- 151
- 938 698
Zixplain
India
Приєднався 14 гру 2018
Hey Dosto ,Welcome to Zixplain subscribe the channel for more interesting ,informational and educational videos...
Thanks for subscription ❤😁
Thanks for subscription ❤😁
kerberos authentication process | kerberos in cryptography and network security|kerberos version 4
kerberos authentication process | kerberos in cryptography and network security|kerberos version 4 :
here we have explained about kerberos authentication process in very simple and easy way along with example. kerberos in cryptography and network security very important for exam point of view. kerberos has many versions such as kerberos version 4 and kerberos version 5 .
#kerberos,#kerberosversion4,#kerberosauthenticationprocess.
Welcome to 10hour4Exam ,I have Created this channel 10hour4Exam to share my knowledge of B.E. and B.tec computer Science Subjects to the person like me, who sit to study complete Subjects just before the Exams and want to Clear Semester Exams with good score in just 10hour.I think you study smartly 10hour are enough 4Exam.
Note:this channel is basically for CS/IT B.E. and B.tec SEMESTER EXAMS only.
plzz subcribe this channel 10hour4Exam to Appreciate my work:-ua-cam.com/channels/A2XGXCzJ_DRJRAq5ZchSzg.html
Download My PPT and Notes Unit wise:-drive.google.com/drive/u/1/my-drive?ogsrc=32
here we have explained about kerberos authentication process in very simple and easy way along with example. kerberos in cryptography and network security very important for exam point of view. kerberos has many versions such as kerberos version 4 and kerberos version 5 .
#kerberos,#kerberosversion4,#kerberosauthenticationprocess.
Welcome to 10hour4Exam ,I have Created this channel 10hour4Exam to share my knowledge of B.E. and B.tec computer Science Subjects to the person like me, who sit to study complete Subjects just before the Exams and want to Clear Semester Exams with good score in just 10hour.I think you study smartly 10hour are enough 4Exam.
Note:this channel is basically for CS/IT B.E. and B.tec SEMESTER EXAMS only.
plzz subcribe this channel 10hour4Exam to Appreciate my work:-ua-cam.com/channels/A2XGXCzJ_DRJRAq5ZchSzg.html
Download My PPT and Notes Unit wise:-drive.google.com/drive/u/1/my-drive?ogsrc=32
Переглядів: 3 432
Відео
Man in the middle attack in hindi | man in the middle attack in network security | Example
Переглядів 4,7 тис.4 роки тому
Man in the middle attack in hindi | man in the middle attack in network security | Example: here i have explained about man in the middle attack in hindi along with example. man in the middle attack in network security plays very important role.Man in the middle attack is type of passive attack. #maninthemiddleattack,#maninthemiddleattackinhindi,#networksecurity Welcome to 10hour4Exam ,I have C...
Model of network security| Network Security Model|Information and Cyber Security | Hindi | ICS |CNS
Переглядів 2,5 тис.4 роки тому
Model of network security| Network Security Model|Information and Cyber Security | Hindi | ICS |CNS: here i have explained about Model of network security also known as Network Security Model which is very important in information and cyber security and network cyber security.model of network security in cryptography is used very frequently. #modelofnetworksecurity,#networksecuritymodel,#ics,#c...
PKI infrastructure:Public key infrastructure | PKI concepts in hindi | PKI certificates explained
Переглядів 15 тис.4 роки тому
PKI infrastructure:Public key infrastructure | PKI concepts in hindi | PKI certificates explained: here i have explained about PKI infrastructure also known as Public key infrastructure this very important in network security and information security.I also explained what is pki certificates in very easy and simple way. #pkiinfrastructure,#pkicertificates,#networksecurity,#ics,#cns Welcome to 1...
Security Mechanism:Security mechanisms in network security | information security | hindi |ICS | CNS
Переглядів 6894 роки тому
Security Mechanism:Security mechanisms in network security | information security | hindi |ICS | CNS: here i have explained about Security Mechanism in which Security mechanisms in network security is very useful to handle security issues.Security mechanism is also very important in information and cyber security i have explained this in very simple way. #securitymechanism,#networksecurity,#inf...
SSL in network security |Secure Socket Layer (SSL)l SSL Protocol Stack Explained in Hindi|SSL header
Переглядів 1,4 тис.4 роки тому
SSL in network security |Secure Socket Layer (SSL)l SSL Protocol Stack Explained in Hindi|SSL header: here i have explained about SSL protocol which is nothing but Secure Socket Layer (SSL) and SSL in network security and information security very useful as SSL provides security to IP protocol.I also explained about SSL Protocol Stack,plzz watch full video. #SSL,#SSLinnetworksecurity,#sslprotoc...
Trusted System:Trusted System in network security| cryptography and network security| ICS|CNS |Hindi
Переглядів 13 тис.4 роки тому
Trusted System:Trusted System in network security| cryptography and network security| ICS|CNS |Hindi: here i have explained about Trusted System which is very important in network security. and Trusted System used in cryptography and network security as well.I explained trusted system and its 4 characteristics. #trustedsystem,#trustedsysteminnetworksecurity Welcome to 10hour4Exam ,I have Create...
Intrusion Detection System (IDS) | Intrusion Prevention System (IPS) | IDS vs IDS | Network Security
Переглядів 32 тис.4 роки тому
Intrusion Detection System (IDS) | Intrusion Prevention System (IPS) | IDS vs IDS | Network Security: here i have explained about Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) in very easy way along with their examples.I also highlighted major difference between IDS vs IPS .and how Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) works with example...
Types of Firewall:Types of firewall in network security | Types of firewall in information security
Переглядів 1,6 тис.4 роки тому
Types of Firewall:Types of firewall in network security | Types of firewall in information security: here i have explained about Types of Firewall and how it is important in information security and network security.There are 3 main Types of Firewall 1)Packet filtering Router 2)Application level gateway 3)Circuit Gateway #Typesoffirewall,#ics,#cns Welcome to 10hour4Exam ,I have Created this cha...
x.509 Certificate: x.509 certificate format |Network Security| Information Security| ICS |CNS| Hindi
Переглядів 9 тис.4 роки тому
x.509 Certificate: x.509 certificate format |Network Security| Information Security| ICS |CNS| Hindi: here i have explained about x.509 certificate format in detail with diagram and example. x.509 Certificate in network security and information security used frequently as standard x.509 certificate format for digital verification and identification.In cryptography, X. 509 is a standard defining...
Hash Function:What is hash function ? Advantages and Disadvantages of hash function | ICS | CNS
Переглядів 2,7 тис.4 роки тому
Hash Function:What is hash function ? Advantages and Disadvantages of hash function | ICS | CNS : here i have explained about Hash Function with example.I explained What is hash function ? and then Advantages and Disadvantages of hash function in very simple and easy way with Diagram and example. #hashfunction,#hashfuctionexample,#ics,#cns Welcome to 10hour4Exam ,I have Created this channel 10h...
KDC (Key Distribution Center): KDC in information security |KDC in cryptography in hindi | Hindi
Переглядів 7 тис.4 роки тому
KDC (Key Distribution Center): KDC in information security |KDC in cryptography in hindi | Hindi: here i have explained about KDC i.e Key Distribution Center in very simple way along with KDC example.KDC is useful in information security and KDC in cryptography as well. this very important network security and cyber security. #KDC,#keydistributioncenter,#ics,#cns Welcome to 10hour4Exam ,I have ...
IPsec: ipsec header format | authentication header | IP Security Protocol | IPsec in hindi |ICS|CNS
Переглядів 4694 роки тому
Welcome to 10hour4Exam ,I have Created this channel 10hour4Exam to share my knowledge of B.E. and B.tec computer Science Subjects to the person like me, who sit to study complete Subjects just before the Exams and want to Clear Semester Exams with good score in just 10hour.I think you study smartly 10hour are enough 4Exam. Note:this channel is basically for CS/IT B.E. and B.tec SEMESTER EXAMS o...
ICS (information and cyber security):Some important Terminology in ICS | CNS | Hindi
Переглядів 984 роки тому
ICS (information and cyber security):Some important Terminology in ICS | CNS | Hindi: here i have explained about Some important Terminology in ICS i.e. information and cyber security . and these terms are very useful while learning about cyber security. #ICSterminology,#icsterms,#cnsterms,#ics Welcome to 10hour4Exam ,I have Created this channel 10hour4Exam to share my knowledge of B.E. and B.t...
Goals of ICS (information and cyber security) : what are the Goals or Objective of ICS | CNS | Hindi
Переглядів 724 роки тому
Goals of ICS (information and cyber security) : what are the Goals or Objective of ICS | CNS | Hindi: here i have explained about Goals of ICS (information and cyber security) in very simple and easy to understand form along with Diagram and example.what is firewall and why we use firewall and how firewall works i answered all of these questions. #goalsofics,#ics,#cns Welcome to 10hour4Exam ,I ...
Firewall: what is Firewall ? why we use Firewall ? | Firewall Block Diagram |How Firewall works |ICS
Переглядів 1764 роки тому
Firewall: what is Firewall ? why we use Firewall ? | Firewall Block Diagram |How Firewall works |ICS
Elements of ICS | Attributes of ICS | information and cyber security | ICS | CNS | Hindi
Переглядів 724 роки тому
Elements of ICS | Attributes of ICS | information and cyber security | ICS | CNS | Hindi
Digital Signature: what is Digital Signature ?Requirements of Digital Signature |Digital Certificate
Переглядів 5804 роки тому
Digital Signature: what is Digital Signature ?Requirements of Digital Signature |Digital Certificate
Conventional Security Model :What is the Conventional encryption model ? | ICS | CNS | Hindi
Переглядів 4,1 тис.4 роки тому
Conventional Security Model :What is the Conventional encryption model ? | ICS | CNS | Hindi
Confusion vs Diffusion : Difference between Confusion and Diffusion | information and cyber security
Переглядів 3,2 тис.4 роки тому
Confusion vs Diffusion : Difference between Confusion and Diffusion | information and cyber security
Difference between Centralized key distribution and Decentralized key distribution | Hindi| ICS| CNS
Переглядів 1,2 тис.4 роки тому
Difference between Centralized key distribution and Decentralized key distribution | Hindi| ICS| CNS
Active Attack vs Passive Attack | Types of Active Attacks | Types of Passive Attacks | Hindi | ICS
Переглядів 1,5 тис.4 роки тому
Active Attack vs Passive Attack | Types of Active Attacks | Types of Passive Attacks | Hindi | ICS
What is Computer Forensics ? its Role ,Objectives and Priorities | Digital Forensics | Hindi
Переглядів 38 тис.4 роки тому
What is Computer Forensics ? its Role ,Objectives and Priorities | Digital Forensics | Hindi
Who can use Computer Forensic Evidence ? | Digital Forensics | Hindi
Переглядів 1,5 тис.4 роки тому
Who can use Computer Forensic Evidence ? | Digital Forensics | Hindi
10 Tips to avoid Virus / Trojan / Worm | Virus vs Trojan | Virus vs Worm | Virus vs Trojan vs Worm
Переглядів 7114 роки тому
10 Tips to avoid Virus / Trojan / Worm | Virus vs Trojan | Virus vs Worm | Virus vs Trojan vs Worm
Steps taken by Computer Forensic Specialist | Processing steps of conduction of investigation |Hindi
Переглядів 2,7 тис.4 роки тому
Steps taken by Computer Forensic Specialist | Processing steps of conduction of investigation |Hindi
Occurence Of Cyber Crime | How Cyber Detective track them ? | Digital Forensics | Hindi
Переглядів 6454 роки тому
Occurence Of Cyber Crime | How Cyber Detective track them ? | Digital Forensics | Hindi
Fighting Cyber Crime with Risk Management Techniques | Digital Forensics | Hindi
Переглядів 9934 роки тому
Fighting Cyber Crime with Risk Management Techniques | Digital Forensics | Hindi
Legal Evidences | Digital Evidences | Computer Forensic Evidences | Digital Forensics
Переглядів 9794 роки тому
Legal Evidences | Digital Evidences | Computer Forensic Evidences | Digital Forensics
Computer Forensic Services in hindi | Digital Forensics | Examples
Переглядів 7 тис.4 роки тому
Computer Forensic Services in hindi | Digital Forensics | Examples
Best👍👍👍
Very useful
you provide best explaination with simple and easy language thanks a lot
Very nice explanation sir
1. Financial fraud Detection and prevention. 2. To trace cyber criminals or cyber terrorist. 3. Recover lost or deleted information. 4. Cyber crime (Monitoring and investigating )
Boht achhe se smjhaya bhai
tomorrow is my exam watching one day before, still confident. Thank you
Same here UTU😂
theek hai
Great 👍
How can I download your ppt?? link doesn't work
Nice explanation 🕺👍
Thank a lot for this information
nice explain with live certificate
5:30 lakho kalodo log 😂😂
bhai symmetric aur asymmetric alag se describe karo.ek ko bolte bolte direct dusre me kud gaye to dikkat ho jta ha thora samajne me.
bhai agali bar thik hai thoda kam bolna
Very nice
Voice not attractive bro
Good bro
You are great man...I have watched whole Playlist of cloud...I can't tell you how helpful is this going to be for our exams!!!!
Happy to help
Thanks
Wow yaar kitne achhe se samjaya hai thank you so much
Thank you so much ❤
beautifully explained!!! thank you so much
Glad it was helpful!
Shabash
ua-cam.com/video/9VNf9EjO6Vw/v-deo.htmlsi=Bwd-T-EgTxBmu9Ij
Phone hack hoga kya?
Content aor explanation aachha he but audio qality improve kijiye
Thanks😊
Thanku sir
System❌ Sistimm✅
Sir course karna hai... digital forensics ka
bolna aaata hai tereko seeystemm seeystemm kr raha hai 🐒
seeystemmm seeystemm
Thanks sir
very good work sir ❤❤
Aap ka link bhejo phir sir aapne to link bhi nahi Diya
Bilkul bakwas
Well explained ❤
thank you sir
Tomorrow Am going to Present a Seminar... About this topic... Thnk you for making me easy.. By explaining this topic ..!
Bklode dimag tattoo me h kya tera, betichod host and VM security both videos are same. Eske ma ki tan tana tan
Har video me comment karuga best padha rahe ho
Best sir ❤❤
Best sirr
Sir tileaar sound ni aari paan thukkr try krna next time
Good brother 👍
Notes links is not working....
Yes..
Thank you bhai ❤
Best explanation ever I seen ! 👍