29 тысяч подписчиков
354 видео
Top 5 Cybersecurity Trends in 2024
History of ENIAC | ENIAC
Y2K Bug | Millennium Bug
Virtual Machines
What is BGP? | Border Gateway Protocol
Photoelectric Effect Explained
Top 5 Cybersecurity headlines of 2023
Types of Computer Network | Computer Networks
Introduction to Image and Image processing | Image Processing
Failures of Classical Mechanics | Classical Mechanics
What is Data Warehouse | Why do we need data warehouse?
What is NFC? | NFC Explained
Virtualization
GUI | what is GUI | Graphical User Interface.
SSH
GRE Over IPsec tunnel
What is API Security? | API Security
Load balancers | what is load balancers | Network scalability
Docker | What is Docker | Why do we need Docker.
NGFW
What is Cyber KIll Chain?
Firewall | What is a firewall | How a firewall works?
Processes in Operating System | Operating System
AI In cybersecurity | Cybersecurity
FTP Explained | File Transfer Protocol | Cisco CCNA
CDP and LLDP
REST
Firewall | what is Firewall | Working of Firewall.
Internet Black Hole
Sanboxing in web browsers
ARP Explained | Address Resolution Protocol.
Top cybersecurity threats in 2021 | Security threats
Cloud Security and its key aspects
Ad-ware
Kernel | what is Kernel | How kernel works?
Networking protocols and its types | CCNA
Top 5 Common web security vulnerabilities | Security Vulnerabilities.
3 way Handshake and SSL
Access Control List | ACL | CCNA
Deep and Dark Web | Difference between deep and Dark web
Default Gateway Explained
What is a Socket?
Photon Sphere
Microsoft’s Majorana 1 Quantum Chip – Hype or Breakthrough?
Krack Attack| what is Krack Attack| how Krack Attack works?
Encryption| What is Encryption| Type of Encryption.
API Security Testing Methodologies
VLAN explained | VLAN Trunking | Cisco CCNA
Proxy | What is proxy? | Forward vs Reverse Proxy
Embedded Systems | Types of Embedded Systems.
Distance vector routing protocols
Ping in network
The Future of Graphical User Interfaces | Graphical User Interface
Parallel Computing and its types | Parallel Computers
What is a switch | How a switch works? | Network switch.
What is cloud security | Cloud security
Wireless security protocols
Top 5 trends of computer science in 2022 | Computer science