Learning Cyber Security Part 2


Picking up where I left off here about computer’s and Cyber Security. Starting out in the class I did not know many of the terms that were talked about at the beginning. Now, with a little over a year of working in the class and learning the different concepts and how they all coincide with everything pertaining to computer’s.  It has been interesting to do the lab simulations to show myself how much I did not know about how to configure my own computer. For years, I have bought computer’s and did not know anything but the basics. Now I can do many things with the knowledge that I have learned on how to keep my family, finances, and computer safe. It seems like the more I learn the harder it is to stay protected with all the new threats out in the world today.

If someone had come up to me a year ago and asked me about Cyber Security I would not have been able to tell them one thing about it. For example, RIPEMD is a suite of cryptographic hash functions developed that is based upon MD4. I would have never know what that was or even heard of it along with other items that I will discuss throughout this journey. There is tons of information about everything that I am learning throughout this course. I have never been overwhelmed at the wealth of information right in front of us and also wonder why people do not safe guard themselves from the bad people in the world.

So in building my computer I have went with Linux because I love it! However, I did not know much about it especially when it came to the commands that you have to use in order to do things as an administrator. It is funny because I could use some commands when it comes to windows because some of them were self explanatory. For example, NetCat in the command line is used to perform a port scan on your computer. It will give you a list of ports that are on your computer. Nmap is used for discovering hosts and services on your network. So many different varieties of commands that you can use in the command prompt to see who is watching you or connecting to your computer. Some of the other commands that you can use to configure your computer can become quite useful when it comes to configuring your adapters, viewing the TCP/IP configuration settings, and seeing the MAC addresses.

All of these commands may seem a lot to take in and remember especially if you are not using them on a daily basis. Right now I have to look in the books to figure out which one to use to complete a lab that is because I do not use these codes enough in the field that I am currently in at this moment. Hopefully, with the knowledge that I am gaining in class along with the expertise I will be able to use this information later on when and if I find that job that I am looking for to further my career.  There are many other command prompts that you can use in Linux.  Another example would be tracert which displays the route taken by the IP  packet on its way to another host. In reading the text I also found that using Netstat can be used for displaying the active TCP/IP connections that are on your computer.

Alright, round two is done for tonight. More to come as I embark on this wonderful exciting journey.

Learning about Cyber Security


Last October,  I decided to go back to school to get a certificate in Cyber Security. It has turned out to be an interesting class to say the least. I thought that I knew enough about computer’s turns out I did not know a whole lot of anything. There was tons of information at the beginning of the class that I personally have never even thought about when it comes to computer’s and how vulnerable they can be especially around the wrong people. If you do not protect your computer, cellphone, laptop, tablet  anything else that you use to connect to the internet the hacker’s can get in with no problems.  Although, I have passed the Microsoft Technology Associate part of the class I am currently working on CompTIA and it has taken me a little longer than I would have hoped to pass. I have been using Test-out for studying however, we have learned that it is only 1/3 of the material that is covered compared to the test that I have taken.

In a week or so I will be competing in the Skills USA competition with another student and am exited to have this experience in the regional. A little nervous as I have never competed with anyone except when it comes to work. Studying the materials and making sure that I am comfortable with the concepts is what I am focusing on right now. Working 60 plus hours a week along with going to night classes is stressful. However, the achievement at the end of the tunnel is something that I am looking forward to when it finally comes together.

Throughout, this course I have built my own computer mind you I have never put one together in my whole entire life. I ordered the parts with help of my instructor and took the computer apart. When all the parts came in I put it all back together with help from some of the other students. Of course, I could have never done that if I did not go to this class to learn more about computers. I have had many people ask me why I have gone back to school. I tell them because I don’t want to settle for nothing less that what I want out of life. I want to have options and maybe make some money on the side for something that I enjoy doing. In life you have to have trades and hobbies that make you feel good inside ones that make everything throughout the day just disappear for just a little while by doing something you love to do.

I just recently started the forensics side of security and let me tell you that is some interesting stuff right there and how it shows you how to dig deep down into someone’s computer to find the hidden files that they may or may not have hiding. It is quite interesting to me how people use the hashing algorithms to hide things or find things out about the other person on the other side of the computer. My instructor says he sees me working for the FBI someday. I do not think that I am ready for that right now however, it is nice thought to be in the forensics side of computer’s.

More details to come as I continue on this journey in learning more about Cyber Security and the ways you can protect yourself on the internet. I will have to break out my notes and make some more posts on Cyber Security