Learning Cyber Security Part 2

Alright, she picks up where she left off here about computers and Cyber Security. When starting class, she did not understand some of the material that the instructor covered during the night. In learning about the different ways, hackers use the information to spy on the victims. It has been interesting to do the lab simulations to show herself; how much she did not know how to configure her computer. For years, she has bought computers and did not know anything but the basics. Now she can do many things with the knowledge that she has learned how to keep my family, finances, and computer safe.; When you have to understand all the ways that hackers can get into your information so you can stay protected from all the new threats out in the world today.

Photo by ThisIsEngineering on Pexels.com

If someone had come up to me a year ago and asked me about Cyber Security, she would not have been able to tell them one thing about it. For example, RIPEMD is a suite of cryptographic hash functions developed that based upon MD4. She would have never know what that was or even heard of it along; with other items that she will discuss throughout this journey. There is tons of information about everything that I am learning throughout this course. She has never been overwhelmed by the wealth of information right in front of her. She also wonders why people do not safeguard themselves from the people in the world.

Photo by Tima Miroshnichenko on Pexels.com

So in building her computer, she has gone with Linux because I love it! However, she did not know much about it when it came to the commands that she has used to do things as an administrator. It is funny. After all, she could use all the differences that come to windows because some of them were self-explanatory. For example, NetCat in the command line is used to perform a port scan on your computer. It will give you a list of ports that are on your computer. Nmap is something that people use for discovering hosts and services on your network. So many different varieties of commands she uses in the command prompt to see who is watching you or connecting to your computer. Some of the others that you can use to configure your computer; can become quite useful when configuring your adapters, viewing the TCP/IP configuration settings, and seeing the MAC addresses.

Photo by Pixabay on Pexels.com

All of the commands may seem a lot to take in and, remember if you are not using them daily. She has to look in the books to figure out which one she needs to complete a lab. She doesn’t use these codes enough in the field that she is currently in the moment. Hopefully, with the knowledge that she is gaining in class with the expertise, she will be able to use this information later on when and if I find that job that she is looking for to further my career. There are many other commands prompts that you can use in Linux. A prime example; would be tracert which displays the route taken by the IP packet on its way to another host. The text she reads allowed her to understand that using Netstat and the active TCP/IP connections. Those are on your computer and available for hackers to breach your computer.

Alright, round two for tonight is almost complete. More to come as we take a ride on this journey in learning Cyber Security.

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s