Mukesh Chinta
Mukesh Chinta
  • 232
  • 229 003
All about Cisco Networking Academy (NetAcad) 🧑‍🎓, Activation, Certificate generation. Free courses👍
Cybersecurity course: Self-Enroll link at: www.netacad.com/portal/web/self-enroll/m/course-2266317
Get connected course: Self-Enroll link at:
www.netacad.com/portal/web/self-enroll/m/course-2277579
For over 23 years Cisco Networking Academy has been ahead of the curve, leading the way in technology education. A global IT and cybersecurity education program powered by its mission to empower all people with career opportunities, Networking Academy is dedicated to transforming the lives of learners around the world. But despite the program’s far-reaching success, many people who could benefit from the program don’t know all it has to offer. Cisco Networking Academy is the world’s largest and longest running corporate social responsibility education program, powering an inclusive future for students and instructors around the world. Learn topics like networking, cybersecurity, and programming through courses backed by learning science and Cisco expertise - and prepare for certifications and job-ready skills that will set you up to work anywhere.
zhlédnutí: 544

Video

X.509 certificate format || Digital certificates || Public key distribution
zhlédnutí 293Před 4 měsíci
X.509 certificate format || Digital certificates || Public key distribution
SHA 512 || Secure Hash Algorithm || Cryptographic Hash function || asymmetric cryptograpy
zhlédnutí 662Před 4 měsíci
SHA 512 || Secure Hash Algorithm || Cryptographic Hash function || asymmetric cryptograpy
Flash Mob@afosecVrsec AFOSEC || Student Fest || V R Siddhartha Engineering College || VRSEC
zhlédnutí 3,4KPřed 5 měsíci
Flash Mob@afosecVrsec AFOSEC || Student Fest || V R Siddhartha Engineering College || VRSEC
INFINITO- 22 by Department of CSE, V R Siddhartha Engineering College || Cultural Event || VRSEC
zhlédnutí 879Před 6 měsíci
INFINITO- 22 by Department of CSE, V R Siddhartha Engineering College || Cultural Event || VRSEC
Ideate2Hack 2023 - Dept of CSE || Hackathon || VRSEC || National Coding Contest || Video Memories
zhlédnutí 171Před 6 měsíci
Ideate2Hack 2023 - Dept of CSE || Hackathon || VRSEC || National Coding Contest || Video Memories
Data Encryption Standard - DES Algorithm|| Symmetric Encryption || Cryptography || LUCIFER algor
zhlédnutí 413Před 8 měsíci
Data Encryption Standard - DES Algorithm|| Symmetric Encryption || Cryptography || LUCIFER algor
Scheduling Algorithms - assignment problems & solutions; real time scheduling, MLQ & MLFQ algorithms
zhlédnutí 484Před 9 měsíci
Scheduling Algorithms - assignment problems & solutions; real time scheduling, MLQ & MLFQ algorithms
Email message transfer || Simple Mail Transfer Protocol || SMTP || Extended SMTP
zhlédnutí 297Před rokem
Email message transfer || Simple Mail Transfer Protocol || SMTP || Extended SMTP
EMAIL format || RFC5322 || MIME || Multipurpose Internet Mail Extensions || Email standard
zhlédnutí 609Před rokem
EMAIL format || RFC5322 || MIME || Multipurpose Internet Mail Extensions || Email standard
Email Architecture || User Agent || Application Layer || Electronic mail || Message Transfer Agents
zhlédnutí 594Před rokem
Email Architecture || User Agent || Application Layer || Electronic mail || Message Transfer Agents
IPv6 header format || Internet Protocol version 6|| IPv6 address notation || IPv6 Extension headers
zhlédnutí 375Před rokem
IPv6 header format || Internet Protocol version 6|| IPv6 address notation || IPv6 Extension headers
Malware || Malicious Software || Virus || Logic Bomb || Backdoor || Trojan Horse || Zombie
zhlédnutí 1,5KPřed rokem
Malware || Malicious Software || Virus || Logic Bomb || Backdoor || Trojan Horse || Zombie
Computer Networks Introduction || Networks Basics || Network Properties || Limitations of Networks
zhlédnutí 1,3KPřed rokem
Computer Networks Introduction || Networks Basics || Network Properties || Limitations of Networks
S/MIME || E-Mail Security || S/MIME services and operations || E-Mail compatibility || Compression
zhlédnutí 955Před rokem
S/MIME || E-Mail Security || S/MIME services and operations || E-Mail compatibility || Compression
VR Annual Day 2023 craze
zhlédnutí 786Před rokem
VR Annual Day 2023 craze
Go Back N Sliding window protocol || Flow Control || Data Link Layer || Pipelining
zhlédnutí 494Před rokem
Go Back N Sliding window protocol || Flow Control || Data Link Layer || Pipelining
Sliding window Protocols @ Data Link Layer
zhlédnutí 759Před rokem
Sliding window Protocols @ Data Link Layer
Diffie - Hellman Key Exchange algorithm with examples || Primitive Root || Discrete Logarithm - DLP
zhlédnutí 575Před rokem
Diffie - Hellman Key Exchange algorithm with examples || Primitive Root || Discrete Logarithm - DLP
RSA algorithm || RSA examples || Rivest Shamir Adleman || Asymmetric encryption || Cryptography
zhlédnutí 687Před rokem
RSA algorithm || RSA examples || Rivest Shamir Adleman || Asymmetric encryption || Cryptography
Advanced Encryption Standard || AES explanation || Rijndael algr || Symmetric encryption algorithms
zhlédnutí 752Před rokem
Advanced Encryption Standard || AES explanation || Rijndael algr || Symmetric encryption algorithms
Simplified Advanced Encryption Standard || S-AES example || Symmetric Encryption Algorithm || AES
zhlédnutí 3,6KPřed rokem
Simplified Advanced Encryption Standard || S-AES example || Symmetric Encryption Algorithm || AES
Transposition ciphers - Rail fence cipher, columnar transposition cipher, examples of ciphers
zhlédnutí 428Před rokem
Transposition ciphers - Rail fence cipher, columnar transposition cipher, examples of ciphers
Simplified Data Encryption Standard (SDES) || S-DES || SDES example || Encryption and Key expansion
zhlédnutí 1,3KPřed rokem
Simplified Data Encryption Standard (SDES) || S-DES || SDES example || Encryption and Key expansion
Playfair cipher - Substitution Cipher - Classical Encryption Techniques|| Example of Playfair cipher
zhlédnutí 345Před rokem
Playfair cipher - Substitution Cipher - Classical Encryption Techniques|| Example of Playfair cipher
Symmetric Cipher Model - Cryptanalysis, Cryptology || Categories of cryptographic methods
zhlédnutí 358Před rokem
Symmetric Cipher Model - Cryptanalysis, Cryptology || Categories of cryptographic methods
A model for network security - information access threats, gatekeeper function
zhlédnutí 328Před rokem
A model for network security - information access threats, gatekeeper function
Security Mechanisms - Specific & Pervasive mechanisms || Relationship between Services & Mechanisms.
zhlédnutí 442Před rokem
Security Mechanisms - Specific & Pervasive mechanisms || Relationship between Services & Mechanisms.
Security Services - Confidentiality, Integrity, Availability, Non repudiation, Authentication
zhlédnutí 425Před rokem
Security Services - Confidentiality, Integrity, Availability, Non repudiation, Authentication
Security Attacks - Active & Passive Attacks, Masquerade, Modification, DoS, Traffic Analysis
zhlédnutí 400Před rokem
Security Attacks - Active & Passive Attacks, Masquerade, Modification, DoS, Traffic Analysis

Komentáře

  • @raghuvirapratapadimulam2098

    You are looking handsome sir

  • @user-wk1ru4pr8z
    @user-wk1ru4pr8z Před 13 dny

    😂

  • @ysai5654
    @ysai5654 Před 15 dny

    Ade chicken curry Koda imposition ivvandi sir

  • @golishanmukharao9107
    @golishanmukharao9107 Před 15 dny

    😊😊

  • @Shanmukh-Bathula
    @Shanmukh-Bathula Před 15 dny

    Manchi manchi imposition lu sir😂😂😂

  • @sireeshavallabhaneni7909

    Good girl. Manchi poem

  • @murtytamminana7020
    @murtytamminana7020 Před 22 dny

    Well explained sir

  • @abhithapapani5849
    @abhithapapani5849 Před 27 dny

    Really very satisfied by your way of teaching and the content you given sir and the pictures are very owsome

    • @MukeshChinta
      @MukeshChinta Před 27 dny

      @@abhithapapani5849 thank you very much for the comment…👍

  • @reubenphilipkatana
    @reubenphilipkatana Před měsícem

    this is marvelous i really learned how u broke down the number system. I can now easily understand. Thank u

  • @sawruparanimakkapati6382
    @sawruparanimakkapati6382 Před měsícem

    😂😂

  • @avsdurga1657
    @avsdurga1657 Před měsícem

    😂🤣

  • @user-qj9uq4zx5n
    @user-qj9uq4zx5n Před měsícem

    Upload 2024 flashmob sanskrit club pls

  • @rezaasar6243
    @rezaasar6243 Před měsícem

    Thank you Mukesh for your thorough explanations. BTW, I think SHR(x) means right shift not left shift.

    • @MukeshChinta
      @MukeshChinta Před měsícem

      Thanks for your comment 👍 please share my channel with your friends

  • @gandhamprakash
    @gandhamprakash Před měsícem

    😂

  • @kids1234hhh
    @kids1234hhh Před měsícem

    😅

  • @pravalikalokini2837
    @pravalikalokini2837 Před měsícem

    For what purpose cpu generates logical address

    • @MukeshChinta
      @MukeshChinta Před měsícem

      Because the code that we write and execute does not relate to the physical address and the CPU needs to match the logical address for our instructions which are stored in the physical address of the memory. That is the need for address binding. Hence, we need two addresses.

    • @pravalikalokini2837
      @pravalikalokini2837 Před měsícem

      @@MukeshChinta thankyou sir

  • @pravalikalokini2837
    @pravalikalokini2837 Před měsícem

    I have one doubt sir cpu generates which one address either process or instructions

    • @MukeshChinta
      @MukeshChinta Před měsícem

      it generates logical addresses while address binding is done to match with the actual physical address of the memory location in which the instruction has been stored.

  • @user-rr9qz3ug4l
    @user-rr9qz3ug4l Před 2 měsíci

    Hello sir i been seaching for your videos for todays sir, today i got now i save the play list.

  • @rakeshg2552
    @rakeshg2552 Před 2 měsíci

    Under rated video teaching is excellent

  • @gandhamprakash
    @gandhamprakash Před 2 měsíci

    😂😂😂

  • @bhavyaanand7363
    @bhavyaanand7363 Před 2 měsíci

    its showing math error in calculator what to do

  • @user-zw8fp
    @user-zw8fp Před 3 měsíci

    fangirl from cn lab

  • @user-zw8fp
    @user-zw8fp Před 3 měsíci

    laddu kavali nayanaa ....

  • @manikantasirigineedi486
    @manikantasirigineedi486 Před 3 měsíci

    Sooo cute.... ❤

  • @chandanamakkapati5136
    @chandanamakkapati5136 Před 3 měsíci

    😂😂

  • @pradeeppushparaj
    @pradeeppushparaj Před 3 měsíci

    Hi Sir, it would be beneficial if you could provide the links to download the lecture slides/PPT in the description.

  • @hanishvenkat9496
    @hanishvenkat9496 Před 4 měsíci

    very well explained sir👏👏👏👏

  • @hanishvenkat9496
    @hanishvenkat9496 Před 5 měsíci

    very well explained sir.

  • @durgaprasadyenninti614
    @durgaprasadyenninti614 Před 5 měsíci

    🔥🔥🔥🔥🔥🦊🦊🦊

  • @user-pr5xw2br8x
    @user-pr5xw2br8x Před 5 měsíci

    please give notes for all the modules

  • @zayeemahmed9890
    @zayeemahmed9890 Před 6 měsíci

    Fabulous vibe from every performance!!!. The standup comedy got me rolling, it was lit

  • @masthimovies8131
    @masthimovies8131 Před 6 měsíci

    10:49 Anna Entry Eyyyyyyyy

  • @manognamarisetty9423
    @manognamarisetty9423 Před 7 měsíci

    Sir, Please explain second chance algorithm once more why there are zeroes initially in queue reference bits

    • @MukeshChinta
      @MukeshChinta Před 7 měsíci

      reference bit '0' means that the page hasnt been accessed recently. Its not mandatory that all reference bits are zeros initially. The queue shown is just an assumption with some pages having reference bit 0 and other's 1. We are trying to see that if a page has been referred recently, we are going to give another chance for that page to stay in memory. So, I am simply looking for a page with reference bit 0 as the victim. If not, I come circling back to the first page I reset.

  • @user-hh1bi9qh2y
    @user-hh1bi9qh2y Před 8 měsíci

    Great explanation sir!!!

  • @user-hh1bi9qh2y
    @user-hh1bi9qh2y Před 8 měsíci

    Very helpful sir!!Thank you for your great explanation

  • @vaibhavchinta5669
    @vaibhavchinta5669 Před 8 měsíci

    Nice dance

  • @vaibhavchinta5669
    @vaibhavchinta5669 Před 8 měsíci

    Nice dance

  • @tf2aa21d
    @tf2aa21d Před 9 měsíci

    thank u sir

  • @chitturipurnachandarsekhar886

    😂

  • @tf2aa21d
    @tf2aa21d Před 9 měsíci

    thank u sir

  • @PraveenKumar-kp1nl
    @PraveenKumar-kp1nl Před 10 měsíci

    This video on the RSA algorithm is incredibly informative! I've always been fascinated by cryptography, and this explanation really helped me grasp the concepts behind RSA. Thank you for breaking it down so clearly. Keep up the great work sir!

  • @tf2aa21d
    @tf2aa21d Před 10 měsíci

    Thanks so much sir

  • @tf2aa21d
    @tf2aa21d Před 10 měsíci

    thank u sir

  • @saradabonu8223
    @saradabonu8223 Před 10 měsíci

    Cute ❤❤

  • @tf2aa21d
    @tf2aa21d Před 10 měsíci

    thank you sir

  • @hamzahussein4981
    @hamzahussein4981 Před 10 měsíci

    Hi sir. I need the instructor ppt. Can you send me?

    • @MukeshChinta
      @MukeshChinta Před 10 měsíci

      Kindly share me your email id. I will share the ppt

    • @hamzahussein4981
      @hamzahussein4981 Před 10 měsíci

      I don't know what is happening! When ever I try to post my email, it emediately removed.

    • @hamzahussein4981
      @hamzahussein4981 Před 10 měsíci

      Where can I contact you, Sir?

    • @MukeshChinta
      @MukeshChinta Před 10 měsíci

      @@hamzahussein4981 sir, send me an email to Mukeshvrsec@gmail.com

  • @tf2aa21d
    @tf2aa21d Před 10 měsíci

    thank you sir

  • @tf2aa21d
    @tf2aa21d Před 10 měsíci

    thank you sir

  • @tf2aa21d
    @tf2aa21d Před 10 měsíci

    thank you sir

  • @peddireddyraghav4032
    @peddireddyraghav4032 Před 11 měsíci

    Thank You Sir Easy to understand!!!!