Cybersecurity Guy

@cybersecurityguy - 376 本の動画

チャンネル登録者数 2410人

Hi everyone, here we try to give you the best cyber security, quantum mechanics and networking videos. So, enjoy, and share the content we upload to our YouT...

最近の動画

Chaos Theory: The Butterfly Effect Unleashed 4:02

Chaos Theory: The Butterfly Effect Unleashed

What is Kubernetes? | Kubernetes 5:35

What is Kubernetes? | Kubernetes

What is Privilege Escalation | Privilege Escalation 4:05

What is Privilege Escalation | Privilege Escalation

Memory Resident Malware 5:10

Memory Resident Malware

Everything about HTTP in 8 Minutes 8:18

Everything about HTTP in 8 Minutes

What is Defense in Depth? | Defense In Depth #cybersecurity 2:12

What is Defense in Depth? | Defense In Depth #cybersecurity

Top 5 Ways to Protect Your Network from Cyber Attacks #cybersecurity 2:25

Top 5 Ways to Protect Your Network from Cyber Attacks #cybersecurity

Apple Will Pay $1,000,000 For This Bug 😳 #shorts #cybersecurity 1:00

Apple Will Pay $1,000,000 For This Bug 😳 #shorts #cybersecurity

Superconductivity: The Zero-Resistance Revolution 4:34

Superconductivity: The Zero-Resistance Revolution

How Cellular Networks Works? 3:29

How Cellular Networks Works?

The Bit That Changed the World: Shannon’s Information Theory 3:17

The Bit That Changed the World: Shannon’s Information Theory

Microsoft’s Majorana 1 Quantum Chip – Hype or Breakthrough? 2:35

Microsoft’s Majorana 1 Quantum Chip – Hype or Breakthrough?

The Future of Graphical User Interfaces #gui #shorts 2:38

The Future of Graphical User Interfaces #gui #shorts

Microsoft’s Majorana 1 Quantum Chip – Hype or Breakthrough? 2:35

Microsoft’s Majorana 1 Quantum Chip – Hype or Breakthrough?

Laser #short #shorts #physics 2:21

Laser #short #shorts #physics

The Future of Graphical User Interfaces | Graphical User Interface #gui 2:38

The Future of Graphical User Interfaces | Graphical User Interface #gui

How lasers work: Demystifying the science 3:55

How lasers work: Demystifying the science

Threat Modeling 2:04

Threat Modeling

Understanding hacking #shorts  #cybersecurity 1:53

Understanding hacking #shorts #cybersecurity

Digital Arrest Scam #digitalarrest #digitalarrest 2:38

Digital Arrest Scam #digitalarrest #digitalarrest

Digital Arrest Scam Explained 2:38

Digital Arrest Scam Explained

Understanding Hacking: Methods, and Protection 1:53

Understanding Hacking: Methods, and Protection

Top 5 Cybersecurity Trends in 2024 3:28

Top 5 Cybersecurity Trends in 2024

History of ENIAC | ENIAC 3:19

History of ENIAC | ENIAC

Y2K Bug | Millennium Bug 3:06

Y2K Bug | Millennium Bug

Virtual Machines 2:38

Virtual Machines

What is BGP? | Border Gateway Protocol 2:54

What is BGP? | Border Gateway Protocol

Photoelectric Effect Explained 2:42

Photoelectric Effect Explained

Top 5 Cybersecurity headlines of 2023 2:54

Top 5 Cybersecurity headlines of 2023

Types of Computer Network | Computer Networks 2:50

Types of Computer Network | Computer Networks

Introduction to Image and Image processing | Image Processing 4:51

Introduction to Image and Image processing | Image Processing

Failures of Classical Mechanics | Classical Mechanics 2:43

Failures of Classical Mechanics | Classical Mechanics

What is Data Warehouse |  Why do we need data warehouse? 2:20

What is Data Warehouse | Why do we need data warehouse?

Latest Apple Security Update #short 1:01

Latest Apple Security Update #short

What is NFC? |  NFC Explained 2:34

What is NFC? | NFC Explained

IP Address Explained 3:31

IP Address Explained

Default Gateway Explained 1:38

Default Gateway Explained

Theory of Everything #physics #toe #alberteinstein 2:40

Theory of Everything #physics #toe #alberteinstein

What is Cyber KIll Chain? #cybersecurity #tech 2:03

What is Cyber KIll Chain? #cybersecurity #tech

VLAN Hopping #shorts 0:58

VLAN Hopping #shorts

Dynamic ARP Inspection #shorts #cybersecurity 1:00

Dynamic ARP Inspection #shorts #cybersecurity

GUI #shorts #gui 0:49

GUI #shorts #gui

NGFW #shorts #cybersecurity #tech 1:00

NGFW #shorts #cybersecurity #tech

Sanboxing in web browsers #shorts #cybersecurity 0:58

Sanboxing in web browsers #shorts #cybersecurity

Cloud Security and its key aspects #cybersecurity #cloudsecurity #cloud 2:08

Cloud Security and its key aspects #cybersecurity #cloudsecurity #cloud

Zero day vulnerabilities #shorts #cybersecurity #tech 0:58

Zero day vulnerabilities #shorts #cybersecurity #tech

What is IPS? #shorts #cybersecurity #tech #ips 1:00

What is IPS? #shorts #cybersecurity #tech #ips

Firewall #shorts #cybersecurity #technology 0:58

Firewall #shorts #cybersecurity #technology

The Noether's Theorem #shorts #physics #physics 0:54

The Noether's Theorem #shorts #physics #physics

How SSL works #shorts #cybersecurity 0:53

How SSL works #shorts #cybersecurity

Internet fact #shorts #internet 0:50

Internet fact #shorts #internet

The history of Email #shorts 1:00

The history of Email #shorts

National Cybersecurity Strategy #cybersecurity #shorts #security 1:00

National Cybersecurity Strategy #cybersecurity #shorts #security

Ping in network #shortvideo #shorts 0:59

Ping in network #shortvideo #shorts

Quantum computers and classical computers #shortvideo #shorts 0:46

Quantum computers and classical computers #shortvideo #shorts

Weak and Hardcoded Passwords #shortvideo #cybersecurity #shorts 0:56

Weak and Hardcoded Passwords #shortvideo #cybersecurity #shorts

Root kits #shortvideo #cybersecurity 1:00

Root kits #shortvideo #cybersecurity

Software Updates and its impacts #shortvideo #shorts 1:00

Software Updates and its impacts #shortvideo #shorts

NAS and NFS #shortvideo #shorts #networking 1:00

NAS and NFS #shortvideo #shorts #networking

Electron wave particle duality #shortvideo #physics #shorts 0:58

Electron wave particle duality #shortvideo #physics #shorts

SSH #shortvideo #shorts 0:59

SSH #shortvideo #shorts

Server Side Template Injection #shortvideo #shorts 0:59

Server Side Template Injection #shortvideo #shorts

Ad-ware #shortvideo #cybersecurity #computerscience #shorts #networking #computers 1:00

Ad-ware #shortvideo #cybersecurity #computerscience #shorts #networking #computers

Command Injection #shortvideo #cybersecurity #shorts 1:00

Command Injection #shortvideo #cybersecurity #shorts

Flame Malware #shortvideo #shorts 1:00

Flame Malware #shortvideo #shorts

The Holographic Principle #physics #shorts 1:00

The Holographic Principle #physics #shorts

Time Travel #shortvideo #shorts 1:00

Time Travel #shortvideo #shorts

Domain Name System #shortvideo #shorts 1:00

Domain Name System #shortvideo #shorts

REST #shorts #shortvideo 0:59

REST #shorts #shortvideo

SOAP #shortvideo #shorts 1:00

SOAP #shortvideo #shorts

Ping #shortvideo #networking 0:49

Ping #shortvideo #networking

Metaverse #shorts #shortvideo 0:54

Metaverse #shorts #shortvideo

Cyber resilience #shorts #shortvideo 0:52

Cyber resilience #shorts #shortvideo

Smurf Attack #shorts #shortvideo 0:52

Smurf Attack #shorts #shortvideo

WAN Architecture #shorts #shortvideo 1:00

WAN Architecture #shorts #shortvideo

Yang Mills theory #shorts #physics 0:53

Yang Mills theory #shorts #physics

Dynamic file analysis #shorts #cybersecurity 1:00

Dynamic file analysis #shorts #cybersecurity

Exfiltration techniques #shortvideo #cybersecurity 1:00

Exfiltration techniques #shortvideo #cybersecurity

Network Analysis 2:40

Network Analysis

Indicators of Compromise #shorts #cybersecurity 1:00

Indicators of Compromise #shorts #cybersecurity

HTTP errors #shorts #shortvideo 1:00

HTTP errors #shorts #shortvideo

Mathematics in Crytography #shorts #shortvideo 0:58

Mathematics in Crytography #shorts #shortvideo

HTTP Methods #shortvideo #shorts 0:59

HTTP Methods #shortvideo #shorts

RCE in Samsung Exynos modems #shortvideo #cybersecurity 0:50

RCE in Samsung Exynos modems #shortvideo #cybersecurity

Parallel Universe 0:58

Parallel Universe

Network security audit #shorts #shortvideo 1:00

Network security audit #shorts #shortvideo

Trojans #shorts #cybersecurity 1:00

Trojans #shorts #cybersecurity

Secure Copy Protocol #shorts #shortvideo 0:56

Secure Copy Protocol #shorts #shortvideo

Public Key Infrastructure #shortvideo #shorts 1:00

Public Key Infrastructure #shortvideo #shorts

Network Segmentation #shorts #shortvideo 0:51

Network Segmentation #shorts #shortvideo

Compromised Credentials #shorts #cybersecurity 0:58

Compromised Credentials #shorts #cybersecurity

Retrospective Security #shorts #cybersecurity 0:59

Retrospective Security #shorts #cybersecurity

BYOD security risks #shorts #cybersecurity 1:00

BYOD security risks #shorts #cybersecurity

Security Operation Centre #shorts 1:00

Security Operation Centre #shorts

Blacklist in cybersecurity #shorts #cybersecurity 0:47

Blacklist in cybersecurity #shorts #cybersecurity

Cloud Service Model #shorts #cloudcomputing 1:00

Cloud Service Model #shorts #cloudcomputing

Insecure API #shorts 0:59

Insecure API #shorts

Photon Sphere #shorts #physics 1:00

Photon Sphere #shorts #physics

Gateway Load Balancing Protocol #shorts 0:59

Gateway Load Balancing Protocol #shorts

HSRP states #shorts 0:55

HSRP states #shorts

動画

Chaos Theory: The Butterfly Effect Unleashed 4:02

Chaos Theory: The Butterfly Effect Unleashed

19 回視聴 - 2 日前

What is Kubernetes? | Kubernetes 5:35

What is Kubernetes? | Kubernetes

42 回視聴 - 1 か月前

What is Privilege Escalation | Privilege Escalation 4:05

What is Privilege Escalation | Privilege Escalation

512 回視聴 - 1 か月前

Memory Resident Malware 5:10

Memory Resident Malware

109 回視聴 - 1 か月前

Everything about HTTP in 8 Minutes 8:18

Everything about HTTP in 8 Minutes

125 回視聴 - 1 か月前

What is Defense in Depth? | Defense In Depth #cybersecurity 2:12

What is Defense in Depth? | Defense In Depth #cybersecurity

92 回視聴 - 2 か月前

Top 5 Ways to Protect Your Network from Cyber Attacks #cybersecurity 2:25

Top 5 Ways to Protect Your Network from Cyber Attacks #cybersecurity

127 回視聴 - 2 か月前

Superconductivity: The Zero-Resistance Revolution 4:34

Superconductivity: The Zero-Resistance Revolution

339 回視聴 - 2 か月前

How Cellular Networks Works? 3:29

How Cellular Networks Works?

310 回視聴 - 2 か月前

The Bit That Changed the World: Shannon’s Information Theory 3:17

The Bit That Changed the World: Shannon’s Information Theory

200 回視聴 - 2 か月前

Microsoft’s Majorana 1 Quantum Chip – Hype or Breakthrough? 2:35

Microsoft’s Majorana 1 Quantum Chip – Hype or Breakthrough?

901 回視聴 - 2 か月前

The Future of Graphical User Interfaces | Graphical User Interface #gui 2:38

The Future of Graphical User Interfaces | Graphical User Interface #gui

182 回視聴 - 2 か月前