Cloud Security Explained! Hear from an Pro Hacker!
Vložit
- čas přidán 14. 06. 2024
- // Membership //
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: / @loiliangyang
// Courses //
Full Ethical Hacking Course: www.udemy.com/course/full-web...
Full Web Ethical Hacking Course: www.udemy.com/course/full-web...
Full Mobile Hacking Course: www.udemy.com/course/full-mob...
// Books //
Kali Linux Hacking: amzn.to/3IUXaJv
Linux Basics for Hackers: amzn.to/3EzRPV6
The Ultimate Kali Linux Book: amzn.to/3m7cutD
// Social Links //
Website: www.loiliangyang.com
Facebook: / loiliangyang
Instagram: / loiliangyang
LinkedIn: / loiliangyang
// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers. - Věda a technologie
Like, share and subscribe!
I want certificate of completion
Did they take your recent video down? May you upload it again?
Need subtitle because I'm from Indonesia sure :(
***** 5* for you always
can you create video with attacking too?
I don't know how to thank you, my friend. You taught us things we didn't learn at university, you are a great person
Ya cuz university is a scam if you haven’t caught that
The technical architecture part was great!
Biggest fan from india
He is Chinese
@@newuser2474 So?
Tumare Jaise chutiyapa k Karan apna naam barbad hota h 😂 kahe bolna ye sab. Kaam kro aur niklo
Tooo good and high quality info abt cloud security ..... Pls keep it up. god bless
We love you Loi Liang Yang. And thank you so much.
A very appreciative effort by you sir, and it's very informative and learnable video what I have been looking for some days about cloud security and I found yours.
Thank you so much
Hi Sir, what is the difference between KYOK and BYOK for Data security?
what are differents from Cloud Security with normal System Security?
Very good presentation on architecture.
Which is best tool for SIEM? And also for encryption
Thanks so much . You inspired me to create my own channel :)
Thanks immensely !! 👍
How can we integrate cloud security with social engineering?
Yessir this is amazing
More video on cloud security.
What is the importance of CNAPP tool in cloud security, can u just explain that
Very cool. Thanks for sharing. What are your thoughts on Palo Alto Prisma vs its many competitors like Wiz and CrowdStrike?
Great video thx
This is not my first time of being in your channel, but I have been trying to join your membership which I have not been able
Try udemy instead here: www.udemy.com/course/full-ethical-hacking-course/
Thanks
Thanks you
Maybe my question is out of video, but I need your help. Two days now, my tablet with Android 8.0 and Gboard working, has a. word suggestion enabled and b. Next word strip bar enabled in order I can see the 3 suggestion words coming. My problem is that word I type, during typing, is underlined. I remember, before these two doys that I have the problem, that I had suggestion and strip bar enabled, but typing word not underined during typing. That's how I want to make it work. Is it possible not to remember well enough and if suggestion word is on, typing word always underlined? Your answer would be precious. Thank you!
sir, put a video on send id sms spoofing
❤️❤️❤️
❤️
Pls take subtitle other language
Sifu Fen chao Hao
Noice
I'm mesmerized by this. I recently read a similar book, and I was completely mesmerized. "Mastering AWS: A Software Engineers Guide" by Nathan Vale
1st
Please i am a huge follower
i need a sifu
can you be my coach????
if i could get an email that would be nice