Zixplain
Zixplain
  • 151
  • 938 698
kerberos authentication process | kerberos in cryptography and network security|kerberos version 4
kerberos authentication process | kerberos in cryptography and network security|kerberos version 4 :
here we have explained about kerberos authentication process in very simple and easy way along with example. kerberos in cryptography and network security very important for exam point of view. kerberos has many versions such as kerberos version 4 and kerberos version 5 .
#kerberos,#kerberosversion4,#kerberosauthenticationprocess.
Welcome to 10hour4Exam ,I have Created this channel 10hour4Exam to share my knowledge of B.E. and B.tec computer Science Subjects to the person like me, who sit to study complete Subjects just before the Exams and want to Clear Semester Exams with good score in just 10hour.I think you study smartly 10hour are enough 4Exam.
Note:this channel is basically for CS/IT B.E. and B.tec SEMESTER EXAMS only.
plzz subcribe this channel 10hour4Exam to Appreciate my work:-ua-cam.com/channels/A2XGXCzJ_DRJRAq5ZchSzg.html
Download My PPT and Notes Unit wise:-drive.google.com/drive/u/1/my-drive?ogsrc=32
Переглядів: 3 432

Відео

Man in the middle attack in hindi | man in the middle attack in network security | Example
Переглядів 4,7 тис.4 роки тому
Man in the middle attack in hindi | man in the middle attack in network security | Example: here i have explained about man in the middle attack in hindi along with example. man in the middle attack in network security plays very important role.Man in the middle attack is type of passive attack. #maninthemiddleattack,#maninthemiddleattackinhindi,#networksecurity Welcome to 10hour4Exam ,I have C...
Model of network security| Network Security Model|Information and Cyber Security | Hindi | ICS |CNS
Переглядів 2,5 тис.4 роки тому
Model of network security| Network Security Model|Information and Cyber Security | Hindi | ICS |CNS: here i have explained about Model of network security also known as Network Security Model which is very important in information and cyber security and network cyber security.model of network security in cryptography is used very frequently. #modelofnetworksecurity,#networksecuritymodel,#ics,#c...
PKI infrastructure:Public key infrastructure | PKI concepts in hindi | PKI certificates explained
Переглядів 15 тис.4 роки тому
PKI infrastructure:Public key infrastructure | PKI concepts in hindi | PKI certificates explained: here i have explained about PKI infrastructure also known as Public key infrastructure this very important in network security and information security.I also explained what is pki certificates in very easy and simple way. #pkiinfrastructure,#pkicertificates,#networksecurity,#ics,#cns Welcome to 1...
Security Mechanism:Security mechanisms in network security | information security | hindi |ICS | CNS
Переглядів 6894 роки тому
Security Mechanism:Security mechanisms in network security | information security | hindi |ICS | CNS: here i have explained about Security Mechanism in which Security mechanisms in network security is very useful to handle security issues.Security mechanism is also very important in information and cyber security i have explained this in very simple way. #securitymechanism,#networksecurity,#inf...
SSL in network security |Secure Socket Layer (SSL)l SSL Protocol Stack Explained in Hindi|SSL header
Переглядів 1,4 тис.4 роки тому
SSL in network security |Secure Socket Layer (SSL)l SSL Protocol Stack Explained in Hindi|SSL header: here i have explained about SSL protocol which is nothing but Secure Socket Layer (SSL) and SSL in network security and information security very useful as SSL provides security to IP protocol.I also explained about SSL Protocol Stack,plzz watch full video. #SSL,#SSLinnetworksecurity,#sslprotoc...
Trusted System:Trusted System in network security| cryptography and network security| ICS|CNS |Hindi
Переглядів 13 тис.4 роки тому
Trusted System:Trusted System in network security| cryptography and network security| ICS|CNS |Hindi: here i have explained about Trusted System which is very important in network security. and Trusted System used in cryptography and network security as well.I explained trusted system and its 4 characteristics. #trustedsystem,#trustedsysteminnetworksecurity Welcome to 10hour4Exam ,I have Create...
Intrusion Detection System (IDS) | Intrusion Prevention System (IPS) | IDS vs IDS | Network Security
Переглядів 32 тис.4 роки тому
Intrusion Detection System (IDS) | Intrusion Prevention System (IPS) | IDS vs IDS | Network Security: here i have explained about Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) in very easy way along with their examples.I also highlighted major difference between IDS vs IPS .and how Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) works with example...
Types of Firewall:Types of firewall in network security | Types of firewall in information security
Переглядів 1,6 тис.4 роки тому
Types of Firewall:Types of firewall in network security | Types of firewall in information security: here i have explained about Types of Firewall and how it is important in information security and network security.There are 3 main Types of Firewall 1)Packet filtering Router 2)Application level gateway 3)Circuit Gateway #Typesoffirewall,#ics,#cns Welcome to 10hour4Exam ,I have Created this cha...
x.509 Certificate: x.509 certificate format |Network Security| Information Security| ICS |CNS| Hindi
Переглядів 9 тис.4 роки тому
x.509 Certificate: x.509 certificate format |Network Security| Information Security| ICS |CNS| Hindi: here i have explained about x.509 certificate format in detail with diagram and example. x.509 Certificate in network security and information security used frequently as standard x.509 certificate format for digital verification and identification.In cryptography, X. 509 is a standard defining...
Hash Function:What is hash function ? Advantages and Disadvantages of hash function | ICS | CNS
Переглядів 2,7 тис.4 роки тому
Hash Function:What is hash function ? Advantages and Disadvantages of hash function | ICS | CNS : here i have explained about Hash Function with example.I explained What is hash function ? and then Advantages and Disadvantages of hash function in very simple and easy way with Diagram and example. #hashfunction,#hashfuctionexample,#ics,#cns Welcome to 10hour4Exam ,I have Created this channel 10h...
KDC (Key Distribution Center): KDC in information security |KDC in cryptography in hindi | Hindi
Переглядів 7 тис.4 роки тому
KDC (Key Distribution Center): KDC in information security |KDC in cryptography in hindi | Hindi: here i have explained about KDC i.e Key Distribution Center in very simple way along with KDC example.KDC is useful in information security and KDC in cryptography as well. this very important network security and cyber security. #KDC,#keydistributioncenter,#ics,#cns Welcome to 10hour4Exam ,I have ...
IPsec: ipsec header format | authentication header | IP Security Protocol | IPsec in hindi |ICS|CNS
Переглядів 4694 роки тому
Welcome to 10hour4Exam ,I have Created this channel 10hour4Exam to share my knowledge of B.E. and B.tec computer Science Subjects to the person like me, who sit to study complete Subjects just before the Exams and want to Clear Semester Exams with good score in just 10hour.I think you study smartly 10hour are enough 4Exam. Note:this channel is basically for CS/IT B.E. and B.tec SEMESTER EXAMS o...
ICS (information and cyber security):Some important Terminology in ICS | CNS | Hindi
Переглядів 984 роки тому
ICS (information and cyber security):Some important Terminology in ICS | CNS | Hindi: here i have explained about Some important Terminology in ICS i.e. information and cyber security . and these terms are very useful while learning about cyber security. #ICSterminology,#icsterms,#cnsterms,#ics Welcome to 10hour4Exam ,I have Created this channel 10hour4Exam to share my knowledge of B.E. and B.t...
Goals of ICS (information and cyber security) : what are the Goals or Objective of ICS | CNS | Hindi
Переглядів 724 роки тому
Goals of ICS (information and cyber security) : what are the Goals or Objective of ICS | CNS | Hindi: here i have explained about Goals of ICS (information and cyber security) in very simple and easy to understand form along with Diagram and example.what is firewall and why we use firewall and how firewall works i answered all of these questions. #goalsofics,#ics,#cns Welcome to 10hour4Exam ,I ...
Firewall: what is Firewall ? why we use Firewall ? | Firewall Block Diagram |How Firewall works |ICS
Переглядів 1764 роки тому
Firewall: what is Firewall ? why we use Firewall ? | Firewall Block Diagram |How Firewall works |ICS
Elements of ICS | Attributes of ICS | information and cyber security | ICS | CNS | Hindi
Переглядів 724 роки тому
Elements of ICS | Attributes of ICS | information and cyber security | ICS | CNS | Hindi
Digital Signature: what is Digital Signature ?Requirements of Digital Signature |Digital Certificate
Переглядів 5804 роки тому
Digital Signature: what is Digital Signature ?Requirements of Digital Signature |Digital Certificate
Conventional Security Model :What is the Conventional encryption model ? | ICS | CNS | Hindi
Переглядів 4,1 тис.4 роки тому
Conventional Security Model :What is the Conventional encryption model ? | ICS | CNS | Hindi
Confusion vs Diffusion : Difference between Confusion and Diffusion | information and cyber security
Переглядів 3,2 тис.4 роки тому
Confusion vs Diffusion : Difference between Confusion and Diffusion | information and cyber security
Difference between Centralized key distribution and Decentralized key distribution | Hindi| ICS| CNS
Переглядів 1,2 тис.4 роки тому
Difference between Centralized key distribution and Decentralized key distribution | Hindi| ICS| CNS
Active Attack vs Passive Attack | Types of Active Attacks | Types of Passive Attacks | Hindi | ICS
Переглядів 1,5 тис.4 роки тому
Active Attack vs Passive Attack | Types of Active Attacks | Types of Passive Attacks | Hindi | ICS
What is Computer Forensics ? its Role ,Objectives and Priorities | Digital Forensics | Hindi
Переглядів 38 тис.4 роки тому
What is Computer Forensics ? its Role ,Objectives and Priorities | Digital Forensics | Hindi
Who can use Computer Forensic Evidence ? | Digital Forensics | Hindi
Переглядів 1,5 тис.4 роки тому
Who can use Computer Forensic Evidence ? | Digital Forensics | Hindi
10 Tips to avoid Virus / Trojan / Worm | Virus vs Trojan | Virus vs Worm | Virus vs Trojan vs Worm
Переглядів 7114 роки тому
10 Tips to avoid Virus / Trojan / Worm | Virus vs Trojan | Virus vs Worm | Virus vs Trojan vs Worm
Steps taken by Computer Forensic Specialist | Processing steps of conduction of investigation |Hindi
Переглядів 2,7 тис.4 роки тому
Steps taken by Computer Forensic Specialist | Processing steps of conduction of investigation |Hindi
Occurence Of Cyber Crime | How Cyber Detective track them ? | Digital Forensics | Hindi
Переглядів 6454 роки тому
Occurence Of Cyber Crime | How Cyber Detective track them ? | Digital Forensics | Hindi
Fighting Cyber Crime with Risk Management Techniques | Digital Forensics | Hindi
Переглядів 9934 роки тому
Fighting Cyber Crime with Risk Management Techniques | Digital Forensics | Hindi
Legal Evidences | Digital Evidences | Computer Forensic Evidences | Digital Forensics
Переглядів 9794 роки тому
Legal Evidences | Digital Evidences | Computer Forensic Evidences | Digital Forensics
Computer Forensic Services in hindi | Digital Forensics | Examples
Переглядів 7 тис.4 роки тому
Computer Forensic Services in hindi | Digital Forensics | Examples

КОМЕНТАРІ