- 235
- 42 644
CyberMentor
India
เข้าร่วมเมื่อ 14 ก.พ. 2022
"CyberMentor" is a dynamic TH-cam channel dedicated to empowering cybersecurity enthusiasts and professionals by highlighting the evolving intersection of cybersecurity and artificial intelligence. With the demand for cybersecurity professionals with AI skills on the rise, the channel provides insightful tutorials, discussions, and resources to help viewers stay ahead in the rapidly changing tech landscape. Emphasizing that AI skills are no longer optional but essential, CyberMentor equips its audience with the knowledge and tools needed to thrive in modern cybersecurity roles. Subscribe to stay informed, enhance your skills, and future-proof your career in this exciting field.
The SECRET to Getting Ahead Without Employment
This video focuses on gaining experience without any job via Upwork/Freelancer and many other websites as explained in the video. There are 15 other sites provides this service for us, just see this video and this certainly boost your confidence for sure.
You can download the materials used in the video by clicking the link:
⬇️ mkkpro.com/d/DZIjj
👉 Join our Telegram Group: mkkpro.com/d/CyMen
🔔 Subscribe my TH-cam Channel:- 🌐mkkpro.com/d/subscribe
🌐 Checkout my personal portfolio website:- 🌐 mkkpro.com/
👊 Checkout my website for security articles/whitepapers:- 🌐 mkkpro.com/blog/
✉︎ Email me For sponsorship inquiries or 🌐 mkkpro.com/#contact
🧠 Wanna grow in CyberSecurity domain, read my best selling kindle book from Amazon: 🌐 mkkpro.com/d/dshhj
📖 Get your copy of my best-selling books in Amazon for CISSP: 🌐 mkkpro.com/d/books
🕵️♂️🏅🚀Boost your Cyber Certification Journey with My Must-Hear Podcasts! 🎙️🎧
🎓CISSP: mkkpro.com/d/CISSP
🎓CCSP : mkkpro.com/d/CCSP
🎓CISA : mkkpro.com/d/CISA
🎓CISM : mkkpro.com/d/CISM
🎓OSCP : mkkpro.com/d/OSCP
☕Buy-me-a-coffee:mkkpro.com/d/Coffee ☕
✋ Disclaimer: This video is not sponsored. There are hyperlinks in certain videos that may redirect you to a minimally priced download page in recognition of the time and effort we have invested in preparing the materials for your use.
We speak 5 Languages - Tamil, Telugu, Kannada, Hindi and English, if anyone wants to talk to us in any of the mentioned language, please join us in our Telegram Group and discuss over there. Here is the link: mkkpro.com/d/CyMen, Thank you.
நாங்கள் 5 மொழிகள் பேசுகிறோம் - தமிழ், தெலுங்கு, கன்னடம், இந்தி மற்றும் ஆங்கிலம், குறிப்பிடப்பட்ட எந்த மொழியில் எங்களுடன் பேச விரும்பினால், தயவுசெய்து எங்கள் டெலிகிராம் குழுவில் எங்களுடன் சேர்ந்து விவாதிக்கவும். இதோ லிங்க்: mkkpro.com/d/CyMen, நன்றி.
हम 5 भाषाएँ बोलते हैं - तमिल, तेलुगु, कन्नड़, हिंदी और अंग्रेजी, यदि कोई हमसे किसी भी उल्लिखित भाषा में बात करना चाहता है, तो कृपया हमारे टेलीग्राम समूह में शामिल हों और वहां चर्चा करें। यहां लिंक है: mkkpro.com/d/CyMen, धन्यवाद।
మేము 5 భాషలు మాట్లాడుతాము - తమిళం, తెలుగు, కన్నడ, హిందీ మరియు ఆంగ్లం, ఎవరైనా మాతో పేర్కొన్న ఏదైనా భాషలో మాట్లాడాలనుకుంటే, దయచేసి మా టెలిగ్రామ్ గ్రూప్లో చేరండి మరియు అక్కడ చర్చించండి. ఇక్కడ లింక్ ఉంది: mkkpro.com/d/CyMen, ధన్యవాదాలు.
ನಾವು 5 ಭಾಷೆಗಳನ್ನು ಮಾತನಾಡುತ್ತೇವೆ - ತಮಿಳು, ತೆಲುಗು, ಕನ್ನಡ, ಹಿಂದಿ ಮತ್ತು ಇಂಗ್ಲಿಷ್, ಯಾರಾದರೂ ನಮ್ಮೊಂದಿಗೆ ಉಲ್ಲೇಖಿಸಲಾದ ಯಾವುದೇ ಭಾಷೆಯಲ್ಲಿ ಮಾತನಾಡಲು ಬಯಸಿದರೆ, ದಯವಿಟ್ಟು ನಮ್ಮ ಟೆಲಿಗ್ರಾಮ್ ಗುಂಪಿನಲ್ಲಿ ನಮ್ಮನ್ನು ಸೇರಿ ಮತ್ತು ಅಲ್ಲಿ ಚರ್ಚಿಸಿ. ಲಿಂಕ್ ಇಲ್ಲಿದೆ: mkkpro.com/d/CyMen, ಧನ್ಯವಾದಗಳು.
You can download the materials used in the video by clicking the link:
⬇️ mkkpro.com/d/DZIjj
👉 Join our Telegram Group: mkkpro.com/d/CyMen
🔔 Subscribe my TH-cam Channel:- 🌐mkkpro.com/d/subscribe
🌐 Checkout my personal portfolio website:- 🌐 mkkpro.com/
👊 Checkout my website for security articles/whitepapers:- 🌐 mkkpro.com/blog/
✉︎ Email me For sponsorship inquiries or 🌐 mkkpro.com/#contact
🧠 Wanna grow in CyberSecurity domain, read my best selling kindle book from Amazon: 🌐 mkkpro.com/d/dshhj
📖 Get your copy of my best-selling books in Amazon for CISSP: 🌐 mkkpro.com/d/books
🕵️♂️🏅🚀Boost your Cyber Certification Journey with My Must-Hear Podcasts! 🎙️🎧
🎓CISSP: mkkpro.com/d/CISSP
🎓CCSP : mkkpro.com/d/CCSP
🎓CISA : mkkpro.com/d/CISA
🎓CISM : mkkpro.com/d/CISM
🎓OSCP : mkkpro.com/d/OSCP
☕Buy-me-a-coffee:mkkpro.com/d/Coffee ☕
✋ Disclaimer: This video is not sponsored. There are hyperlinks in certain videos that may redirect you to a minimally priced download page in recognition of the time and effort we have invested in preparing the materials for your use.
We speak 5 Languages - Tamil, Telugu, Kannada, Hindi and English, if anyone wants to talk to us in any of the mentioned language, please join us in our Telegram Group and discuss over there. Here is the link: mkkpro.com/d/CyMen, Thank you.
நாங்கள் 5 மொழிகள் பேசுகிறோம் - தமிழ், தெலுங்கு, கன்னடம், இந்தி மற்றும் ஆங்கிலம், குறிப்பிடப்பட்ட எந்த மொழியில் எங்களுடன் பேச விரும்பினால், தயவுசெய்து எங்கள் டெலிகிராம் குழுவில் எங்களுடன் சேர்ந்து விவாதிக்கவும். இதோ லிங்க்: mkkpro.com/d/CyMen, நன்றி.
हम 5 भाषाएँ बोलते हैं - तमिल, तेलुगु, कन्नड़, हिंदी और अंग्रेजी, यदि कोई हमसे किसी भी उल्लिखित भाषा में बात करना चाहता है, तो कृपया हमारे टेलीग्राम समूह में शामिल हों और वहां चर्चा करें। यहां लिंक है: mkkpro.com/d/CyMen, धन्यवाद।
మేము 5 భాషలు మాట్లాడుతాము - తమిళం, తెలుగు, కన్నడ, హిందీ మరియు ఆంగ్లం, ఎవరైనా మాతో పేర్కొన్న ఏదైనా భాషలో మాట్లాడాలనుకుంటే, దయచేసి మా టెలిగ్రామ్ గ్రూప్లో చేరండి మరియు అక్కడ చర్చించండి. ఇక్కడ లింక్ ఉంది: mkkpro.com/d/CyMen, ధన్యవాదాలు.
ನಾವು 5 ಭಾಷೆಗಳನ್ನು ಮಾತನಾಡುತ್ತೇವೆ - ತಮಿಳು, ತೆಲುಗು, ಕನ್ನಡ, ಹಿಂದಿ ಮತ್ತು ಇಂಗ್ಲಿಷ್, ಯಾರಾದರೂ ನಮ್ಮೊಂದಿಗೆ ಉಲ್ಲೇಖಿಸಲಾದ ಯಾವುದೇ ಭಾಷೆಯಲ್ಲಿ ಮಾತನಾಡಲು ಬಯಸಿದರೆ, ದಯವಿಟ್ಟು ನಮ್ಮ ಟೆಲಿಗ್ರಾಮ್ ಗುಂಪಿನಲ್ಲಿ ನಮ್ಮನ್ನು ಸೇರಿ ಮತ್ತು ಅಲ್ಲಿ ಚರ್ಚಿಸಿ. ಲಿಂಕ್ ಇಲ್ಲಿದೆ: mkkpro.com/d/CyMen, ಧನ್ಯವಾದಗಳು.
มุมมอง: 22
วีดีโอ
How to Optimize Your Resume & Profile for AI Filters
มุมมอง 302 ชั่วโมงที่ผ่านมา
This video focuses on Optimizing LinkedIn Profile, Building resume using ChatGPT, Modifying resume based on Job Description, Get your resume evaluation score and quality rating from ChatGPT. You can download the materials used in the video by clicking the link: ⬇️ To be uploaded 👉 Join our Telegram Group: mkkpro.com/d/CyMen 🔔 Subscribe my TH-cam Channel:- 🌐mkkpro.com/d/subscribe 🌐 Checkout my p...
The SECRET to a Successful CyberSecurity Career
มุมมอง 312 ชั่วโมงที่ผ่านมา
The video emphasizes the importance of specialization within cybersecurity. It argues that focusing on a specialization, such as penetration testing or cloud security, is more valuable than being a generalist. Specialists are highly sought after and compensated because companies value their expertise. The video suggests that becoming a go-to person in a specific area builds credibility and stre...
Top CYBERSECURITY Expert Reveals Best Career Tricks
มุมมอง 442 ชั่วโมงที่ผ่านมา
This video focuses on common pitfalls individuals face in their cybersecurity careers and provides actionable advice on how to overcome them. The speaker, drawing from 28 years of experience, addresses issues such as lack of career growth, dissatisfaction, and unsuccessful job applications, offering solutions centered around specialization, LinkedIn optimization, and leveraging AI. You can down...
You Won't Believe The CYBERSECURITY Career Tricks I Discovered
มุมมอง 494 ชั่วโมงที่ผ่านมา
CyberSecurity career - Tricks of the Trade course, designed to help individuals land jobs and advance their careers in the field. The course focuses on improving cybersecurity profiles, gaining experience, building a professional brand, and leveraging AI. The course emphasizes the importance of taking action and dedicating time to the course. The instructor MKK aims to provide actionable lesson...
Unlocking Ethical Hacking: Module 20 Part 02 Explained
มุมมอง 537 ชั่วโมงที่ผ่านมา
The video titled "Cryptography: Securing Digital Communication and Data" provides a comprehensive overview of cryptographic principles and their importance in safeguarding sensitive information. It covers essential concepts such as encryption, hashing, and digital signatures, explaining their roles in ensuring data confidentiality, integrity, authentication, and non-repudiation. The video explo...
Unlocking Ethical Hacking: Module 19 Part 03 Explained
มุมมอง 267 ชั่วโมงที่ผ่านมา
The video titled "Cloud Security: Mastering the Art of Ethical Hacking" provides an in-depth exploration of the security challenges within cloud environments. It focuses on ethical hacking techniques for assessing cloud infrastructure vulnerabilities across platforms like AWS, Azure, and Google Cloud. The video covers key essential tool AADInternals You can download the materials used in the vi...
Unlocking Ethical Hacking: Module 19 Part 02 Explained
มุมมอง 8414 ชั่วโมงที่ผ่านมา
The video titled "Cloud Security: Mastering the Art of Ethical Hacking" provides an in-depth exploration of the security challenges within cloud environments. It focuses on ethical hacking techniques for assessing cloud infrastructure vulnerabilities across platforms like AWS, Azure, and Google Cloud. The video covers key essential tools such as Trivy, S3Scanner, Lazys3, CloudBrute and CloudFox...
Unlocking Ethical Hacking: Module 18 Part 02 Explained
มุมมอง 6116 ชั่วโมงที่ผ่านมา
The video titled "IoT and OT Security: Navigating the Digital Frontier" explores the security challenges and threats associated with the Internet of Things (IoT) and Operational Technology (OT) environments. It provides an in-depth look at how interconnected devices and industrial control systems (ICS) can be vulnerable to cyberattacks due to weak configurations, outdated firmware, and inadequa...
Unlocking Ethical Hacking: Module 16 Part 03 Explained
มุมมอง 4816 ชั่วโมงที่ผ่านมา
The video titled "Wireless Network Security: Protecting the Invisible" explores the critical concepts of securing wireless networks against modern cyber threats. It covers essential wireless security protocols, including WEP, WPA, WPA2, and WPA3, highlighting their strengths and vulnerabilities. The video delves into three essential tools such as Airbase-Ng, Net Surveyor etc., ⏰ Timecodes 00:00...
Unlocking Ethical Hacking: Module 16 Part 02 Explained
มุมมอง 6519 ชั่วโมงที่ผ่านมา
The video titled "Wireless Network Security: Protecting the Invisible" explores the critical concepts of securing wireless networks against modern cyber threats. It covers essential wireless security protocols, including WEP, WPA, WPA2, and WPA3, highlighting their strengths and vulnerabilities. The video delves into three essential tools such as Sparrow-Wifi, Airodump-ng, Aircrack-ng and Wordl...
Unlocking Ethical Hacking: Module 17 Part 02 Explained
มุมมอง 82วันที่ผ่านมา
Module 14 titled "Mobile Security" delves into three essential tools such as LOIC, AndroRAT and PhoneSploit-Pro ⏰ Timecodes 00:00-Intro 00:43-lOIC tool demo 06:21-AndroRAT tool demo 17:33-PhoneSploit-Pro tool demo You can download the materials used in the video by clicking the link: ⬇️mkkpro.com/d/egEMA 👉 Join our Telegram Group: mkkpro.com/d/CyMen 🔔 Subscribe my TH-cam Channel:- 🌐mkkpro.com/d...
Unlocking Ethical Hacking: Module 14 Part 03 Explained
มุมมอง 92วันที่ผ่านมา
Module 14 titled "Hacking Web Application Security" delves into the intricacies of web application security. This module covers essential tools such as PwnXSS, Wapiti, WPScan, N-Stalker, Vega, SmartScanner ⏰ Timecodes 00:00-Introduction to Module 14 Part 03 01:36-PWNXSS Tool tutorial 07:49-WAPITI Tool tutorial 13:09-WPSCAN Tool tutorial 22:43-N-STALKER Tool tutorial 31:15-VEGA64 Tool tutorial 3...
Unlocking Ethical Hacking: Module 14 Part 02 Explained
มุมมอง 9614 วันที่ผ่านมา
Module 14 titled "Hacking Web Application Security" delves into the intricacies of web application security. This module covers essential tools such as ClickJack-POC, DirSearch and JWT_Tool demo ⏰ Timecodes 00:00-Introduction to Module 14 Part 02 01:16-ClickJack-POC 11:41-DirSearch Tool demo 19:01-JWT Tool demo You can download the materials used in the video by clicking the link for free: ⬇️ m...
Unlocking Ethical Hacking: Module 15 Part 02 Explained
มุมมอง 6314 วันที่ผ่านมา
Module 15 titled "SQL Injection," provides an in-depth exploration of SQL injection attack techniques, evasion strategies, and effective countermeasures. Participants learn to identify and exploit various types of SQL injection vulnerabilities within web applications, understand the methodologies employed in such attacks, and implement robust defenses to safeguard databases against potential th...
Unlocking Ethical Hacking: Module 13 Part 03 Explained
มุมมอง 10914 วันที่ผ่านมา
Unlocking Ethical Hacking: Module 13 Part 03 Explained
Unlocking Ethical Hacking: Module 13 Part 02 Explained
มุมมอง 6114 วันที่ผ่านมา
Unlocking Ethical Hacking: Module 13 Part 02 Explained
Unlocking Ethical Hacking: Module 12 Part 03 Explained
มุมมอง 7114 วันที่ผ่านมา
Unlocking Ethical Hacking: Module 12 Part 03 Explained
Unlocking Ethical Hacking: Module 12 Part 02 Explained
มุมมอง 10114 วันที่ผ่านมา
Unlocking Ethical Hacking: Module 12 Part 02 Explained
Unlocking Ethical Hacking: Module 11 Part 02 Explained
มุมมอง 11014 วันที่ผ่านมา
Unlocking Ethical Hacking: Module 11 Part 02 Explained
Unlocking Ethical Hacking: Module10 Part02 Explained
มุมมอง 7321 วันที่ผ่านมา
Unlocking Ethical Hacking: Module10 Part02 Explained
Unlocking Ethical Hacking: Module09 Part02 Explained
มุมมอง 6721 วันที่ผ่านมา
Unlocking Ethical Hacking: Module09 Part02 Explained
Unlocking Ethical Hacking: Module08 Part02 Explained
มุมมอง 6821 วันที่ผ่านมา
Unlocking Ethical Hacking: Module08 Part02 Explained
Unlocking Ethical Hacking: Module07 Part02 Explained
มุมมอง 16421 วันที่ผ่านมา
Unlocking Ethical Hacking: Module07 Part02 Explained
Unlocking Ethical Hacking: Module06 Part04 Explained
มุมมอง 14021 วันที่ผ่านมา
Unlocking Ethical Hacking: Module06 Part04 Explained
Unlocking Ethical Hacking: Module06 Part03 Explained
มุมมอง 22121 วันที่ผ่านมา
Unlocking Ethical Hacking: Module06 Part03 Explained
Unlocking Ethical Hacking: Module06 Part02 Explained
มุมมอง 60421 วันที่ผ่านมา
Unlocking Ethical Hacking: Module06 Part02 Explained
Unlocking Ethical Hacking: Module 20 Part 01 Explained
มุมมอง 50628 วันที่ผ่านมา
Unlocking Ethical Hacking: Module 20 Part 01 Explained
thank you guruji
Waiting
Thank you guruji
Thank you guruji
Careful what you delete! Some are on production! OMFG OMFG
You really need to master technical writing.
Specialisation, hmm. Pick two basic programing languages to master, backend and front end + something on hardware. Things I never did. Maintenance on a big ecosystem is heavy.
Thank you guruji
Thank for sharing sir
Hi sir, What is this vagrant? Do we have to know the commands which you pasted in cmd?
Not mandatory to know, but if you know you can quickly spin up any VMs in minutes
Ohh okay thanks
@@cyberskelet hello sir Im using a laptop and i dont have physical connection to the wifi router, so in this case bridge adapter mode is not working. Any idea what should I do so that the Vm's can communicate with each other and the Internet
@ Connect your Wireless NIC to your phone's hotspot and choose your Wireless NIC as your VM bridged NIC and thats it.
@@cyberskelet no sir I had done set Nat network because of some course I had done previously, and no when I removed it works Thank you so much!! Liked the module 1 part 1 excited for part 2😇
Hello sir
Hello, how can i help you?
Hello sir Can you please tell me the contents of this playlist? What all concepts are you teaching here? Also please let me know if you are teaching from very basics including practical labs. Thank you in advance!
Hey there! Sure, I’ll spill the beans. Think of this playlist as a buffet of hacking knowledge - we’ve got everything from appetizers (basic concepts) to the main course (practical labs). Just make sure to leave room for dessert!
@ Ohh Nicee. Thank you so much. One more question about practical labs, are there videos on Linux from basics? Like the commands which you will be running for pracricals?
@@arjung96 I guess you haven't watched any video or watching in a adhoc way, would suggest you to watch from beginning then you would realize what am i talking about. Part01 videos are all theories and other Parts are meant for Lab
@@cyberskelet yes sir I haven’t watched any video till now. I just wanted to confirm the contents of the video before starting because if I get to know later in the video that this playlist is not for beginners then my time would be wasted. Thanks for helping and making this playlist :)
@ Truly appreciated for your Time consciousness
wow so helpfull sir
Bro nuvvu Telugu kada
Avunu Vishnu
love u sir🤩
👏👏👏
You are doing good sir
Appreciate it!
Super sir
👌👏👏👏
👌👏👏👏
👏👏👏
It will make national news
Not getting you
I’ve been hacked by someone high up in googles IT.. will pay for help
I need help sir
which type of help you are looking for
👏 informative sir
Appreciate the feedback!
👏👏👏
Super sir 👏
👌👏👏👏
👏👏
Is this help for beginners to learn ethical hacking
If you understand the basics, of course yes
The most underrated channel on TH-cam
Absolutely, if i search this channel wise or content wise youtube algorithm won't give easily i don't know why ? So that I backup day by day i never miss this, never trust youtube
Thank you so much sir 😊
You are welcome!
awesome thank you so much
You're welcome!
Hi
Hello
❤
Hi sir what this lap do what help for hacker how it works
This is for the CEH Module 01 Lab, which you will use to practice lab exercises for your practical exam
Thank sir but so l do this in Kali Linux
👌👏👏
❤
👌👏
We speak 5 Languages - Tamil, Telugu, Kannada, Hindi and English, if anyone wants to talk to us in any of the mentioned language, please join us in our Telegram Group and discuss over there. Here is the link: mkkpro.com/d/CyMen, Thank you. நாங்கள் 5 மொழிகள் பேசுகிறோம் - தமிழ், தெலுங்கு, கன்னடம், இந்தி மற்றும் ஆங்கிலம், குறிப்பிடப்பட்ட எந்த மொழியில் எங்களுடன் பேச விரும்பினால், தயவுசெய்து எங்கள் டெலிகிராம் குழுவில் எங்களுடன் சேர்ந்து விவாதிக்கவும். இதோ லிங்க்: mkkpro.com/d/CyMen, நன்றி. हम 5 भाषाएँ बोलते हैं - तमिल, तेलुगु, कन्नड़, हिंदी और अंग्रेजी, यदि कोई हमसे किसी भी उल्लिखित भाषा में बात करना चाहता है, तो कृपया हमारे टेलीग्राम समूह में शामिल हों और वहां चर्चा करें। यहां लिंक है: mkkpro.com/d/CyMen, धन्यवाद। మేము 5 భాషలు మాట్లాడుతాము - తమిళం, తెలుగు, కన్నడ, హిందీ మరియు ఆంగ్లం, ఎవరైనా మాతో పేర్కొన్న ఏదైనా భాషలో మాట్లాడాలనుకుంటే, దయచేసి మా టెలిగ్రామ్ గ్రూప్లో చేరండి మరియు అక్కడ చర్చించండి. ఇక్కడ లింక్ ఉంది: mkkpro.com/d/CyMen, ధన్యవాదాలు. ನಾವು 5 ಭಾಷೆಗಳನ್ನು ಮಾತನಾಡುತ್ತೇವೆ - ತಮಿಳು, ತೆಲುಗು, ಕನ್ನಡ, ಹಿಂದಿ ಮತ್ತು ಇಂಗ್ಲಿಷ್, ಯಾರಾದರೂ ನಮ್ಮೊಂದಿಗೆ ಉಲ್ಲೇಖಿಸಲಾದ ಯಾವುದೇ ಭಾಷೆಯಲ್ಲಿ ಮಾತನಾಡಲು ಬಯಸಿದರೆ, ದಯವಿಟ್ಟು ನಮ್ಮ ಟೆಲಿಗ್ರಾಮ್ ಗುಂಪಿನಲ್ಲಿ ನಮ್ಮನ್ನು ಸೇರಿ ಮತ್ತು ಅಲ್ಲಿ ಚರ್ಚಿಸಿ. ಲಿಂಕ್ ಇಲ್ಲಿದೆ: mkkpro.com/d/CyMen, ಧನ್ಯವಾದಗಳು.
👏👏
👌❤
Sir please did dedicated AD and AD pentesting
Watch Module06 Part02 Onwards
Sir please did AD playlist
Watch Module06 Part02 Onwards
hello sir i am final year student of cyber security can you help me to place cyber security company !!
Join in our Telegram channel, and we will discuss there in person, here is the link: mkkpro.com/d/CyMen
part 2 or complicated practical things
Already uploaded
Thank you for this. I am trying to learn from the beginning. Is this something a beginner can follow? Appreciate all of your content!
I'm glad you found it helpful! Yes, this module is designed with beginners in mind, so you should be able to follow along easily. Happy learning!
❤❤❤❤
Sir plz reply my comments how to start cyber security course and become a become a perfect ethical hacker 😢
You've got to have strong fundamentals, learn the tools then practice, practice, practice, that's the key!
Sir, very nice explanation about AD and certain places in video was extremely good, however i have a doubt, could you please clarify? @21:28, you are saying that when DNS collapses it hop over to LLMNR, is that correct as i was struggling to understand this concept?
Good question. LLMNR is a secondary name resolution procedure in AD's eyes. Multicast is used to transmit LLMNR queries from one client computer to another client computer on the same subnet that has LLMNR enabled via a local network link on a single subnet. In situations when traditional DNS name resolution is not feasible, LLMNR offers name resolution without requiring the setup of a DNS server or DNS client. Hope you would have got my point..!!