Cybersecurity | Cloud | DevelopmentCreate an ASP.Net Web API using ASP.Net Core and Visual Studio 2017 August 23, 2024 video API ControllerASP.NET CoreCRUDdatabase contextHTTP GETKaushik Roy Chowdhuryroutingto-do itemsURL PathsVisual Studio 2017Web API
Cybersecurity | Cloud | DevelopmentHow to configure Quick Book for Supporting Multi-User Access March 2, 2024 video accessbuntha chhaycambodia comptuer networkcambodia lectureCambodia universitychapter1computer network teaching in khmerComputer NetworksConfiguredata communicationshosting mumti-user accesshowintroductionintroductions to data communicationskhmer itkhmer it lessonkhmer lecturekhmer lessonkhmer teachingLabmulti-user accessnetworkquickbookquickbook serverrouterroutingspeak khmersub-interfaceswitchteaching in khmervlan
Cybersecurity | Cloud | DevelopmentInstall and Configure Web Server and DNS Server on Windows server 2012 R2 May 17, 2023 video buntha chhaycambodia comptuer networkcambodia lectureCambodia universitycomputer network teaching in khmerComputer NetworksConfiguredata communicationsdns serverhowintroductionintroductions to data communicationskhmer itkhmer it lessonkhmer lecturekhmer lessonkhmer teachingLabnetworkPractic Exercise on DNS and Webrouterroutingspeak khmersub-interfaceswitchteaching in khmertracertrunkvlanWeweb serverwindows server 2012 r2
Cybersecurity | Cloud | DevelopmentION Toronto – Panel: Improving The Resilience And Security Of The Internet's Routing May 5, 2023 video Computer Security (Industry)internetInternet securityInternet SocietyIONConfIONToronto2013ISOCroutingrouting security
Cybersecurity | Cloud | DevelopmentWHAT IS A CIDR IN AWS? | VPC PART 2 | Visual Explanations January 26, 2023 video Amazon Web ServicesAWSaws subnetting tutorialCIDRcidr blockcidr block in awscidr calculationscidr notationcidr notation explainedcidr subnet bitscidr subnetting tutorialclassless inter-domain routingclassless ip addressing exampleIP AddressnetworkingPythoholicpythoholic awsRoadToAWSroutingsaa-c02subnetsubnet cidr chartsubnet masksubnettingsubnetting tutorialVirtual Private Cloudvirtual private cloud awsvpc cidr blockwhat is cidr
Cybersecurity | Cloud | DevelopmentEthical Hacking Episode 2: Top 10 things Cybersecurity #Cybersecurity #security #infosec #ceh December 29, 2022 video blueteamcehcomptiaComputer sciencecomputingcyber securitycyber security trainingCybersecurityCyberSecurity 101cybersecurity 2021cybersecurity careerscybersecurity for beginnersEC-councileccouncilethical hackingethical hacking 101ethicalhackingethicalhacking for beginnersfirewallsInfosecIoTitIT skillslet's talk cyber securitynetworkingnew to cybersecurityRaspberry piredteamroutingSecuritysmartphonesswitchingtechwireless
Cybersecurity | Cloud | DevelopmentSvelte SPA routing: Routify tutorial June 16, 2022 video Ajaxhtmlhtml5javascriptnodejsReactJSrolluproutingsapperSPAsveltesveltejswebweb developmentwebpack
Cybersecurity | Cloud | DevelopmentION Krakow – Routing Around Catastrophe July 27, 2021 video internetInternet securityInternet SocietyISOCKraków (City/Town/Village)networkingroutingSecurityTechnology
Cybersecurity | Cloud | DevelopmentCreate OU User and Group Map Drive in Domain Controller in Windows Server 2012 R2 February 2, 2021 video accessbuntha chhaycambodia comptuer networkcambodia lectureCambodia universitychapter1computer network teaching in khmerComputer NetworksConfigurecreate OUdata communicationsFile Server on Windows server 2012R2Groupshowintroductionintroductions to data communicationskhmer itkhmer it lessonkhmer lecturekhmer lessonkhmer teachingLabnetworkpacketpermissionroutingspeak khmersub-interfaceteaching in khmertracertrunkUsersvlan
Cybersecurity | Cloud | DevelopmentUsing Pod Security Policies to harden your Kubernetes cluster December 16, 2020 video 2019alertingArchitectureautomatebountybugcertificatecloudclusterdefenseDevopsDevSecOpsDistributedElixirencryptionengineeringfeedbackfunctionalhasgeekKafkakeykuberneteslogmaliciousmanagementmanagermonitoringmultinetworkOLAPOLTPOnionOpenopenscapOSINTpodpolarDBPolicyprogrammingpythonreliabilityremoterootconfroutingSecurityServersourceSRESSHstreamsSystemtenantTortrafficusabilityUserVitessWireshark