Showing posts with label Networking. Show all posts
Showing posts with label Networking. Show all posts

Wednesday, February 26, 2025

Studying for CCNA Update...

Studying for CCNA Update

It has been a while since I have written a post about studying for Cisco's CCNA IT certification.

To be honest, progress has been slow.

However, there are reasons for that.

Back in late December 2024, I had just completed the reading the following chapters in the CCNA 200-301 Official Cert Guide, Volume 1, Second Edition by Wendell Odom, CCIE No. 1624.

  • Part One: Introduction to Networking
    • Chapter 1: Introduction to TCP/IP Networking
    • Chapter 2: Fundamentals of Ethernet LANs
    • Chapter 3: Fundamentals of WANs and IP Routing
  • Part Two: Implementing Ethernet LANs
    • Chapter 4: Using the Command-Line Interface
    • Chapter 5: Analyzing Ethernet LAN Switching
    • Chapter 6: Configuring Basic Switch Management
    • Chapter 7: Configuring and Verifying Switch Interfaces

I also completed the exercises for Chapters 4, 5, 6, and 7 in Pearson Vue's CCNA Network Simulator training program. Furthermore, I even completed all of the exercises for Chapters 4, 5, 6, and 7 on Wendell Odom's CCNA Skills Blog. Do you need to use Pearson Vue's CCNA Network Simulator while studying for the CCNA IT certification? No, you don't. However, the CCNA Network Simulator does come with A LOT of guided practice exercises to get you experience using Cisco's IOS command-line interface for configuring switches and routers. In other words, using Pearson Vue's CCNA Network Simulator is completely optional. However, I believe that the money spent on Pearson Vue's CCNA Network Simulator is money well spent.

For CCNA study, Wendell Odom's CCNA Skills Blog is also entirely optional. The CCNA Skills Blog contains a lot of good resources for studying CCNA. Moreover, the CCNA Cert Skills Blog also features Wendell Odom's own CCNA practice exercises. While Pearson Vue's Network Simulator is a simulation, Wendell Odom's networking exercises require you to use Cisco's Packet Tracer program. Unlike the Network Simulator, Wendell Odom's networking exercises are entirely free. Plus, Cisco offers Packet Tracer as a free download from its website. You do have to create an account with Cisco to download Packet Tracer, however. It's irritating, but Packet Tracer is an invaluable program to have in your CCNA study.

What was the problem?

Despite reading the first seven chapters in the textbook and completing all of the exercises, what was the problem?

Since I had recently earned four training badges from Cisco Networking Academy (see previous post here), I was probably feeling a little too high and mighty when it came to basic networking. Thus, when it came to reading Chapters 4, 5, 6, and 7 in the CCNA 200-301 Official Cert Guide, I just read through the chapters without taking any notes. I was about to start Chapter 8: Implementing Ethernet Virtual LANs, when I realized that I probably committed a mistake by not taking any notes while reading those four chapters.


Chapter 4 from the CCNA Official Cert Guide
Chapter 4 from the CCNA Official Cert Guide


Chapter 5 from the CCNA Official Cert Guide
Chapter 5 from the CCNA Official Cert Guide

Chapter 6 from the CCNA Official Cert Guide
Chapter 6 from the CCNA Official Cert Guide

Chapter 7 from the CCNA Official Cert Guide
Chapter 7 from the CCNA Official Cert Guide

Thus, I made the decision to RE-READ all four chapters and TAKE COPIOUS NOTES. After re-reading each individual chapter, I went back to the Pearson Vue Network Simulator and completed the exercises for each chapter. To be sure, it was A LOT of work and required a lot of extra time. However, it was a necessary review to complete.


Chapter 8 from the CCNA Official Cert Guide
Chapter 8 from the CCNA Official Cert Guide

After all of that hard work, I was ready to start reading Chapter 8: Implementing Ethernet Virtual LANs. This time, there would be a difference, however. I would take notes as I read through the chapter. Predictably, taking notes while reading prolonged the amount of time it would have taken to complete the chapter if I had just read it. In the Introduction to the CCNA 200-301 Official Cert Guide, Wendell Odom mentioned that he tried to write each chapter so that it would take approximately an hour to read. That was an interesting comment, I thought. Whenever I read something technical, I tend to read slowly as I try to absorb all of the information. At over 30 pages, Chapter 8 is one of the longest chapters in the CCNA 200-301 Official Cert Guide

Why is Chapter 8 so long? Well, the chapter covers two topics. The first topic concerns what are known as virtual LANs. What is a virtual LAN? A virtual LAN is created when you essentially subdivide a switch into smaller segments. A typical switch has 24 ports. For example, let's say you have a small business with several departments, but you only have several departments, such as accounting, operations, sales, human resources, and so on. To improve security and network efficiency, you decide to group all of the devices used by the accounting department into a specific range of ports. Then, you do the same for all of the other departments. There is a problem. When you create a virtual LAN, the switch recognizes each virtual LAN as a separate network. You can't just send a message from a device on VLAN 1 to another device on VLAN 2 even though you are using the same switch. It just won't work. To send a message to another device on another VLAN on the same switch, you need a router. After all, the VLANs are located on different networks. That's where trunking comes in. Essentially, trunking identifies what VLAN the message is being sent to. Thus, you have to adjust the settings on the switch and the router to enable trunking, which will then allow devices on separate VLANs to send messages to each other. 

Yes, it's A LOT of information to digest as you are taking notes. However, I eventually made it to the end of the chapter. When you take notes while reading, the process makes you concentrate on what you are reading.   

Pearson Vue Network Simulator Chapter 8 Exercises
Pearson Vue Network Simulator Chapter 8 Exercises

Now that I have completed reading and taking notes on Chapter 8 in the CCNA 200-301 Official Cert Guide, I have been slowly completing all of the Network Simulator exercises for Chapter 8. The Network Simulator contains three types of exercises for Chapter 8. 

  • Skill Builders
  • Configuration Scenarios
  • Troubleshooting Scenarios
So far, I have completed all 13 Skill Builder exercises. I recently completed all three Configuration Scenarios. Now, I just need to complete the remaining four Troubleshooting Scenarios. Once all of the Network Simulator labs are complete, it will then be time to either move on to Chapter 9: Spanning Tree Protocol Concepts or head on over Wendell Odom's CCNA Skills Blog and work my way through his VLAN exercises. 

Sounds like fun, doesn't it?  


Wednesday, December 11, 2024

Finishing Chapter 7 in the Official Cert Guide for CCNA

Working My Way Through the CCNA Official Cert Guide

A couple of weeks ago, I went ahead and began studying for the Cisco Certified Network Administrator certification. This IT certification is better known by its abbreviation: CCNA. As I mentioned in a previous post on here on my blog, when I worked at the Social Security Administration (SSA) in Woodlawn, MD as a Tier 1 help desk agent, I made an attempt to study for the Network+ certification offered by CompTIA. Due to the sheer volume of information required to know for the certification, I gave up on studying for Network+. I then made an attempt at studying for the CCNA certification. I got as far as either Chapter 9: "Spanning Tree Protocol Concepts" or Chapter 10: "RSTP and EtherChannel Configuration" before stopping. I was having trouble understanding some of the topics in either chapter, so I got bogged down studying. In addition, I went through a period where I got REALLY BUSY with work. It's amazing how that works.

Over the past year, I have been taking online courses via Cisco's Networking Academy. Since I recently completed all four online classes for networking, it seemed like the perfect time to make another attempt to study for (and earn) the CCNA certification from Cisco.

A couple of months ago, I discovered on Cisco's own website that an updated and revised version of the Official Cert Guide for CCNA 200-301 would be published and available for sale in July 2024. Well, the first volume would be available. At the time, the second volume of the Official Cert Guide had been scheduled to be published a month or two after. Even though I was busy working on the online courses at the Cisco Networking Academy, I went ahead and bought the first volume of the new certification guide from Amazon as soon as it was available for purchase.

Since I decided to make another attempt to pass the CCNA certification exam, I quickly made it through Part 1: "Introduction to Networking". Part 1 consists of the following chapters:

  • Chapter 1: Introduction to TCP/IP Networking
  • Chapter 2: Fundamentals of Ethernet LANs
  • Chapter 3: Fundamentals of WANs and IP Routing

To be honest, Part 1: "Introduction to Networking" was a good review of the information covered in the four online networking classes that I had completed.

I then began work on Part 2: "Implementing Ethernet LANs", which consists of the following chapters:

  • Chapter 4: Using the Command-Line Interface
  • Chapter 5: Analyzing Ethernet LAN Switching
  • Chapter 6: Configuring Basic Switch Management
  • Chapter 7: Configuring and Verifying Switch Interfaces

I then made short work reading chapters 4, 5, 6, and 7. Like the chapters in Part 1: "Introduction to Networking", chapters 4, 5, 6, and 7 were another good review. However, using the Cisco IOS to configure different aspects of a network switch is like riding a bike to a certain degree. Part of my plan for studying for the CCNA certification is to use Network Simulator software offered by Pearson Vue. The objective of the Network Simulator tool is to give you experience using Cisco IOS by giving you exercises to work on after reading the corresponding chapter in the Official CCNA Cert Guide. Just know that the Network Simulator tool doesn't have exercises for every chapter in the Official CCNA Cert Guide. It just depends on whether the chapter in the Official CCNA Cert Guide covers new commands for the Cisco IOS.

On the night of December 11, 2024, I completed the exercises in Pearson Vue's Network Simulator tool for Chapter 7: "Configuring and Verifying Interfaces". Surprisingly, there were only three exercises for the chapter.

Before moving on to Part 3: "Implementing VLANs and STP", there are some things that I probably should do first.

In no particular order, here are some things that I should do:

  • Go back and complete the "Do I Know This Already?" quizzes for chapters 4, 5, 6, and 7. The questions are probably very similar to the questions on the official CCNA certification exam. As a result, the more practice I can get with these types of questions, the better.
  • Go to Wendell Odom's Cert Skills blog and work my way through the exercises for chapters 4, 5, 6, and 7. These exercises are similar to the Cisco IOS exercises found on Pearson Vue's Network Simulator. The difference is that Wendell Odom doesn't prompt you or guide you through the exercise. Instead, he gives you the network setup and tells you the changes that need to be made. It's up to you to try to figure out what commands that you need to enter into the Cisco IOS command prompt to complete the exercise. Wendell Odom does give you the answers. The nice thing about the Cisco IOS exercises available on the Cert Skills blog is that the exercises are free. While the exercises were conceived with using just a pen and a piece of paper, you can complete the exercises using Cisco's Packet Tracer application, which is available for free.
Screenshot of Wendell Odom's Cert Skills blog.
Screenshot of Wendell Odom's Cert Skills blog.

  • Create my own User's Guide to the Cisco IOS. That means going through chapters 4, 5, 6, and 7 creating my own tables of all of the Cisco IOS commands. There are also step-by-step instructions on how to configure passwords, for example. Once complete, I can then print out all of the tables and step-by-step guides and then put them into a notebook. Then, it's just a matter of adding additional tables and step-by-step guides as I complete subsequent chapters in the Official CCNA Cert Guide.
Cisco IOS User Guide on Google Docs.
Cisco IOS User Guide on Google Docs.

UPDATE: Over the past week or so, I have been steadily creating my own Cisco IOS user guide over on Google Docs. I created my versions of the tables found in the first seven chapters of the <b>Official CCNA Cert Guide</b>. I am planning on adding to this document as I progress through the book.  
  • Go back through chapters 4, 5, 6, and 7 and write down notes for all of the key topics that MIGHT be on the certification exam. So far, I have written down notes for chapter 4. Since I have completed those four online networking classes from the Cisco Networking Academy, this is largely just another review.
  • Create my own simple networks using Cisco Packet Tracer and then configure all of the devices. The nice thing about this option is that Cisco Packet Tracer is F-R-E-E to download and use. Here on my blog, I wrote a post about other options available, such as Cisco Modeling Labs or GNS3, if you don't want to use Cisco Packet Tracer.
Cisco Packet Tracer exercise.
Cisco Packet Tracer exercise. 

Lastly, is it really necessary to buy your own hardware to study for CCNA? That is, do you need to buy a router, a couple of switches, some Ethernet cable, and a networking cabinet? Not really. If you have the money and space, you most certainly can. Based on my own research, a hardware kit for CCNA study can easily cost several hundreds of dollars, depending on the options you choose. However, it's not necessary to buy all of that equipment. I have a friend and former co-worker at SocialSecurity who earned the CCNA certification by just using Packet Tracer. The main advantage of buying your own CCNA hardware kit is that you gain tactile experience using and configuring hardware. Cisco Packet Tracer was designed for study when hardware is not available or affordable. Besides, the Cisco IOS used on Packet Tracer is largely the same (for the most part) as the Cisco IOS used by actual switches and routers.

Monday, November 4, 2024

New Badge from Cisco Networking Academy...

New Badge from Cisco Networking Academy

I recently earned a new badge from Cisco Networking Academy.

I F-I-N-A-L-L-Ypassed the final exam for the Network Support and Security online course.

The Network Support and Security course is the final online course offered by the Cisco Networking Academy for networking.

The four networking courses are (in order of completion):

  1. Networking Basics
    • Badge issued on January 23, 2024
    • Skills learned: Network Media, Application Layer Services, Network Types, IPv4 Addresses, Wireless Access, Protocols Standards
  2. Networking Devices and Initial Configuration
    • Badge issued on April 18, 2024
    • Skills learned: ARP, Cisco IOS, IPv4 Subnetting, DCHP, Hierarchical Network Design, Cisco Devices, Ethernet Operates, Network Layer Protocols, DNS, Binary Systems, Transport Layer Protocols, Virtualization and Cloud Services
  3. Network Addressing and Basic Troubleshooting
    • Badge issued on July 5, 2024
    • Skills learned: Cisco Routers, IPv6 Addressing, Network Troubleshooting, Cisco Switches, Troubleshooting, Copper and Fiber Cabling
  4. Network Support and Security
    • Badge issued on October 29, 2024
    • Skills learned: Documentation, Support, User Support, Endpoint Devices, Help Desk, Network Troubleshooting

Here are the badges.


Verified Cisco Networking Academy Networking Basics Badge
Verified Cisco Networking Academy Networking Basics Badge

Verified Cisco Networking Academy Networking Devices and Initial Configuration Badge
Verified Cisco Networking Academy Networking Devices and Initial Configuration Badge

Verified Cisco Networking Academy Network Addressing and Basic Troubleshooting Badge
Verified Cisco Networking Academy Network Addressing and Basic Troubleshooting Badge

Verified Cisco Networking Academy Network Support and Security Badge
Verified Cisco Networking Academy Network Support and Security Badge

All of my badges can be found on my public profile page at Credly

In addition, I need to go through and update both my LinkedIn profile page as well as my resume.

Now, it's on to my next learning course.  

I have yet to decide on what my next course should be. It could be CCNA, Python, JavaScript, Microsoft Server, or Microsoft Azure

Friday, October 4, 2024

Types of Firewalls...

It's a Long Slog

For the past few weeks, I have been S-L-O-W-L-Y working my way through the Network Support and Security online class from Cisco Networking Academy.

To be sure, it has been a L-O-N-G slog.

The course contains only three modules:

  • Module 1: Network Support
  • Module 2: Cybersecurity Threats, Vulnerabilities, and Attacks
  • Module 3: Network Security

Like all online classes from Cisco Networking Academy, each module contains several sub-modules. Each sub-module contains numerous definitions, charts, graphics, videos, pull-down menus, lists, and whatnot. If you are trying to take notes as you read each sub-module, it can be a time-consuming process.

When I started the Network Support and Security online course, my initial thought that it would be a quick and easy course to complete.

Boy, I was wrong.

Types of Firewalls

Sub-module 3.5.2 "Types of Firewalls" gives a basic introduction to four different types of firewalls.

The types of firewalls analyzed by the sub-module are:

  • Packet Filtering (Stateless) Firewall
Packet Filtering (Stateless) Firewall
Packet Filtering (Stateless) Firewall 

    • Packet filtering firewalls are usually part of a router firewall, which permits or denies traffic based on Layer 3 and Layer 4 information.
      • Source IP address 
      • Destination IP address
      • Protocol
      • Source port number
      • Destination port number
      • Synchronize/Start (SYN) packet receipt
    • Packet filtering firewalls are stateless firewalls that use a simple policy table look-up that filters traffic based on specific criteria. 
    • There are several advantages of using a packet filtering firewall:
      • Packet filters implement simple "permit or deny" rule sets
      • Packet filters have a low impact on network performance
      • Packet filters are easy to implement and are supported by most routers.
      • Packet filters provide an initial degree of security at the Network layer
      • Packet filters perform almost all the tasks of a high-end firewall at a much lower cost.  
    • There are several disadvantages of using a packet filtering firewall: 
      • Packet filters are susceptible to IP spoofing. Threat actors can send arbitrary packets that meet Access Control List (ACL) criteria and pass through the filter. 
      • Packet filters do not reliably filter fragmented packets
        • Because fragmented IP packets carry the TCP header in the first fragment and packet filters filter on TCP header information, all fragments after the first fragment are passed unconditionally. 
        • Decisions to use packet filters assume that the filter of the first fragment accurately enforces the policy. 
      • Packet filters use complex ACLs, which can be difficult to implement and maintain
      • Packet filters cannot dynamically filter certain services
    • Packet filters are stateless. They examine each packet individually rather than in the context of the state of a connection. 
    • Packet filters do not represent a complete firewall solution, but they are an important element of a firewall security policy. 

  • Stateful Firewall
Stateful Firewall
Stateful Firewall

    • Stateful firewalls are the most versatile and most common firewall technologies in use. 
    • Stateful firewalls provide stateful packet filtering by using connection information maintained in a state table. 
    • Stateful filtering is a firewall architecture that is classified at the Network layer. 
    • Stateful firewalls also analyze traffic at OSI Layer 4 (Transport) and Layer 5 (Session).
    • There are several benefits to using a stateful firewall in a network: 
      • Stateful firewalls are often used as a primary means of defense by filtering unwanted, unnecessary, or undesirable traffic. 
      • Stateful firewalls strengthen packet filtering by providing more stringent control over security. 
      • Stateful firewalls improve performance over packet filters or proxy servers. 
      • Stateful firewalls defend against spoofing and DoS attacks by determining whether packets belong to an existing connection or are from an unauthorized source. 
      • Stateful firewalls provide more log information than a packet filtering firewall. 
    • Stateful firewalls also present some limitations
      • Stateful firewalls cannot prevent Application layer attacks because they do not examine the actual contents of the HTTP connection. 
      • Not all protocols are stateful. For example, UDP and ICMP do not generate connection information for a state table, and, therefore, do not garner as much support for filtering. 
      • It is difficult to track connections that use dynamic port negotiation
        • Some applications open multiple connections. 
        • This requires a whole new range of ports that must be opened to allow this second connection. 
      • Stateful firewalls do not support user authentication

  • Application Gateway Firewall
Application Gateway Firewall
Application Gateway Firewall

    • An application gateway firewall (proxy firewall) filters information at Layers 3, 4, 5, and 7 of the OSI reference model. 
    • Most of the firewall control and filtering is done in software. 
    • When a client needs to access a remote server, it connects to a proxy server. 
    • The proxy server connects to the remote server on behalf of the client. 
    • Therefore, the server only sees a connection from the proxy server. 

  • Next Generation Firewall
Next Generation Firewall
Next Generation Firewall

    • Next generation firewalls (NGFW) go beyond stateful firewalls by providing the following: 
      • Integrated intrusion prevention. 
      • Application awareness and control to see and block risky apps. 
      • Upgrade paths to include future information needs. 
      • Techniques to address evolving security threats. 

Additional types of firewalls include:

  • Host-Based (Personal and Server) Firewall - a PC or server with firewall software running on it. 
  • Transparent Firewall - filters IP traffic between a pair of bridged interfaces. 
  • Hybrid Firewall - a combination of the various firewall types. 

I will come back to this post after I complete Module 3.5 Firewalls and Host-Based Intrusion Prevention.

There is a lot of good information about firewalls.

Additionally, I found some really good information and graphics about the different types of firewalls over at Palo Alto Networks' webpage.

As always, more to follow.

Thursday, September 12, 2024

Starting Module 3 Network Security...

Starting Module 3 Network Security

The other day, I FINALLY made it to "Module 3: Network Security" in the Network Support and Security online course from Cisco Networking Academy.

Boy, it was a long SLOG to get through "Module 2: Cybersecurity Threats, Vulnerabilites, and Attacks".

I will have more to write about this later.

Module 3: Network Security
Module 3: Network Security


Module Objective: Configure secure user access on a network.

Here are the objectives for Module 3:


Topic Title Topic Objective
Security Foundations Explain foundational security concepts.
Access Control Configure access control.
Defending Systems and Devices Explain cybersecurity processes and procedures that protect systems.
Antimalware Protection Explain methods of mitigating malware.
Firewalls and Host-Based Intrusion Prevention Explain how firewalls operate to filter traffic and recommend endpoint security measures.
Secure Wireless Access Configure basic wireless security on a home router (WPAx).

Tuesday, August 13, 2024

PuTTY, WireShark, and NMAP

PuTTY, Wireshark, and NMAP

This will be a post about the following IT applications: PuTTY, Wireshark, and NMAP.

As I am working my way through "Module 1: Network Support" in the Network Support and Security online class available at the Cisco Networking Academy, I became reacquainted with the IT applications Wireshark and NMAP. Since I recently wrote about it, I also became reacquainted with the IT application PuTTY.

What is PuTTY?

Due to my recent post about my first IT job, I recently downloaded a copy of the PuTTY application onto my Dell laptop. What does PuTTY do and what is it used for? Here is a good description:

PuTTY is a free and open-source terminal emulator, serial console and network file transfer application. It supports several network protocols, including SCP, SSH, Telnet, rlogin, and raw socket connection. It can also connect to a serial port. The name "PuTTY" has no official meaning.

In so many words, with PuTTY running on your computer (laptop or desktop), you can connect to a switch, a router, or a host and make changes to the configuration.

With PuTTY, you can connect to a host, a router, or a switch using a computer protocol called Telnet. It's not recommended that you use Telnet, however. Telnet does not encrypt user names and passwords. As a result, if someone was monitoring your activity with a packet sniffer, such as Wireshark (see below), he or she would be able to determine your logon credentials. Telnet dates from the 1970s and 1980s when computer security had a low priority since users were U.S. government employees.

As a result of this flaw with Telnet, it is highly recommended that you use a computer protocol known as Secure Shell, or SSH. SSH will encrypt your logon user name and password, making it rather difficult for potentially malignant actors to eavesdrop on your data.

Is there a reason for using PuTTY at home? Well, the main draw with an application like PuTTY is that it is an open-source application that is independent of any software or hardware vendor. Unless you have your own collection of servers and routers at home, such as for studying for Cisco's CCNA certification, you might find that PuTTY is of limited use.

That said, there could be instances where you could use PuTTY at home. This might be a subject worth pursuing at some point.

I am slowly making my way through the Network Support and Security online course from the Cisco Networking Academy. In Section 1.5 "Troubleshoot a Network", there are a couple of hands-on labs that utilize both Wireshark and NMAP.

Screenshot of PuTTY interface.
Screenshot of PuTTY interface.


What is Wireshark?

What is NMAP?

I just downloaded and installed NMAP onto my computer. I cannot wait to try it out.

Screenshot of NMAP using the command prompt option.
Screenshot of NMAP using the command prompt option.

Screenshot of NMAP's graphical user interface (GUI) known as Zenmap.
Screenshot of NMAP's graphical user interface (GUI) known as Zenmap.


More to follow.

UPDATE: I'm going to have to re-write this post. 

Friday, July 19, 2024

New Cisco Networking Academy Class...

New Cisco Networking Academy Class

This week, I dropped the AI Fundamentals with IBM SkillsBuild online class at the Cisco Networking Academy.

Introduction to Artificial Intelligence with IBM SkillsBuild
Introduction to Artificial Intelligence with IBM SkillsBuild 


I completed the first module, "Introduction to Artificial Intelligence". It was interesting to learn about what artificial intelligence is and what it is not. It was also interesting to learn about the history of artificial intelligence and its different categories. It was also interesting to learn about the different techniques on how machine learning solves problems. As you progress through the class, you eventually work with IBM Watson AI to run a couple of simulations. It's all fascinating. Moreover, while AI may be the latest IT buzzword, AI isn't going away anytime soon. Thus, it's important to learn what it is and what it can do. My understanding is that the newest version of the Official Cert Guide for CCNA from Cisco Press will have a chapter about using AI in regards to networking.

However, since I have one last online course to complete all of the networking courses from Cisco Networking Academy, I made the decision to stop the AI Fundamentals with IBM SkillsBuild online class. Despite my newly found interest in the subject, the course itself is a distraction from my goal of completing the online courses for networking. I will come back and complete the course at a later date.

As a result, I went ahead and started the Network Support and Security online class instead.

Network Support and Security Online Course

While the Network Support and Security online class may only have three training modules, each individual module is quite lengthy.

Here are the three modules:

  • Network Support
  • Cybersecurity Threats, Vulnerabilities, and Attacks
  • Network Security

Plus, as I mentioned in a previous post, I have a long list of online courses at the Cisco Networking Academy that I want to complete.

Time to get studying!!!

Friday, July 12, 2024

Falling Behind on My Blog...

Lack of Updates

In case you weren't aware, I have fallen behind on posting updates to my blog for the past couple of weeks.

Yes, it is true.

As per usual, I have been REALLY busy doing all kinds of stuff.

Last week, I made completing the Final Exam for the Network Addressing and Basic Troublshooting online course from Cisco Networking Academy a top priority.

In addition, I somehow found myself getting involved with working at the State Farm Stadium in Glendale, AZ during public events. Not too sure how that happened, but there it is. As a result, I have been busy completing the online courses for serving alcohol and preparing and serving food.

In the meantime, I have started a new online course with Cisco Networking Academy. I will probably make that into its own blog post.

Plus, I need to keep working on the complex blog posts that I have been working on for the past couple of weeks here on Blogger. Those three posts NEED TO BE completed ASAP.

As per usual, there never is enough hours in the day.

More to follow.

Tuesday, June 25, 2024

My First IT Job...

Introduction

This will be a post about my very first job in information technology, or IT. For my very first job in IT, I worked as a temporary worker for Data Networks, an IT services company based in the Baltimore area. There wasn't a direct path as to how I got there. It just sort of happened. The story does involve many different locations in and around both Baltimore, MD and Columbia, MD. Here is a map of many of the key locations.

Key Locations in Baltimore and Columbia, MD
Key Locations in Baltimore and Columbia, MD

Student at the UMBC Training Center

During the spring of 2017, I was working at the Target on Dobbin Road in the Columbia Crossing shopping center in Columbia, MD for a mere $10.57 per hour as a part-time employee. I was working as a Team Member in the backroom. Basically, it was my job to make sure that the store's shelves were stocked for the store's customers. Since it was a job that required me to be on my feet for long stretches of time, I developed plantar fasciitis in my left foot. As you can imagine, I wasn't a very happy worker. The final straw with Target occurred when store management tried to blame me for not meeting their goals for online sales during Christmas. I didn't know how to react when they said that. On the other hand, the job at Target did get me away from my roommates for a little bit.

Map of Target in Columbia, MD
Map of Target in Columbia, MD

At the time, I was occasionally going to the Columbia Workforce Center at 7161 Columbia Gateway Dr, looking for a new job. I would and browse through the available job openings on one of the computers that belonged to the Maryland Department of Labor. Feeling frustrated at not finding work for a former Department of Defense contractor that no longer had a Top Secret security clearance, I made an appointment to see a job counselor. After a brief interview, the job counselor, whose name I can no longer remember, informed me that the State of Maryland had a severe shortage of workers in Information Technology. She informed me that the State of Maryland (or was it Howard County?) had an agreement with the University of Maryland-Baltimore County (UMBC) to encourage more workers to go into Information Technology. Basically, the State of Maryland would pay the cost of tuition (around $5,000) to attend the training classes for the A+, Network+, and Security+ certifications given by UMBC at their training center in Columbia at 6996 Columbia Gateway Dr.

Location of Columbia Workforce Center and UMBC Training Center
Location of Columbia Workforce Center and UMBC Training Center

After a short conversation with the person in charge of the UMBC Training Center, I informed the Columbia Workforce Center that I wanted to enroll in the program. The A+ certification class lasted four weeks with classes on Tuesday and Thursday nights. The Network+ class lasted two weeks. The Security+ class lasted an additional two weeks. All of the instructors for the three classes had decades of experience working in information technology. The instructor for the A+ class had a long list of IT certifications in his biography. The instructor for the Network+ class did computer networking for Sandy Spring Bank in Maryland. For the Security+ class, one instructor worked as an independent IT contractor, while the second instructor worked at Booz Allen Hamilton as a cyber security analyst. The students that attended the classes all came from different backgrounds. Some had already worked in IT; meanwhile, others were just getting started.

My First Job in Information Technology

Latitude, Inc. webpage
Latitude, Inc. webpage

During the A+ class, at the urging of the instructor (whose name I cannot remember), I started to look for entry-level work in IT as a way to get experience. Shortly after updating my resume and posting it on Indeed, I received a phone call from a recruiter (Aaron Webster) at a staffing company based in Hanover, MD called Latitude, Inc. He said that he was looking to fill a job opening a network technician. He said that the job involved working with an IT services company based in Hunt Valley, MD called Data Networks. The recruiter said that Data Networks had a contract to replace old network switches and install new network switches at various high schools in the Columbia, MD area.

High Schools IVO Columbia, MD
High Schools IVO Columbia, MD

The recruiter gave the following details about the job:

  • The entry level network technician position was temporary.
  • The position paid only $10.00 per hour.
  • The position involved driving to each job site.
  • Data Networks would provide me with a polo shirt to wear during work.

I think that I was also told that the job wouldn't start until July.

Without missing a beat, I agreed to doing the job.

The timing of the job wasn't ideal, however. The lease on my apartment near the Columbia Mall was set to expire on June 30th. One roommate decided to move out of the apartment in the middle of the night a couple of weeks prior to the expiration of lease. That roommate had become somewhat disillusioned at working at NSA as a DoD contractor. My second roommate was trying to figure out what he wanted to do. He was trying to find a new DoD contracting job overseas. For me, I decided to quit my job at Target in order to focus on the job with Data Networks.

My mindset for the temporary job with Data Networks was to do such a good job that they would offer me a permanent job. That was my goal.

Data Networks of Hunt Valley, MD
Data Networks of Hunt Valley, MD

Lastly, at the time, cancerous tumors began to appear on my body at seemingly random places, such as the right side of my neck, my right arm pit, and my right thigh.

Meeting the Team

Shortly after my interview with Latitude, Inc., I received a phone call from Nancy Stout, the Director of Human Resources at Data Networks. We exchanged contact information. She asked me what my shirt size was. (Note to Nancy: I never did receive my blue polo shirt with the Data Networks logo on it.) She also scheduled a time for me to visit the Data Networks office in Essex, MD, so that I could meet the rest of the team members.

Nancy Stout of Data Networks (Source: LinkedIn)
Nancy Stout of Data Networks (Source: LinkedIn)

After that phone call with Nancy, events moved at a lightning-fast pace. The moving company showed up at my apartment at Columbia Mall and shipped the items that I was keeping back to my mom's house in Arizona. I finished emptying out my remaining items from the apartment. I turned in my apartment key to the rental agency. I then used Hotwire to reserve a room for two weeks at the Ramada Hotel in Hanover, MD near BWI Airport along Maryland State Route 100. Ironically, the Ramada Hotel was a short distance away from the Latitude, Inc. office building where I had an in-person interview for the entry level network technical job.

Driving to the Configuration Center

Shortly after moving out of my apartment, I received a phone call from Nancy Stout. She stated that the Data Networks personnel in charge of the project wanted to meet me prior starting work. She said that they wanted to have a short meeting at the Data Networks Configuration Center in Essex, MD, a small town outside Baltimore on the Pulaski Highway. She gave me the date, time, and address for the interview. She said that I should ask to speak to either Lovett Davis or Todd Rechen, the two project managers.

Shortly after the phone call, I remember going to the Burlington Coat Factory at the Arundel Mills Mall to buy a new dress shirt and tie, a new pair of dress pants, and a pair of dress shoes the day before the interview. Despite the weather being 95 degrees Fahrenheit with 90% humidity, just your typical summer weather in Maryland, I dressed for the interview as if I was going to an actual job interview. I probably could have gotten by wearing a nice pair of shorts and a polo shirt with socks and shoes, but I wasn't going to take that chance. I wanted to make a positive first impression. Like I wrote earlier, I was hoping to get a full-time job with Data Networks.

I then got into my car and drove northwest on Highway 100 and took the exit for Interstate 895, heading northeast to Baltimore. I entered the city limits of the City of Baltimore. I then drove through the Fort McHenry tunnel that goes under the Inner Harbor. Once on the other side of the tunnel, I stayed on Interstate 895 until I took the exit for the Pulaski Highway. From there, I drove up the Pulaski Highway until I made a right turn onto Rossvile Blvd, right next to the Wawa gas station. The Data Networks Configuration Center was a short distance down the street. The entire area was a light industrial area. The Data Networks Configuration Center was located in a non-descript industrial park. It was just one office in a long row of offices. If I remember correctly, there was just a simple sign on the front of the door that read "Data Networks". The entire drive from Hanover, MD to Essex, MD took over an hour.

I seemed to have found the right place. I parked the car and locked the doors. I straightened out my clothes. I took a deep breath and then opened the office door for Data Networks.

I want to write that the very first person I met as I walked in the door was Michael (Mike) Keller. He was one of the senior technicians at Data Networks that would be working on the Howard County Public Schools project. I remember he told me that he had a lot of IT certifications from Dell Technologies and VMware. After a short introduction, he took me into an office where I met both Lovett Davis and Todd Rechen, the two leaders of the project. If I remember correctly, Lovett Davis had IT certifications for CompTIA's A+, Network+, and Security+. He may have given me his business card, which is why I remember those three specific IT certifications. Todd Rechen, on the other hand, had both a bachelor's degree and a master's degree in Computer Science.

Senior System Engineer Mike Keller of Data Networks (Source: LinkedIn)
Senior System Engineer Mike Keller of Data Networks (Source: LinkedIn) 

The meeting itself was a breeze. Lovett, Todd, and Mike just wanted to meet me prior to getting started on the project. They also just wanted to know what kind of IT experience, if any, that I had. I explained that I was an unemployed former DoD contractor without a Top Secret clearance that was looking to go into IT. I also explained that I was taking the classes for A+, Network+, and Security+ at the UMBC Training Center in Columbia, MD. I might have mentioned that I quit my dead-end job at Target to work on the project. At the time, I had a rather large cancerous tumor right below the right side of my jaw. I'm not too sure what they thought about that. Anyway, it was a very friendly interview.

Director of Enterprise Services Lovett Davis of Data Networks (Source: LinkedIn)
Director of Enterprise Services Lovett Davis of Data Networks (Source: LinkedIn)

After the short interview, Lovett and Mike gave me a short tour of the Data Networks Configuration Center. They gave me a brief rundown about the HP Aruba switches that were going to be used on the project. I remember seeing worktables with several stacks of brand new Hewlett Packard Enterprise (HPE) Aruba multilayer switches that had been taken right out of the box. Lovett explained that Howard County Public Schools had several high schools that were using old switches (Sorry, I don't remember the name of the brand.) in their campus LANs that needed to be replaced.

HPE Aruba Multilayer Switches


HPE Aruba 2930F Switch
HPE Aruba 2930F Switch (Source: HPE)

Here is just a quick note about the HPE Aruba multilayer switches. Going through HPE's website, it is very conceivable that we were going to install a variant of the HPE Aruba 2930F switch. The photo of the HPE Aruba 2930F switch looks very similar to the switch I remember installing numerous times while working on the project. The array of ports along the face of the switch and the distinctive Aruba with rounded letters in orange looks very familiar. I remember writing down the product name IOT look it up on HPE's website when I got back to my hotel at the end of the day. Anyway, I do remember reading on HPE's website that the specific switch we were going to install was a multilayer switch. That is, the switch operated at both the Network layer (Layer 3) and the Transport layer (Layer 4) of the OSI Reference Model. Switches typically operate at the Data Link layer of the OSI Reference Model. At the time, I think HPE had just acquired Aruba Networks. Not that it matters.

Multilayer Switches operate at Layers 3 and 4 of the OSI Reference Model
Multilayer Switches operate at Layers 3 and 4 of the OSI Reference Model


First Day on the Job

Shortly before leaving the Data Networks Configuration Center, Lovett or Todd informed me about the first high school that we were going to work at for the project. Ironically, the high school was very close to the Target on Dobbin Road in Columbia, MD. In fact, the very same Target that I used to work at. The name of the school was Long Reach High School

Location of Long Reach High School
Location of Long Reach High School

I really didn't know anything about the school apart from driving past it on numerous occasions. However, I was actually going to go there for work. Lovett and Todd told me to show up at Long Reach High School on a Tuesday in July 2017 at around 8:30 AM. I drove over from my room at the Ramada Inn dressed in a blue polo shirt, tan khaki pants, and running shoes. I really didn't know what to expect when I showed up. I was the first person from Data Networks to show up. Not knowing what to do, I got out of my car and stood near the main entrance of the school. Since it was Maryland in July, the weather was already starting to get hot and humid. After standing around for a couple of minutes, Mike Keller showed up. Then Lovett and Todd then also appeared. Then two additional temporary workers showed up (Sorry, I don't remember their names.). The two additional temporary workers were like me. They were hired as temporary workers to assist with the project and, more importantly, get IT experience. Both of the temporary workers were of college age. Lastly, another member of the team showed up. His name was Linwood Brown. He was one of the senior networking technicians for Howard County Public Schools. You could think of him as the customer.

After a brief introduction, Linwood escorted the team into the main building of the high school. After signing in at the administrative office and getting visitor badges, there was a meeting. Lovett went over what the plan for the day was going to be.

Here was the plan for the day:

  1. Identify all of the locations inside the school where the new switches were to be installed.
  2. Unload the new switches from the van that Mike drove to the school from the Configuration Center.
  3. Take the new switches to their assigned location.
  4. Dispose all of the packaging for the new switches.

Since we started work at 8:30 AM, it didn't take long to finish all of our tasks for the day. I'd say that we were done at about 12:30 PM or so. Right around lunch time. Plus, it helped that school was out for the summer. The only people at the school were the administrative staff. We could get our work done with minimal delays. Before leaving for the day, all of the temporary workers were told to show up at Long Reach High School on the following Thursday at 6:30 AM. Getting off work at lunch time was something of a surprise to me. I was expecting to work a full eight hours. Not only that, I was also expecting to work Monday through Friday. It was then that I realized that not only was the entry level network technician position temporary, but it was also part-time. After my initial disappointment faded away, I got something to eat for lunch and drove back to the Ramada Inn. Once I was back at my hotel room, I started studying one of my A+ or Network+ certification books. Later on that afternoon, I had my Network+ class at the UMBC Training Center in Columbia, MD for three hours.

Project Management and Networking Diagrams

At the time, I didn't realize that there was an actual schedule to replace the old network switches at Howard County Public Schools that Data Networks was following. I remember Todd telling me one day that the entire project had been planned out in detail. There were numerous constraints and requirements for the project. While in the Army in South Korea, I took an introductory class in project management, so I was familiar with some of the steps on how to plan and implement a project. Some of those constraints that needed to be considered for the project were the following:

  • The schools in Howard County that required new network switches were all high schools.
  • None of the high schools had the same layout or floorplan.
  • The project had to be completed during the summer vacation to prevent any service disruptions for students and staff.
  • There were only two days available each week to install new switches for each school.
    • The first day was required for set-up.
    • The second day was required for installing the new switches and for performing any troubleshooting/testing.
  • The project had to be within the allotted budget. That would explain why the position was part-time and temporary.
  • All old network switches had to be replaced with new HPE Aruba switches.

It's by no means an exhaustive list of requirements, but I am sure that you get the idea.

I don't remember if it was Todd or Lovett, but someone did explain to me that they went through and estimated how many man-hours it would take to complete the various steps of the project. My guess was also that Data Networks would have lost money if there were any delays in completing the project. Thus, the project didn't have a large margin for error.

Networking diagrams are important itmes to have when planning an IT project. The two major networking diagrams are the physical and logical network diagrams. The physical and logical network diagrams are like roadmaps for the network.

The physical network diagram identifies the physical location and function of each network device. It's kind of like a floorplan. The physical network diagram also portrays all of the physical arrangements of the network, such as ports to be used, cable types to be used, the shelf location of devices on each specific server rack, and so on. Depending on the scale of the network, you can have a bird's eye view physical network diagram with additional physical network diagrams for each server closet, for example. Basically, you want to portray where everything goes and what devices connect to each other and how. Here is an example of a physical network diagram.

Physical Network Diagram Example (Source: Cisco Networking Academy)
Physical Network Diagram Example (Source: Cisco Networking Academy) 

In contrast, the logical network diagram displays the connecting interfaces and the Layer 3 network addressing scheme to be used by the network. Additionally, the logical network diagram shows how the devices communicate with each other and how data flows through the network. A key piece of information on the logical network diagram is the IPv4/IPv6 address to be used by each subnet. You might also want to indicate which specific ports will be used on switches and routers. Here is an example of a logical network diagram.

Logical Network Diagram Example (Source: Cisco Networking Academy)
Logical Network Diagram Example (Source: Cisco Networking Academy)

I don't ever remember seeing either kind of network diagram while working with Data Networks. However, I do remember seeing Lovett, Todd, or Linwood consulting a diagram of some sort, especially when they were troubleshooting an issue. I do remember specifically Todd consulting a diagram of some sort to make sure that the switches I installed on a server rack were in the correct server location and in the proper order. In fact, now that I think about it, Todd, Lovett, and Mike did annotate a diagram as we took each HPE Aruba switch to its assigned location at each school.

As Lovett and Todd explained to me, it was important that each HPE Aruba switch get placed in the correct server closet and installed in the correct order on the server rack. It was also important to know the location of each specific switch for simple accountability purposes in addition to the performance of the network.

All of that planning had been accomplished at the Data Networks Configuration Center in Essex, MD before I worked on the project.

In other words, you just couldn't install a new switch just anywhere.

Second Day on the Job

Based on a recommendation from Mike Keller, I went to Home Depot in Columbia, MD, just a short drive down Snowden River Parkway, to buy two screwdrivers. I bought a flathead screwdriver and a cross-tip screwdriver. Both screwdrivers had to be seven or eight inches long. Those two screwdrivers would prove themselves to be rather helpful.

On Thursday morning, I got up at 5:00 AM. I left my hotel room at the Ramada Inn by 5:30 AM. It was too early for the complementary hotel breakfast, so I drove to a nearby McDonald's for a quick breakfast. I think I arrived at the Long Reach High School parking lot at about, say, 6:20 AM. Mike and Todd had just arrived. Lovett was on his way. The other two temporary employees arrived a couple of minutes after me. At around 6:30 AM, Linwood Brown arrived. He unlocked the main door to the school and let everyone inside.

Ethernet Cable
Ethernet Cable

After a short planning meeting, it was decided that I would work with Mike on this day. We walked down a hallway and found our first server closet. From what I remember, it was more like a small room than a closet. Linwood unlocked the door. Inside the room was a server rack consisting of five switches that were still powered on. I noticed that the power cables and the Ethernet cables were daisy-chained to each switch. To the side of the server rack was a stack of five brand new HPE Aruba switches (with cables) that had been put inside the room on Tuesday. With Mike's assistance, I performed the following steps:

  1. Turned off all of the old switches.
  2. Disconnected all of the power cables from the old switches.
  3. Disconnected all of the Ethernet cables from the top old switch.
  4. Disconnected all of the fiber-optic cables from the old switches.
  5. Unscrewed all of the screws that connected the top old switch to the server rack.
  6. Removed the old switch from the server rack.
  7. Placed the old switch and power cables outside the server closet.

I then went to the stack of new HPE Aruba switches. Each new switch was labeled with a number on the bottom. For server racks, the switch with the lowest number (number one) went on top of the stack. Then the switch labeled with a number two was placed under the switch labeled with the number one and so on until you were out of switches to install. I flipped over each new switch, looking for the switch with a number one. Once I found the switch with a number one label, I then mounted the switch to the top rack of the server rack. I then re-connected the Ethernet cables to the ports on the new switch from the switch below. I then moved on to the second old switch from the top, disconnecting all of the Ethernet cables. I then removed the old switch from the server rack. I then located the new HPE Aruba switch that was labeled with number two. I then mounted the new switch to the second rack from the top of the server rack. I then re-connected all of the Ethernet cables to the switch. I performed the same steps for the rest of the old switches on the rack that needed to be replaced, ensuring that the new switches were being mounted in the correct order. It was a slow, deliberate process to replace all of the old switches. Mike then assisted me with re-connecting all of the Ethernet and fiber-optic cables with SC connectors to the new switches. A key point here is that sometimes the server closets were in horrible condition with Ethernet and fiber-optic cables strewn all over like a bowl of spaghetti. Cable maintenance is paramount. You want the cables to be neatly organized. You probably should also label any important cables for any future problems. I then daisy-chained all of the power cables to the switches before turning on all of them on.

Fiber-Optic Cable with SC Connectors
Fiber-Optic Cable with SC Connectors

Once all of that was completed, Mike then opened his laptop and then connected a sky-blue console cable from the laptop to one of the switches. He then used a program called PuTTY, a terminal emulator, to configure the switches. Basically, he was providing configuration information for each port to the switch and then saving the configuration. We then cleaned up the area and made sure to neatly stack all of the old switches and their power cables before moving on to the next server closet.

PuTTY Configuration Screen
PuTTY Configuration Screen

Those were the basic steps that all of the members of the team performed at each location inside the school that required a new switch. Most of the time, the old switches were stacked inside a server closet. Other times, the old switch(es) would be located on top of a storage cabinet or some other location that was difficult to find. Just a note that working inside server closets gets really H-O-T!!! After working in my first server closet, I was covered in sweat. It probably didn't help that oftentimes the air conditioning inside the high schools was turned off except for the administrative offices. As the morning wore on, the plantar fasciitis started to get painful, so I started to drag my left foot everywhere I walked.

After working with Mike on a couple of server closets, I started to work on server closets on my own. The whole process of removing old switches and then mounting the new switches became rather easy. This allowed Mike to check the work of the other two workers. Todd would help out with server closets as well. Once all of the new switches had been mounted, turned on, and configured, Lovett and Linwood would then do all of the testing on the new switches. More often than not, each high school had a room that resembled a Network Operations Center (NOC) from where the computer network could be centrally managed.

What were Lovett and Linwood doing? Well, I imagine that they were sending a series of what are known as ping commands to each switch. The ping command will let you know if a device (host, switch, router, other) is connected to the network. If you don't receive a successful response to a ping request, then the device you are attempting to ping might not be on the network. Typically, there are several items that you might want to ping after setting up a network. The items that you may want to issue a ping command to include the following:

  • Pinging the IPv4/IPv6 address of the device itself to ensure that the TCP/IP stack is functioning properly.
  • Pinging another device on the same network.
  • Pinging the IPv4/IPv6 address of the default gateway on the assigned router to ensure that the device is able to send messages to another network.
  • Pinging the IPv4/IPv6 address of a device on another network.

If a one of the issued ping commands fails, then you might have a problem that needs further investigation.

Ping Command Example
Ping Command Example

Another command that you can issue is known as the tracert, or traceroute, command. This command is similar to the ping command. However, there is a difference. The tracert command will attempt to follow the path of the message. The tracert command will display the information of each router it encounters on the way to the destination device. If the tracert command fails along the route, the tracert will provide you with the information of the last known router it successfully detected. With that information, you might have a clue on where to look for a connectivity problem.

Tracert Command Example
Tracert Command Example

Thus, if the Lovett and Linwood were probably pinging each new switch from the NOC. If the ping command was unsuccessful, then they would issue the tracert command to determine where the problem may lie. Once they were able to identify where to look for the connectivity problem, it was a matter of going to the appropriate server closet and trying to resolve the connectivity problem. Sometimes it was a matter of either the Ethernet cables or the fiber-optic cables being connected to the wrong port on the switch. Other times, there were problems with the cabling of the network itself. All we could do was wait for Lovett, Linwood, and Todd to diagnose the problem and then try to resolve it. Troubleshooting network problems can be really tedious to experience firsthand. Personally, I made every attempt to see what it was they were doing in order to learn more about networking.

Once the testing and any troubleshooting were complete, it was time to clean up. That meant to go around to each server closet and pick up all of the used switches and their power cables. The used switches and power cables were usually then taken back to the walkway near the main entrance. At that location, we inventoried all of used switches to ensure that we had all of them. After the inventory, we typically stacked all of the used switches on a pallet for someone from Howard County Public Schools to pick up.

The End Result (Photo by Me)
The End Result (Photo by Me)

Once the inventory was complete, we were finished for the day. That second day at Long Reach High School seemed to take forever. We probably worked close to seven hours that day. I didn't care a whole lot as the work was interesting. As a bonus, I enjoyed working with my co-workers. It was a breath of fresh air after working in the trenches of consumerism at Home Depot and Target. With each succeeding high school we worked at, the days went by faster. I got to the point where I could disassemble the old network switches and then mount the new network switches on my own without any help. After I completed work at the server closet, Mike would perform a quick check of my work and then tell me where I needed to go next.

The Final Total

So how many high schools in Howard County, Maryland did I work at with Data Networks? That is a really good question. I can't give an accurate answer as all of the notes that I took during that period of time have been thrown away. Let's see if I can reconstruct the schools that I worked at with a table in HTML. Before I do that, let me take another look at that map of high schools that I created in Google Maps to jog my memory.

High School City State Replace Network Switches?
Centennial High School Ellicott City MD Yes
Howard High School Ellicott City MD No
Wilde Lake High School Columbia MD Yes
Fusion Academy Columbia Columbia MD No
River Hill High School Clarksville MD Yes
Atholton High School Columbia MD No
Hammond High School Columbia MD Yes
Long Reach High School Columbia MD Yes
Oakland Mills High School Columbia MD No

Thus, if my memory is correct, it looks like I replaced the network switches for a total of five high schools for Howard County Public Schools. I thought that the total number of schools would be higher, but it looks like I was wrong. I do remember one school we worked at was actually two schools (a middle school and a high school) at one location. Before I left the project, the next high school on the list would have been Howard High School.

Leaving the Project

While working with Data Networks on the project with Howard County Public Schools, I was talking to a classmate at the UMBC Training Center about getting a new IT job. One Tuesday or Thursday night before the A+, Network+, or Security+ class (I don't remember which), a classmate, Jason Partington, told everyone that he worked as an IT help desk agent at the Social Security Administration (SSA) in Woodlawn, MD. He said that his company, Koniag Government Services (KGS), was always looking to hire new IT help desk agents due to a high employee turnover rate for the position. He also added that KGS would hire people for the position if they didn't have any IT certifications. Jason said that before he started working at SSA, he was a cook at Ruth Chris steak restaurant in Pikesville, MD. Thinking that working at SSA as an IT help desk agent would be a good entry-level gateway into IT, I gave Jason my phone number and my email address. He said that he would let KGS Human Resources know that I was interested in the position. Later that night at my hotel room in a Red Roof Inn, I went to the KGS website and applied for the position. I also made sure to mention Jason's name during the application process. Sure enough, a few days after applying for the IT help desk agent position, I received a phone call from KGS Human Resources. The person I spoke to said that KGS had received my application and that Jason had referred me for the position. After a couple of questions, I was told that I would receive a phone call from the senior agent on the SSA contract in the next couple of days. She said that it would be an informal interview to gauge what I know about IT and to not get too stressed during the phone call. A couple of days later, I received a phone call from the senior agent. We spoke on the phone for about 20 minutes or so as I answered basic questions about IT and the importance of customer service. Considering that the phone call was at 9:00 AM, I thought that the phone call went well. After several more days went by, I received another phone call from KGS HR to schedule an interview with the project managers for the IT help desk agent contract at KGS' office in Woodlawn, MD on Lord Baltimore Road. At the interview, one of the project managers I met was Bryan Cronin. We talked about my work history, what I knew about customer service, what I knew about IT, and what the expections were for being an IT help desk agent on the contract. It also helped that Bryan, like me, was in the military. He had been in the U.S. Air Force. The interview was positive and lasted about an hour. After waiting several more days, I received yet another phone call from KGS HR. I was offered the IT help desk agent position at SSA as a KGS employee. I accepted the job offer.

After finishing work at another high school, it might have been either Hammond High School or River Hill High School, I informed Lovett, Todd, and Mike that I had accepted a job offer to work as an IT help desk agent at SSA. Everyone was happy with my announcement. It was more than a little bittersweet to leave the project with Data Networks. I really enjoyed working on the project. I learned A LOT. More importantly, I enjoyed working with my co-workers. It as difficult to leave the project, but the IT help desk agent position was a new opportunity in IT. I ended up working as an IT help desk agent at SSA for six years.