- 209
- 18 271 492
Sunny Classroom
United States
Registrace 15. 06. 2014
Hello, my name is Sunny Sun, Associate Professor of the Cybersecurity Program at the University of Saint Mary (USM), Kansas.
I have been teaching at USM many different computer courses of both Computer Information Systems and Cybersecurity: Web design (HTML, CSS, & PHP), Networking, Ethical hacking, Cryptography, Digital forensics, Database, Data structure & algorithms, and computer programming ( Java, C#, and Python). I enjoy teaching.
I hope these videos are helpful in your study or as you prepare for the national certification tests (CompTIA Network+/Security+, CCENT, or CCAP).
Thank you very much for your support by becoming a Sunny Classroom member. Your support is much appreciated. www.patreon.com/sunnyclassroom
I have been teaching at USM many different computer courses of both Computer Information Systems and Cybersecurity: Web design (HTML, CSS, & PHP), Networking, Ethical hacking, Cryptography, Digital forensics, Database, Data structure & algorithms, and computer programming ( Java, C#, and Python). I enjoy teaching.
I hope these videos are helpful in your study or as you prepare for the national certification tests (CompTIA Network+/Security+, CCENT, or CCAP).
Thank you very much for your support by becoming a Sunny Classroom member. Your support is much appreciated. www.patreon.com/sunnyclassroom
Video
Stack and Queue
zhlédnutí 1KPřed 2 měsíci
Today, I will discuss two data structures: Stack and Queue. Stacks and queues are considered logical, conceptual, or abstract data structures because they organize and access data using specific rules. Their operations and efficiency are more about these rules than where the data is physically stored in the computer.
How your browser secure your communications over the Internet?
zhlédnutí 3,5KPřed 5 měsíci
Today, I will explain how your browser uses symmetric and asymmetric encryption and digital certificates to protect your online conversations behind the scenes.
A Brief History of the WEB
zhlédnutí 1,8KPřed 6 měsíci
Today I will talk about the brief evolution history of the World Wide Web. The Web is a system of interconnected pages and resources that can be accessed through the Internet. The Web has undergone different development stages, often called Web 1.0, Web 2.0, and Web 3.0. Each stage represents a significant change in how users interact with the Web and the technologies used.
A brief history of Computer Storage Media
zhlédnutí 1,6KPřed 7 měsíci
Today, my topic is a brief history of computer storage technology. Please support my channel by becoming a member at patreon.com/sunnyclassroom. Playlists: Routing and Switching czcams.com/play/PLSNNzog5eydtmcbcbc1b8pVRkgre3vNUy.html IPv4 Basics IPv4 Basics czcams.com/video/vcArZIAmnYQ/video.html Cyber Attacks and Defense czcams.com/video/LXd2uP1qKDE/video.html Basic Cryptography czcams.com/vid...
ARP poisoning and Port mirroring attacks
zhlédnutí 6KPřed 11 měsíci
Please support my channel by becoming a member at patreon.com/sunnyclassroom. Today I will talk about two more network switch attacks: ARP poisoning and Port mirroring attack. Playlists: Routing and Switching czcams.com/play/PLSNNzog5eydtmcbcbc1b8pVRkgre3vNUy.html IPv4 Basics IPv4 Basics czcams.com/video/vcArZIAmnYQ/video.html Cyber Attacks and Defense czcams.com/video/LXd2uP1qKDE/video.html Ba...
Switch attacks: MAC Flooding and MAC Spoofing
zhlédnutí 7KPřed 11 měsíci
Please support my channel by becoming a member at patreon.com/sunnyclassroom. Today I will talk about two common attacks on the network switch: MAC flooding attack and MAC spoofing attack. Playlists: Routing and Switching czcams.com/play/PLSNNzog5eydtmcbcbc1b8pVRkgre3vNUy.html IPv4 Basics IPv4 Basics czcams.com/video/vcArZIAmnYQ/video.html Cyber Attacks and Defense czcams.com/video/LXd2uP1qKDE/...
Network Devices to Protect your Intranet
zhlédnutí 3,9KPřed 11 měsíci
An intranet is a private network which is heavily protected by many different networking devices, such as router, firewall, proxy server, DMZ, honeynet, IPS and IDS. This diagram is an overly-simplified version of the reality. I try to put these devices together in a reasonable order, only for teaching and learning purpose.
Malware 2: Rootkit, keylogger, logic bomb, adware, & botnet
zhlédnutí 3,3KPřed rokem
Please support my channel by becoming a member at patreon.com/sunnyclassroom. Malware is any type of software program designed to harm or exploit computer systems or a device. Malware can take many forms, including viruses, ransomware, spyware, and other types of malicious software. Today I will talk about five more types of malware: rootkits, keyloggers, logic bombs, adware, and botnets. Playl...
Malware: virus, worm, Trojan horse, spyware, & ransomware
zhlédnutí 6KPřed rokem
Please support my channel by becoming a member at patreon.com/sunnyclassroom. Malware is any type of software program designed to harm or exploit computer systems or a device. Malware can take many forms, including viruses, ransomware, spyware, and other types of malicious software. Today I will talk about five types of malware: virus, worm, trojan horse, spyware, and ransomware. Playlists: Rou...
How does cellular network work?
zhlédnutí 13KPřed rokem
Today my topic is cellular networks and their key components. We will explore how these components collaborate to provide cellular services. Please support my channel by becoming a member at patreon.com/sunnyclassroom. Today my topic is about celluar networks: several key components of cellular networks and how they work together to deliver celluar services. Playlists: Remote Access/WAN technol...
How does SNMP work?
zhlédnutí 11KPřed rokem
Please support my channel by becoming a member at patreon.com/sunnyclassroom. Today my topic is SNMP - Simple Network Management Protocol, a widely used protocol in networking and is supported by a large number of devices. The topic will include the definition of SNMP, SNMP system components, and how does SNMP work? Playlists: Routing and Switching czcams.com/play/PLSNNzog5eydtmcbcbc1b8pVRkgre3...
General switch vs managed switch
zhlédnutí 6KPřed rokem
Please support my channel by becoming a member at patreon.com/sunnyclassroom. A switch is a network device that connects other devices on a computer network and forwards data between those devices. There are several different options available when it comes to the functions of a switch. Today I will talk about two types of switches: the general switch and the managed switch in terms of manageme...
Summary of six dynamic routing protocols
zhlédnutí 4,4KPřed rokem
Please support my channel by becoming a member at patreon.com/sunnyclassroom. Today I will summarize six different dynamic routing protocols I have covered so far. Playlists: Routing and Switching czcams.com/play/PLSNNzog5eydtmcbcbc1b8pVRkgre3vNUy.html IPv4 Basics IPv4 Basics czcams.com/video/vcArZIAmnYQ/video.html Cyber Attacks and Defense czcams.com/video/LXd2uP1qKDE/video.html Basic Cryptogr...
Distance-vector vs link-state and a hybrid EIGRP
zhlédnutí 8KPřed rokem
Please support my channel by becoming a member at patreon.com/sunnyclassroom. In today’s lesson, I will talk about 1) the main differences between distance-vector routing and link-state routing algorithm; 2) EIGRP - Enhanced Interior Gateway Routing Protocol, a hybrid type routing protocol of both distance-vector and link state. Playlists: Routing and Switching czcams.com/play/PLSNNzog5eydtmcbc...
Link state routing protocols: IS to IS and OSPF
zhlédnutí 14KPřed rokem
Link state routing protocols: IS to IS and OSPF
Distance vector routing protocols: RIP and IGRP
zhlédnutí 11KPřed rokem
Distance vector routing protocols: RIP and IGRP
static vs dynamic routing & routing metrics
zhlédnutí 8KPřed rokem
static vs dynamic routing & routing metrics
AS : Interior and border routers, Border Gateway Protocol
zhlédnutí 13KPřed rokem
AS : Interior and border routers, Border Gateway Protocol
Routers, functions, interfaces and ports
zhlédnutí 7KPřed rokem
Routers, functions, interfaces and ports
SMS phishing attacks and how to prevent them
zhlédnutí 5KPřed rokem
SMS phishing attacks and how to prevent them
Data Storage Types: File, Block, & Object
zhlédnutí 30KPřed rokem
Data Storage Types: File, Block, & Object
The ElGamal Algorithm: a simple example
zhlédnutí 9KPřed rokem
The ElGamal Algorithm: a simple example
How to test if g is a primitive root of a prime number p?
zhlédnutí 3KPřed rokem
How to test if g is a primitive root of a prime number p?
what a marvelous explanation!!!! Thank you so much
You are my life saver. Keep it up with the good work.
Thank you, helped a lot
this guy is really good at explaining everything
Awesome!!!
what if the subnet is /23 or /21 ?
massive thanks . 2024 student but your video is really better than my professor
To the point explanation, covering all the concepts.
Well done, thank you!
PLEASE WHY THE 63 NOT 64? i mean for the first broadcast id
How do we get rid of the wasteful subnet?
I've looked at a ton of different videos that explained subnetting and no one did a better job than this one. Pretty incredible
very nice video sunny, what happen when we get for example /16 or /18 ? is not in your table, thanks a lot
what if the given has /27? Will I still be able to use the sunny subnetting table?
Thank you, sir! You are doing a great job.
i lost it when he ssid and rednecks in the USA" funny as hell 😂😂😂😂
😮
how do we know if the question is asking for a [ subnet only ] or if it is asking for a [ subnet of a subnet ]? Thank you!
what do we do with the original subnet mask /24, just ignore it? when is it useful? Thank you so much!
ok nvm. Ur an actual legend holy shit I would bear your children if nature allowed it
Source Network Address Translation (source-nat or SNAT) allows traffic from a private network to go out to the internet. Why the teacher is talking about static NAT. Am I wrong?
That was an amazing explanation. Thanks
Has anyone seen VLSN questions like this on the exam?
Thanks for the clear and concise explanation.
Thank you you're a life saver for my coursework that is due five days from now I can do as much as I can then then upload it much appreciation
after watching at 10 vids claiming they know how to explain it in easy to understand, they start simple then in the middle they over complicate the teaching and already confusing and abstract coz they skip in explaining the mechanism in the tagging and trunking, coz they themselves don't really understand why and what really happens on the ports, they just define this and that happens and skip the why it happened. You're the only one who really understands what you are teaching and in the most easy to understand use of words for a student
Great
isn't that APIPA? 5:35 you say that link local but I guess you are wrong.
you are amazing Sunny, in the end i've found where i shall be learning network.
Thank you so much 😭you have saved my semester sir
Sunny, you're the best at explaining networking topics. Thank you a lot.
I just learned this today and you made it 100% easier
Currently struggling in my network classes and finding these videos is like finding fresh water in the sahara desert
thank you so much for explaining 🌷
thanks teach!
I think I need more explanation on encoding.
best explanations
Please cover a video on SAML Oauth and SSO
Sunny my man, my professors at WGU always send me your videos. Very simple and clean knowledge. Thank you sir
Just spent weeks trying to understand and just explained everything clearly under 10 mins. Thank you
Thank YOU!!!!
Thank You sir, u were the choice from my lecturer to watch your videos so that i can have a better understanding and so far, all of the videos i' ve watched is well explained !!
Hi, what if the cidr is not /24 and something else like /8 or /16?
I always get confused by block storage because that's how filesystems store files anyways. They're broken into blocks and those blocks can be stored anywhere in the filesystem
Thank you very much Sunny this video have save a life, from....🇨🇲🇨🇲❤👍
thank you very much! your the best!
Thank you Sunny
Quality videos, thanks
Wow, you are a great teacher....
Nice video, thank you 😁