SSDs are frequently found in servers, laptops, and performance-critical devices like software development computers and gaming systems. Their speed and dependability make them perfect for systems that need great performance, even though they cost more per gigabyte than HDDs.
    Another popular storage option is cloud storage, which enables users to remotely save data over the internet. Gupta et al., (2022) states that flexible, scalable storage is available from any internet-connected device with services like Google Drive, One Drive, and AWS S3. Web hosting, enterprise data management, remote backups, and collaboration all make use of cloud storage. Although it is scalable and convenient, it is very dependent on internet connectivity.
    A specialized device linked to a network that enables several users to store and access shared files is called Network Attached Storage, or NAS (Et. al., 2021). Businesses, organizations, and home networks frequently utilize NAS for automated backups, media streaming, and centralized storage.

    in reply to: OCU C)OST A Discussion Lesson 07 #111537
    Eugene Estes
    Participant

    A single physical machine can operate several virtual systems through virtualization technologies. In computing environments, it enhances scalability, flexibility, and resource usage (“Understanding virtualization,” 2023). The benefits and drawbacks of two popular virtualization technology types are listed below.
    1. Hardware Virtualization (Hypervisor-Based Virtualization)
    Hardware virtualization creates and maintains virtual machines (VMs) using a hypervisor like VMware, Hyper-V, or Virtual-box (Thyagaturu et al., 2022). On top of the actual hardware, each virtual machine (VM) runs its own operating system.
    Pros:
    Isolation: By making each virtual machine completely autonomous, security and stability are increased.
    Flexibility: A single computer can run several operating systems.
    Scalability: Virtual machines are simple to add or remove as needed.
    Software testing in an environment that doesn’t interfere with the host system is ideal.
    Cons:
    Increased Resource Usage: virtual machines (VMs) demand a lot of RAM, CPU, and storage.
    Performance Overhead: Using several operating systems simultaneously may cause performance to suffer.
    Complex Management: Needs expertise to set up virtual machines and configure hypervisors.
    2. Container-Based Virtualization (e.g., Docker, Kubernetes)
    Instead of running entire virtual machines, containers share the host operating system kernel and bundle apps and their dependencies together (Queiroz et al., 2023).
    Pros:
    Lightweight: Much less resource-intensive than virtual machines.
    Quick Deployment: Containers increase productivity by starting in a matter of seconds.
    Applications that are portable function uniformly in a variety of settings.
    High Density: A single server can host several containers.
    Cons:
    Less Isolation: Because containers share the host operating system, they are not quite as secure as full virtual machines (Zehra et al., 2024).
    Limitations on Compatibility: Containers may not run different OS types because they rely on the host OS kernel.
    Complex Orchestration: Tools like Kubernetes, which have a learning curve, are necessary for managing numerous containers.

    in reply to: OCU C)OST A Devotion 03 #111509
    Eugene Estes
    Participant

    The faith of the Roman centurion found in Matthew 8:7–10 is one of the most amazing examples of faith found in the New Testament. The centurion approaches Jesus on behalf of his ailing servant, and Jesus offers to come to his house and heal him. However, the centurion humbly says that he is not worthy of having the Lord under his roof, instead expressing confidence that Christ can heal with just a word. This act of trust makes Jesus marvel and declare that He had not found such great faith even among the Israelite’s.
    This narrative emphasizes a fundamental reality of the Christian life, real faith is based on acknowledging Christ’s actual authority. Despite being a Roman officer who was not Jewish, the centurion understood authority because of his military position, where orders were carried out without hesitation. He extended this knowledge to Jesus because he thought that Christ’s heavenly power was unrestricted by his bodily presence or distance. Jesus was shocked by this degree of trust, demonstrating that faith is determined by the heart’s reaction to God rather than one’s religious history. Believers today are challenged by the centurion’s example to recognize Christ’s sovereignty and have faith in His strength even in the face of seemingly impossible obstacles.
    Recognizing Jesus as Lord involves acknowledging both who He is and what He wants for your life. Because God is aware of our needs, vulnerability, and future, Christians are obligated to trust Him in every circumstance. Scripture teaches that even in the face of adversity, believers should live with holiness, contentment, and faith in God’s purpose. This verse serves as a reminder that faith is active trust in God’s benevolence and authority rather than just belief.
    Thus, Matthew 8 exhorts believers to trust on the Lord’s might and give up their responsibilities to Him. A paradigm of humility, submission, and unshakable faith in Christ’s ability to step in is the centurion’s response.

    in reply to: OCU C)OST A Discussion Lesson 03 #111312
    Eugene Estes
    Participant

    A system that allows two or more computers or devices to exchange resources, data, and services is called a computer network. Networks are categorized according to their size, geographic reach, and function. Personal Area Networks (PAN), Local Area Networks (LAN), Metropolitan Area Networks (MAN), and Wide Area Networks (WAN) are the primary varieties.
    1. Personal Area Network (PAN)
    The smallest kind of network, known as a PAN, is used to link personal devices, such printers, laptops, and smartphones, within a very narrow range, often a few meters (Sharma et al., 2025. Common examples are Bluetooth and USB connectivity. Enabling rapid and confidential exchange of information among personal devices is the goal of a PAN.
    2. Local area network (LAN)
    Computers in a restricted space, such a home, workplace, or school, are connected by a LAN. Goni, (2021) highlights that files, printers, and internet access are among the resources that can be shared. LANs are perfect for small businesses since they are usually quick and safe.
    3. Metropolitan Area Network (MAN)
    Compared to a LAN, a MAN covers a wider area, like a city or college. In order to share resources or internet services, it links several LANs together. Providing effective communication within a metropolitan area is the goal of a MAN.
    4. Wide Area Network (WAN)
    A WAN connects several cities or nations and spans large geographic areas. The best illustration of a WAN is the internet (Troia et al., 2025) . Its goal is to make it possible for consumers and businesses to communicate and share data globally.

    References
    Goni, O. (2021). Implementation of local area network (LAN) and build a secure LAN system for atomic energy research establishment (AERE). International Journal of Electronics Engineering and Applications, IX(II), 21. https://doi.org/10.30696/ijeea.ix.ii.2021.21-33
    Sharma, D., Rai, H., A, M., Dubey, S., & Yadav, H. (2025). An overview on computer networking. International Journal of Innovative Research in Engineering, 142-145. https://doi.org/10.59256/ijire.20250602018
    Troia, S., Borgianni, L., Sguotti, G., Giordano, S., & Maier, G. (2025). A comprehensive survey on software-defined wide area network. IEEE Communications Surveys & Tutorials, 1-1. https://doi.org/10.1109/comst.2025.3594678

    in reply to: OCU C)OST A Discussion Lesson 02 #111320
    Eugene Estes
    Participant

    By entering particular commands, users can communicate directly with the operating system via a text-based interface called a command line. Compared to graphical user interfaces (GUIs), it offers users more speed, flexibility, and control (Manowska et al., 2024) . The command line’s primary goals are to enable users to control system resources, complete jobs quickly, and use scripts to automate repetitive processes.
    Command lines are frequently used to manage files and systems. Choi, (2024) highlights that for instance, users can use dir or ls to inspect contents and cd (change directory) to explore directories. They can use mkdir and rmdir to create and delete folders, copy and move files, and del or rm to remove files. System-related commands like shutdown and task list control power and active processes, while ipconfig (Windows) and ifconfig (Linux) aid in viewing network setups.

    References
    Choi, B. (2024). Linux fundamentals I – Linux file and directory mastery. Introduction to Python Network Automation Volume I – Laying the Groundwork, 351-473. https://doi.org/10.1007/979-8-8688-0146-4_7
    Manowska, A., Boroš, M., Bluszcz, A., & Tobór-Osadnik, K. (2024). The use of the command line interface in the verification and management of the security of IT systems and the analysis of the potential of integrating biometric data in cryptographic mechanisms. Scientific Papers of Silesian University of Technology. Organization and Management Series, 2024(198), 289-308. https://doi.org/10.29119/1641-3466.2024.198.16

    in reply to: OCU C)OST A Discussion Lesson 03 #111323
    Eugene Estes
    Participant

    A system that allows two or more computers or devices to exchange resources, data, and services is called a computer network. Networks are categorized according to their size, geographic reach, and function. Personal Area Networks (PAN), Local Area Networks (LAN), Metropolitan Area Networks (MAN), and Wide Area Networks (WAN) are the primary varieties.
    1. Personal Area Network (PAN)
    The smallest kind of network, known as a PAN, is used to link personal devices, such printers, laptops, and smartphones, within a very narrow range, often a few meters (Sharma et al., 2025. Common examples are Bluetooth and USB connectivity. Enabling rapid and confidential exchange of information among personal devices is the goal of a PAN.
    2. Local area network (LAN)
    Computers in a restricted space, such a home, workplace, or school, are connected by a LAN. Goni, (2021) highlights that files, printers, and internet access are among the resources that can be shared. LANs are perfect for small businesses since they are usually quick and safe.
    3. Metropolitan Area Network (MAN)
    Compared to a LAN, a MAN covers a wider area, like a city or college. In order to share resources or internet services, it links several LANs together. Providing effective communication within a metropolitan area is the goal of a MAN.
    4. Wide Area Network (WAN)
    A WAN connects several cities or nations and spans large geographic areas. The best illustration of a WAN is the internet (Troia et al., 2025) . Its goal is to make it possible for consumers and businesses to communicate and share data globally.

    References
    Goni, O. (2021). Implementation of local area network (LAN) and build a secure LAN system for atomic energy research establishment (AERE). International Journal of Electronics Engineering and Applications, IX(II), 21. https://doi.org/10.30696/ijeea.ix.ii.2021.21-33
    Sharma, D., Rai, H., A, M., Dubey, S., & Yadav, H. (2025). An overview on computer networking. International Journal of Innovative Research in Engineering, 142-145. https://doi.org/10.59256/ijire.20250602018
    Troia, S., Borgianni, L., Sguotti, G., Giordano, S., & Maier, G. (2025). A comprehensive survey on software-defined wide area network. IEEE Communications Surveys & Tutorials, 1-1. https://doi.org/10.1109/comst.2025.3594678

    in reply to: OCU C)OST A Discussion Lesson 02 #111216
    Eugene Estes
    Participant

    By entering particular commands, users can communicate directly with the operating system via a text-based interface called a command line. Compared to graphical user interfaces (GUIs), it offers users more speed, flexibility, and control (Manowska et al., 2024) . The command line’s primary goals are to enable users to control system resources, complete jobs quickly, and use scripts to automate repetitive processes.
    Command lines are frequently used to manage files and systems. Choi, (2024) highlights that for instance, users can use dir or ls to inspect contents and cd (change directory) to explore directories. They can use mkdir and rmdir to create and delete folders, copy and move files, and del or rm to remove files. System-related commands like shutdown and task list control power and active processes, while ipconfig (Windows) and ifconfig (Linux) aid in viewing network setups.

    References
    Choi, B. (2024). Linux fundamentals I – Linux file and directory mastery. Introduction to Python Network Automation Volume I – Laying the Groundwork, 351-473. https://doi.org/10.1007/979-8-8688-0146-4_7
    Manowska, A., Boroš, M., Bluszcz, A., & Tobór-Osadnik, K. (2024). The use of the command line interface in the verification and management of the security of IT systems and the analysis of the potential of integrating biometric data in cryptographic mechanisms. Scientific Papers of Silesian University of Technology. Organization and Management Series, 2024(198), 289-308. https://doi.org/10.29119/1641-3466.2024.198.16

    in reply to: OCU C)OST A Discussion Lesson 01 #111215
    Eugene Estes
    Participant

    A system that allows two or more computers or devices to exchange resources, data, and services is called a computer network. Networks are categorized according to their size, geographic reach, and function. Personal Area Networks (PAN), Local Area Networks (LAN), Metropolitan Area Networks (MAN), and Wide Area Networks (WAN) are the primary varieties.
    1. Personal Area Network (PAN)
    The smallest kind of network, known as a PAN, is used to link personal devices, such printers, laptops, and smartphones, within a very narrow range, often a few meters (Sharma et al., 2025. Common examples are Bluetooth and USB connectivity. Enabling rapid and confidential exchange of information among personal devices is the goal of a PAN.
    2. Local area network (LAN)
    Computers in a restricted space, such a home, workplace, or school, are connected by a LAN. Goni, (2021) highlights that files, printers, and internet access are among the resources that can be shared. LANs are perfect for small businesses since they are usually quick and safe.
    3. Metropolitan Area Network (MAN)
    Compared to a LAN, a MAN covers a wider area, like a city or college. In order to share resources or internet services, it links several LANs together. Providing effective communication within a metropolitan area is the goal of a MAN.
    4. Wide Area Network (WAN)
    A WAN connects several cities or nations and spans large geographic areas. The best illustration of a WAN is the internet (Troia et al., 2025) . Its goal is to make it possible for consumers and businesses to communicate and share data globally.

    References
    Goni, O. (2021). Implementation of local area network (LAN) and build a secure LAN system for atomic energy research establishment (AERE). International Journal of Electronics Engineering and Applications, IX(II), 21. https://doi.org/10.30696/ijeea.ix.ii.2021.21-33
    Sharma, D., Rai, H., A, M., Dubey, S., & Yadav, H. (2025). An overview on computer networking. International Journal of Innovative Research in Engineering, 142-145. https://doi.org/10.59256/ijire.20250602018
    Troia, S., Borgianni, L., Sguotti, G., Giordano, S., & Maier, G. (2025). A comprehensive survey on software-defined wide area network. IEEE Communications Surveys & Tutorials, 1-1. https://doi.org/10.1109/comst.2025.3594678

    in reply to: OCU C)OST A Discussion Lesson 05 #111441
    Eugene Estes
    Participant

    A technique for protecting data is encryption, which transforms data into a format that is unintelligible without the right decryption key. It is frequently used to safeguard private information in systems for authentication, storage, and communication (Kaushik et al., 2023). The three main forms of encryption are shown here, along with the circumstances in which each is most suitable..
    1. Symmetric Encryption (e.g., AES)
    Symmetric encryption encrypts and decrypt data using a single common key. Sarkar et al., (2024) says because of its speed and robust security, AES (Advanced Encryption Standard) is the most widely used symmetric algorithm.
    Useful Applications: AES can be used to encrypt big files, safeguard hard drives, preserve database data, and secure wireless networks. It works best in settings where the same secret key may be safely shared by both parties.
    2. Asymmetric Encryption (e.g., RSA)
    Two keys are used in asymmetric encryption: a private key for decryption and a public key for encryption. One of the most popular algorithms in this area is RSA .
    Use: Digital signatures, encrypted communications, secure key exchange, and creating secure web connections like HTTPS are all suitable applications for RSA (Banoth & Regar, 2023). It works well in circumstances where parties who have never met before need to communicate securely.
    3. Hashing (e.g., SHA-256)
    Data is transformed into an irreversible, fixed-length code using hashing. Abdullahi et al., (2023) suggests that instead of concealing information, it is utilized to confirm it.SHA-256 is used appropriately for storing passwords, verifying file integrity, confirming block-chain transactions, and making sure that data hasn’t been tampered with.

    in reply to: OCU C)OST A Discussion Lesson 04 #111440
    Eugene Estes
    Participant

    Transmission Control Protocol/Internet Protocol, or TCP/IP, is a basic communication model that links computers and other devices over networks, including the internet. It establishes a set of guidelines and standards that govern the packaging, addressing, transmission, routing, and reception of data (De Alencar, 2022) . The foundation of contemporary networking is TCP/IP, which guarantees dependable and effective communication between devices running various operating systems and technologies.
    TCP/IP uses a layered architecture to function. Islam et al., (2023) argues that the Internet Protocol (IP) layer is in charge of figuring out the most efficient way for data to move across networks and identifying devices using distinct IP addresses. IP manages addressing and routing, but it cannot ensure that data packets will be delivered reliably.
    By ensuring stability, the Transmission Control Protocol (TCP) enhances IP. In

    in reply to: OCU C)OST A Discussion Lesson 01 #111359
    Eugene Estes
    Participant

    Hello Rodnika,
    Your essay offers a clear and organised explanation of the four operating programs and their roles. You clearly illustrate how each tool fulfils specific digital needs. You discover popular applications and clarify their practical uses in daily life, illustrating their utility for ordinary chores. Microsoft Word functions as a writing tool and enables formatting, editing, and collaborative document development (Mohammed & AL-Jaberi, 2021). This makes it an essential tool for composition in educational, professional, and domestic environments. Your explanation of Google Chrome is notably praiseworthy, as web browsers are essential for information retrieval, research, and online navigation. The integration of Adobe Photoshop exemplifies the application of creative tools for photo editing, visual enhancement, and the production of professional-grade graphics. As you noted, Zoom has become an essential tool for communication, especially for online meetings, remote business engagements, and virtual education. Your work illustrates an understanding of how these apps might improve communication and collaboration in the digital realm.
    References
    Mohammed, M. A., & AL-Jaberi, M. A. (2021). Google Docs or Microsoft word? Master’s students’ engagement with instructor written feedback on academic writing in a cross-cultural setting. Computers and Composition, 62, 102672. https://doi.org/10.1016/j.compcom.2021.102672

    in reply to: OCU C)OST A Discussion Lesson 03 #111326
    Eugene Estes
    Participant

    Hello Ross,
    Your explanation of the many parts of a network and how they all fit together to allow communication is really helpful. Constructing efficient and safe systems requires an understanding of how these parts work together, which is something you touched on before. To guarantee the integrity and correct transmission of the data they share, protocols are crucial for both hosts and nodes (Kairaldeen et al., 2021). In complicated or massive networks, when numerous devices are in operation at once, this coordination becomes very necessary. Furthermore, the difference you brought up between logical and physical networks emphasizes how contemporary systems rely on both hardware and intangible structures such as data organization, addressing schemes, and routing patterns. Hidden from view by end users, logical networks play a crucial role in controlling data flow, transit time, and security. Network performance optimization, planning, and troubleshooting are all made easier with a firm grasp of both the physical and logical aspects.
    References
    Kairaldeen, A. R., Abdullah, N. F., Abu-Samah, A., & Nordin, R. (2021). Data integrity time optimization of a blockchain IoT smart home network using different consensus and hash algorithms. Wireless Communications and Mobile Computing, 2021(1). https://doi.org/10.1155/2021/4401809

    in reply to: OCU C)OST A Devotion 02 #111325
    Eugene Estes
    Participant

    This week’s devotional is from Matthew chapter 7, verses 3-4, where Jesus asks why we are quick to notice the speck in another’s eye while ignoring the log in our own. This passage is a metaphor: the speck represents a small fault and the log a greater one. Jesus warns us against focusing on minor faults in others while overlooking our larger shortcomings. This week’s devotional reminds us to extend grace and love to others rather than judge them.
    In the Bible, God cautions us in several passages about judging others. He tells us not to judge, lest we be judged, and encourages us in the Lord’s Prayer to forgive others so that we may be forgiven. In the book of John, Jesus saves an adulterous woman from being stoned by telling the crowd that whoever is without sin should cast the first stone. They all leave, recognizing their own faults. Often, we may judge others for sins such as alcoholism, because we do not struggle with it ourselves, forgetting that we too have our own faults, whether knowingly or unknowingly.
    God shows us mercy and forgives us of our shortcomings countless times though we are undeserving of His great love. As I self-reflect on this week’s devotional I think I try to be patient with others, often trying to understand and figure out why a person acts the way they do as it could be a result of past traumas. I am challenged to ensure I do a self-evaluation regularly of how I live my life, if it pleases God. And if my life does not please God, to repent and mend my ways as God is faithful to forgive me and restore us back to His kingdom. I will also correct others with love if they fall astray instead of judging them.

    in reply to: OCU C)OST A Discussion Lesson 03 #111324
    Eugene Estes
    Participant

    A system that allows two or more computers or devices to exchange resources, data, and services is called a computer network. Networks are categorized according to their size, geographic reach, and function. Personal Area Networks (PAN), Local Area Networks (LAN), Metropolitan Area Networks (MAN), and Wide Area Networks (WAN) are the primary varieties.
    1. Personal Area Network (PAN)
    The smallest kind of network, known as a PAN, is used to link personal devices, such printers, laptops, and smartphones, within a very narrow range, often a few meters (Sharma et al., 2025. Common examples are Bluetooth and USB connectivity. Enabling rapid and confidential exchange of information among personal devices is the goal of a PAN.
    2. Local area network (LAN)
    Computers in a restricted space, such a home, workplace, or school, are connected by a LAN. Goni, (2021) highlights that files, printers, and internet access are among the resources that can be shared. LANs are perfect for small businesses since they are usually quick and safe.
    3. Metropolitan Area Network (MAN)
    Compared to a LAN, a MAN covers a wider area, like a city or college. In order to share resources or internet services, it links several LANs together. Providing effective communication within a metropolitan area is the goal of a MAN.
    4. Wide Area Network (WAN)
    A WAN connects several cities or nations and spans large geographic areas. The best illustration of a WAN is the internet (Troia et al., 2025) . Its goal is to make it possible for consumers and businesses to communicate and share data globally.

    in reply to: OCU C)OST A Discussion Lesson 02 #111217
    Eugene Estes
    Participant

    By entering particular commands, users can communicate directly with the operating system via a text-based interface called a command line. Compared to graphical user interfaces (GUIs), it offers users more speed, flexibility, and control (Manowska et al., 2024) . The command line’s primary goals are to enable users to control system resources, complete jobs quickly, and use scripts to automate repetitive processes.
    Command lines are frequently used to manage files and systems. Choi, (2024) highlights that for instance, users can use dir or ls to inspect contents and cd (change directory) to explore directories. They can use mkdir and rmdir to create and delete folders, copy and move files, and del or rm to remove files. System-related commands like shutdown and task list control power and active processes, while ifconfig (Windows) and ifconfig (Linux) aid in viewing network setups.

Viewing 15 posts - 1 through 15 (of 17 total)

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Certifications

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.