Network Engineering

Network Engineering

Hussein Nasser via YouTube Direct link

The OSI Model - Explained by Example

1 of 51

1 of 51

The OSI Model - Explained by Example

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Network Engineering

Automatically move to the next video in the Classroom when playback concludes

  1. 1 The OSI Model - Explained by Example
  2. 2 TCP vs UDP Crash Course
  3. 3 Port forwarding with NAT and iptables (transparent proxying) - “Run” your webapp on port 80
  4. 4 Network Address Translation - NAT Explained
  5. 5 TCP Tunneling Applications Pros and Cons (Explained by Example)
  6. 6 How much bandwidth do you really need? (Web browsing, streaming and gaming)
  7. 7 Denial of Service Attacks Explained
  8. 8 Public IP vs. Private IP and Port Forwarding (Explained by Example)
  9. 9 Load Balancer vs Reverse Proxy (Explained by Example)
  10. 10 Do you REALLY need a VPN?
  11. 11 How Tor Works? (The Onion Router)
  12. 12 Programmatically Open External Ports with UPNP
  13. 13 Address Resolution Protocol - ARP
  14. 14 Fail-over and High-Availability (Explained by Example)
  15. 15 What happens when you type google.com into your browser and press enter? (Detailed Analysis)
  16. 16 Server Name Indication (SNI) (Explained by Example)
  17. 17 Scaling and Securing WebSockets with HAProxy
  18. 18 Docker Volumes Explained (PostgreSQL example)
  19. 19 Building a Multi-player Game with WebSockets
  20. 20 SSL/TLS Termination, TLS Forward Proxy Pros and Cons
  21. 21 How public WIFI can be sniffed?
  22. 22 Setup Active-Passive Cluster with Keepalived & HAProxy (Two raspberry pis)
  23. 23 Active-Active vs Active-Passive Cluster to Achieve High Availability in Scaling Systems
  24. 24 SSH Tunneling - Local & Remote Port Forwarding (by Example)
  25. 25 A Good Network Engineering Videos Resource Recommendation
  26. 26 Multicast DNS Explained
  27. 27 What is the TCP 3-Way Handshake and Why Backend Engineers should understand it
  28. 28 Wiresharking CURL - How a single GET request translates to 10 TCP Packets
  29. 29 What is TCP Slow Start and how Does it affect your Web Application Performance?
  30. 30 Expose Local WebSocket, HTTP and HTTPS WebServers to the Public Internet with Ngrok
  31. 31 TCP Half-Open Explained
  32. 32 Career Path Advice - Moving from a Network Engineer to a Backend Engineer
  33. 33 Demystifying the Browser Networking Tab in Developer Tools With Examples
  34. 34 What is a Virtual IP Address? How does it help with High-Availability
  35. 35 How HTTP Tunneling works, The CONNECT method, Pros & Cons and more
  36. 36 NAT Slipstreaming Vulnerability Explained
  37. 37 NEW GENIUS DNS Cache Poisoning Attack - SAD DNS Explained
  38. 38 iptables Demystified - Port Redirection and Forwarding HTTP Traffic to another machine (part 1)
  39. 39 iptables Demystified - Load Balancing without a Load Balancer (no software installation) (part 2)
  40. 40 Technical Discussion on VPNs - How VPNs Work, their benefits, and What happens when VPNs are Hacked
  41. 41 HTTP Code 502 Bad Gateway Explained (All its Possible Causes on the Backend)
  42. 42 Following an HTTP GET / through Switches, Routers, Gateways, and Proxies (Detailed Examples)
  43. 43 Hub vs Switch vs Bridge vs Router (Full Detailed Example)
  44. 44 First port your computer hits
  45. 45 The Beauty of the Internet Protocol
  46. 46 This tool is neat
  47. 47 DNS is beautiful
  48. 48 Why 0177.0.0.1 is also localhost
  49. 49 Software Engineering and Nursery Rhymes
  50. 50 UDP hole punching | The Backend Engineering Show
  51. 51 This project could free millions of IPv4 addresses, but is it worth it?

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.