Top videos

Dion Training CompTIA IT Fundamentals+
35 Views ยท 4 months ago

CompTIA IT Fundamentals+ Course | Module 4 Part 7: Internet of Things (IoT) Devices

Introduction to Computer (Udemy)
35 Views ยท 4 months ago

Module 3 Part 5: โฃSoftware Testing and Emerging Trends

Introduction to Computer (Udemy)
35 Views ยท 4 months ago

Module 6 Part โฃ2: Phishing, Network Security, and Firewalls

Introduction to Computer (Udemy)
35 Views ยท 4 months ago

Module 8 Part โฃ2: Machine Learning and Blockchain

Introduction to Computer (Udemy)
35 Views ยท 4 months ago

Module 8 Part โฃ3: Internet of Things (IoT) and Quantum Computing

C# Bootcamp (Udemy)
42 Views ยท 2 years ago

Part 08 of C# .net Bootcamp: What is the .NET Platform?

In this lesson, you are going to learn about what is the .NET platform, what it's used for, and how it works.

C# Bootcamp (Udemy)
81 Views ยท 2 years ago

Part 13 of C# .NET Bootcamp: Hello World!

In this lesson you are going to learn how to create a new program... A classic Hello World application as a console application in the .NET platform using C# language.

C# Bootcamp (Udemy)
70 Views ยท 2 years ago

Part 14 of C# .NET Bootcamp: โฃHello World (Explicit)

In this lesson, you are going to learn more about your first application created in .NET platform using the C# language, but more in depth...

Dion Training CompTIA IT Fundamentals+
34 Views ยท 4 months ago

โฃโฃโฃCompTIA IT Fundamentals+ Course | Module 10 Part 6: Access Control and Permissions

The field of mathematics owes a tremendous debt to the Islamic Golden Age. Mathematicians such as Omar Khayyam (who is perhaps better known today as a poet) and al-Khwarizmi built on the work of Babylonian, Greek, and Indian mathematicians to systematize and explain algebra and symbolic algorithms. Survey this critical period of mathematics history.

Networking Fundamentals (Udemy)
173 Views ยท 2 years ago

Part 09 of Computer Networking Fundamentals: Wireless Standards

Wireless Standards

At the end of this episode, I will be able to:

  1. Compare and contrast wireless technology standards.

Learner Objective: Compare and contrast wireless technology standards.

Description: In this episode, the learner will be introduced to a variety of wireless specifications and standards.


  • Introduction to Network Infrastructure
    • Wireless networking
      • Wireless Standards
        • IEEE - Institute of Electrical and Electronics Engineers (IEEE)
          • The world's largest association of technical professionals and standards body.
          • Electrical, electronics, telecommunications, computer engineering
        • 802 - is the standards committee that develops and maintains networking
        • Wi-Fi Alliance - a non-profit organization that owns the Wi-Fi trademark. Manufacturers may use the trademark to brand products certified for Wi-Fi interoperability. standards for LANs, MAN, and their wireless counterparts WLAN, WPAN, WMAN as well as Ethernet and bridging technologies.
        • 802.11 - is the standards committee for wireless LAN RF communication standards
        • 802.11a - (1999)released along side .11b, 5 GHz frequency @54Mbps
        • 802.11b - (1999)released along side .11a, 2.4 GHz frequency @11Mbps
        • 802.11g (Wi-Fi 3)- (2003)2.4 GHz @54Mbps, supports backward compatibility with .11b devices
        • 802.11n (Wi-Fi 4) - (2009) 2.4 GHz and 5 GHz, @600Mbps, supports backward compatibility with all earlier 802.11 standards, increased channel width.
        • 802.11ac (Wi-Fi 5) - (2014) 5 GHz, @1.3 Gbps-2.3 Gbps
        • 802.11ax (Wi-Fi 6/6E) - (2021) 2.4 GHz,5 GHz and 6 GHz, @9.6 Gbps
      • Bluetooth
        • Wireless communication technology operating in the 2.4 GHz ISM band
        • Bluetooth 1.* (1999)- 732 Kbps (10m or 32.8 ft)
        • Bluetooth 2.* - (2004) (Enhanced Data Rate or EDR) 3 Mbps (10m or 32.8 ft)
        • Bluetooth 3.0 - (2009) (+ High Speed or +HS) (up to 24 Mbps over Wi-Fi) (10m or 32.8 ft) excessive power consumption
        • Bluetooth 4.* - (2010) (Bluetooth Low Energy or BLE) 1 Mbps (610m or 32.8 ft)
        • Bluetooth 5.* (2016)- 2 Mbps (10m or 32.8 ft)
      • Infrared
        • Short-range line-of-sight communication
        • Specifications are controlled by the Infrared Data Association (IrDA)
        • Standards
          • Serial IrDA (SIR) - 115.2 Kbps
          • Fast IrDA (FIR) - 4 Mbps
          • Very Fast IrDA (VFIR) - 16 Mbps

Networking Fundamentals (Udemy)
115 Views ยท 2 years ago

Part 11 of Computer Networking Fundamentals: Wireless Network Security

Wireless Network Security

At the end of this episode, I will be able to:

  1. Compare and contrast wireless security technologies.

Learner Objective: Compare and contrast wireless security technologies

Description: In this episode, the learner will explore a variety of wireless network security technologies.


  • Introduction to Network Infrastructure
    • Wireless Security
      • WEP
        • Weak or vulnerable to attack(Avoid)
        • Uses a static key
        • 64-bit or 128-bit key
        • RC4 stream cipher
        • CRC checksum
      • WPA
        • Weak or vulnerable to attack(Avoid)
        • Uses Temporal Key Integrity Protocol
        • Per-packet encryption
        • RC4 stream cipher
        • Message Integrity Check
      • WPA2
        • Stronger (Implement)
        • Uses CCMP
          • Counter Mode Cipher Block Chaining Message Authentication Code Protocol
        • Advanced Encryption Standard
        • 128-bit key
      • WPA3
        • Strongest
        • Uses SAE
        • 128-bit or 192-bit encryption
      • WPS
        • Push-button security
        • Simplifies implementing security
        • Weak or vulnerable to attack (Avoid)
        • Disable
      • Personal Mode
        • WPA/WPA2/WPA3 implementation
        • Requires no additional infrastructure
        • Uses a preshared key or PSK (think password)
      • Enterprise Mode
        • WPA/WPA2/WPA3 implementation
        • Requires additional infrastructure
        • Utilizes 802.1X port-based authencation
        • Requires a Remote Access Dial-in Server (RADIUS)
      • MAC Filtering
        • A security technique that identifies which wireless clients are allowed or denied access to the wireless network based on the client's media access control address.

Networking Fundamentals (Udemy)
196 Views ยท 2 years ago

Part 13 of Computer Networking Fundamentals: Virtual Private Networks (VPN)

Virtual Private Networks

At the end of this episode, I will be able to:

  1. Identify and describe the characteristics and importance of VPNs.

Learner Objective: Identify and describe the characteristics and importance of VPNs

Description: In this episode, the learner will be introduced to virtual private networks or VPNs as well as the importance and attributes of this technology.

  • Introduction to Network Infrastructure
    • Virtual Private Networks
      • A technology that allows for secure communications using public networks infrastructure
      • Tunneling Protocols -
        • Protocol - a set of rules for communications on a network
        • Point-to-Point Tunneling Protocol (PPTP) - the oldest VPN tunneling protocol, while still in use, should be avoided due to vulnerabilities in the encryption and authentication.
        • Layer 2 Tunneling Protocol (L2TP)- a combination of Microsoft's PPTP and Cisco's Layer 2 Forwarding (L2F), is a complex VPN protocol that is commonly coupled with IPSec for strong encryption.
        • Microsoft Point-to-Point Encryption (MPPE)- an older encryption protocol used with dial-up connections and VPN technologies. This protocol is not considered to be secure and should be avoided where security is a concern.
        • IP Security (IPSec)
      • VPN Types
        • Remote Access VPN - connects remote users to the organization's network from any location
        • Site-to-site VPN - connects two local area networks together

Dion Training CompTIA IT Fundamentals+
34 Views ยท 4 months ago

โฃโฃโฃCompTIA IT Fundamentals+ Course | Module 7 Part 2: Network Components

Take the measure of the sultan Suleiman's extraordinary vision, through which he expanded and consolidated the Ottoman Empire, engendered a bureaucratic system and a unified legislative code, and commissioned monumental architecture. Learn also of his great love for his favorite wife, Roxelana, perhaps the most influential female political figure in Ottoman history.

Dion Training CompTIA IT Fundamentals+
34 Views ยท 4 months ago

โฃโฃโฃCompTIA IT Fundamentals+ Course | Module 13 Part 9: Digital Certificates

Dion Training CompTIA IT Fundamentals+
34 Views ยท 4 months ago

CompTIA IT Fundamentals+ Course | Module 5 Part 1: โฃInternal System Components

Alvin Muslim Sardar
34 Views ยท 3 months ago

OSN-K Informatika 2024

Introduction to Computer (Udemy)
34 Views ยท 4 months ago

Module 7 Part โฃ2: File Management and Document Creation

Introduction to Computer (Udemy)
34 Views ยท 4 months ago

Module 8 Part โฃ1: Introduction to Emerging Technologies and Artificial Intelligence




Showing 6 out of 27