- 232
- 229 003
Mukesh Chinta
India
Registrace 17. 09. 2020
Any student who is interested to learn concepts related to technology, you are welcome to watch my video lectures. Suggestions are always welcome!!! 🙂
All about Cisco Networking Academy (NetAcad) 🧑🎓, Activation, Certificate generation. Free courses👍
Cybersecurity course: Self-Enroll link at: www.netacad.com/portal/web/self-enroll/m/course-2266317
Get connected course: Self-Enroll link at:
www.netacad.com/portal/web/self-enroll/m/course-2277579
For over 23 years Cisco Networking Academy has been ahead of the curve, leading the way in technology education. A global IT and cybersecurity education program powered by its mission to empower all people with career opportunities, Networking Academy is dedicated to transforming the lives of learners around the world. But despite the program’s far-reaching success, many people who could benefit from the program don’t know all it has to offer. Cisco Networking Academy is the world’s largest and longest running corporate social responsibility education program, powering an inclusive future for students and instructors around the world. Learn topics like networking, cybersecurity, and programming through courses backed by learning science and Cisco expertise - and prepare for certifications and job-ready skills that will set you up to work anywhere.
Get connected course: Self-Enroll link at:
www.netacad.com/portal/web/self-enroll/m/course-2277579
For over 23 years Cisco Networking Academy has been ahead of the curve, leading the way in technology education. A global IT and cybersecurity education program powered by its mission to empower all people with career opportunities, Networking Academy is dedicated to transforming the lives of learners around the world. But despite the program’s far-reaching success, many people who could benefit from the program don’t know all it has to offer. Cisco Networking Academy is the world’s largest and longest running corporate social responsibility education program, powering an inclusive future for students and instructors around the world. Learn topics like networking, cybersecurity, and programming through courses backed by learning science and Cisco expertise - and prepare for certifications and job-ready skills that will set you up to work anywhere.
zhlédnutí: 544
Video
X.509 certificate format || Digital certificates || Public key distribution
zhlédnutí 293Před 4 měsíci
X.509 certificate format || Digital certificates || Public key distribution
SHA 512 || Secure Hash Algorithm || Cryptographic Hash function || asymmetric cryptograpy
zhlédnutí 662Před 4 měsíci
SHA 512 || Secure Hash Algorithm || Cryptographic Hash function || asymmetric cryptograpy
Flash Mob@afosecVrsec AFOSEC || Student Fest || V R Siddhartha Engineering College || VRSEC
zhlédnutí 3,4KPřed 5 měsíci
Flash Mob@afosecVrsec AFOSEC || Student Fest || V R Siddhartha Engineering College || VRSEC
INFINITO- 22 by Department of CSE, V R Siddhartha Engineering College || Cultural Event || VRSEC
zhlédnutí 879Před 6 měsíci
INFINITO- 22 by Department of CSE, V R Siddhartha Engineering College || Cultural Event || VRSEC
Ideate2Hack 2023 - Dept of CSE || Hackathon || VRSEC || National Coding Contest || Video Memories
zhlédnutí 171Před 6 měsíci
Ideate2Hack 2023 - Dept of CSE || Hackathon || VRSEC || National Coding Contest || Video Memories
Data Encryption Standard - DES Algorithm|| Symmetric Encryption || Cryptography || LUCIFER algor
zhlédnutí 413Před 8 měsíci
Data Encryption Standard - DES Algorithm|| Symmetric Encryption || Cryptography || LUCIFER algor
Scheduling Algorithms - assignment problems & solutions; real time scheduling, MLQ & MLFQ algorithms
zhlédnutí 484Před 9 měsíci
Scheduling Algorithms - assignment problems & solutions; real time scheduling, MLQ & MLFQ algorithms
Email message transfer || Simple Mail Transfer Protocol || SMTP || Extended SMTP
zhlédnutí 297Před rokem
Email message transfer || Simple Mail Transfer Protocol || SMTP || Extended SMTP
EMAIL format || RFC5322 || MIME || Multipurpose Internet Mail Extensions || Email standard
zhlédnutí 609Před rokem
EMAIL format || RFC5322 || MIME || Multipurpose Internet Mail Extensions || Email standard
Email Architecture || User Agent || Application Layer || Electronic mail || Message Transfer Agents
zhlédnutí 594Před rokem
Email Architecture || User Agent || Application Layer || Electronic mail || Message Transfer Agents
IPv6 header format || Internet Protocol version 6|| IPv6 address notation || IPv6 Extension headers
zhlédnutí 375Před rokem
IPv6 header format || Internet Protocol version 6|| IPv6 address notation || IPv6 Extension headers
Malware || Malicious Software || Virus || Logic Bomb || Backdoor || Trojan Horse || Zombie
zhlédnutí 1,5KPřed rokem
Malware || Malicious Software || Virus || Logic Bomb || Backdoor || Trojan Horse || Zombie
Computer Networks Introduction || Networks Basics || Network Properties || Limitations of Networks
zhlédnutí 1,3KPřed rokem
Computer Networks Introduction || Networks Basics || Network Properties || Limitations of Networks
S/MIME || E-Mail Security || S/MIME services and operations || E-Mail compatibility || Compression
zhlédnutí 955Před rokem
S/MIME || E-Mail Security || S/MIME services and operations || E-Mail compatibility || Compression
Go Back N Sliding window protocol || Flow Control || Data Link Layer || Pipelining
zhlédnutí 494Před rokem
Go Back N Sliding window protocol || Flow Control || Data Link Layer || Pipelining
Sliding window Protocols @ Data Link Layer
zhlédnutí 759Před rokem
Sliding window Protocols @ Data Link Layer
Diffie - Hellman Key Exchange algorithm with examples || Primitive Root || Discrete Logarithm - DLP
zhlédnutí 575Před rokem
Diffie - Hellman Key Exchange algorithm with examples || Primitive Root || Discrete Logarithm - DLP
RSA algorithm || RSA examples || Rivest Shamir Adleman || Asymmetric encryption || Cryptography
zhlédnutí 687Před rokem
RSA algorithm || RSA examples || Rivest Shamir Adleman || Asymmetric encryption || Cryptography
Advanced Encryption Standard || AES explanation || Rijndael algr || Symmetric encryption algorithms
zhlédnutí 752Před rokem
Advanced Encryption Standard || AES explanation || Rijndael algr || Symmetric encryption algorithms
Simplified Advanced Encryption Standard || S-AES example || Symmetric Encryption Algorithm || AES
zhlédnutí 3,6KPřed rokem
Simplified Advanced Encryption Standard || S-AES example || Symmetric Encryption Algorithm || AES
Transposition ciphers - Rail fence cipher, columnar transposition cipher, examples of ciphers
zhlédnutí 428Před rokem
Transposition ciphers - Rail fence cipher, columnar transposition cipher, examples of ciphers
Simplified Data Encryption Standard (SDES) || S-DES || SDES example || Encryption and Key expansion
zhlédnutí 1,3KPřed rokem
Simplified Data Encryption Standard (SDES) || S-DES || SDES example || Encryption and Key expansion
Playfair cipher - Substitution Cipher - Classical Encryption Techniques|| Example of Playfair cipher
zhlédnutí 345Před rokem
Playfair cipher - Substitution Cipher - Classical Encryption Techniques|| Example of Playfair cipher
Symmetric Cipher Model - Cryptanalysis, Cryptology || Categories of cryptographic methods
zhlédnutí 358Před rokem
Symmetric Cipher Model - Cryptanalysis, Cryptology || Categories of cryptographic methods
A model for network security - information access threats, gatekeeper function
zhlédnutí 328Před rokem
A model for network security - information access threats, gatekeeper function
Security Mechanisms - Specific & Pervasive mechanisms || Relationship between Services & Mechanisms.
zhlédnutí 442Před rokem
Security Mechanisms - Specific & Pervasive mechanisms || Relationship between Services & Mechanisms.
Security Services - Confidentiality, Integrity, Availability, Non repudiation, Authentication
zhlédnutí 425Před rokem
Security Services - Confidentiality, Integrity, Availability, Non repudiation, Authentication
Security Attacks - Active & Passive Attacks, Masquerade, Modification, DoS, Traffic Analysis
zhlédnutí 400Před rokem
Security Attacks - Active & Passive Attacks, Masquerade, Modification, DoS, Traffic Analysis
You are looking handsome sir
😀😃
😂
Ade chicken curry Koda imposition ivvandi sir
@@ysai5654 😁😂
😊😊
Manchi manchi imposition lu sir😂😂😂
@@Shanmukh-Bathula 😄
Good girl. Manchi poem
Well explained sir
Really very satisfied by your way of teaching and the content you given sir and the pictures are very owsome
@@abhithapapani5849 thank you very much for the comment…👍
this is marvelous i really learned how u broke down the number system. I can now easily understand. Thank u
😂😂
😂🤣
Upload 2024 flashmob sanskrit club pls
Thank you Mukesh for your thorough explanations. BTW, I think SHR(x) means right shift not left shift.
Thanks for your comment 👍 please share my channel with your friends
😂
😅
For what purpose cpu generates logical address
Because the code that we write and execute does not relate to the physical address and the CPU needs to match the logical address for our instructions which are stored in the physical address of the memory. That is the need for address binding. Hence, we need two addresses.
@@MukeshChinta thankyou sir
I have one doubt sir cpu generates which one address either process or instructions
it generates logical addresses while address binding is done to match with the actual physical address of the memory location in which the instruction has been stored.
Hello sir i been seaching for your videos for todays sir, today i got now i save the play list.
Under rated video teaching is excellent
Thank you👍
😂😂😂
its showing math error in calculator what to do
fangirl from cn lab
laddu kavali nayanaa ....
Sooo cute.... ❤
😂😂
Hi Sir, it would be beneficial if you could provide the links to download the lecture slides/PPT in the description.
very well explained sir👏👏👏👏
very well explained sir.
🔥🔥🔥🔥🔥🦊🦊🦊
please give notes for all the modules
Fabulous vibe from every performance!!!. The standup comedy got me rolling, it was lit
10:49 Anna Entry Eyyyyyyyy
Rc anna thopu dhammu untey apu ❤️🔥
Sir, Please explain second chance algorithm once more why there are zeroes initially in queue reference bits
reference bit '0' means that the page hasnt been accessed recently. Its not mandatory that all reference bits are zeros initially. The queue shown is just an assumption with some pages having reference bit 0 and other's 1. We are trying to see that if a page has been referred recently, we are going to give another chance for that page to stay in memory. So, I am simply looking for a page with reference bit 0 as the victim. If not, I come circling back to the first page I reset.
Great explanation sir!!!
Very helpful sir!!Thank you for your great explanation
Nice dance
Nice dance
thank u sir
😂
thank u sir
This video on the RSA algorithm is incredibly informative! I've always been fascinated by cryptography, and this explanation really helped me grasp the concepts behind RSA. Thank you for breaking it down so clearly. Keep up the great work sir!
Thanks so much sir
thank u sir
Cute ❤❤
thank you sir
Hi sir. I need the instructor ppt. Can you send me?
Kindly share me your email id. I will share the ppt
I don't know what is happening! When ever I try to post my email, it emediately removed.
Where can I contact you, Sir?
@@hamzahussein4981 sir, send me an email to Mukeshvrsec@gmail.com
thank you sir
thank you sir
thank you sir
Thank You Sir Easy to understand!!!!