Posts

Showing posts from June, 2025

BSIT400-T301 - Week 4 Blog

This week's presentation, labeled Cloud+ Module 4, provided some extensive information about how cloud networking transforms traditional infrastructure through SDN (Software-Defined Networking) and NFV (Network Functions Virtualization) technologies. The main point that caught my attention was the different methods cloud providers AWS, Azure, and GCP use to segment and route their networks. AWS VPCs maintain strict regional and availability zone boundaries, but GCP VPCs provide worldwide regional coverage, which benefits distributed applications. The main lesson learned was the transition from hardware-based network management to logical configuration methods. Virtual operations allow users to create subnets and assign IP addresses using CIDR and manage route tables. The cloud benefits from these concepts because they enable scalability, redundancy, and security operations that do not require physical server access. The cloud stack uses OSI/TCP-IP models as its foundation, but modi...

BSIT380-T302 - Week 4 Blog

 The detection of threats at their early stages depends on continuous monitoring of endpoints, networks, and email systems. The 8th chapter this week talks about how organizations can achieve real-time systems visibility through the implementation of SIEM (Security Information and Event Management) and EDR (Endpoint Detection and Response) tools. These tools collect logs and detect irregularities while performing automated response procedures. The exploitation of email continues to be one of the most common attack methods, so organizations must actively monitor for phishing attempts, malicious attachments, and unusual login behaviors. The identification of malicious activity depends heavily on data analytics through pattern recognition. Security teams can identify potential threats at an early stage by performing scheduled data analysis reviews, which examine login times, IP ranges, and unusual user behavior. The review process enables incident response while simultaneously enhanci...

BSIT400-T301 Week 3 Blog

T his weeks powerpoint information about cloud migration demonstrated that successful migration requires complex strategic planning. The process of data relocation from point A to point B requires detailed planning, evaluation, and continuous communication throughout the entire process. The most significant insight for me was the phased approach to migration, which requires multiple revisits because needs change, technologies advance, and cloud offerings transform. The documentation process stands as a crucial element because it requires organizations to record baseline performance data along with system dependencies, legal requirements, and temporary service desk hour modifications. The small details in the migration process determine whether the transition will succeed or fail. The different migration strategies, including rehosting, replatforming, and refactoring, became important concepts for me to understand. The different business requirements require unique approaches because th...

BSIT400-T301 Week 1 Blog

Welcome to my IT blog, which you can find here. I am Derek Talbott. I have spent multiple years in the IT field. I am studying Information Technology at Bellevue while working in the field, which allows me to combine academic knowledge with practical experience. Cloud Computing and Governance immediately drew my attention because cloud solutions have transitioned from future IT concepts to become the current reality. I have directly observed businesses transition from traditional infrastructure to cloud-based environments through my current position, and I have participated in discussions about cloud migration, hybrid networks, and remote access security. My experience with cloud governance remains limited because I have not yet gained sufficient knowledge about policy creation, compliance standards, and large-scale cloud operation management. I am eager to learn about this subject matter throughout this course. I will document my learning process through this blog by discussing weekl...

BSIT380-T302 Week 3 Blog

The readings from this week demonstrate that vulnerability management requires more than scanning activities because it demands an organizational strategy to detect and evaluate risks according to specific business requirements.  Chapter 5 demonstrated that maintaining an accurate and up-to-date asset inventory stands as a fundamental requirement for organizations. The protection of assets becomes impossible without knowing what assets exist. The continuous execution of vulnerability scanning together with strong patch management practices stood out to me as the most important aspect. The chapter demonstrated that unfiltered scan results lack accuracy, so analysts need both technical and critical thinking abilities to distinguish between actual threats and false positives. Chapter 7 talked about incident response and forensic readiness as essential components. The main lesson I learned was that vulnerability scanning exists to help organizations prepare for potential security incid...

BSIT400-T301 Week 2 Blog

 This week’s lesson on virtualization really emphasized how foundational virtual hardware is to cloud computing. One key takeaway for me was how hypervisors, especially Type 1, allow multiple virtual machines to operate efficiently on a single physical server. This setup not only saves on hardware costs but also improves scalability and flexibility, which are critical in cloud environments. Understanding vCPU sizing, memory overcommitment, and storage allocation also gave me insight into how IT teams balance performance with resource availability. I also found the comparison between traditional virtual machines and alternatives like containers and serverless computing really eye-opening. Containers offer a lightweight and portable solution for running applications, while serverless computing shifts the burden of infrastructure management entirely to the cloud provider. These approaches help reduce overhead and can make application deployment much more efficient. Overall, this week...

BSIT380-T302 Week 2 Blog

 This week’s readings really emphasized how foundational agreements and proactive analysis are to a strong cybersecurity posture. One key takeaway for me came from the deep dive into Service Level Agreements (SLAs) . SLAs are more than just technical checklists, they are legal and operational frameworks that define accountability, especially when it comes to security. In an environment where companies outsource critical infrastructure to third-party vendors, clearly defined SLAs are what ensure providers deliver not just uptime, but compliance with security protocols like data encryption, vulnerability patching timelines, and incident response commitments. From Chapter 4, I found the section on threat intelligence particularly compelling. The idea that cybersecurity is not just reactive but also predictive stood out. Gathering, analyzing, and applying threat intelligence helps organizations stay ahead of attackers. Whether it’s understanding threat actor motives or identifying in...

BSIT380-T302 Week 1 Blog

Hello and welcome to my first entry in what I hope becomes a valuable space for sharing insights, experiences, and lessons learned in the world of cybersecurity, system hardening, and network risk management. My name is Derek Talbott, and I am currently the Site IT Manager at Michelin in Junction City, Kansas. With over a decade of hands-on experience in IT, ranging from systems administration and Active Directory management to executing cybersecurity compliance rules across global infrastructures, I’ve learned just how critical strong security practices are in maintaining operational stability. Before transitioning into the civilian IT world, I served in the U.S. Army as a 15N Avionics Mechanic, 15F Aircraft Electrician, and 25B Information Technology Specialist. Those years taught me how to stay calm under pressure, lead by example, and treat every piece of technology as mission-critical, skills that continue to guide my approach to IT security today. I’m currently wrapping up my ...