Spanning Tree Configuration Secrets | CCNA Complete Lab Guide
Sun Networking Technology
(পেইজ টি লাইক দিয়ে সাথেই থাকুন)
We are here to help you to build a Networking & IT career.
''LEARN AND SPREAD YOUR KNOWLEDGE LIKE A SUN''
We are trying to create a platform where people will have the scope to learn practically & hands-on many kinds of Networking and IT technology courses. Basically, we are based on networking. Where have multi-vendor Networking courses? You could find many kinds of networking and IT-related courses here. Like: Cisco, Juniper, MikroTik, FTTX Network, Network Automation, Network Monitoring and Managem

DeepSeek Database Leaked – Full Control Over DB Secret keys, Logs & Chat History Exposed
https://cybersecuritynews.com/deepseek-database-leaked/?fbclid=IwY2xjawIILKFleHRuA2FlbQIxMQABHY_PTgESWrksuPDSqBuCUg3xN4Y_dts_10zJWitnLjS3rUzUMYvD6TIbSw_aem_a2jR_LHsq7FJ-swUZgu2ow
DeepSeek Database Leaked - Full Control Over DB Secret keys, Logs & Chat History Exposed DeepSeek, a prominent Chinese AI startup, exposed a publicly accessible ClickHouse database containing Secret keys, Logs & Chat History.

Types Of Malware
Malware (Malicious Software) is a type of software designed to harm, exploit, or disrupt computers, networks, and devices. It includes viruses, ransomware, spyware, worms, Trojans, and other threats that can steal data, damage systems, or give attackers unauthorized access.
Malware spreads through malicious emails, infected websites, USB drives, and software vulnerabilities. Effective cybersecurity measures like antivirus software, firewalls, and user awareness help protect against malware attacks.
Types of Malware
1. Ransomware – Encrypts files or locks a system, demanding payment to restore access.
2. Fileless Malware – Operates in memory without leaving traces on disk, making detection difficult.
3. Spyware – Secretly collects user data, such as passwords and browsing habits, for malicious use.
4. Adware – Displays intrusive ads, often leading to unwanted software installations or tracking user behavior.
5. Trojan – Disguises itself as legitimate software but creates backdoors for attackers.
6. Worms – Self-replicating malware that spreads across networks, consuming bandwidth and resources.
7. Rootkit – Hides deep within the system to grant attackers persistent access and control.
8. Keyloggers – Records keystrokes to steal login credentials, credit card details, and sensitive data.
9. Bots – Turns infected devices into part of a botnet for launching attacks like DDoS or spam campaigns.
10. Mobile Malware – Targets smartphones and tablets, often through malicious apps or phishing attacks.
11. Bootkit – A type of rootkit that infects the boot sector, making removal difficult.
12. Logic Bomb – Triggers malicious actions when certain conditions are met, like a specific date or user action.
13. Backdoor – Creates a hidden entry point for attackers to access a system remotely.
Malware can cause data theft, system damage, and financial loss, making cybersecurity measures essential.

🚨 End of Support for Exchange Server 2016 & 2019
Mark your calendars: On October 14, 2025, Exchange Server 2016 and 2019 will reach the end of support. After this date, Microsoft will no longer provide:
🔸 Technical support
🔸 Bug fixes
🔸 Security updates
🔸 Time zone updates
To avoid risks, I recommend migrating to Exchange Online or preparing to upgrade to Exchange Server Subscription Edition (SE), launching in early H2 2025.
Stay ahead and secure your organization’s communication infrastructure.

🌐 Common Networking Port Numbers
1️⃣ Port 22 (SSH): Used for Secure Shell (SSH) connections, enabling secure access to remote servers.
2️⃣ Port 80 (HTTP): The standard port for unencrypted web traffic; used by HTTP protocols for web browsing.
3️⃣ Port 443 (HTTPS): Secure HTTP port, vital for encrypted web traffic, ensuring safe data transfer online.
4️⃣ Port 53 (DNS): Domain Name System port, used for translating domain names to IP addresses.
5️⃣ Port 25 (SMTP): Simple Mail Transfer Protocol, responsible for email transmission.
6️⃣ Port 1433 (SQL Server): Microsoft SQL Server communication port, essential for database interactions.
7️⃣ Port 3389 (RDP): Remote Desktop Protocol port, used for remote access to Windows servers.
8️⃣ Port 3306 (MySQL): Default port for MySQL database connections.
9️⃣ Port 123 (NTP): Network Time Protocol, used to synchronize time across systems.

MASTERING CCNA VLANs Lab Practical Skills!
MASTERING CCNA VLANs Lab Practical Skills! In this hands-on lab, you'll learn how to master your network with VLANs. Whether you're a beginner or an expert, this tutorial will help you understand and ...

Network Engineer Interview Preparation (Part 10)
Stay tuned for more tips as we continue the series!
Network Engineer Interview Preparation (Part - 10) Network Engineer Interview Preparation (Part - 10) By Sun Networking Technology
7 CISCO Router Configuration Essentials You Can't Ignore!
In this video, we'll cover the 7 essential CISCO router configuration tips you can't afford to ignore. Whether you're new to networking or a seasoned pro, these tips will help you optimize your router settings for maximum performance.

Hi everyone,
Hope you guys are well. In 2025 we are going to start our Online Courses and as well we are also going to start again Free Network Essentials course for you.
Course Name: Network Essentials
Language: Bangla
Classes: 3 to 5 Days (1.5 to 2 Hours each Class)
Cost: Free (Until 15 January)
Method: Online (Zoom)
Course Complete Certificates
Note: You need to fill in the criteria for getting Certificates
To join this new course Network Essential fill out this form.
Link: https://forms.gle/fzf31Mx6xW7Vzphs8
Thanks
Sun Networking Technology
আশা করি আপনারা সবাই ভালো আছেন। ২০২৫ সালে আমরা আমাদের অনলাইন কোর্স শুরু করতে যাচ্ছি এবং একই সাথে আমরা আপনাদের জন্য আবারও ফ্রি নেটওয়ার্ক এসেনশিয়াল কোর্স শুরু করতে যাচ্ছি।
কোর্সের নাম: নেটওয়ার্ক এসেনশিয়াল
ভাষা: বাংলা
ক্লাস: ৩ থেকে ৫ দিন (প্রতিটি ক্লাসের ১.৫ থেকে ২ ঘন্টা)
খরচ: বিনামূল্যে (১৫ জানুয়ারী পর্যন্ত)
পদ্ধতি: অনলাইন (জুম)
কোর্স সম্পূর্ণ সার্টিফিকেট
বিঃদ্রঃ: সার্টিফিকেট পাওয়ার জন্য আপনাকে মানদণ্ড পূরণ করতে হবে
এই নতুন কোর্সে যোগদানের জন্য নেটওয়ার্ক এসেনশিয়াল এই ফর্মটি পূরণ করুন।
লিঙ্ক: https://forms.gle/fzf31Mx6xW7Vzphs8
ধন্যবাদ
সান নেটওয়ার্কিং টেকনোলজি
Happy New Year 2025
Telnet and SSH Configuration on a New Cisco Switch
Playlist: https://www.youtube.com/playlist?list=PL9w3-O03BiO88wCfC5F8g1_chYb7VLlX0
IP Configuration on Cisco Switch: VLAN and Interface Step-by-Step Guide
Playlist: https://www.youtube.com/playlist?list=PL9w3-O03BiO88wCfC5F8g1_chYb7VLlX0

Road map to become an Network Engineer.


Kubernetes top tools you need to know
Day 1
5 Essential Basic Switch Configurations Every CCNA Beginner Must Know

কে কে অনলাইনে (CCNA) কোর্স করতে চান ?
WhatsApp এ যোগাযোগ করুন ।
Click here to claim your Sponsored Listing.
Location
Category
Contact the school
Telephone
Address
Sylhet