![Sunny Classroom](/img/default-banner.jpg)
- 209
- 18 368 515
Sunny Classroom
United States
Приєднався 15 чер 2014
Hello, my name is Sunny Sun, Associate Professor of the Cybersecurity Program at the University of Saint Mary (USM), Kansas.
I have been teaching at USM many different computer courses of both Computer Information Systems and Cybersecurity: Web design (HTML, CSS, & PHP), Networking, Ethical hacking, Cryptography, Digital forensics, Database, Data structure & algorithms, and computer programming ( Java, C#, and Python). I enjoy teaching.
I hope these videos are helpful in your study or as you prepare for the national certification tests (CompTIA Network+/Security+, CCENT, or CCAP).
Thank you very much for your support by becoming a Sunny Classroom member. Your support is much appreciated. www.patreon.com/sunnyclassroom
I have been teaching at USM many different computer courses of both Computer Information Systems and Cybersecurity: Web design (HTML, CSS, & PHP), Networking, Ethical hacking, Cryptography, Digital forensics, Database, Data structure & algorithms, and computer programming ( Java, C#, and Python). I enjoy teaching.
I hope these videos are helpful in your study or as you prepare for the national certification tests (CompTIA Network+/Security+, CCENT, or CCAP).
Thank you very much for your support by becoming a Sunny Classroom member. Your support is much appreciated. www.patreon.com/sunnyclassroom
Відео
Stack and Queue
Переглядів 1,1 тис.3 місяці тому
Today, I will discuss two data structures: Stack and Queue. Stacks and queues are considered logical, conceptual, or abstract data structures because they organize and access data using specific rules. Their operations and efficiency are more about these rules than where the data is physically stored in the computer.
How your browser secure your communications over the Internet?
Переглядів 3,6 тис.6 місяців тому
Today, I will explain how your browser uses symmetric and asymmetric encryption and digital certificates to protect your online conversations behind the scenes.
A Brief History of the WEB
Переглядів 1,8 тис.7 місяців тому
Today I will talk about the brief evolution history of the World Wide Web. The Web is a system of interconnected pages and resources that can be accessed through the Internet. The Web has undergone different development stages, often called Web 1.0, Web 2.0, and Web 3.0. Each stage represents a significant change in how users interact with the Web and the technologies used.
A brief history of Computer Storage Media
Переглядів 1,6 тис.8 місяців тому
Today, my topic is a brief history of computer storage technology. Please support my channel by becoming a member at patreon.com/sunnyclassroom. Playlists: Routing and Switching ua-cam.com/play/PLSNNzog5eydtmcbcbc1b8pVRkgre3vNUy.html IPv4 Basics IPv4 Basics ua-cam.com/video/vcArZIAmnYQ/v-deo.html Cyber Attacks and Defense ua-cam.com/video/LXd2uP1qKDE/v-deo.html Basic Cryptography ua-cam.com/vid...
ARP poisoning and Port mirroring attacks
Переглядів 7 тис.11 місяців тому
Please support my channel by becoming a member at patreon.com/sunnyclassroom. Today I will talk about two more network switch attacks: ARP poisoning and Port mirroring attack. Playlists: Routing and Switching ua-cam.com/play/PLSNNzog5eydtmcbcbc1b8pVRkgre3vNUy.html IPv4 Basics IPv4 Basics ua-cam.com/video/vcArZIAmnYQ/v-deo.html Cyber Attacks and Defense ua-cam.com/video/LXd2uP1qKDE/v-deo.html Ba...
Switch attacks: MAC Flooding and MAC Spoofing
Переглядів 8 тис.11 місяців тому
Please support my channel by becoming a member at patreon.com/sunnyclassroom. Today I will talk about two common attacks on the network switch: MAC flooding attack and MAC spoofing attack. Playlists: Routing and Switching ua-cam.com/play/PLSNNzog5eydtmcbcbc1b8pVRkgre3vNUy.html IPv4 Basics IPv4 Basics ua-cam.com/video/vcArZIAmnYQ/v-deo.html Cyber Attacks and Defense ua-cam.com/video/LXd2uP1qKDE/...
Network Devices to Protect your Intranet
Переглядів 4 тис.Рік тому
An intranet is a private network which is heavily protected by many different networking devices, such as router, firewall, proxy server, DMZ, honeynet, IPS and IDS. This diagram is an overly-simplified version of the reality. I try to put these devices together in a reasonable order, only for teaching and learning purpose.
Malware 2: Rootkit, keylogger, logic bomb, adware, & botnet
Переглядів 3,3 тис.Рік тому
Please support my channel by becoming a member at patreon.com/sunnyclassroom. Malware is any type of software program designed to harm or exploit computer systems or a device. Malware can take many forms, including viruses, ransomware, spyware, and other types of malicious software. Today I will talk about five more types of malware: rootkits, keyloggers, logic bombs, adware, and botnets. Playl...
Malware: virus, worm, Trojan horse, spyware, & ransomware
Переглядів 6 тис.Рік тому
Please support my channel by becoming a member at patreon.com/sunnyclassroom. Malware is any type of software program designed to harm or exploit computer systems or a device. Malware can take many forms, including viruses, ransomware, spyware, and other types of malicious software. Today I will talk about five types of malware: virus, worm, trojan horse, spyware, and ransomware. Playlists: Rou...
How does cellular network work?
Переглядів 13 тис.Рік тому
Today my topic is cellular networks and their key components. We will explore how these components collaborate to provide cellular services. Please support my channel by becoming a member at patreon.com/sunnyclassroom. Today my topic is about celluar networks: several key components of cellular networks and how they work together to deliver celluar services. Playlists: Remote Access/WAN technol...
How does SNMP work?
Переглядів 11 тис.Рік тому
Please support my channel by becoming a member at patreon.com/sunnyclassroom. Today my topic is SNMP - Simple Network Management Protocol, a widely used protocol in networking and is supported by a large number of devices. The topic will include the definition of SNMP, SNMP system components, and how does SNMP work? Playlists: Routing and Switching ua-cam.com/play/PLSNNzog5eydtmcbcbc1b8pVRkgre3...
General switch vs managed switch
Переглядів 6 тис.Рік тому
Please support my channel by becoming a member at patreon.com/sunnyclassroom. A switch is a network device that connects other devices on a computer network and forwards data between those devices. There are several different options available when it comes to the functions of a switch. Today I will talk about two types of switches: the general switch and the managed switch in terms of manageme...
Summary of six dynamic routing protocols
Переглядів 4,5 тис.Рік тому
Please support my channel by becoming a member at patreon.com/sunnyclassroom. Today I will summarize six different dynamic routing protocols I have covered so far. Playlists: Routing and Switching ua-cam.com/play/PLSNNzog5eydtmcbcbc1b8pVRkgre3vNUy.html IPv4 Basics IPv4 Basics ua-cam.com/video/vcArZIAmnYQ/v-deo.html Cyber Attacks and Defense ua-cam.com/video/LXd2uP1qKDE/v-deo.html Basic Cryptogr...
Distance-vector vs link-state and a hybrid EIGRP
Переглядів 9 тис.Рік тому
Please support my channel by becoming a member at patreon.com/sunnyclassroom. In today’s lesson, I will talk about 1) the main differences between distance-vector routing and link-state routing algorithm; 2) EIGRP - Enhanced Interior Gateway Routing Protocol, a hybrid type routing protocol of both distance-vector and link state. Playlists: Routing and Switching ua-cam.com/play/PLSNNzog5eydtmcbc...
Link state routing protocols: IS to IS and OSPF
Переглядів 15 тис.Рік тому
Link state routing protocols: IS to IS and OSPF
Distance vector routing protocols: RIP and IGRP
Переглядів 12 тис.Рік тому
Distance vector routing protocols: RIP and IGRP
static vs dynamic routing & routing metrics
Переглядів 9 тис.Рік тому
static vs dynamic routing & routing metrics
AS : Interior and border routers, Border Gateway Protocol
Переглядів 14 тис.Рік тому
AS : Interior and border routers, Border Gateway Protocol
Routers, functions, interfaces and ports
Переглядів 8 тис.Рік тому
Routers, functions, interfaces and ports
SMS phishing attacks and how to prevent them
Переглядів 5 тис.Рік тому
SMS phishing attacks and how to prevent them
Data Storage Types: File, Block, & Object
Переглядів 31 тис.Рік тому
Data Storage Types: File, Block, & Object
The ElGamal Algorithm: a simple example
Переглядів 9 тис.Рік тому
The ElGamal Algorithm: a simple example
How to test if g is a primitive root of a prime number p?
Переглядів 3 тис.Рік тому
How to test if g is a primitive root of a prime number p?
doesn't this only solve for /24?
Hi Sir, what if subnet is less than 24
Awesome explanation. I have a question though. Is there another Sunny Table in case we need more than 256 hosts?
Thanks for connecvting tagging to Trunking!
Thank you
SO FUN!
watching this in 2024. thanks a lot this is very simple and concise!
Just want to say that you're my go-to guy when I need some tech explanation. You make it very easy to understand! A BIGH MAHALO to you Sunny!
Good explanation.
Excellent explanation sir.... Thank you so much ❤❤❤❤
Great job! It was so easy to understand.
thank you Sir
Loving your video
Thank you
Sorry if this is a blonde question but in the real world - who choses what your original ID is? A lot of the case studies I see in textbooks start with "you've been given this network ID with this mask, generate n number of subnets." What I don't understand about all of this is, how does this original network ID get generated for a business or organisation, and how does it get passed down for you to work on? Second question - it looks like there is not a fixed limit for the number of hosts and subnets. The table in the last video stopped at 256, this one stops at 65536. Are there realworld practical limitations on the number of devices a business can include in a subnet? Thank you so much for your videos - you are my first ever UA-cam subscribe because they are wonderful.
Mr. Sunny, I’ve just made practical CCNA exam only because of you. Many thanks from the Czech Republic! 🙏
You can always count on Sunny to have your back!
This looks cool for class C IP address. Why is no one asking what happens when it's a class A or B IP address!!
This is by far the simplest most intuitive subnetting approach on youtube! Thank you sir!
Thank you Sunny! It takes great intelligence to teach subnetting so clearly and simply.😊
Much Appreciation. I had 3 hours lecture on it but clearly understood from your video.
It would be great if these graphs more clearly indicated what domain they are in!
Can someone explain to me please, why we divide 16,384 by 256, not to some other number? 6.57min on the video.
hallo.
"A diligent student needs no master"
Excellent video
hey please show me how to find valid subnet and valid host
Why is the subnet /27 instead of /24?
got my exam in 2 hours, well hope this covers it, if it's asking /16 address i hope I know what to do
Simple and straight to the point, thank you!
If my router did a PAT from port 80 to 8000, how does the other router know that I'm requesting a port 80(web) instead of 8000? Thank you.
Sunny, great video.
What is fin
So comprehensive yet so simply put! Your explanation is clear and understandable. Cheers!
Very crisp and concise explanation.
love u sunnny great job
sunny sir thank you soo much you are the best!
Muito bom!
People in my System Management course cried over how our teacher explained it, we were so confused. This is so much easier!
Thank you, sir. The video was really helpful. I understand it properly.❤
thank you sir
WHere I can get this slides
In my humble opinion, you are the best on this topic on UA-cam.
Thank you very much Sir 👌👏
GÜZEL
the power of experiences
perfect !
Hi Sunny great video as always! In the example we are told the network ID range is 172.30.232.0/24. You explained in this video that we use one subnetting table or the other depending on the subnet mask (e.g. /16 subnetting not the same as /24 subnetting). But how is it determined that a /24 mask is used for the network ID range? Why not 172.30.232.0/16 or 172.30.232.0/8? Also I was read in an article that, for subnetting, it is possible to borrow one bit from the network in case you need more subnets than the ones one can make with the given subnet. How is this done? Is there any limitation to this? Thank you in advance.
what a marvelous explanation!!!! Thank you so much
You are my life saver. Keep it up with the good work.