Channel Avatar

Sunny Classroom @UCr0Ze4SR3MHXAgz1TvRYL7Q@youtube.com

248K subscribers - no pronouns :c

Hello, my name is Sunny Sun, Associate Professor of the Cybe


08:27
Protecting your network II
12:39
Protecting your network part I - IDS, IPS, Honeynet, DMZ, proxy
03:50
Random Access Memory(RAM)
10:25
Stack and Queue
09:23
How your browser secure your communications over the Internet?
08:05
A Brief History of the WEB
08:22
A brief history of Computer Storage Media
09:58
ARP poisoning and Port mirroring attacks
10:09
Switch attacks: MAC Flooding and MAC Spoofing
20:35
Network Devices to Protect your Intranet
10:33
Malware 2: Rootkit, keylogger, logic bomb, adware, & botnet
08:48
Malware: virus, worm, Trojan horse, spyware, & ransomware
04:27
How does cellular network work?
03:57
How does SNMP work?
06:05
General switch vs managed switch
04:43
Summary of six dynamic routing protocols
06:56
Distance-vector vs link-state and a hybrid EIGRP
10:11
Link state routing protocols: IS to IS and OSPF
06:19
Distance vector routing protocols: RIP and IGRP
06:43
static vs dynamic routing & routing metrics
05:51
Five factors of Authentication
08:57
AS : Interior and border routers, Border Gateway Protocol
08:23
ChatGPT: A mind-blowing AI
07:16
All about Bluetooth
09:38
How does a SOHO router works
05:37
Routers, functions, interfaces and ports
09:09
13 types of computer networks
04:08
SMS phishing attacks and how to prevent them
05:21
Data Storage Types: File, Block, & Object
06:39
The ElGamal Algorithm: a simple example
08:21
Intro to the ElGamal Cryptosystem
04:20
How to test if g is a primitive root of a prime number p?
08:04
The RSA - A simple math example
06:49
The RSA Algorithm with math formulas
06:30
Prime, coprime , modulo operation, and congruence modulo
11:16
DHKE: Demo in math - part 2/2
08:21
DHKE : Demo with mixing colors - part 1/2
06:58
One - way function & trapdoor function in modern cryptography
04:56
Three types of VPN
06:38
Browsing darknet sites
06:26
HTTPS & Tor for Privacy and Anonymity
05:02
How does the Tor network hide your traffic?
07:00
Installing and using Tor Browser
06:50
The Onion Router (Tor) Network
04:43
DAS, NAS, & SAN
06:18
FIFO and GFS - tape backup rotation schemes
07:01
Surface net, Deep net, and darknet
08:07
Data Backup: Full, Incremental, and Differential
03:14
The 3-2-1 backup rule
03:48
The Swiss Cheese Model for Cyberattacks
03:28
CompTIA Security+ : Forensic data collection order
04:11
Disaster Recovery Sites: hot, warm, & cold
07:05
RAID: 0, 1,5, 6, 01, & 10
04:06
CompTIA Network+ : Troubleshooting Model
05:19
Armored virus infection: appender, split, & Swiss cheese
06:19
Scam, hoax, prank, spam, SPIM, & SPIT
05:54
Pharming by DNS poisoning & Domain Hijacking
11:11
How to spot a phishing email - case 2
07:23
How to spot a phishing email - case 1
07:02
The 6 most common types of phishing attacks