237 тысяч подписчиков
209 видео
Disaster Recovery Sites: hot, warm, & cold
AS : Interior and border routers, Border Gateway Protocol
How SSL certificate works?
How does a computer communicate locally and remotely?
SMS phishing attacks and how to prevent them
Address Resolution Protocol (ARP)
Why digital certificate?
Stack and Queue
What is digital signature?
SSL/TLS handshake Protocol
AAA framework: TACACS+ vs RADIUS
PKI: self-signed digital certificate?
Firewall
VLSM Subnetting - subnetting a subnet
Analog vs Digital
AAA framework and RADIUS
ChatGPT: A mind-blowing AI
Simplex, half duplex, and full duplex
Malware: virus, worm, Trojan horse, spyware, & ransomware
IEEE 802 1Q: Tagging and Trunking 101
collision vs. broadcast domain: Hub, Switch and Router
Malware 2: Rootkit, keylogger, logic bomb, adware, & botnet
TCP vs. UDP
Special and private IPv4 addresses
A brief history of Computer Storage Media
The Swiss Cheese Model for Cyberattacks
Distance-vector vs link-state and a hybrid EIGRP
A Brief History of the WEB
Circuit Switching vs. Packet Switching
Switch attacks: MAC Flooding and MAC Spoofing
All about Bluetooth
static vs dynamic routing & routing metrics
VPN - Virtual Private Network
Distance vector routing protocols: RIP and IGRP
How TCP starts and close session?
How to test if g is a primitive root of a prime number p?
Decimal to binary: two methods
Network Devices to Protect your Intranet
ARP poisoning and Port mirroring attacks
Surface net, Deep net, and darknet
The ElGamal Algorithm: a simple example
Link state routing protocols: IS to IS and OSPF
Routers, functions, interfaces and ports
Dictionary Attack and Brute Force Attack: hacking passwords
Straight through, crossover, rollover - Where & When to use what?
How hash function work?
General switch vs managed switch
Private Key Encryption (Symmetric Key Encryption)
One - way function & trapdoor function in modern cryptography
How DHCP works?