Channel Avatar

Jama about Tech @UCauG1J7hfzVbx3FXALloE9Q@youtube.com

0 subscribers - no pronouns :c

Hey, I’m Jamila, an ex-MBA turned IT engineer and tech educa


32:38
Firewall Basics: Simple Overview
13:44
Why QUIC is the Future of Internet Communication?
16:30
What is CORS? Quick and Easy Breakdown
14:40
Server Name Indication (SNI): Everything You Need to Know
20:45
Web API Explained Like You're 5
13:15
TCP vs. UDP: Pros, Cons, and Use Cases
22:45
TLS/SSL Handshake Explained Like You're 5
28:41
HTTP Crash Course from basics to advanced - Part 2
26:21
HTTP Crash Course from basics to advanced - Part 1
11:01
AI vs. ML: The Real Difference Explained
27:17
OSI Model Explained: in-depth look into 7 layers
11:04
Top AI Certifications Explained [2024]
07:20
URI vs. URL vs. URN: Clearing the Confusion
11:48
Securing DNS - DNS Deep Dive Part 4
11:40
6 most common DNS attacks - DNS Deep Dive Part 3
21:45
DNS Deep Dive - Part 2
16:39
DNS Explained: From Basics to Advanced | Part 1
07:16
Entry-level Cisco certifications explained
11:48
Top 5 Networking Certifications Explained
35:21
Well-Architected Framework - AWS Cloud Practitioner (CLF-C02) - 1.2
10:29
5 Vinted Scams You Shouldn't Fall For
05:05
Coder vs. Develover vs. Programmer: Tech Trinity Explained
11:52
Top 5 Project Management Certs Explained
15:16
Value Proposition of AWS Cloud - AWS Cloud Practitioner (CLF-C02) - 1.1
06:39
Top 5 Dev Certifications Explained
11:56
Traditional IT - AWS Cloud Practitioner (CLF-C02) - Domain 1
05:36
Exam Information - AWS Cloud Practitioner (CLF-C02)
11:16
Is a Computer Science Degree Worth It? Pros and Cons
16:00
5 Ways to Spot Facebook Marketplace Fraudsters
10:23
Microservices vs. Monolith: explaining like you're 5
11:40
How to pass CompTIA A+ on your first attempt [2023]
08:22
Chronicles of Spear and Whale Phishing Attacks
11:17
5 Essential Cyber Security Certifications to Safeguard Your Future
08:31
Zero-Day Vulnerabilities Exposed: Who is at Risk?
09:49
Cracking the Code: Understanding Phishing Attacks
14:48
How Social Engineering Can Manipulate Your Mind
14:52
Entry-level IT positions | Help-desk | Tech Support | IT Technician
06:22
Brute Force and Dictionary attacks EXPLAINED | #CyberSeries
05:53
Credential Stuffing attack EXPLAINED | #CyberSeries
04:29
Account takeover attack EXPLAINED | #CyberSeries
09:01
RED HAT Certified Engineer certification explained | Red Hat Credential
10:01
3 FACTS about Cloud Engineer | What do cloud engineers do?
17:58
Docker images EXPLAINED | Hands-on on Docker Images
11:42
Kubernetes Certifications EXPLAINED | Certified Kubernetes Administrator CKA | CKAD | CKSS
05:48
DOCKER installation on MacOS | Docker Desktop | Docker Registry
10:28
5 FACTs about KUBERNETES | Kubernetes explained | #kubernetesseries
08:59
RED HAT Certified System Administrator certification explained | Red Hat Credential
11:59
5 FACTS about DOCKER | DOCKER explained
13:58
AWS Certification Paths EXPLAINED
03:10
Unpacking my CompTIA Linux+ Certification Kit
12:34
Introduction to Red Hat certifications | Most Popular Red Hat certifications | Is it worth it?
10:55
3 KEY DIFFERENCES between Linux and RedHat | Linux vs. RedHat | RedHat Certifications
19:43
AWS SPECIALTY certifications explained | AWS Data Analytics, Database, Machine Learning, Security
15:15
AWS PROFESSIONAL certifications explained | AWS Solutions Architect vs. DevOps Engineer
16:38
AWS ASSOCIATE certifications explained | AWS Solutions Architect vs. SysOps Admin
23:18
I PASSED Linux+ // Exam tips and information
20:14
5 MISTAKES I made in my ComTIA Preparations (A+, Network+, Security+)
14:57
How I started an online degree in Computer Science and Cyber Security - pros and cons
08:25
MAC Address explained | MAC vs IP | #ITseries
15:01
Why you should NOT use brain DUMPS to prepare for CompTIA exams