Channel Avatar

Cybersecurity Guy @UCcE9VVuuJP1tCmbCiWoo3sQ@youtube.com

2.1K subscribers - no pronouns :c

Hi everyone, here we try to give you the best cyber security


03:28
Top 5 Cybersecurity Trends in 2024
03:19
History of ENIAC | ENIAC
03:06
Y2K Bug | Millennium Bug
02:38
Virtual Machines
02:54
What is BGP? | Border Gateway Protocol
02:42
Photoelectric Effect Explained
02:54
Top 5 Cybersecurity headlines of 2023
02:50
Types of Computer Network | Computer Networks
04:51
Introduction to Image and Image processing | Image Processing
02:43
Failures of Classical Mechanics | Classical Mechanics
02:20
What is Data Warehouse | Why do we need data warehouse?
02:34
What is NFC? | NFC Explained
03:31
IP Address Explained
01:38
Default Gateway Explained
02:40
Theory of Everything #physics #toe #alberteinstein
02:03
What is Cyber KIll Chain? #cybersecurity #tech
02:08
Cloud Security and its key aspects #cybersecurity #cloudsecurity #cloud
02:40
Network Analysis
01:25
Capabilities and function of TFTP and FTP #shorts #shortvideo
03:32
Top 5 Networking Protocols that we use everyday | Network Protocols
02:34
Processes in Operating System | Operating System
03:06
What is Remote Access Trojan | RAT
02:42
What is Internet of Things | IOT
02:47
Secure Software Development Life Cycle | SSDLC #sdlc
02:37
How Uber got hacked!!
03:52
Parallel Computing and its types | Parallel Computers #computerscience
01:47
Bitcoin ATM Heist | Cryptocurrency heist | Zero Day
01:43
Crypto scam | Cryptocurrency scam in United States
02:15
35 Malware apps on Android Phones report 🔥 🔥🔥
02:51
Security attacks in cryptography
02:20
India's technological progress history | India@75
03:28
Access Control List | ACL | CCNA
03:31
AI In cybersecurity | Cybersecurity #cybersecurity
04:00
A brief history of Hacking | Hackers #hacking
03:05
5 ways you should know to protect your business from phishing in 2022 | #Phishing
03:11
Networking protocols and its types | CCNA
03:04
Top 5 Facts about Black Holes | Black Holes
03:32
What is a Data Center? Simply Explained
02:33
API Security Testing Methodologies
04:10
What is NFT? Simply Explained 🔥 🔥 🔥
01:01
Digital Security
04:58
Top 5 Common web security vulnerabilities | Security Vulnerabilities.
04:11
Bangladesh Bank Heist | Biggest cyber heist ever
02:50
Top 5 tips to protect phone | Mobile security
02:36
What is blockchain | Simply explained.
03:20
What is Web 3.0 | How web 3.0 works?
04:49
Critical Infrastructure security | National Security
03:07
What is General Data Protection Regulation | GDPR
02:53
5G explained | 5G technology
05:47
Top 5 physics mysteries | Physics mysteries
03:04
What is Spyware? | Pegasus Spyware.
04:18
Power over Ethernet | PoE explained
02:35
NIC | Network Interface Card
04:10
What is network security | Network security
04:19
Top 5 trends of computer science in 2022 | Computer science
02:58
What is cloud security | Cloud security #cybersecurity
04:34
Top 4 software development methodologies | #agile
01:41
Quantum Repeater | Quantum Mechanics #internet
05:48
What is Radiation? | Radiation
03:18
WebSocket| What is WebSocket #cybersecurity