Mile2 Cybersecurity Certifications

Cybersecurity Certifications

Trae Johnson

Forum Replies Created

Viewing 15 posts - 1 through 15 (of 81 total)
  • Author
    Posts
  • in reply to: OCU C)NP C Week 05 Lesson 09 Discussion #105966
    Trae Johnson
    Participant

    Chapter 9 really stresses the importance of being proactive when dealing with network management. It is such a basic sense practice to routinely scan application and service logs because, as you said, it allows technicians to identify and fix issues before they become serious problems. It is like doing preventive maintenance: small issues are resolved before they can cause extensive downtime or security compromise.

    I also agree with your comment on disaster recovery. It’s one of those things where it’s easy to overlook until something occurs. Having good plans, clear procedures, and good backups not only protects data but also gives the entire team confidence in case of an emergency.

    in reply to: OCU C)NP C Week 05 Lesson 10 Discussion #105965
    Trae Johnson
    Participant

    You have raised very good points regarding the prominence of security, performance, and scalability in designing networks. Security is actually fundamental, since it safeguards confidential data and makes the network strong against both internal and external attacks. With tools such as firewalls and encryption, coupled with implementation of stringent password policies, one must ensure a secure setup.

    I also like your emphasis on performance and scalability. Giving sufficient bandwidth and proper device placement avoids congestion and downtime, which is vital for end-user satisfaction and business continuity. Scalability, as you mentioned, allows the network to grow without major reinventions—this is vital for supporting future needs. Your approach in general illustrates how meticulous planning builds a network that is secure and efficient but dynamic enough to support long-term success.

    in reply to: OCU C)NP C Week 05 Lesson 10 Discussion #105964
    Trae Johnson
    Participant

    Effective network design relies on foundation design policies that foster scalability, reliability, and manageability. Hierarchical Network Design is an example of such a policy that separates the network into three functional layers: core, distribution, and access. This structure simplifies fault-finding, enhances performance, and allows for easy expansion in the future. The core layer is used to transfer data quickly and efficiently, the distribution layer handles routing and policy, and the access layer is used to connect end-user devices. This multi-level structure provides a modular framework under which it becomes easier to segment and debug issues.

    Redundancy and High Availability is yet another important policy, which ensures that the network remains operational even in the event of device or path failure. This is achieved via redundant devices and links, and also by employing protocols such as HSRP and STP. To accompany that is a strong Security Policy, which ensures that the network remains safe from unauthorized entry and attacks. Security measures include the use of VLAN for segmentation, enforcement of access via AAA protocols, and deployment of intrusion prevention system. All such policies combined are the basis for a secure and stable network framework.

    in reply to: OCU C)NP C Week 05 Lesson 09 Discussion #105879
    Trae Johnson
    Participant

    Effective network design relies on foundation design policies that foster scalability, reliability, and manageability. Hierarchical Network Design is an example of such a policy that separates the network into three functional layers: core, distribution, and access. This structure simplifies fault-finding, enhances performance, and allows for easy expansion in the future. The core layer is used to transfer data quickly and efficiently, the distribution layer handles routing and policy, and the access layer is used to connect end-user devices. This multi-level structure provides a modular framework under which it becomes easier to segment and debug issues.

    Redundancy and High Availability is yet another important policy, which ensures that the network remains operational even in the event of device or path failure. This is achieved via redundant devices and links, and also by employing protocols such as HSRP and STP. To accompany that is a strong Security Policy, which ensures that the network remains safe from unauthorized entry and attacks. Security measures include the use of VLAN for segmentation, enforcement of access via AAA protocols, and deployment of intrusion prevention system. All such policies combined are the basis for a secure and stable network framework.

    in reply to: OCU C)NP C Week 05 Lesson 09 Discussion #105877
    Trae Johnson
    Participant

    Daily networking tasks such as service checks and reading service logs are required to maintain the network stable and secure. Constant checks ensure that critical services such as DNS, DHCP, and email are operational, allowing administrators to detect and resolve issues before they become severe problems. Simultaneously, daily service logs provide a perfect audit trail of system activity and events that make trouble-shooting and long-term analysis easy. Together, these procedures form the basis of effective network performance and security, with proactive management and continuous improvement enabled.

    Day-to-day networking is also vital to disaster recovery readiness through continuously monitoring, backing up, and configuring systems for rapid restoration. Easy activities such as verifying backup integrity, failover system testing, and maintaining up-to-date network documentation minimize downtime and data loss in the event of failure. Network administrators must also revise and update disaster recovery plans on a continuous basis to account for infrastructure changes and emerging threats. These constant day-to-day endeavors ensure that when an interruption occurs. Be it due to hardware failure, cyber attack, or natural disaster. The network can be reinstated quickly and effectively, preserving business continuity.

    in reply to: OCU C)NP C Week 05 Devotion #105876
    Trae Johnson
    Participant

    Lately, I’ve been recognizing a spiritual laziness in my life. My days are full and busy, yet they are more filled with distractions and earthly pursuits than with eternal purpose. Social media, productivity goals, and constant activity have subtly invaded my time, crowding out quiet moments with God or intentional kingdom work. Even during seasons of spiritual sensitivity, I’ve caught myself staying in the “marketplace,” sensing the call to the vineyard but hesitating. I’ve put off speaking with someone I felt prompted to talk to, missed opportunities for prayer, and ignored the unique ways that God has equipped me to labor.

    Yet God is gently reminding me of the vineyard He’s prepared for me, a calling to minister to others, write, pray, and help individuals see how their lives are part of a greater redemptive narrative. I know I’ve been gifted and provided with opportunities, and it’s time to stop stalling. This week, I’m committing myself to a daily distraction-free hour with God and actually calling someone I’ve been challenged to call. They may be baby steps, but they’re my try at stepping out of passivity and into obedience. The day isn’t done, and I don’t want to waste it. Lord, assist me to labor faithfully in Your vineyard.

    in reply to: OCU C)NP C Week 04 Lesson 08 Discussion #105678
    Trae Johnson
    Participant

    You explained it properly amidst the key differences in ownership, scalability, and cost. I especially like how you pointed out the flexibility of the cloud environments and how they are appropriate for smaller businesses. This was easier to follow.

    in reply to: OCU C)NP C Week 04 Lesson 08 Discussion #105677
    Trae Johnson
    Participant

    You’ve addressed a very good point in demonstrating how virtualization forms the foundation of cloud computing. I agree, virtual worlds deal directly with splitting and allocating hardware resources, and the cloud simply takes it a step further by delivering those resources as services over the internet. The clarification that virtualization can happen without the cloud but not the other way around is especially important.

    in reply to: OCU C)NP C Week 04 Devotion #105676
    Trae Johnson
    Participant

    In a culture that values goodness, kindness, generosity, and righteousness, it’s all too simple to assume that being a “good person” is enough to secure our position in God’s sight. But Matthew 19:16 reminds me that even the most noble deeds are not good enough when compared to God’s standard of righteousness. The wealthy young ruler truly desired to know what good thing he might do to inherit eternal life, but Jesus kindly revealed the flaw in his thinking: eternal life isn’t earned, it’s received.

    This text fills me with a desire to stop measuring my worth by my acts and graciously admit I am in need of grace. My best endeavors, however excellent they might be, are not the answer to heaven. It is only through Jesus’s perfection, death, and resurrection that I can be restored to God.

    Now, I rest in the freedom of the gospel. I do not serve others and live in righteousness to earn God’s favor, but because I already have His favor through Christ. My works are not based on a need to earn salvation, but out of thankfulness for the salvation which I have received freely.

    in reply to: OCU C)NP C Week 04 Lesson 08 Discussion #105675
    Trae Johnson
    Participant

    A cloud environment and a virtual environment have numerous major differences. First, their ownership and location set them apart. A virtual environment is typically hosted on local, on-premises hardware that is owned and controlled by the company. In contrast, a cloud environment is hosted on third-party-owned remote servers, i.e., Amazon Web Services, Microsoft Azure, or Google Cloud. This also dictates how the resources are managed and accessed.

    Second, scalability is much more dynamic in the cloud. Virtual environments are limited by the potential of the physical hardware they are hosted on, and scaling normally entails manual additions or upgrades to the hardware. Cloud environments, on the other hand, are highly scalable, and organizations can add or subtract resources on an as-needed basis automatically with minimal effort.

    Lastly, cost structure is another primary distinction. Virtual environments entail considerable upfront expenses in buying and keeping up hardware, rendering them capital-intensive. Cloud environments, on the other hand, are based on a pay-as-you-go model, where organizations merely pay for the resources they truly utilize, transforming capital expenditures into more manageable operating expenses.

    in reply to: OCU C)NP C Week 04 Lesson 07 Discussion #105674
    Trae Johnson
    Participant

    Great choices, firewalls and ZTNA both play key roles in minimizing risk and controlling access. They form a strong foundation for a secure network…

    in reply to: OCU C)NP C Week 04 Lesson 07 Discussion #105673
    Trae Johnson
    Participant

    Great points disabling unused services and having strict password policies are essential to reducing vulnerabilities. With other such controls like firewalls and updates, they improve overall security significantly.

    in reply to: OCU C)NP C Week 04 Lesson 07 Discussion #105672
    Trae Johnson
    Participant

    Implement Firewalls and Access Control Lists (ACLs):
    Firewalls serve to create a barrier between untrusted and trusted networks, restricting incoming and outgoing traffic based on predefined security policies. ACLs go a step further by establishing what users or devices can access specific resources or services. Together, they restrict the attack surface and deny unauthorized access.

    Regular Patch Management and System Updates
    Implementing security patches and updates in a timely manner prevents known vulnerabilities within operating systems, applications, and firmware from being exploited by attackers. Automation ensures constant security throughout the network.

    in reply to: OCU C)NP C Week 03 Lesson 06 Discussion #105634
    Trae Johnson
    Participant

    I like the manner in which you connected business growth and acquiring customers’ information, both sit on the same level when building trust. You also broke down threats like DDoS and rootkits really well in plain terms. It certainly points to the reasons businesses cannot do without cybersecurity

    in reply to: OCU C)NP C Week 03 Lesson 06 Discussion #105633
    Trae Johnson
    Participant

    You raise a very sound argument about the greater risk of cybersecurity problems with the growth of 5G networks. I like the way you highlighted the emotional as well as physical risks rather than just technical risks. Having live solutions to breaches is what is called for, and your example of hidden malware in mobile apps is the kind of creativity cyber hackers have developed. Being proactive and alert is surely the direction of the future under such situations.

Viewing 15 posts - 1 through 15 (of 81 total)

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Certifications

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.