![Sunny Classroom](/img/default-banner.jpg)
- Видео 209
- Просмотров 18 381 055
Sunny Classroom
США
Добавлен 15 июн 2014
Hello, my name is Sunny Sun, Associate Professor of the Cybersecurity Program at the University of Saint Mary (USM), Kansas.
I have been teaching at USM many different computer courses of both Computer Information Systems and Cybersecurity: Web design (HTML, CSS, & PHP), Networking, Ethical hacking, Cryptography, Digital forensics, Database, Data structure & algorithms, and computer programming ( Java, C#, and Python). I enjoy teaching.
I hope these videos are helpful in your study or as you prepare for the national certification tests (CompTIA Network+/Security+, CCENT, or CCAP).
Thank you very much for your support by becoming a Sunny Classroom member. Your support is much appreciated. www.patreon.com/sunnyclassroom
I have been teaching at USM many different computer courses of both Computer Information Systems and Cybersecurity: Web design (HTML, CSS, & PHP), Networking, Ethical hacking, Cryptography, Digital forensics, Database, Data structure & algorithms, and computer programming ( Java, C#, and Python). I enjoy teaching.
I hope these videos are helpful in your study or as you prepare for the national certification tests (CompTIA Network+/Security+, CCENT, or CCAP).
Thank you very much for your support by becoming a Sunny Classroom member. Your support is much appreciated. www.patreon.com/sunnyclassroom
Видео
Stack and Queue
Просмотров 1,1 тыс.3 месяца назад
Today, I will discuss two data structures: Stack and Queue. Stacks and queues are considered logical, conceptual, or abstract data structures because they organize and access data using specific rules. Their operations and efficiency are more about these rules than where the data is physically stored in the computer.
How your browser secure your communications over the Internet?
Просмотров 3,7 тыс.6 месяцев назад
Today, I will explain how your browser uses symmetric and asymmetric encryption and digital certificates to protect your online conversations behind the scenes.
A Brief History of the WEB
Просмотров 1,8 тыс.7 месяцев назад
Today I will talk about the brief evolution history of the World Wide Web. The Web is a system of interconnected pages and resources that can be accessed through the Internet. The Web has undergone different development stages, often called Web 1.0, Web 2.0, and Web 3.0. Each stage represents a significant change in how users interact with the Web and the technologies used.
A brief history of Computer Storage Media
Просмотров 1,6 тыс.8 месяцев назад
Today, my topic is a brief history of computer storage technology. Please support my channel by becoming a member at patreon.com/sunnyclassroom. Playlists: Routing and Switching ruclips.net/p/PLSNNzog5eydtmcbcbc1b8pVRkgre3vNUy IPv4 Basics IPv4 Basics ruclips.net/video/vcArZIAmnYQ/видео.html Cyber Attacks and Defense ruclips.net/video/LXd2uP1qKDE/видео.html Basic Cryptography ruclips.net/video/v...
ARP poisoning and Port mirroring attacks
Просмотров 7 тыс.11 месяцев назад
Please support my channel by becoming a member at patreon.com/sunnyclassroom. Today I will talk about two more network switch attacks: ARP poisoning and Port mirroring attack. Playlists: Routing and Switching ruclips.net/p/PLSNNzog5eydtmcbcbc1b8pVRkgre3vNUy IPv4 Basics IPv4 Basics ruclips.net/video/vcArZIAmnYQ/видео.html Cyber Attacks and Defense ruclips.net/video/LXd2uP1qKDE/видео.html Basic C...
Switch attacks: MAC Flooding and MAC Spoofing
Просмотров 8 тыс.Год назад
Please support my channel by becoming a member at patreon.com/sunnyclassroom. Today I will talk about two common attacks on the network switch: MAC flooding attack and MAC spoofing attack. Playlists: Routing and Switching ruclips.net/p/PLSNNzog5eydtmcbcbc1b8pVRkgre3vNUy IPv4 Basics IPv4 Basics ruclips.net/video/vcArZIAmnYQ/видео.html Cyber Attacks and Defense ruclips.net/video/LXd2uP1qKDE/видео...
Network Devices to Protect your Intranet
Просмотров 4,1 тыс.Год назад
An intranet is a private network which is heavily protected by many different networking devices, such as router, firewall, proxy server, DMZ, honeynet, IPS and IDS. This diagram is an overly-simplified version of the reality. I try to put these devices together in a reasonable order, only for teaching and learning purpose.
Malware 2: Rootkit, keylogger, logic bomb, adware, & botnet
Просмотров 3,3 тыс.Год назад
Please support my channel by becoming a member at patreon.com/sunnyclassroom. Malware is any type of software program designed to harm or exploit computer systems or a device. Malware can take many forms, including viruses, ransomware, spyware, and other types of malicious software. Today I will talk about five more types of malware: rootkits, keyloggers, logic bombs, adware, and botnets. Playl...
Malware: virus, worm, Trojan horse, spyware, & ransomware
Просмотров 6 тыс.Год назад
Please support my channel by becoming a member at patreon.com/sunnyclassroom. Malware is any type of software program designed to harm or exploit computer systems or a device. Malware can take many forms, including viruses, ransomware, spyware, and other types of malicious software. Today I will talk about five types of malware: virus, worm, trojan horse, spyware, and ransomware. Playlists: Rou...
How does cellular network work?
Просмотров 13 тыс.Год назад
Today my topic is cellular networks and their key components. We will explore how these components collaborate to provide cellular services. Please support my channel by becoming a member at patreon.com/sunnyclassroom. Today my topic is about celluar networks: several key components of cellular networks and how they work together to deliver celluar services. Playlists: Remote Access/WAN technol...
How does SNMP work?
Просмотров 11 тыс.Год назад
Please support my channel by becoming a member at patreon.com/sunnyclassroom. Today my topic is SNMP - Simple Network Management Protocol, a widely used protocol in networking and is supported by a large number of devices. The topic will include the definition of SNMP, SNMP system components, and how does SNMP work? Playlists: Routing and Switching ruclips.net/p/PLSNNzog5eydtmcbcbc1b8pVRkgre3vN...
General switch vs managed switch
Просмотров 6 тыс.Год назад
Please support my channel by becoming a member at patreon.com/sunnyclassroom. A switch is a network device that connects other devices on a computer network and forwards data between those devices. There are several different options available when it comes to the functions of a switch. Today I will talk about two types of switches: the general switch and the managed switch in terms of manageme...
Summary of six dynamic routing protocols
Просмотров 4,5 тыс.Год назад
Please support my channel by becoming a member at patreon.com/sunnyclassroom. Today I will summarize six different dynamic routing protocols I have covered so far. Playlists: Routing and Switching ruclips.net/p/PLSNNzog5eydtmcbcbc1b8pVRkgre3vNUy IPv4 Basics IPv4 Basics ruclips.net/video/vcArZIAmnYQ/видео.html Cyber Attacks and Defense ruclips.net/video/LXd2uP1qKDE/видео.html Basic Cryptography ...
Distance-vector vs link-state and a hybrid EIGRP
Просмотров 9 тыс.Год назад
Please support my channel by becoming a member at patreon.com/sunnyclassroom. In today’s lesson, I will talk about 1) the main differences between distance-vector routing and link-state routing algorithm; 2) EIGRP - Enhanced Interior Gateway Routing Protocol, a hybrid type routing protocol of both distance-vector and link state. Playlists: Routing and Switching ruclips.net/p/PLSNNzog5eydtmcbcbc...
Link state routing protocols: IS to IS and OSPF
Просмотров 15 тыс.Год назад
Link state routing protocols: IS to IS and OSPF
Distance vector routing protocols: RIP and IGRP
Просмотров 12 тыс.Год назад
Distance vector routing protocols: RIP and IGRP
static vs dynamic routing & routing metrics
Просмотров 9 тыс.Год назад
static vs dynamic routing & routing metrics
AS : Interior and border routers, Border Gateway Protocol
Просмотров 14 тыс.Год назад
AS : Interior and border routers, Border Gateway Protocol
Routers, functions, interfaces and ports
Просмотров 8 тыс.Год назад
Routers, functions, interfaces and ports
SMS phishing attacks and how to prevent them
Просмотров 5 тыс.Год назад
SMS phishing attacks and how to prevent them
Data Storage Types: File, Block, & Object
Просмотров 32 тыс.Год назад
Data Storage Types: File, Block, & Object
The ElGamal Algorithm: a simple example
Просмотров 9 тыс.Год назад
The ElGamal Algorithm: a simple example
How to test if g is a primitive root of a prime number p?
Просмотров 3 тыс.Год назад
How to test if g is a primitive root of a prime number p?
So helpful tanks
Awesome way to subnet. Really simplifies subnetting. ❤ However, I have the same question as @orcnewmymail. What would this table look like with less Network bits? And sacrificing an entire subnet is totally new to me.
Great! New suscriber here....
Its not HTTTPS.
We divide 16384 by 256.. can someone explain why and where the 256 came from ?
I love u
Thank you! This video was pretty helpful. But when it comes to a request like 14.53.233.153/20 i couldnt find a way to use your table. Would you mind to explain?
This is a nice video on cyber kill chain. Some similarities with supply chain management. Hope similar videos will publish more.
Great teaching . Thank you sir :)
Although I see why this method is called Frequency Hopping. I don't see why it's called Spread Spectrum though.
OMG. Liked. Subscribed.
U r agreat teacher
doesn't this only solve for /24?
Hi Sir, what if subnet is less than 24
Awesome explanation. I have a question though. Is there another Sunny Table in case we need more than 256 hosts?
Thanks for connecvting tagging to Trunking!
Thank you
SO FUN!
watching this in 2024. thanks a lot this is very simple and concise!
Just want to say that you're my go-to guy when I need some tech explanation. You make it very easy to understand! A BIGH MAHALO to you Sunny!
Good explanation.
Excellent explanation sir.... Thank you so much ❤❤❤❤
Great job! It was so easy to understand.
thank you Sir
Loving your video
Thank you
Sorry if this is a blonde question but in the real world - who choses what your original ID is? A lot of the case studies I see in textbooks start with "you've been given this network ID with this mask, generate n number of subnets." What I don't understand about all of this is, how does this original network ID get generated for a business or organisation, and how does it get passed down for you to work on? Second question - it looks like there is not a fixed limit for the number of hosts and subnets. The table in the last video stopped at 256, this one stops at 65536. Are there realworld practical limitations on the number of devices a business can include in a subnet? Thank you so much for your videos - you are my first ever RUclips subscribe because they are wonderful.
Mr. Sunny, I’ve just made practical CCNA exam only because of you. Many thanks from the Czech Republic! 🙏
You can always count on Sunny to have your back!
This looks cool for class C IP address. Why is no one asking what happens when it's a class A or B IP address!!
This is by far the simplest most intuitive subnetting approach on youtube! Thank you sir!
Thank you Sunny! It takes great intelligence to teach subnetting so clearly and simply.😊
Much Appreciation. I had 3 hours lecture on it but clearly understood from your video.
It would be great if these graphs more clearly indicated what domain they are in!
Can someone explain to me please, why we divide 16,384 by 256, not to some other number? 6.57min on the video.
hallo.
"A diligent student needs no master"
Excellent video
hey please show me how to find valid subnet and valid host
Why is the subnet /27 instead of /24?
got my exam in 2 hours, well hope this covers it, if it's asking /16 address i hope I know what to do
Simple and straight to the point, thank you!
If my router did a PAT from port 80 to 8000, how does the other router know that I'm requesting a port 80(web) instead of 8000? Thank you.
Sunny, great video.
What is fin
So comprehensive yet so simply put! Your explanation is clear and understandable. Cheers!
Very crisp and concise explanation.
love u sunnny great job
sunny sir thank you soo much you are the best!
Muito bom!