Loi Liang Yang
Cloud Security, Ethical Hacking, and AWS tools with a focus on practical implementation and hands-on tutorials.
Nutrition Label
Loi Liang Yang specializes in "over-the-shoulder" tutorials that walk viewers through live workflows in AWS and Kali Linux. His content is highly practical, favoring direct demonstration of tools and terminal commands over theoretical slides or marketing fluff. While excellent for learning specific implementation steps, his analysis typically aggregates standard industry practices rather than offering novel stress-tests or unique research.
Strengths
- +
- +
- +
Notes
- !Technical tutorials feature excellent hands-on rigor, while career advice videos are more subjective and opinion-based.
- !Titles for OSINT and hacking tools can be hyperbolic; verify tool limitations against official documentation.
Rating Breakdown
Breakdown across the key dimensions we rate. Methodology →
Recent Videos

AWS Systems Manager Just In Time Node Access

Security AI Agent! Automated Penetration Testing

Top 10 Things To do After Installing Kali Linux

OSINT for Beginners: Find Everything About Anyone!

AWS Security Hub Overview & Tutorial

How to Create an Amazon CloudFront Distribution and Website

Cybersecurity Trends for 2026

don’t waste your time in cybersecurity

Build AI Agents - Bedrock AgentCore | hands-on tutorial

Amazon Q Developer - Setup MCP Server for CloudTrail | Security Investigation

the cybersecurity job market is cooked

Amazon Q - The Ultimate AI Agent

API Security - Top 7 Best Practises

Cross Site Scripting (XSS) Tutorial

Amazon Inspector Tutorial for Vulnerability Management | AWS
Why this rating
Evidence receipts showing why each dimension is rated the way it is.
“Top 10 Things To do After Installing Kali Linux”[0:05] →
The video delivers exactly what is promised: a structured, numbered list of 10 specific post-installation configuration steps.
“We are now inside the EC2 instance... we have root access right here.”[07:05] →
Demonstrates a live, successful connection to the instance via the browser-based shell, proving the workflow functions as described.
“We need to search for 'SSM'. We are going to select AmazonSSMManagedInstanceCore.”[02:45] →
Correctly identifies the specific AWS managed policy required for this functionality, demonstrating domain knowledge beyond generic advice.
“Number 5: Install Terminator.”[5:12] →
The recommendations (Update, Git, Terminator, Htop) are standard, competent industry advice for this specific OS, representing a good summary rather than a novel framework.
“And now if I go over to the domain name... you can see that we have the 'Hello World'.”[05:50] →
Demonstrates the final result works ('happy path') but lacks performance benchmarks (latency comparisons) or failure mode testing.