Mile2 Cybersecurity Certifications

Cybersecurity Certifications

Jacob Mannon

Forum Replies Created

Viewing 12 posts - 46 through 57 (of 57 total)
  • Author
    Posts
  • in reply to: OCU C)OST C Discussion Lesson 05 #93841
    Jacob Mannon
    Participant

    I liked this chapter because it helped me understand how the Wi-Fi had different types of encryption. I have worked in hospitals and for the military and always wondered why the Wi-Fi operated differently than it did at my home. Now I understand that they had WPAe as their encryption method that required me to have username/password authenticators for network access.

    in reply to: OCU C)OST C Discussion Lesson 04 #93840
    Jacob Mannon
    Participant

    I like how you explained binary code. I had always thought it was more complicated than what it is. This chapter was pretty enlightening for me in regards to binary and how the TCP/IP works. It honestly doesn’t seem as complex as I initially thought it was. Everything seems to have its own protocols and rules for communicating.

    in reply to: OCU C)OST C Devotion 02 #93830
    Jacob Mannon
    Participant

    Before I was saved, I was very quick to judge others when I had plenty of my own problems that I hadn’t even begun to deal with. After becoming a Christian, I started to judge less and try to understand more. I have caught myself slipping up and judging someone when I still had my own issues to overcome, but now I am able to identify it and repent in order to move forward. I know that I am not perfect and will make mistakes. It is how I handle that mistake and make effort to repent and ask forgiveness from God as well as the individual I may have wronged.
    I have noticed that coworkers often would use me to just let out their frustrations or talk about issues they had with their own friends/family members. Now, I try to understand their perspective because I have been that unsaved person just venting to others about what I perceived to be a problem that was really my own judgement of a situation. Not all unsaved people are open to talking about Jesus and His salvation. However, I have noticed that people are willing to talk about reconciliation with the individuals they have decided they have issue with. This can lead into a more serious conversation about Jesus and the power of His forgiveness.

    in reply to: OCU C)OST C Discussion Lesson 05 #93828
    Jacob Mannon
    Participant

    Three different Wi-Fi encryption methods could include WPA personal, WPA enterprise, and WPS. WPA personal is an encryption method that is passkey based and is good for a small household. The passkey requires between 8-63 characters, so a family wishing to upgrade their encryption would have good use for WPA personal. Creating a password that is long and changing it periodically would make for a more secure Wi-Fi network. The WPA enterprise encryption method is good for something like a university or hospital who wants only staff/members to have access to the Wi-Fi. The requirement of a username and password to have access to the network would also make it easier to track down any users who were breaking company policies. The WPS encryption is a simple encryption method using 8 digit pass codes. WPS is not the most secure due to the codes being breakable. It may not be seen as often due to superior encryption options like the WPA2 categories listed above.

    in reply to: OCU C)OST C Discussion Lesson 04 #93827
    Jacob Mannon
    Participant

    The transmission control protocol/internet protocol, or TCP/IP, is the method by which a message is transmitted from point a to point b via computer networks, IP addresses are identified, and how internet traffic operates. The IP portion is broken down into 2 major versions, IPV4 and IPV6. IPV4 first launched in 1983 and was the protocol that made IP addresses what they are today, IPV6 is the updated version that makes internet traffic more streamlined. The purpose of this protocol is to allow internet communications to take place. If I want to send a message to someone, or use Google to do research, the TCP/IP protocol has to identify where the message is originating and then send the message to point B to then retrieve the information or response from my friend and then return that information/message to me. TCP/IP is also responsible for managing IP addresses. Everyone has an address where they live. Computers are the same way. The IP address is the location your computer is accessing the internet from and where the TCP/IP protocol is going to traffic all incoming Google results, emails, messages, downloads, etc.

    in reply to: OCU C)OST C Discussion Lesson 03 #93754
    Jacob Mannon
    Participant

    Hello,

    These first few chapters have been very informational for me. I am new to I.T. so I had no idea that a single network could span an entire city. Prior to this chapter, I was familiar with the concept of campus wide networks from time spent in the military and previous college. It is also pretty cool that a network can be as small as a PAN.

    in reply to: OCU C)OST C Discussion Lesson 02 #93753
    Jacob Mannon
    Participant

    Hello,

    This chapter was definitely eye opening for me. I had not used the command prompt before on my computer, so this chapter taught me a lot. I always thought that the command prompt was a lot more open ended in the sense that I could communicate with the computer sort of like Siri or Cortana. I think movies like War Games (1983) gave me a misconception of how command prompts worked.

    in reply to: OCU C)OST C Discussion Lesson 01 #93752
    Jacob Mannon
    Participant

    Hello,

    I also had trouble understanding the wording of the question. My interpretation was that the OS is what runs the computer while operating applications are specific to the OS. Word and PowerPoint are operating applications associated with the Windows OS. I am glad to see I wasn’t the only one who was confused with the computer lingo.

    in reply to: OCU C)OST C Discussion Lesson 03 #93730
    Jacob Mannon
    Participant

    There are 6 different area networks listed in chapter 3. Those are the LAN, WAN, PAN, CAN, MAN, and SAN. The local area network (LAN) is a network that connects computers in a relatively small area like a house or a school building. The wide area network (WAN) connects computers on a greater scale like a city or even a country. A personal area network (PAN) covers a very small area within a few yards. The campus area network (CAN) connects the nodes of a campus. This could be a university specific type of network. The metropolitan area network (MAN) connects nodes located within the confines of a city. It could only be part of the city, but there are some that can cover an entire city. A storage area network (SAN) is used to connect storage devices like multiple hard drives together. Networks are also physical and logical. The physical network is the hardware used to carry information like an ethernet cable. Logical network is data that is carried by the cable from point A to point B.

    in reply to: OCU C)OST C Devotion 01 #93701
    Jacob Mannon
    Participant

    Before I became a Christian, I was a very angry person. My dad even says that I was always an angry child. I remember being one of the most begrudging people to walk the earth. The most minor slight against my person was something I took very personally. It took a lot of time after becoming a Christian to learn how to forgive and move on. It took a lot for me to not only forgive but ask for forgiveness for the way I responded to disputes, arguments, and differences. I had to come to the end of myself and ask Christ for forgiveness for all of the wrong I had done so that I could then learn how to forgive others. It wasn’t an easy thing to do by any means. I am a very hard headed person, and humility is something I had struggled with for a long time. A verse that I love that helps keep me on the right track is James 1:19-20, “So my beloved brethren, I say unto you, be swift to hear, slow to speak, slow to wrath, for the wrath of man cannot produce the righteousness of God” (nkjv). I am thankful to God that He sent His Son so that someone like me could reach salvation.

    in reply to: OCU C)OST C Discussion Lesson 02 #93698
    Jacob Mannon
    Participant

    Command lines are how a user can interact with a computer. A user can issue a variety of commands like help, dir, sfc, and exit for example. The help command will bring up a short list of commands available to the user. The dir command will pull up the windows directory. The sfc command will run the system file checker and assess the user’s computer for corruption. The exit command will close the command window.

    in reply to: OCU C)OST C Discussion Lesson 01 #93697
    Jacob Mannon
    Participant

    Operating applications are applications that are specific to an operating system such as Microsoft. For my examples I will discuss Word, Excel, PowerPoint, and Outlook.
    Word is an application that is used to write documents primarily. Word has many user friendly features for writing papers, reports, books, articles, or college assignments like this one. Users are able to make charts, snip photos, design artistic headings, and even use a voice to text feature for dictation.
    Excel is an application used making spreadsheets, charts, and graphs. It is an application that is great for accountants in that it can be used to keep track of business accounts. It is also very useful for creating personal budgets.
    Outlook is an application exclusive to Microsoft Windows. This application is for email. Outlook has become one of the most popular options for business due to encryption capabilities and user friendly features.
    PowerPoint is an application that has changed how information is presented to groups of people. This application is used to put information into a slideshow presentation. Photos, bullet points, videos, and text can be designed and organized to produce very artistic presentations.

Viewing 12 posts - 46 through 57 (of 57 total)

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .