Posts

Showing posts from August, 2025

Blog Wrap up

 I have enjoyed writing blogs because it leads to having to find new ways to explain and write about networking topics. I don’t think that it was majorly helpful for my current job, because I don’t work in anything that involves too much networking yet, but maybe one day, it will be more useful. I don’t think that I will continue blogging about networking unless it was for a future class because I don’t think I would ever know what to write unless being told. Being able to blog wouldn’t necessarily be desirable for a company, but I think that being able to effectively communicate what you know to individuals who won’t have as much knowledge around networking or other IT areas does make you more of an attractive hire for companies.

Week 10 - Network Tools

 There are a couple different kinds of tools that can be used to check an ethernet line. These tools are a cable tester, which can test your line before you run it; a fiber optic tester, this is used to detect issues in fiber optic cables, such as damage or incorrect terminations; cable pulling equipment, helps in installing or upgrading large amounts of cabling efficiently, and finally network cable testers, which assess the operational status of network connections, identifying issues in signal strength and connectivity. Across these different tools, they all are used to complete, generally the same task of testing the cable and making sure they are functional.

Week 9 - Implementing Security Policies and how it affects workers

  Implementing security policies can have many implications on the teams that they are implemented with. One such thing is a zero-trust policy. This leads to multiple step authentication because of the system policies in place leading to the network not automatically trusting anything that connects to a network and requires additional authentication to access any resources on the network.   Additional ways the policies can affect the employees are by preventing access to resources, requiring different steps to access secure areas, and limiting what internet websites can be accessed on the secure network. Although these policies can prevent employees from doing certain things, it keeps the network and information on that network secure.